![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > General
How do cables and data centers think? This book investigates how information infrastructures enact particular forms of knowledge. It juxtaposes the pervasive logics of speed, efficiency, and resilience with more communal and ecological ways of thinking and being, turning technical "solutions" back into open questions about what society wants and what infrastructures should do. Moving from data centers in Hong Kong to undersea cables in Singapore and server clusters in China, Munn combines rich empirical material with insights drawn from media and cultural studies, sociology, and philosophy. This critical analysis stresses that infrastructures are not just technical but deeply epistemological, privileging some actions and actors while sidelining others. This innovative exploration of the values and visions at the heart of our technologies will interest students, scholars, and researchers in the areas of communication studies, digital media, technology studies, sociology, philosophy of technology, information studies, and geography.
Optimization techniques have been widely adopted to implement various data mining algorithms. In addition to well-known Support Vector Machines (SVMs) (which are based on quadratic programming), different versions of Multiple Criteria Programming (MCP) have been extensively used in data separations. Since optimization based data mining methods differ from statistics, decision tree induction, and neural networks, their theoretical inspiration has attracted many researchers who are interested in algorithm development of data mining. "Optimization based Data Mining: Theory and Applications," mainly focuses on MCP and SVM especially their recent theoretical progress and real-life applications in various fields. These include finance, web services, bio-informatics and petroleum engineering, which has triggered the interest of practitioners who look for new methods to improve the results of data mining for knowledge discovery. Most of the material in this book is directly from the research and application activities that the authors' research group has conducted over the last ten years. Aimed at practitioners and graduates who have a fundamental knowledge in data mining, it demonstrates the basic concepts and foundations on how to use optimization techniques to deal with data mining problems.
This book intersects the distributed ledger technology (DLT) community with the international security community. Given the increasing application of blockchain technology in the fields of business and international development, there is a growing body of study on other use cases. For instance, can blockchain have a significant role in preserving and improving international security? This book explores this question in the context of preventing the proliferation of some of the most dangerous materials in the world-items that if not secured can lend to the development of weapons of mass destruction. It considers how blockchain can increase efficiencies in the global trade of nuclear and chemical materials and technology, thereby increasing assurances related to compliance with international nonproliferation and disarmament treaties.
User-Centric Networks (UCN) and Information-Centric Networks (ICN) are new communication paradigms to increase the efficiency of content delivery and also content availability. In this new concept, the network infrastructure actively contributes to content caching and distribution. This book presents the basic concepts of UCN and ICN, describes the main architecture proposals for these networks, and discusses the main challenges to their development. The book also looks at the current challenges for this concept, including naming, routing and caching on the network-core elements, several aspects of content security, user privacy, and practical issues in implementing UCN and ICN.
This book constitutes the refereed proceedings of the 6th International Conference on Computer, Communication, and Signal Processing, ICCSP 2022, held in Chennai, India, in February 2022.* The 21 full and 2 short papers presented in this volume were carefully reviewed and selected from 111 submissions. The papers are categorized into topical sub-headings: artificial intelligence and machine learning; Cyber security; and internet of things. *The conference was held as a virtual event due to the COVID-19 pandemic.
Global Information Society: Operating Information Systems in a Dynamic Global Business Environment addresses the importance of information technology management and issues in operating information systems in the global dynamic business environment. It embraces discussions of the global information technology theory, frameworks and IT architecture, discovery of global knowledge management, improvement of the global information systems development methodologies, and applications of the latest technologies such as mobile technology and web services in the global information systems development and operations. The book features a collection of new ideas, latest technology applications and experiences in the global information systems development and operations.
The proven Study Guide that prepares you for this new Google Cloud exam The Google Cloud Certified Professional Data Engineer Study Guide, provides everything you need to prepare for this important exam and master the skills necessary to land that coveted Google Cloud Professional Data Engineer certification. Beginning with a pre-book assessment quiz to evaluate what you know before you begin, each chapter features exam objectives and review questions, plus the online learning environment includes additional complete practice tests. Written by Dan Sullivan, a popular and experienced online course author for machine learning, big data, and Cloud topics, Google Cloud Certified Professional Data Engineer Study Guide is your ace in the hole for deploying and managing analytics and machine learning applications. Build and operationalize storage systems, pipelines, and compute infrastructure Understand machine learning models and learn how to select pre-built models Monitor and troubleshoot machine learning models Design analytics and machine learning applications that are secure, scalable, and highly available. This exam guide is designed to help you develop an in depth understanding of data engineering and machine learning on Google Cloud Platform.
This much-needed update to the bestselling guide on the extensive changes to the local area networks (LAN) switching technologies explains why LAN switching technologies are critical to network design. This in-depth guide covers the capabilities, application, and design of LAN switches and switched internetworks and examines the significant changes that have taken place since the publication of the first edition seven years ago. You're sure to appreciate the witty writing style and easy-to-follow format on such an often-complicated subject matter.
This book provides an essential overview of IoT, energy-efficient topology control protocols, motivation, and challenges for topology control for Wireless Sensor Networks, and the scope of the research in the domain of IoT. Further, it discusses the different design issues of topology control and energy models for IoT applications, different types of simulators with their advantages and disadvantages. It also discusses extensive simulation results and comparative analysis for various algorithms. The key point of this book is to present a solution to minimize energy and extend the lifetime of IoT networks using optimization methods to improve the performance. Features: Describes various facets necessary for energy optimization in IoT domain. Covers all aspects to achieve energy optimization using latest technologies and algorithms, in wireless sensor networks. Presents various IoT and Topology Control Methods and protocols, various network models, and model simulation using MATLAB (R). Reviews methods and results of optimization with Simulation Hardware architecture leading to prolonged life of IoT networks. First time introduces bio-inspired algorithms in the IoT domain for performance optimization This book aims at Graduate Students, Researchers in Information Technology, Computer Science and Engineering, Electronics and Communication Engineering.
1. Learn best practices for every facet of management 2. Learn what type of leader you need to be to succeed 3. Maximize employee engagement and retention among staff 4. Develop your staff's talent to full potential 5. Learn where the future of management is headed
With the evolution of technology and sudden growth in the number of smart vehicles, traditional Vehicular Ad hoc NETworks (VANETs) face several technical challenges in deployment and management due to less flexibility, scalability, poor connectivity, and inadequate intelligence. VANETs have raised increasing attention from both academic research and industrial aspects resulting from their important role in driving assistant system. Vehicular Ad Hoc Networks focuses on recent advanced technologies and applications that address network protocol design, low latency networking, context-aware interaction, energy efficiency, resource management, security, human-robot interaction, assistive technology and robots, application development, and integration of multiple systems that support Vehicular Networks and smart interactions. Simulation is a key tool for the design and evaluation of Intelligent Transport Systems (ITS) that take advantage of communication-capable vehicles in order to provide valuable safety, traffic management, and infotainment services. It is widely recognized that simulation results are only significant when realistic models are considered within the simulation tool chain. However, quite often research works on the subject are based on simplistic models unable to capture the unique characteristics of vehicular communication networks. The support that different simulation tools offer for such models is discussed, as well as the steps that must be undertaken to fine-tune the model parameters in order to gather realistic results. Moreover, the book provides handy hints and references to help determine the most appropriate tools and models. This book will promote best simulation practices in order to obtain accurate results.
"Vivek Kale's Creating Smart Enterprises goes smack-dab at the heart of harnessing technology for competing in today's chaotic digital era. Actually, for him, it's SMACT-dab: SMACT (Social media, Mobile, Analytics and big data, Cloud computing, and internet of Things) technologies. This book is required reading for those that want to stay relevant and win, and optional for those that don't." -Peter Fingar, Author of Cognitive Computing and business technology consultant Creating Smart Enterprises unravels the mystery of social media, mobile, analytics and big data, cloud, and Internet of Things (SMACT) computing and explains how it can transform the operating context of business enterprises. It provides a clear understanding of what SMACT really means, what it can do for smart enterprises, and application areas where it is practical to use them. All IT professionals who are involved with any aspect of a SMACT computing project will profit by using this book as a roadmap to make a more meaningful contribution to the success of their computing initiatives. This pragmatic book: Introduces the VUCA (volatility, uncertainty, complexity, and ambiguity) business ecosystem confronted by the businesses today. Describes the challenges of defining business and IT strategies and of aligning them as well as their impact on enterprise governance. Provides a very wide treatment of the various components of SMACT computing, including the Internet of Things (IoT) and its constituting technologies like RFID, wireless networks, sensors, and wireless sensor networks (WSNs). This book addresses the key differentiator of SMACT computing environments and solutions that combine the power of an elastic infrastructure with analytics. The SMACT environment is cloud-based and inherently mobile. Information management processes can analyze and discern recurring patterns in colossal pools of operational and transactional data. Analytics, big data, and IoT computing leverage and transform these data patterns to help create successful, smart enterprises.
Technology Innovation discusses the fundamental aspects of processes and structures of technology innovation. It offers a new perspective concerning fundamentals aspects not directly involved in the complex relations existing between technology and the socio-economic system. By considering technology and its innovation from a scientific point of view, the book presents a novel definition of technology as a set of physical, chemical, and biological phenomena, producing an effect exploitable for human purposes. Expanding on the general model of technology innovation by linking the model of technology, based on a structure of technological operations, with the models of the structures for technology innovation, based on organization of fluxes of knowledge and capitals, the book considers various technological processes and the stages of the innovation process. Offers a perspective on the evolution of technology in the frame of an industrial platform network Explains a novel definition of technology as a set of physical, chemical, and biological phenomena producing an effect exploitable for human purposes Discusses technology innovation as result of structures organizing fluxes of knowledge and capitals Provides a technology model simulating the functioning of technology with its optimization Presents a technology innovation model explaining the territorial technology innovation process The book is intended for academics, graduate students, technology developers who are involved in operations management and research, innovation, and technology development.
The text is written to provide readers with a comprehensive study of information security and management system, audit planning and preparation, audit techniques and collecting evidence, international information security (ISO) standard 27001, and asset management. It further discusses important topics such as security mechanisms, security standards, audit principles, audit competence and evaluation methods, and the principles of asset management. It will serve as an ideal reference text for senior undergraduate, graduate students, and researchers in fields including electrical engineering, electronics and communications engineering, computer engineering, and information technology. The book explores information security concepts and applications from an organizational information perspective and explains the process of audit planning and preparation. It further demonstrates audit techniques and collecting evidence to write important documentation by following the ISO 27001 standards. The book: Elaborates on the application of confidentiality, integrity, and availability (CIA) in the area of audit planning and preparation Covers topics such as managing business assets, agreements on how to deal with business assets, and media handling Demonstrates audit techniques and collects evidence to write the important documentation by following the ISO 27001 standards Explains how the organization's assets are managed by asset management, and access control policies Presents seven case studies
The high failure rate of enterprise resource planning (ERP) projects is a pressing concern for both academic researchers and industrial practitioners. The challenges of an ERP implementation are particularly high when the project involves designing and developing a system from scratch. Organizations often turn to vendors and consultants for handling such projects but, every aspect of an ERP project is opaque for both customers and vendors. Unlocking the mysteries of building a large-scale ERP system, The Adventurous and Practical Journey to a Large-Scale Enterprise Solution tells the story of implementing an applied enterprise solution. The book covers the field of enterprise resource planning by examining state-of-the-art concepts in software project management methodology, design and development integration policy, and deployment framework, including: A hybrid project management methodology using waterfall as well as a customized Scrum-based approach A novel multi-tiered software architecture featuring an enhanced flowable process engine A unique platform for coding business processes efficiently Integration to embed ERP modules in physical devices A heuristic-based framework to successfully step into the Go-live period Written to help ERP project professionals, the book charts the path that they should travel from project ideation to systems implementation. It presents a detailed, real-life case study of implementing a large-scale ERP and uses storytelling to demonstrate incorrect and correct decisions frequently made by vendors and customers. Filled with practical lessons learned, the book explains the ins and outs of adopting project methodologies. It weaves a tale that features both real-world and scholarly aspects of an ERP implementation.
The book discusses the fundamentals of high-performance computing. The authors combine visualization, comprehensibility, and strictness in their material presentation, and thus influence the reader towards practical application and learning how to solve real computing problems. They address both key approaches to programming modern computing systems: multithreading-based parallelizing in shared memory systems, and applying message-passing technologies in distributed systems. The book is suitable for undergraduate and graduate students, and for researchers and practitioners engaged with high-performance computing systems. Each chapter begins with a theoretical part, where the relevant terminology is introduced along with the basic theoretical results and methods of parallel programming, and concludes with a list of test questions and problems of varying difficulty. The authors include many solutions and hints, and often sample code.
Internet of Things (IoT)-enabled spaces have made revolutionary advances in the utility grid. Among these advances, intelligent and energy-efficient services are gaining considerable interest. The use of the smart grid is increasing day after day around us and is not only used in saving energy but also in our daily life for intelligent health, traffic, and even farming systems. The grid enabled with IoT features is also expected to communicate with cellular networks smoothly in the next-generation networks (6G and beyond). This will open the door for other interesting research areas. In this book, we consider the most significant and emergent research topics in this domain, addressing major issues and challenges in IoT-based solutions proposed for the smart grid. The chapters provide insight on comprehensive topics in IoT-based smart grids, combining technical aspects with the most up-to-date theory. It investigates the grid under varying and potential emerging paradigms such as edge/fog computing, in addition to big data aspects considerations in the IoT era. With comprehensive surveys and case studies, this book explores basic and high-level grid aspects in the emerging smart city paradigm, which makes it especially attractive to researchers, academics, and higher-level students. This authored book can be used by computer science undergraduate and postgraduate students, researchers and practitioners, city administrators, policymakers, and government regulators.
This book presents the features and advantages offered by complex networks in the machine learning domain. In the first part, an overview on complex networks and network-based machine learning is presented, offering necessary background material. In the second part, we describe in details some specific techniques based on complex networks for supervised, non-supervised, and semi-supervised learning. Particularly, a stochastic particle competition technique for both non-supervised and semi-supervised learning using a stochastic nonlinear dynamical system is described in details. Moreover, an analytical analysis is supplied, which enables one to predict the behavior of the proposed technique. In addition, data reliability issues are explored in semi-supervised learning. Such matter has practical importance and is not often found in the literature. With the goal of validating these techniques for solving real problems, simulations on broadly accepted databases are conducted. Still in this book, we present a hybrid supervised classification technique that combines both low and high orders of learning. The low level term can be implemented by any classification technique, while the high level term is realized by the extraction of features of the underlying network constructed from the input data. Thus, the former classifies the test instances by their physical features, while the latter measures the compliance of the test instances with the pattern formation of the data. We show that the high level technique can realize classification according to the semantic meaning of the data. This book intends to combine two widely studied research areas, machine learning and complex networks, which in turn will generate broad interests to scientific community, mainly to computer science and engineering areas.
Cybersecurity Risk Management In Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran technology analyst Cynthia Brumfield, with contributions from cybersecurity expert Brian Haugli, delivers a straightforward and up-to-date exploration of the fundamentals of cybersecurity risk planning and management. The book offers readers easy-to-understand overviews of cybersecurity risk management principles, user, and network infrastructure planning, as well as the tools and techniques for detecting cyberattacks. The book also provides a roadmap to the development of a continuity of operations plan in the event of a cyberattack. With incisive insights into the Framework for Improving Cybersecurity of Critical Infrastructure produced by the United States National Institute of Standards and Technology (NIST), Cybersecurity Risk Management presents the gold standard in practical guidance for the implementation of risk management best practices. Filled with clear and easy-to-follow advice, this book also offers readers: A concise introduction to the principles of cybersecurity risk management and the steps necessary to manage digital risk to systems, assets, data, and capabilities A valuable exploration of modern tools that can improve an organization's network infrastructure protection A practical discussion of the challenges involved in detecting and responding to a cyberattack and the importance of continuous security monitoring A helpful examination of the recovery from cybersecurity incidents Perfect for undergraduate and graduate students studying cybersecurity, Cybersecurity Risk Management is also an ideal resource for IT professionals working in private sector and government organizations worldwide who are considering implementing, or who may be required to implement, the NIST Framework at their organization.
This volume publishes new trends and findings in hot topics related to ubiquitous computing/networking. It is the outcome of UNet - ainternational scientific event that took place on September 08-10, 2015, in the fascinating city of Casablanca, Morocco. UNet'15 is technically sponsored by IEEE Morocco Section and IEEE COMSOC Morocco Chapter.
Easy-to-follow visual walkthrough of every important part of the Google Cloud Platform The Google Cloud Platform incorporates dozens of specialized services that enable organizations to offload technological needs onto the cloud. From routine IT operations like storage to sophisticated new capabilities including artificial intelligence and machine learning, the Google Cloud Platform offers enterprises the opportunity to scale and grow efficiently. In Visualizing Google Cloud: Illustrated References for Cloud Engineers & Architects, Google Cloud expert Priyanka Vergadia delivers a fully illustrated, visual guide to matching the best Google Cloud Platform services to your own unique use cases. After a brief introduction to the major categories of cloud services offered by Google, the author offers approximately 100 solutions divided into eight categories of services included in Google Cloud Platform: Compute Storage Databases Data Analytics Data Science, Machine Learning and Artificial Intelligence Application Development and Modernization with Containers Networking Security You'll find richly illustrated flowcharts and decision diagrams with straightforward explanations in each category, making it easy to adopt and adapt Google's cloud services to your use cases. With coverage of the major categories of cloud models--including infrastructure-, containers-, platforms-, functions-, and serverless--and discussions of storage types, databases and Machine Learning choices, Visualizing Google Cloud: Illustrated References for Cloud Engineers & Architects is perfect for every Google Cloud enthusiast, of course. It is for anyone who is planning a cloud migration or new cloud deployment. It is for anyone preparing for cloud certification, and for anyone looking to make the most of Google Cloud. It is for cloud solutions architects, IT decision-makers, and cloud data and ML engineers. In short, this book is for YOU.
The Internet of Edges is a new paradigm whose objective is to keep data and processing close to the user. This book presents three different levels of Edge networking: MEC (Multi-access Edge Computing), Fog and Far Edge (sometimes called Mist or Skin). It also reviews participatory networks, in which user equipment provides the resources for the Edge network. Edge networks can be disconnected from the core Internet, and the interconnection of autonomous edge networks can then form the Internet of Edges. This book analyzes the characteristics of Edge networks in detail, showing their capacity to replace the imposing Clouds of core networks due to their superior server response time, data security and energy saving.
Artificial Intelligence and Deep Learning for Computer Network: Management and Analysis aims to systematically collect quality research spanning AI, ML, and deep learning (DL) applications to diverse sub-topics of computer networks, communications, and security, under a single cover. It also aspires to provide more insights on the applicability of the theoretical similitudes, otherwise a rarity in many such books.
This book introduces novel methods and approaches for semantic integration. In addition to developing ground-breaking new methods for ontology alignment, the author provides extensive explanations of up-to-date case studies. It includes a thorough investigation of the foundations and provides pointers to future steps in ontology alignment with conclusion linking this work to the knowledge society. |
You may like...
Enabling Semantic Web Services - The Web…
Dieter Fensel, Holger Lausen, …
Paperback
R1,747
Discovery Miles 17 470
The Phoenix Lights- Petroglyphsinthesky…
Jeff Woolwine
Hardcover
Advances in Mechanical Engineering and…
Ketul C. Popat, S. Kanagaraj, …
Hardcover
R5,852
Discovery Miles 58 520
I Love Winter - Children's Seasons book
Shelley Admont, Kidkiddos Books
Hardcover
R660
Discovery Miles 6 600
Intelligent Fixtures for the…
H.-Christian Moehring, Petra Wiederkehr, …
Hardcover
R3,956
Discovery Miles 39 560
|