0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (114)
  • R250 - R500 (362)
  • R500+ (2,316)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer software packages > General

Social Media: The Good, the Bad, and the Ugly - 15th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E... Social Media: The Good, the Bad, and the Ugly - 15th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2016, Swansea, UK, September 13-15, 2016, Proceedings (Paperback, 1st ed. 2016)
Yogesh K. Dwivedi, Matti Mantymaki, M. N. Ravishankar, Marijn Janssen, Marc Clement, …
R1,532 Discovery Miles 15 320 Ships in 18 - 22 working days

This book constitutes the refereed conference proceedings of the 15th IFIP WG 6.11 Conference on e-Business, e-Services and e-Society, I3E 2016, held in Swansea, UK, in September 2016 The 47 full and 17 short papers presented were carefully reviewed and selected from 90 submissions. They are organized in the following topical sections: social media strategy and digital business; digital marketing and customer relationship management; adoption and diffusion; information sharing on social media; impression, trust, and risk management; data acquisition, management and analytics; e-government and civic engagement; e-society and online communities.

Digital Transformation of the Financial Industry - Approaches and Applications (Hardcover, 1st ed. 2023): Slađana Benković,... Digital Transformation of the Financial Industry - Approaches and Applications (Hardcover, 1st ed. 2023)
Slađana Benković, Aleksandra Labus, Miloš Milosavljević
R4,323 Discovery Miles 43 230 Ships in 10 - 15 working days

This book presents a collection of state-of-the-art research findings on the digital transformation of financial services. Digitalization has fundamentally changed financial services and has a tendency to reshape the landscape of the financial industry in an unprecedented manner. Over the last ten years, the development of new financial technologies has contributed to the creation of new business and organizational models, along with new approaches to service delivery. By encompassing significant conceptual contributions, innovations in methods and techniques, and by delineating the main applications of digital transformation in Central and Eastern Europe (CEE), the volume extends current knowledge on digital transformation in the financial industry.  The book is divided into two parts. The first part provides a social-science perspective on digital transformation in the financial industry. The second part provides the most recent evidence on how financial technologies are transforming financial services on the markets, and how the adoption of modern information technologies fosters setting up new financial services. Further, this part outlines new approaches to digital transformation in the financial industry. This book will appeal to students, scholars, and researchers of finance, monetary economics, and business, as well as practitioners interested in a better understanding of the digital transformation of financial services, new financial technologies, and innovations in finance. 

Digital transformation (Paperback): Tom Rozsas Digital transformation (Paperback)
Tom Rozsas
R253 Discovery Miles 2 530 Ships in 18 - 22 working days
Multidisciplinary Social Networks Research - Second International Conference, MISNC 2015, Matsuyama, Japan, September 1-3,... Multidisciplinary Social Networks Research - Second International Conference, MISNC 2015, Matsuyama, Japan, September 1-3, 2015. Proceedings (Paperback, 1st ed. 2015)
Leon Wang, Shiro Uesugi, I-Hsien Ting, Koji Okuhara, Kai Wang
R2,946 Discovery Miles 29 460 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Second International Multidisciplinary Social Networks Conference, MISNC 2015, held in Matsuyama, Japan, in September 2015. The 49 full papers presented were carefully reviewed and selected from 125 submissions. The papers deal with the following topics: multidisciplinary research on social networks; ethical issues related to SNS; information technology and social networks mining.

Research and Practical Issues of Enterprise Information Systems - 10th IFIP WG 8.9 Working Conference, CONFENIS 2016, Vienna,... Research and Practical Issues of Enterprise Information Systems - 10th IFIP WG 8.9 Working Conference, CONFENIS 2016, Vienna, Austria, December 13-14, 2016, Proceedings (Paperback, 1st ed. 2016)
A. Min Tjoa, Li Da Xu, Maria Raffai, Niina Maarit Novak
R2,291 Discovery Miles 22 910 Ships in 18 - 22 working days

This book constitutes the proceedings of the 10th International IFIP WG 8.9 Working Conference on Research and Practical Issues of Enterprise Information Systems, CONFENIS 2016, held in Vienna, Austria, in December 2016. The conference provided an international forum for the broader IFIP community to discuss the latest research findings in the area of EIS and specifically aimed at facilitating the exchange of ideas and advances on all aspects and developments of EIS. The 25 papers presented in this volume were carefully reviewed and selected from 63 submissions. They were organized in topical sections on: semantic concepts and open data; customer relationship management; security and privacy issues; advanced manufacturing and management aspects; business intelligence and big data; decision support in EIS; and EIS-practices.

Modernizing Oracle Tuxedo Applications with Python - A practical guide to using Oracle Tuxedo in the 21st century (Paperback):... Modernizing Oracle Tuxedo Applications with Python - A practical guide to using Oracle Tuxedo in the 21st century (Paperback)
Aivars Kalvans
R1,223 Discovery Miles 12 230 Ships in 18 - 22 working days

Learn Tuxedo by developing solutions in Python for real-world problems Key Features Understand Tuxedo through a modern lens by experimenting with Python code Boost your productivity by using Python programming to perform common Tuxedo programming tasks Manage real-world integration tasks with small Python programs Book DescriptionDespite being developed in the 1980s, Oracle Tuxedo still runs a significant part of critical infrastructure and is not going away any time soon. Modernizing Oracle Tuxedo Applications with Python will help you get to grips with the most important Tuxedo concepts by writing Python code. The book starts with an introduction to Oracle Tuxedo and guides you in installing its latest version and Python bindings for Tuxedo on Linux. You'll then learn how to build your first server and client, configure Tuxedo, and start running an application. As you advance, you'll understand load balancing and work with the BBL server, which is at the heart of a Tuxedo application. This Tuxedo book will also cover Boolean expressions and different ways to export Tuxedo buffers for storage and transmission, before showing you how to implement servers and clients and use the management information base to change the configuration dynamically. Once you've learned how to configure Tuxedo for transactions and control them in application code, you'll discover how to use the store-and-forward functionality to reach destinations and use an Oracle database from a Tuxedo application. By the end of this Oracle Tuxedo book, you'll be able to perform common Tuxedo programming tasks with Python and integrate Tuxedo applications with other parts of modern infrastructure. What you will learn Understand Oracle Tuxedo as a microservice platform Develop Oracle Tuxedo applications using Python 3 Perform administration tasks programmatically with Python 3 Extract Tuxedo statistics for monitoring application performance Integrate Tuxedo into the modern software ecosystem Understand how distributed transactions work in Tuxedo Who this book is forThis book is for developers who are new to Tuxedo and are looking to develop a new modern front-end or integrate Tuxedo in their applications. The book will also help experienced Tuxedo, C or COBOL developers to improve their productivity and QA engineers to automate Tuxedo application tests. Beginner-level knowledge of Python and Linux shell is required before getting started with this book.

Privacy Technologies and Policy - 4th Annual Privacy Forum, APF 2016, Frankfurt/Main, Germany, September 7-8, 2016, Proceedings... Privacy Technologies and Policy - 4th Annual Privacy Forum, APF 2016, Frankfurt/Main, Germany, September 7-8, 2016, Proceedings (Paperback, 1st ed. 2016)
Stefan Schiffner, Jetzabel Serna, Demosthenes Ikonomou, Kai Rannenberg
R1,941 Discovery Miles 19 410 Ships in 18 - 22 working days

This book constitutes the refereed conference proceedings of the 4th Annual Privacy Forum, APF 2016, held in Frankfurt/Main, Germany, in September 2016. The 12 revised full papers presented in this volume were carefully reviewed and selected from 32 submissions. The papers are organized in three sessions: eIDAS and data protection regulation; IoT and public clouds; and privacy policies and privacy risk presentation.

Practical Remote Pair Programming - Best practices, tips, and techniques for collaborating productively with distributed... Practical Remote Pair Programming - Best practices, tips, and techniques for collaborating productively with distributed development teams (Paperback)
Adrian Bolboaca
R825 Discovery Miles 8 250 Ships in 18 - 22 working days

A practical guide for developers, development teams, and managers to successfully implement remote pair programming techniques and styles that better fit their organization's environment Key Features Implement remote pair programming best practices in your organization to increase productivity in software development teams Overcome the challenges in communication while working with distributed teams across the globe Explore remote pair programming tools and learn smart ways to use them efficiently Book DescriptionRemote pair programming takes pair programming practices to the next level by allowing you and your team members to work effectively in distributed teams. This helps ensure that you continuously improve code quality, share equal ownership of the code, facilitate knowledge sharing, and reduce bugs in your code. If you want to adopt remote pair programming within your development team, this book is for you. Practical Remote Pair Programming takes you through various techniques and best practices for working with the wide variety of tools available for remote pair programming. You'll understand the significance of pair programming and how it can help improve communication within your team. As you advance, you'll get to grips with different remote pair programming strategies and find out how to choose the most suitable style for your team and organization. The book will take you through the process of setting up video and audio tools, screen sharing tools, and the integrated development environment (IDE) for your remote pair programming setup. You'll also be able to enhance your remote pair programming experience with source control and remote access tools. By the end of this book, you'll have the confidence to drive the change of embracing remote pair programming in your organization and guide your peers to improve productivity while working remotely. What you will learn Develop a structured organizational approach to implementing pair programming and using it effectively Understand how pair programming fosters better communication inside and outside the team Organize remote pair programming and choose the right style for your organization Set up screen sharing, IDE, source control rules, audio, and video for your remote pair programming setup Use various pair programming techniques and styles in the context of a remote environment Enhance your remote pair programming experience with source control and remote access tools Who this book is forThis book is for any developer who wants to understand the different practical aspects involved in remote pair programming and adopt them in their existing development teams. If you're a team leader or technical manager, this book will serve as a manual for implementing remote pair programming covering the best resources for you to manage communication and collaboration using pair programming with your team members working remotely in distributed teams.

Attribute-based Credentials for Trust - Identity in the Information Society (Paperback, Softcover reprint of the original 1st... Attribute-based Credentials for Trust - Identity in the Information Society (Paperback, Softcover reprint of the original 1st ed. 2015)
Kai Rannenberg, Jan Camenisch, Ahmad Sabouri
R3,684 Discovery Miles 36 840 Ships in 18 - 22 working days

The need for information privacy and security continues to grow and gets increasingly recognized. In this regard, Privacy-preserving Attribute-based Credentials (Privacy-ABCs) are elegant techniques to provide secure yet privacy-respecting access control. This book addresses the federation and interchangeability of Privacy-ABC technologies. It defines a common, unified architecture for Privacy-ABC systems that allows their respective features to be compared and combined Further, this book presents open reference implementations of selected Privacy-ABC systems and explains how to deploy them in actual production pilots, allowing provably accredited members of restricted communities to provide anonymous feedback on their community or its members. To date, credentials such as digitally signed pieces of personal information or other information used to authenticate or identify a user have not been designed to respect the users' privacy. They inevitably reveal the identity of the holder even though the application at hand often needs much less information, e.g. only the confirmation that the holder is a teenager or is eligible for social benefits. In contrast, Privacy-ABCs allow their holders to reveal only their minimal information required by the applications, without giving away their full identity information. Privacy-ABCs thus facilitate the implementation of a trustworthy and at the same time privacy-respecting digital society. The ABC4Trust project as a multidisciplinary and European project, gives a technological response to questions linked to data protection. Viviane Reding (Former Vice-president of the European Commission, Member of European Parliament)

The Agile Consultant - Guiding Clients to Enterprise Agility (Paperback, 1st ed.): Rick Freedman The Agile Consultant - Guiding Clients to Enterprise Agility (Paperback, 1st ed.)
Rick Freedman
R2,020 R1,773 Discovery Miles 17 730 Save R247 (12%) Ships in 18 - 22 working days

Learn the agile philosophy of lean processes, incremental delivery, deep client participation, decentralized authority, and just-in-time planning to bring speed, creativity, empowerment and increased productivity to product development. This book is your guide to becoming the go-to advisor for the enterprise agile transition. Many organizations have brought in agile coaches and achieved great progress in software development productivity, only to find teams slipping back into old methods as they encounter enterprise resistance and dysfunction. The consultative skills required to engage at the enterprise level differ greatly from those needed to coach teams in agile practices. Agile coaches and consultants need to up their game to successfully partner with executives, managers, and PMOs to evolve from traditional methods to a lean, agile mindset. The Agile Consultant, by former Intel Worldwide Project Management Director and agile expert Rick Freedman, author of Amazon best-seller The IT Consultant, shows how to overcome transition challenges and move beyond team-level practice coaching to guide the entire organization to enterprise agility. Agile methods are displacing traditional, process-heavy project management techniques, and are poised to migrate from software development to the rest of IT, and to the entire enterprise. Agile's rapid adoption proves a simple truth: agility works! Agile methods are here to stay, and will continue to expand within the organization. Enterprises are rapidly moving beyond agile development to agile IT, agile marketing, and agile strategic planning. Enterprises need agile coaches and consultants to guide them towards achieving the benefits of agility. What You'll Learn Instill effective agile practices across the enterprise Coach teams, managers, and executives in learning, adopting, and practicing lean and agile strategies Diagnose the roadblocks and obstacles most organizations encounter during the transition to agile Use recognized change-management techniques to guide the enterprise to agility while minimizing disruption and resistance Navigate the many challenges that can derail the transition to agility Demonstrate the critical mix of facilitation, interpersonal, and relationship skills to help organizations succeed with agile Guide the corporate culture toward agility from the top down and the bottom up Evolve from old school project management thinking to a lean, agile mindset Who This Book Is For Besides IT consultants, The Agile Consultant will also appeal to developer teams, internal IT staffers and their managers, and to executives leading the transition to agile development.

Supply Chain Transformation - Evolving with Emerging Business Paradigms (Paperback, Softcover reprint of the original 1st ed.... Supply Chain Transformation - Evolving with Emerging Business Paradigms (Paperback, Softcover reprint of the original 1st ed. 2014)
Amiya K. Chakravarty
R2,354 Discovery Miles 23 540 Ships in 18 - 22 working days

Today, supply chain transformation for creating customer value continues to be a priority for many companies, as it enables them to gain a competitive advantage. While value creation is shaped by external drivers such as market volatility, technology, product and service offering and disruption, it can be stymied by the internal stresses arising from the need to minimize costs, limitations in process redesign, waste minimization and the unavailability of knowledge capital. Therefore, for companies to survive and prosper, the relevant questions to ask would be how to identify the external/internal forces driving changes and how to map the business drivers to the attributes of transformation. While the contemporary supply chain is well-structured, the evolving economic system is causing disruptions to this structure. The emergence of novel business paradigms - non applicability of the traditional laws of supply and demand, dominance of negative externality effects and anomalies of high growth rate coexisting with high supply side uncertainty - must be recognized in transforming supply chains. For example, healthcare delivery and humanitarian relief do not follow known supply/demand relationships; the negative externality effects are increasing sustainability concerns; and emerging economies, with dysfunctional business infrastructure, must manage high growth rates. This book delves into the transformation issues in supply chains and extends the concepts to incorporate emerging issues. It does so through ten chapters, divided into three sections. The first section establishes the framework for transformation, while the second focuses on the transformation of current chains in terms of products, processes, supply base, procurement, logistics and fulfillment. Section three is devoted to capturing the key issues in transforming supply chains for emerging economies, humanitarian relief, sustainability and healthcare delivery. This work will be of interest to both academics and industrial practitioners and will be of great value to graduate students in business and engineering. It raises many questions, some provocative and provides many leads for in-depth research. Several approaches are suggested for new problems along with a discussion of case studies and examples from different industries.

The RFID Roadmap: The Next Steps for Europe (Paperback, Softcover reprint of the original 1st ed. 2008): Gerd Wolfram, Birgit... The RFID Roadmap: The Next Steps for Europe (Paperback, Softcover reprint of the original 1st ed. 2008)
Gerd Wolfram, Birgit Gampl, Peter Gabriel
R3,110 Discovery Miles 31 100 Ships in 18 - 22 working days

RFID is a key technology for Europe. Today there is a noticeable shift away from the days of RFID pilot projects, and towards a time where organisations are looking to RFID to drive efficiency and innovation. Although Europe is a leading player in the world of RFID technology, several challenges which are preventing RFID from reaching its full potential need to be addressed. To further the advancement of this technology, coordinated European efforts need to be promoted, specifically in the areas of standardisation, user guidelines, legislation, technology development, and research and development. These themes have been analysed, and clear recommendations have been derived, stating what the different RFID stakeholders can do to support the technology. This book is aimed at decision makers in all fields of society, e.g. in companies, politics, business associations, etc. The publication is a summary of the results of the coordination action CE RFID - "Coordinating European Efforts in the RFID Value Chain" - and is a network of European RFID technology providers, vendors and end users. It aims at promoting the use of RFID technology and supporting further development. The project was funded by the European Commission under the 6th Framework Programme.

Advances in Intelligent Decision Technologies - Proceedings of the Second KES International Symposium IDT 2010 (Paperback,... Advances in Intelligent Decision Technologies - Proceedings of the Second KES International Symposium IDT 2010 (Paperback, Softcover reprint of the original 1st ed. 2010)
Gloria Phillips-Wren
R7,828 Discovery Miles 78 280 Ships in 18 - 22 working days

Intelligent Decision Technologies (IDT) seeks an interchange of research on intelligent systems and intelligent technologies which enhance or improve decision making in industry, government and academia. The focus is interdisciplinary in nature, and includes research on all aspects of intelligent decision technologies, from fundamental development to the applied system. This volume represents leading research from the Second KES International Symposium on Intelligent Decision Technologies (KES IDT'10), hosted and organized by the Sellinger School of Business and Management, Loyola University Maryland, USA, in conjunction with KES International. The symposium was concerned with theory, design development, implementation, testing and evaluation of intelligent decision systems. Topics include decision making theory, intelligent agents, fuzzy logic, multi-agent systems, Bayesian networks, optimization, artificial neural networks, genetic algorithms, expert systems, decision support systems, geographic information systems, case-based reasoning, time series, knowledge management systems, Kansei communication, rough sets, spatial decision analysis, and multi-criteria decision analysis. These technologies have the potential to revolutionize decision making in many areas of management, healthcare, international business, finance, accounting, marketing, military applications, ecommerce, network management, crisis response, building design, information retrieval, and disaster recovery.

Automated Machine Learning - Hyperparameter optimization, neural architecture search, and algorithm selection with cloud... Automated Machine Learning - Hyperparameter optimization, neural architecture search, and algorithm selection with cloud platforms (Paperback)
Adnan Masood; Foreword by Ahmed Sherif
R1,102 Discovery Miles 11 020 Ships in 18 - 22 working days

Get to grips with automated machine learning and adopt a hands-on approach to AutoML implementation and associated methodologies Key Features Get up to speed with AutoML using OSS, Azure, AWS, GCP, or any platform of your choice Eliminate mundane tasks in data engineering and reduce human errors in machine learning models Find out how you can make machine learning accessible for all users to promote decentralized processes Book DescriptionEvery machine learning engineer deals with systems that have hyperparameters, and the most basic task in automated machine learning (AutoML) is to automatically set these hyperparameters to optimize performance. The latest deep neural networks have a wide range of hyperparameters for their architecture, regularization, and optimization, which can be customized effectively to save time and effort. This book reviews the underlying techniques of automated feature engineering, model and hyperparameter tuning, gradient-based approaches, and much more. You'll discover different ways of implementing these techniques in open source tools and then learn to use enterprise tools for implementing AutoML in three major cloud service providers: Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform. As you progress, you'll explore the features of cloud AutoML platforms by building machine learning models using AutoML. The book will also show you how to develop accurate models by automating time-consuming and repetitive tasks in the machine learning development lifecycle. By the end of this machine learning book, you'll be able to build and deploy AutoML models that are not only accurate, but also increase productivity, allow interoperability, and minimize feature engineering tasks. What you will learn Explore AutoML fundamentals, underlying methods, and techniques Assess AutoML aspects such as algorithm selection, auto featurization, and hyperparameter tuning in an applied scenario Find out the difference between cloud and operations support systems (OSS) Implement AutoML in enterprise cloud to deploy ML models and pipelines Build explainable AutoML pipelines with transparency Understand automated feature engineering and time series forecasting Automate data science modeling tasks to implement ML solutions easily and focus on more complex problems Who this book is forCitizen data scientists, machine learning developers, artificial intelligence enthusiasts, or anyone looking to automatically build machine learning models using the features offered by open source tools, Microsoft Azure Machine Learning, AWS, and Google Cloud Platform will find this book useful. Beginner-level knowledge of building ML models is required to get the best out of this book. Prior experience in using Enterprise cloud is beneficial.

Strategies in E-Business - Positioning and Social Networking in Online Markets (Paperback, Softcover reprint of the original... Strategies in E-Business - Positioning and Social Networking in Online Markets (Paperback, Softcover reprint of the original 1st ed. 2014)
Ignacio Gil Pechuan, Daniel Palacios-Marques, Marta Peris Peris-Ortiz, Eduardo Vendrell, Cesar Ferri Ramirez
R3,060 Discovery Miles 30 600 Ships in 18 - 22 working days

In this volume, the authors apply insights from a variety of perspectives to explore the alignment among strategy, organization design, process and human resource management, and e-business practices on developing successful social networking programs-with particular regard to applying such initiatives against the backdrop of the global financial crisis and challenges to traditional business models. Showcasing in-depth case studies, the authors present emerging approaches to analyze the impact of investment in social networking sites, aligning internal resources, and measuring effects on positioning, branding, and new business creation. The fact that a growing proportion of the world population has a relationship with social networking sites could prove very valuable for companies. The question is whether this represents a business opportunity, whether companies know how to make the most of it and if they will make the necessary efforts to adapt to these new platforms. In the modern world, social networking sites have enormous potential for large as well as small and medium-sized enterprises (SMEs); most companies are aware of the need for a presence on social networking sites, but at present their e-business strategies are part of their medium and long-term strategic planning and only a small percentage have been put into practice. In short, this book attempts to answer the following questions: Is there a business opportunity for companies on social networking sites? Do they know how to make the most of it? Are they willing to make the necessary effort to adapt? Can e-business strategies contribute to company creation and the success of already existing businesses? And if so, how?

Computer Programming for Beginners and Cybersecurity - 4 MANUSCRIPTS IN 1: The Ultimate Manual to Learn step by step How to... Computer Programming for Beginners and Cybersecurity - 4 MANUSCRIPTS IN 1: The Ultimate Manual to Learn step by step How to Professionally Code and Protect Your Data. This Book includes: Python, Java, C ++ and Cybersecurity (Paperback)
Alan Grid
R1,139 R968 Discovery Miles 9 680 Save R171 (15%) Ships in 18 - 22 working days
Introduction to Public Key Infrastructures (Paperback, Softcover reprint of the original 1st ed. 2013): Johannes A. Buchmann,... Introduction to Public Key Infrastructures (Paperback, Softcover reprint of the original 1st ed. 2013)
Johannes A. Buchmann, Evangelos Karatsiolis, Alexander Wiesmaier
R2,147 Discovery Miles 21 470 Ships in 18 - 22 working days

The introduction of public key cryptography (PKC) was a critical advance in IT security. In contrast to symmetric key cryptography, it enables confidential communication between entities in open networks, in particular the Internet, without prior contact. Beyond this PKC also enables protection techniques that have no analogue in traditional cryptography, most importantly digital signatures which for example support Internet security by authenticating software downloads and updates. Although PKC does not require the confidential exchange of secret keys, proper management of the private and public keys used in PKC is still of vital importance: the private keys must remain private, and the public keys must be verifiably authentic. So understanding so-called public key infrastructures (PKIs) that manage key pairs is at least as important as studying the ingenious mathematical ideas underlying PKC. In this book the authors explain the most important concepts underlying PKIs and discuss relevant standards, implementations, and applications. The book is structured into chapters on the motivation for PKI, certificates, trust models, private keys, revocation, validity models, certification service providers, certificate policies, certification paths, and practical aspects of PKI. This is a suitable textbook for advanced undergraduate and graduate courses in computer science, mathematics, engineering, and related disciplines, complementing introductory courses on cryptography. The authors assume only basic computer science prerequisites, and they include exercises in all chapters and solutions in an appendix. They also include detailed pointers to relevant standards and implementation guidelines, so the book is also appropriate for self-study and reference by industrial and academic researchers and practitioners.

Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, DIMVA 2015, Milan, Italy,... Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings (Paperback, 2015 ed.)
Magnus Almgren, Vincenzo Gulisano, Federico Maggi
R2,322 Discovery Miles 23 220 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 12th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2015, held in Milan, Italy, in July 2015. The 17 revised full papers presented were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on attacks, attack detection, binary analysis and mobile malware protection, social networks and large-scale attacks, Web and mobile security, and provenance and data sharing.

HCI in Business, Government, and Organizations: eCommerce and Innovation - Third International Conference, HCIBGO 2016, Held as... HCI in Business, Government, and Organizations: eCommerce and Innovation - Third International Conference, HCIBGO 2016, Held as Part of HCI International 2016, Toronto, Canada, July 17-22, 2016, Proceedings, Part I (Paperback, 1st ed. 2016)
Fiona Fui-Hoon Nah, Chuan-Hoo Tan
R2,989 Discovery Miles 29 890 Ships in 18 - 22 working days

This volume constitutes the refereed proceedings of the Third International Conference on HCI in Business, Government and Organizations, HCIBGO 2016, held as part of the 18th International Conference on Human-Computer Interaction, HCII 2016, which took place in Toronto, Canada, in July 2016. HCII 2016 received a total of 4354 submissions, of which 1287 papers were accepted for publication after a careful reviewing process. The 53 papers presented in this volume are organized in topical sections named: social media for business; electronic, mobile and ubiquitous commerce; business analytics and visualization; branding, marketing and consumer behavior; and digital innovation.

The Practice of Enterprise Architecture - A Modern Approach to Business and IT Alignment (Paperback, 2nd ed.): Svyatoslav... The Practice of Enterprise Architecture - A Modern Approach to Business and IT Alignment (Paperback, 2nd ed.)
Svyatoslav Kotusev
R1,562 Discovery Miles 15 620 Ships in 18 - 22 working days
DevOps on the Microsoft Stack (Paperback, 1st ed.): Wouter de Kort DevOps on the Microsoft Stack (Paperback, 1st ed.)
Wouter de Kort
R2,732 Discovery Miles 27 320 Ships in 18 - 22 working days

This book tells you everything you need to know to help your organization implement DevOps on the Microsoft platform. You will learn how to use Visual Studio, Visual Studio Team Services, and Azure to implement a complete DevOps process in your company. You will learn about Agile Project Management, Continuous Integration, Continuous Delivery, Technical Debt Management, Automatic Testing and Monitoring, and see how all these areas fit together. DevOps is important for organizations that want to make the best use of their resources and avoid costly mistakes. Teams that embrace DevOps deploy code up to 30 times more frequently than their competition and less than 50% of their deployments fail according to Puppet Labs State of DevOps survey. DevOps on the Microsoft Stack shows you how to help your organization implement DevOps, covering the tooling they will need and how to make everything work together while following best practices. The focus is not only on technology but also on the cultural issues that teams will face when implementing DevOps. The author's goal is to not only show you which tooling there is but help you to successfully use everything together to implement DevOps in your projects and organization. In this book, you'll learn: What DevOps is and how it can help development teams How to use Visual Studio, Visual Studio Team Services, and Azure to setup a DevOps process How to introduce DevOps to your organization and how to overcome problems

Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014,... Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers (Paperback, 2014 ed.)
Nicolas Christin, Reihaneh Safavi-Naini
R2,735 Discovery Miles 27 350 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC 2014), held in Christ Church, Barbados, in March 2014. The 19 revised full papers and 12 short papers were carefully selected and reviewed from 165 abstract registrations and 138 full papers submissions. The papers are grouped in the following topical sections: payment systems, case studies, cloud and virtualization, elliptic curve cryptography, privacy-preserving systems, authentication and visual encryption, network security, mobile system security, incentives, game theory and risk, and bitcoin anonymity.

Financial Cryptography and Data Security - FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014,... Financial Cryptography and Data Security - FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers (Paperback, 2014 ed.)
Rainer Boehme, Michael Brenner, Tyler Moore, Matthew Smith
R2,058 Discovery Miles 20 580 Ships in 18 - 22 working days

This books constitutes the thoroughly refereed papers and poster abstracts from the FC 2014 Workshops, the First Workshop on Bitcoin Research, BITCOIN 2014, and the Second Workshop on Applied Homomorphic Cryptography and Encrypted Computing, WAHC 2014, co-located with the 18th International Conference on Financial Cryptography and Data Security, held in Christ Church, Barbados, on March 7, 2014. The 15 full papers and 3 poster abstracts presented were carefully reviewed and selected from 30 submissions. They are grouped in topical sections on Bitcoin transactions, policy and legal issues; Bitcoin security; improving digital currencies; posters, and WAHC papers.

Enterprise Applications and Services in the Finance Industry - 7th International Workshop, FinanceCom 2014, Sydney, Australia,... Enterprise Applications and Services in the Finance Industry - 7th International Workshop, FinanceCom 2014, Sydney, Australia, December 2014, Revised Papers (Paperback, 1st ed. 2015)
Artur Lugmayr
R1,535 Discovery Miles 15 350 Ships in 18 - 22 working days

This book constitutes the proceedings of the 7th International Workshop on Enterprise Applications and Services in the Finance Industry, FinanceCom 2014, held in Sydney, Australia, on December 12, 2014. The workshop spans multiple disciplines, including technical, service, economic, sociological, and behavioral sciences. It reflects on technologically enabled opportunities, implications, and changes due to the introduction of new business models or regulations related to the financial services industry and the financial markets. The nine papers presented were carefully reviewed and selected from numerous submissions.

LPIC-3 304-200 Linux Virtualization and High Availability Exam Practice Questions & Dumps - Exam Practice Questions For LPIC-3... LPIC-3 304-200 Linux Virtualization and High Availability Exam Practice Questions & Dumps - Exam Practice Questions For LPIC-3 304-200 Exam Prep LATEST VERSION (Paperback)
Quantic Books
R358 Discovery Miles 3 580 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Developing Curriculum for Emergency…
Susana Silva, Paula Peres, … Hardcover R5,370 Discovery Miles 53 700
Diverse Perspectives and…
Thomas M. Connolly, Petros Papadopoulos, … Hardcover R8,550 Discovery Miles 85 500
Influencer Secrets - How to Build Your…
Smm Publishing Hardcover R540 R499 Discovery Miles 4 990
System of Controls - I.T.'s Guide to…
William D Reed Hardcover R947 R826 Discovery Miles 8 260
Securing Critical Infrastructures
Mohamed K Kamara Hardcover R852 Discovery Miles 8 520
Pedagogy, Presence, and Motivation in…
Aaron Michael Perez, ?Enol Orakc? Hardcover R5,333 Discovery Miles 53 330
Affiliate Marketing for Beginners - 12…
Smm Publishing Hardcover R579 R528 Discovery Miles 5 280
Pedagogical Creativity, Culture…
Ambika Gopal Raj Hardcover R6,170 Discovery Miles 61 700
Implementing SAP SuccessFactors - A…
Permanand Singh Hardcover R634 R578 Discovery Miles 5 780
AI-Driven Intelligent Models for…
Samala Nagaraj, Korupalli V Rajesh Kumar Hardcover R6,199 Discovery Miles 61 990

 

Partners