![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer software packages > General
'There is no doubt', dr. Kevin Nunley wrote, 'the Internet really is the biggest gold rush of our lifetime. It is unlikely you or I will get another chance as big as this one to earn huge profits anytime in the next 100 years. Someday people will look back and judge us as one of two groups: those who didn't recognize the Internet revolution and missed the greatest chance of our age, and those who smartly made a place for themselves in the new business model that will dominate the future. It is time to get on board. ' Ing. Adrian Mulder Content Editor Adrian Mulder is an Internet journalist who writes for major business computing magazines. He combines a technical background with a vast experience in the computer and business trade magazine industry The Ultimate Internet Advertising Guide Acknowledgements Many people and professionals have contributed directly or indirectly to this book. To name them all would be practically impossible, as there are many. Nevertheless the editors would like to mention a few of those who have made the production of this book possible. Executive Editor for SCN Education BV: Robert Pieter Schotema Publishing Manager: drs. Marieke Kok Marketing Coordinator: Martijn Robert Broersma Content Editor: ing. Adrian Mulder Editorial Support Dennis Gaasbeek, Rob Guijt, Richard van Winssen Interior Design: Paulien van Hemmen, Bach. Also, we would especially like to thank dr. Roland van Stigt for laying a solid foundation for the Hon Guide series to grow on.
This book contains the proceedings of two of the IFIP conferences that took place at the IFIP World Computer Congress 2010 in Brisbane, Australia. The proceedings of each conference are allocated separate parts in this book each with their own editors. E-Government and E-Services (EGES) page 3 Marijn Janssen / Winfried Lamersdorf Global Information Systems Processes (GISP) page 183 Jan Pries-Heje / Michael Rosemann Organization E-Government and E-Services (EGES 2010) EGES Co-chairs Marijn Janssen Delft, The Netherlands Winfried Lamersdorf Hamburg, Germany Lalit Sawhney Bangalore, India Leon Strous Helmond, The Netherlands EGES Reviewers Agarwal Ashok ACS Technologies Ltd., Bhoopal, India Mark Borman University of Sydney, Australia Erwin Fielt Queensland University of Technology, Brisbane, Australia Ernest Foo Queensland University of Technology, Brisbane, Australia M.P. Gupta Indian Institute of Technology Delhi, India Paul Henman The University of Queensland, Australia Ralf Klischewski German University, Cairo, Egypt Christine Leitner Donau-Universit. at Krems, Austria Miriam Lips Victoria University of Wellington, New Zealand Zoran Milosevic Deontic, Brisbane, Australia Oystein Sabo University of Agder, Norway Jochen Scholl University of Washington, Seattle, USA Leif Skiftenes University of Agder, Norway Weerakoddy Vishanth Brunel University Business School, West London, UK Dirk Werth DFKI, Saarbruc . . ken, Germany Maria Wimmer University Koblenz-Landau, Germany EGES Subreviewers Alexandra Chapko, Andreas Emrich and Marc Graessle German Research Center for Arti?cial Intelligence, Saarbruc .. ken, Germany Kristof Hamann, Kai Jander, Ante Vilenica and Sonja Zaplata University of Hamburg, Germany Global Information Systems Processes (GISP 2010) GISP Co-chairs Jan Pries-Heje Roskilde University, Denmark
After the dramatic failures of the dot coms in 2000 and 2001, many observers were quick to report on the death of electronic commerce. Investor confidence sagged, stock prices of technology firms in nearly all of the related sectors suffered. In reality, the picture is not nearly as dismal as the press would have us believe. E-commerce is not dead, but it has moved beyond its overhyped beginning stage. This book is an effort to sort through the hype, providing a realistic assessment of the state of electronic commerce today, and the important areas of opportunity and challenge for tomorrow. The book sees all kind of developments where e-business is becoming an integral part of 'traditional' business processes, with special emphasis on practical and policy importance. E-commerce scholars from a number of disciplines and countries contribute to assess the impact of the dot com bust and the current state of e-commerce.
Disease mapping involves the analysis of geo-referenced disease incidence data and has many applications, for example within resource allocation, cluster alarm analysis, and ecological studies. There is a real need amongst public health workers for simpler and more efficient tools for the analysis of geo-referenced disease incidence data. Bayesian and multilevel methods provide the required efficiency, and with the emergence of software packages a such as WinBUGS and MLwiN a are now easy to implement in practice. Provides an introduction to Bayesian and multilevel modelling in disease mapping. Adopts a practical approach, with many detailed worked examples. Includes introductory material on WinBUGS and MLwiN. Discusses three applications in detail a relative risk estimation, focused clustering, and ecological analysis. Suitable for public health workers and epidemiologists with a sound statistical knowledge. Supported by a Website featuring data sets and WinBUGS and MLwiN programs. "Disease Mapping with WinBUGS and MLwiN"A provides a practical introduction to the use of software for disease mapping for researchers, practitioners and graduate students from statistics, public health and epidemiology who analyse disease incidence data.
Organizations of all types struggle with information. Millions of dollars are spent on ERP applications to integrate data and yet this data still isn t accessible or relevant. Emails contain hidden liabilities. Safety manuals endanger workers. Worse, there is data and information being created and handled in every nook and cranny of large organizations, well out of view of formal oversight, but within view of customers and regulators. Thus far, any efforts to wrestle the "data-beast" to the ground have failed, and there exists a profound need for all levels of business management, not just IT, to understand the risks, challenges, and subsequent remediation value of treating information as a real asset. "Making Enterprise Information Management (EIM) Work for
Business" educates executives and middle management in a way that
speaks to "business" issues and solves "business" problems. The
book is divided into two parts, the first of which defines EIM,
addresses why it is required, and identifies the business issues
surrounding it. The second part acts as a field guide, or "how-to"
that explains how EIM can be worked into any organization via
various methodologies, techniques, templates, and business case
studies. *Organizes information modularly, so you can delve directly into the topics that you need to understand *Based in reality with practical case studies and a focus on getting the job done, even when confronted with tight budgets, resistant stakeholders, and security and compliance issues. *Includes applicatory templates, examples, and advice for executing every step of an EIM program. "
This book constitutes the refereed proceedings of the 19th International Conference on Innovations for Community Services, I4CS 2019, held in Wolfsburg, Germany, in June 2019. The 16 revised full papers presented in this volume were carefully reviewed and selected from 43 submissions. The papers are organized in topical sections on communication systems; teaching and collaboration; smart cities; innovations and digital transformation; data analytics and models; community and quality.
The importance of demonstrating the value achieved from IT investments is long established in the Computer Science (CS) and Information Systems (IS) literature. However, emerging technologies such as the ever-changing complex area of cloud computing present new challenges and opportunities for demonstrating how IT investments lead to business value. Recent reviews of extant literature highlights the need for multi-disciplinary research. This research should explore and further develops the conceptualization of value in cloud computing research. In addition, there is a need for research which investigates how IT value manifests itself across the chain of service provision and in inter-organizational scenarios. This open access book will review the state of the art from an IS, Computer Science and Accounting perspective, will introduce and discuss the main techniques for measuring business value for cloud computing in a variety of scenarios, and illustrate these with mini-case studies.
This two-volume set LNCS 11578 and 11579 constitutes the refereed proceedings of the 11th International Conference on Social Computing and Social Media, SCSM 2019, held in July 2019 as part of HCI International 2019 in Orlando, FL, USA. HCII 2019 received a total of 5029 submissions, of which 1275 papers and 209 posters were accepted for publication after a careful reviewing process. The 81 papers presented in these two volumes are organized in topical sections named: Social Media Design and Development, Human Behaviour in Social Media, Social Network Analysis, Community Engagement and Social Participation, Computer Mediated Communication, Healthcare Communities, Social Media in Education, Digital Marketing and Consumer Experience.
What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally networked information society? The increasing div- sity of information and communication technologies and their equally wide range of usage in personal, professional and official capacities raise challenging questions of identity in a variety of contexts. The aim of the IFIP/FIDIS Summer Schools has been to encourage young a- demic and industry entrants to share their own ideas about privacy and identity m- agement and to build up collegial relationships with others. As such, the Summer Schools have been introducing participants to the social implications of information technology through the process of informed discussion. The 4th International Summer School took place in Brno, Czech Republic, during September 1-7, 2008. It was organized by IFIP (International Federation for Infor- tion Processing) working groups 9.2 (Social Accountability), 9.6/11.7 (IT Misuse and the Law) and 11.6 (Identity Management) in cooperation with the EU FP6 Network of Excellence FIDIS and Masaryk University in Brno. The focus of the event was on security and privacy issues in the Internet environment, and aspects of identity m- agement in relation to current and future technologies in a variety of contexts.
This double volumes LNCS 11229-11230 constitutes the refereed proceedings of the Confederated International Conferences: Cooperative Information Systems, CoopIS 2018, Ontologies, Databases, and Applications of Semantics, ODBASE 2018, and Cloud and Trusted Computing, C&TC, held as part of OTM 2018 in October 2018 in Valletta, Malta. The 64 full papers presented together with 22 short papers were carefully reviewed and selected from 173 submissions. The OTM program every year covers data and Web semantics, distributed objects, Web services, databases, informationsystems, enterprise workflow and collaboration, ubiquity, interoperability, mobility, grid and high-performance computing.
This book constitutes revised selected papers from the 17th Workshop on e-Business, WeB 2018, which took place in Santa Clara, CA, USA, in December 2018. The purpose of WeB is to provide an open forum for e-Business researchers and practitioners world-wide, to share topical research findings, explore novel ideas, discuss success stories and lessons learned, map out major challenges, and collectively chart future directions for e-Business. The WeB 2018 theme was "The Ecosystem of e-Business: Technologies, Stakeholders, and Connections." There was a total of 47 submissions and 41 papers were presented at the conference. Of these, 19 revised papers are presented in this volume. These contributions are organized in the following topical sections: social, policy, and privacy issues; e-market; FinTech; and artificial intelligence.
This book constitutes the refereed proceedings of the workshops and special session co-located with the 17th International Conference on Practical Applications of Agents and Multi-Agent Systems, PAAMS 2019, held in Avila, Spain, in June 2019. The total of 26 full and 8 short papers presented in this volume were carefully reviewed and selected from 47 submissions. The book also contains extended abstracts of the doctoral consortium contributions. The papers in this volume stem from the following meetings: Workshop on Agents-Based Solutions for Manufacturing and Supply Chain, AMSC; Second International Workshop on Blockchain Technology for Multi-Agent Systems, BTC4MAS; Workshop on MAS for Complex Networks and Social Computation; CNSC; Workshop on Multi-Agent Based Applications for Energy Markets, Smart Grids and Sustainable Energy Systems, MASGES; Workshop on Smart Cities and Intelligent Agents, SCIA; and Workshop on Swarm Intelligence and Swarm Robotics, SISR; as well as the special session on Software Agents and Virtualization for Internet of Things, SAVIoTS.
Security operations departments are growing in importance and recognition; they are responsible for the secure day to day running of an organisation's network, endpoint, application, identity and physical security controls. This book walks you through how to establish and grow a strong security operations team, including hiring the right people, knowing when to build a tool rather than buy, and crafting procedures that allow the team to detect and respond to a wide variety of security threats.
This book constitutes the refereed proceedings of the 18th International Conference on Innovations for Community Services, I4CS 2018, held in Zilina, Slovakia, in June 2018. The 14 revised full papers and the three revised short papers presented in this volume were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on architectures and management; data analytics and models; community and public collaboration; innovations and digital transformation.
This book constitutes the proceedings of the 23rd Ada-Europe International Conference on Reliable Software Technologies, Ada-Europe 2018, held in Lisbon, Portugal, in June 2018. The 10 papers presented in this volume were carefully reviewed and selected from 27 submissions. They were organized in topical sections named: safety and security; Ada 202X; handling implicit overhead; real-time scheduling; and new application domains.
Kenntnisse in VBA-Programmierung sind wichtig, um noch mehr aus Excel herauszuholen. Die Excel-Experten Michael Alexander und Dick Kusleika erklAren Ihnen zunAchst die Grundlagen von VBA. Dann geben Sie Ihnen einen Einblick in die wichtigsten Programmiertechniken. SpAter widmen Sie sich den fortgeschritteneren Techniken und erlAutern wie Sie UserForms arbeiten. Sie fA1/4hren Sie auch in viele scheinbar kleine, aber trotzdem wichtige Gebiete rund um Excel-VBA ein. So finden Sie in diesem Buch was Sie brauchen, ob Sie Einsteiger in Excel-VBA sind oder hier schon erste Erfahrungen gesammelt haben.
This book provides an extensive, up-to-date overview of the ways in which information and communication technologies (ICTs) can be used to develop tourism and hospitality. The coverage encompasses a wide variety of topics within the field, including virtual reality, sharing economy and peer-to-peer accommodation, social media use, hotel technology, big data, robotics, and recommendation systems, to name but a few. The content is based on the 2019 ENTER eTourism conference, organized in Nicosia, Cyprus by the International Federation for Information Technologies and Travel & Tourism (IFITT) - the leading independent global community for the discussion, exchange, and development of knowledge on the use and impact of new ICTs in the travel and tourism industry. The book offers a global perspective and rich source of information on important innovations and novel ideas. Though it will prove especially valuable for academics working in the eTourism field, it will also be of considerable interest to practitioners and students.
This two-volume set LNCS 11588 and 11589 constitutes the refereed proceedings of the 6th International Conference on Business, Government, and Organizations, HCIBGO 2019, held in July 2019 as part of HCI International 2019 in Orlando, FL, USA. HCII 2019 received a total of 5029 submissions, of which 1275 papers and 209 posters were accepted for publication after a careful reviewing process. The 63 papers presented in these two volumes are organized in topical sections named: Electronic, Mobile and Ubiquitous Commerce, eBanking and Digital Money, Consumer Behaviour, Business Information Systems, Dashboards and Visualization, Social Media and Big Data Analytics in B
Securing against operational interruptions and the theft of your data is much too important to leave to chance. By planning for the worst, you can ensure your organization is prepared for the unexpected. Enterprise Architecture and Information Assurance: Developing a Secure Foundation explains how to design complex, highly available, and secure enterprise architectures that integrate the most critical aspects of your organization's business processes. Filled with time-tested guidance, the book describes how to document and map the security policies and procedures needed to ensure cost-effective organizational and system security controls across your entire enterprise. It also demonstrates how to evaluate your network and business model to determine if they fit well together. The book's comprehensive coverage includes: Infrastructure security model components Systems security categorization Business impact analysis Risk management and mitigation Security configuration management Contingency planning Physical security The certification and accreditation process Facilitating the understanding you need to reduce and even mitigate security liabilities, the book provides sample rules of engagement, lists of NIST and FIPS references, and a sample certification statement. Coverage includes network and application vulnerability assessments, intrusion detection, penetration testing, incident response planning, risk mitigation audits/reviews, and business continuity and disaster recovery planning. Reading this book will give you the reasoning behind why security is foremost. By following the procedures it outlines, you will gain an understanding of your infrastructure and what requires further attention.
The idea behind Docker is simple. Create a tiny virtual environment called a container that holds just your application and its dependencies. The Docker engine uses the host operating system to keep track of your containers. Applications running inside containers share resources, making their footprints small. They are easy to install, manage, and remove. Docker in Action, Second Edition teaches you to create, deploy, and manage applications hosted in Docker containers running on Linux. Fully updated, with four new chapters and revised best practices and examples, this second edition begins with a clear explanation of the Docker model. Then, you go hands-on with packaging applications, testing, installing, running programs securely, and deploying them across a cluster of hosts. With examples showing how Docker benefits the whole dev lifecycle, you'll discover techniques for everything from dev-and-test machines to full-scale cloud deployments.
|
You may like...
Smart Technology Applications in…
Tomayess Issa, Piet Kommers, …
Hardcover
R5,342
Discovery Miles 53 420
Diverse Perspectives and…
Thomas M. Connolly, Petros Papadopoulos, …
Hardcover
R8,550
Discovery Miles 85 500
Developing Curriculum for Emergency…
Susana Silva, Paula Peres, …
Hardcover
R5,370
Discovery Miles 53 700
Current Trends in Cybersecurity and…
Remberto Jimenez, Veronica E O'Neill
Hardcover
R6,810
Discovery Miles 68 100
College Technology Survival Kit
Marianne Daugharthy, Alanna Duley
Paperback
|