![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > General
Key Features / Selling Points Unique selling point: * The only book to distill the CSEC2017 recommendations down into practical teaching approaches for K-12 classrooms Core audience: * Teachers and educators of cybersecurity, who may or may not have a background in the subject Place in the market: * First book of its kind
Key Features / Selling Points Unique selling point: * The only book to distill the CSEC2017 recommendations down into practical teaching approaches for K-12 classrooms Core audience: * Teachers and educators of cybersecurity, who may or may not have a background in the subject Place in the market: * First book of its kind
This textbook intends to be a comprehensive and substantially self-contained two-volume book covering performance, reliability, and availability evaluation subjects. The volumes focus on computing systems, although the methods may also be applied to other systems. The first volume covers Chapter 1 to Chapter 14, whose subtitle is ``Performance Modeling and Background". The second volume encompasses Chapter 15 to Chapter 25 and has the subtitle ``Reliability and Availability Modeling, Measuring and Workload, and Lifetime Data Analysis". This text is helpful for computer performance professionals for supporting planning, design, configuring, and tuning the performance, reliability, and availability of computing systems. Such professionals may use these volumes to get acquainted with specific subjects by looking at the particular chapters. Many examples in the textbook on computing systems will help them understand the concepts covered in each chapter. The text may also be helpful for the instructor who teaches performance, reliability, and availability evaluation subjects. Many possible threads could be configured according to the interest of the audience and the duration of the course. Chapter 1 presents a good number of possible courses programs that could be organized using this text. Volume I is composed of the first two parts, besides Chapter 1. Part I gives the knowledge required for the subsequent parts of the text. This part includes six chapters. It covers an introduction to probability, descriptive statistics and exploratory data analysis, random variables, moments, covariance, some helpful discrete and continuous random variables, Taylor series, inference methods, distribution fitting, regression, interpolation, data scaling, distance measures, and some clustering methods. Part II presents methods for performance evaluation modeling, such as operational analysis, Discrete-Time Markov Chains (DTMC), and Continuous Time Markov Chains (CTMC), Markovian queues, Stochastic Petri nets (SPN), and discrete event simulation.
This textbook intends to be a comprehensive and substantially self-contained two-volume book covering performance, reliability, and availability evaluation subjects. The volumes focus on computing systems, although the methods may also be applied to other systems. The first volume covers Chapter 1 to Chapter 14, whose subtitle is ``Performance Modeling and Background". The second volume encompasses Chapter 15 to Chapter 25 and has the subtitle ``Reliability and Availability Modeling, Measuring and Workload, and Lifetime Data Analysis". This text is helpful for computer performance professionals for supporting planning, design, configuring, and tuning the performance, reliability, and availability of computing systems. Such professionals may use these volumes to get acquainted with specific subjects by looking at the particular chapters. Many examples in the textbook on computing systems will help them understand the concepts covered in each chapter. The text may also be helpful for the instructor who teaches performance, reliability, and availability evaluation subjects. Many possible threads could be configured according to the interest of the audience and the duration of the course. Chapter 1 presents a good number of possible courses programs that could be organized using this text. Volume II is composed of the last two parts. Part III examines reliability and availability modeling by covering a set of fundamental notions, definitions, redundancy procedures, and modeling methods such as Reliability Block Diagrams (RBD) and Fault Trees (FT) with the respective evaluation methods, adopts Markov chains, Stochastic Petri nets and even hierarchical and heterogeneous modeling to represent more complex systems. Part IV discusses performance measurements and reliability data analysis. It first depicts some basic measuring mechanisms applied in computer systems, then discusses workload generation. After, we examine failure monitoring and fault injection, and finally, we discuss a set of techniques for reliability and maintainability data analysis.
This new volume provides the information needed to understand the simplex method, the revised simplex method, dual simplex method, and more for solving linear programming problems. Following a logical order, the book first gives a mathematical model of the linear problem programming and describes the usual assumptions under which the problem is solved. It gives a brief description of classic algorithms for solving linear programming problems as well as some theoretical results. It goes on to explain the definitions and solutions of linear programming problems, outlining the simplest geometric methods and showing how they can be implemented. Practical examples are included along the way. The book concludes with a discussion of multi-criteria decision-making methods. Advances in Optimization and Linear Programming is a highly useful guide to linear programming for professors and students in optimization and linear programming.
Access US Census Bureau geographic and demographic data directly within R. Wrangle Census data with tidyverse tools and work with margins of error in the American Community Survey. Make maps and interactive web visualizations with US Census data. Explore Census data with spatial analysis using the sf package. Integrate Census data into spatial and machine learning models.
Access US Census Bureau geographic and demographic data directly within R. Wrangle Census data with tidyverse tools and work with margins of error in the American Community Survey. Make maps and interactive web visualizations with US Census data. Explore Census data with spatial analysis using the sf package. Integrate Census data into spatial and machine learning models.
This book deals with how to measure innovation in crisis management, drawing on data, case studies, and lessons learnt from different European countries. The aim of this book is to tackle innovation in crisis management through lessons learnt and experiences gained from the implementation of mixed methods through a practitioner-driven approach in a large-scale demonstration project (DRIVER+). It explores innovation from the perspective of the end-users by focusing on the needs and problems they are trying to address through a tool (be it an app, a drone, or a training program) and takes a deep dive into what is needed to understand if and to what extent the tool they have in mind can really bring innovation. This book is a toolkit for readers interested in understanding what needs to be in place to measure innovation: it provides the know-how through examples and best practices. The book will be a valuable source of knowledge for scientists, practitioners, researchers, and postgraduate students studying safety, crisis management, and innovation.
This book deals with how to measure innovation in crisis management, drawing on data, case studies, and lessons learnt from different European countries. The aim of this book is to tackle innovation in crisis management through lessons learnt and experiences gained from the implementation of mixed methods through a practitioner-driven approach in a large-scale demonstration project (DRIVER+). It explores innovation from the perspective of the end-users by focusing on the needs and problems they are trying to address through a tool (be it an app, a drone, or a training program) and takes a deep dive into what is needed to understand if and to what extent the tool they have in mind can really bring innovation. This book is a toolkit for readers interested in understanding what needs to be in place to measure innovation: it provides the know-how through examples and best practices. The book will be a valuable source of knowledge for scientists, practitioners, researchers, and postgraduate students studying safety, crisis management, and innovation.
Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues. It focuses on the practical programming materials that will teach readers how to implement security solutions using the most popular software packages. It's not limited to any specific cybersecurity subtopics and the chapters touch upon a wide range of cybersecurity domains, ranging from malware to biometrics and more. Features The book presents the implementation of a unique socio-technical solution for real-time cybersecurity awareness. It provides comprehensible knowledge about security, risk, protection, estimation, knowledge and governance. Various emerging standards, models, metrics, continuous updates and tools are described to understand security principals and mitigation mechanism for higher security. The book also explores common vulnerabilities plaguing today's web applications. The book is aimed primarily at advanced undergraduates and graduates studying computer science, artificial intelligence and information technology. Researchers and professionals will also find this book useful.
This book offers an overview of the key ideas of Petri nets, how they were developed, and how they were applied in diverse applications. The chapters in the first part offer individual perspectives on the impact of Petri's work. The second part of the book contains personal memories from researchers who collaborated with him closely, in particular they recount his unique personality. The chapters in the third part offer more conventional treatments on various aspects of current Petri net research, and the fourth part examines the wide applications of Petri nets, and the relationships with other domains. The editors and authors are the leading researchers in this domain, and this book will be a valuable insight for researchers in computer science, particularly those engaged with concurrency and distributed systems.
The term speech processing refers to the scientific discipline concerned with the analysis and processing of speech signals for getting the best benefit in various practical scenarios. These different practical scenarios correspond to a large variety of applications of speech processing research. Examples of some applications include enhancement, coding, synthesis, recognition and speaker recognition. A very rapid growth, particularly during the past ten years, has resulted due to the efforts of many leading scientists. The ideal aim is to develop algorithms for a certain task that maximize performance, are computationally feasible and are robust to a wide class of conditions. The purpose of this book is to provide a cohesive collection of articles that describe recent advances in various branches of speech processing. The main focus is in describing specific research directions through a detailed analysis and review of both the theoretical and practical settings. The intended audience includes graduate students who are embarking on speech research as well as the experienced researcher already working in the field. For graduate students taking a course, this book serves as a supplement to the course material. As the student focuses on a particular topic, the corresponding set of articles in this book will serve as an initiation through exposure to research issues and by providing an extensive reference list to commence a literature survey. Expe rienced researchers can utilize this book as a reference guide and can expand their horizons in this rather broad area."
This book contains all refereed papers accepted during the fourth asia-pacific edition & twelve edition - which were merged this year - of the CSD&M conference that took place in Beijing, People's Republic of China by 2021. Mastering complex systems requires an integrated understanding of industrial practices as well as sophisticated theoretical techniques and tools. This explains the creation of an annual go-between European and Asian forum dedicated to academic researchers & industrial actors working on complex industrial systems architecting, modeling & engineering. These proceedings cover the most recent trends in the emerging field of complex systems, both from an academic and professional perspective. A special focus was put this year on "Digital Transformation in Complex Systems Engineering". CESAM Community The CSD&M series of conferences are organized under the guidance of CESAM Community, managed by CESAMES. CESAM Community aims in organizing the sharing of good practices in systems architecting and model-based systems engineering (MBSE) and certifying the level of knowledge and proficiency in this field through the CESAM certification. The CESAM systems architecting & model-based systems engineering (MBSE) certification is especially currently the most disseminated professional certification in the world in this domain through more than 1,000 real complex system development projects on which it was operationally deployed and around 10,000 engineers who were trained on the CESAM framework at international level.
Python is an amazing programming language. It can be applied to almost any programming task. It allows for rapid development and debugging. Getting started with Python is like learning any new skill: it's important to find a resource you connect with to guide your learning. Luckily, there's no shortage of excellent books that can help you learn both the basic concepts of programming and the specifics of programming in Python. With the abundance of resources, it can be difficult to identify which book would be best for your situation. Python for Beginners is a concise single point of reference for all material on python. * Provides concise, need-to-know information on Python types and statements, special method names, built-in functions and exceptions, commonly used standard library modules, and other prominent Python tools * Offers practical advice for each major area of development with both Python 3.x and Python 2.x * Based on the latest research in cognitive science and learning theory * Helps the reader learn how to write effective, idiomatic Python code by leveraging its best-and possibly most neglected-features This book focuses on enthusiastic research aspirants who work on scripting languages for automating the modules and tools, development of web applications, handling big data, complex calculations, workflow creation, rapid prototyping, and other software development purposes. It also targets graduates, postgraduates in computer science, information technology, academicians, practitioners, and research scholars.
Brushless permanent-magnet motors provide simple, low maintenance, and easily controlled mechanical power. Written by two leading experts on the subject, this book offers the most comprehensive guide to the design and performance of brushless permanent-magnetic motors ever written. Topics range from electrical and magnetic design to materials and control. Throughout, the authors stress both practical and theoretical aspects of the subject, and relate the material to modern software-based techniques for design and analysis. As new magnetic materials and digital power control techniques continue to widen the scope of the applicability of such motors, the need for an authoritative overview of the subject becomes ever more urgent. Design of Brushless Permanent-Magnet Motors fits the bill and will be read by students and researchers in electric and electronic engineering.
This book is a wonderful collection of chapters that posits how managers need to cope in the Big Data era. It highlights many of the emerging developments in technologies, applications, and trends related to management's needs in this Big Data era. -Dr. Jay Liebowitz, Harrisburg University of Science and Technology This book presents some meaningful work on Big Data analytics and its applications. Each chapter generates helpful guidance to the readers on Big Data analytics and its applications, challenges, and prospects that is necessary for organizational strategic direction. -Dr. Alex Koohang, Middle Georgia State University Big Data is a concept that has caught the attention of practitioners, academicians, and researchers. Big Data offers organizations the possibility of gaining a competitive advantage by managing, collecting, and analyzing massive amounts of data. As the promises and challenges posed by Big Data have increased over the past decade, significant issues have developed regarding how data can be used for improving management. Big Data can be understood as large amounts of data generated by the Internet and a variety of connected smart devices and sensors. This book discusses the main challenges posed by Big Data in a manner relevant to both practitioners and scholars. It examines how companies can leverage Big Data analytics to act and optimize the business. This book brings together the theory and practice of management in the era of Big Data. It offers a look at the current state of Big Data, including a comprehensive overview of both research and practical applications. By bringing together conceptual thinking and empirical research on the nature, meaning, and development of Big Data in management, this book unifies research on Big Data in management to stimulate new directions for academic investigation as well as practice.
INVITATION TO COMPUTER SCIENCE, 6E, International Edition is a well-respected text that provides an overview of the computer science field. Using a flexible, non-language specific model, INVITATION TO COMPUTER SCIENCE, 6E, International Edition offers a solid foundation for the first course in a Computer Science curriculum. INVITATION TO COMPUTER SCIENCE, 6E, International Edition maintains its bestselling, algorithm-driven approach and includes expanded chapter exercises and practice problems, as well as new boxes dedicated to mobile applications and current issues throughout. Online language modules are available in C++, Java, Python, C#, and Ada, allowing the option of incorporating a programming language to expand concepts from the text. INVITATION TO COMPUTER SCIENCE, 6E, International Edition offers an optional CourseMate with study tools such as flashcards, quizzing, and games. CourseMate Activities speak to and engage students while developing abstract thinking and problem solving skills. Also available with INVITATION TO COMPUTER SCIENCE, 6E, International Edition, an optional Lab Manual containing 20 laboratory projects that map directly to the main text. The Lab Manual and accompanying software provide both visual and hands-on activities, allowing students to experience the fundamentals of computer science.
Technology Innovation discusses the fundamental aspects of processes and structures of technology innovation. It offers a new perspective concerning fundamentals aspects not directly involved in the complex relations existing between technology and the socio-economic system. By considering technology and its innovation from a scientific point of view, the book presents a novel definition of technology as a set of physical, chemical, and biological phenomena, producing an effect exploitable for human purposes. Expanding on the general model of technology innovation by linking the model of technology, based on a structure of technological operations, with the models of the structures for technology innovation, based on organization of fluxes of knowledge and capitals, the book considers various technological processes and the stages of the innovation process. Offers a perspective on the evolution of technology in the frame of an industrial platform network Explains a novel definition of technology as a set of physical, chemical, and biological phenomena producing an effect exploitable for human purposes Discusses technology innovation as result of structures organizing fluxes of knowledge and capitals Provides a technology model simulating the functioning of technology with its optimization Presents a technology innovation model explaining the territorial technology innovation process The book is intended for academics, graduate students, technology developers who are involved in operations management and research, innovation, and technology development.
A new era of complexity science is emerging, in which nature- and bio-inspired principles are being applied to provide solutions. At the same time, the complexity of systems is increasing due to such models like the Internet of Things (IoT) and fog computing. Will complexity science, applying the principles of nature, be able to tackle the challenges posed by highly complex networked systems? Bio-Inspired Optimization in Fog and Edge Computing: Principles, Algorithms, and Systems is an attempt to answer this question. It presents innovative, bio-inspired solutions for fog and edge computing and highlights the role of machine learning and informatics. Nature- or biological-inspired techniques are successful tools to understand and analyze a collective behavior. As this book demonstrates, algorithms, and mechanisms of self-organization of complex natural systems have been used to solve optimization problems, particularly in complex systems that are adaptive, ever-evolving, and distributed in nature. The chapters look at ways of enhancingto enhance the performance of fog networks in real-world applications using nature-based optimization techniques. They discuss challenges and provide solutions to the concerns of security, privacy, and power consumption in cloud data center nodes and fog computing networks. The book also examines how: The existing fog and edge architecture is used to provide solutions to future challenges. A geographical information system (GIS) can be used with fog computing to help users in an urban region access prime healthcare. An optimization framework helps in cloud resource management. Fog computing can improve the quality, quantity, long-term viability, and cost-effectiveness in agricultural production. Virtualization can support fog computing, increase resources to be allocated, and be applied to different network layers. The combination of fog computing and IoT or cloud computing can help healthcare workers predict and analyze diseases in patients.
As the number of Internet of Things (IoT) elements grows exponentially, their interactions can generate a massive amount of raw and multi-structured data. The challenge with this data explosion is to transform any raw data into information and knowledge, which can be used by people and systems to make intelligent decisions. Industrial IoT Application Architectures and Use Cases explores how artificial intelligence (AI), data analytics, and IoT technology combine to promote intelligent decision-making and automation in a range of industries. With faster, more stable AI algorithms and approaches, knowledge discovery and dissemination from IoT-device data can be simplified and streamlined. An era of powerful cognitive technology is beginning due to cloud-based cognitive systems that are forming the foundation of game-changing intelligent applications. This book presents next-generation use cases of IoT and IoT data analytics for a variety of industrial verticals as given below: An Intelligent IoT framework for smart water management An IoT-enabled smart traffic control system for congestion control and smart traffic management An intelligent airport system for airport management and security surveillance An IoT framework for healthcare to integrate and report patient information Fuzzy scheduling with IoT for tracking and monitoring hotel assets An IoT system for designing drainage systems and monitoring drainage pipes Predictive maintenance of plant equipment to decide the actual mean time to malfunction Integrated neural networks and IoT systems for predictive equipment maintenance IoT integration in blockchain for smart waste management This book also includes a chapter on the IoT paradigm and an overview of uses cases for personal, social, and industrial applications.
This book teaches the basics of Oracle GoldenGate, which is a product that is used to simplify the process of Oracle Database Replication. GoldenGate can be used for reporting, failover, high availability, live reporting, data warehousing, and BigData ETL process, as well as connecting to multiple other data sources outside of Oracle Database such as SQL Server, MySQL, Teradata, PostgreSQL, and many others. The purpose of GoldenGate and its popularity is its ability to make the highly complex architecture of database replication into a much more simplistic task. This book teaches the reader how to use Oracle GoldenGate, from installation to troubleshooting.
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications comprehensively discusses the implications of cloud (storage) services and mobile applications on digital forensic investigations. The book provides both digital forensic practitioners and researchers with an up-to-date and advanced knowledge of collecting and preserving electronic evidence from different types of cloud services, such as digital remnants of cloud applications accessed through mobile devices. This is the first book that covers the investigation of a wide range of cloud services. Dr. Kim-Kwang Raymond Choo and Dr. Ali Dehghantanha are leading researchers in cloud and mobile security and forensics, having organized research, led research, and been published widely in the field. Users will gain a deep overview of seminal research in the field while also identifying prospective future research topics and open challenges.
Ab initio molecular dynamics revolutionized the field of realistic computer simulation of complex molecular systems and processes, including chemical reactions, by unifying molecular dynamics and electronic structure theory. This book provides the first coherent presentation of this rapidly growing field, covering a vast range of methods and their applications, from basic theory to advanced methods. This fascinating text for graduate students and researchers contains systematic derivations of various ab initio molecular dynamics techniques in order that readers can understand and assess the merits and drawbacks of commonly used methods. It also discusses the special features of the widely-used Car-Parrinello approach, correcting various misconceptions currently found in research literature. The book also contains pseudo-code and program layout for typical plane wave electronic structure codes, allowing newcomers to the field to understand commonly-used program packages, and enabling developers to improve and add new features in their code.
The Internet of Things (IoT) has made revolutionary advances in the utility grid as we know it. Among these advances, intelligent medical services are gaining much interest. The use of Artificial Intelligence (AI) is increasing day after day in fighting one of the most significant viruses, COVID-19. The purpose of this book is to present the detailed recent exploration of AI and IoT in the COVID-19 pandemic and similar applications. The integrated AI and IoT paradigm is widely used in most medical applications, as well as in sectors that deal with transacting data every day. This book can be used by computer science undergraduate and postgraduate students; researchers and practitioners; and city administrators, policy makers, and government regulators. It presents a smart and up-to-date model for COVID-19 and similar applications. Novel architectural and medical use cases in the smart city project are the core aspects of this book. The wide variety of topics it presents offers readers multiple perspectives on a variety of disciplines. Prof. Dr. Fadi Al-Turjman received his PhD in computer science from Queen's University, Kingston, Ontario, Canada, in 2011. He is a full professor and research center director at Near East University, Nicosia, Cyprus.
Placing contemporary technological developments in their historical context, this book argues for the importance of law in their regulation. Technological developments are focused upon overcoming physical and human constraints. There are no normative constraints inherent in the quest for ongoing and future technological development. In contrast, law proffers an essential normative constraint. Just because we can do something, does not mean that we should. Through the application of critical legal theory and jurisprudence to pro-actively engage with technology, this book demonstrates why legal thinking should be prioritised in emerging technological futures. This book articulates classic skills and values such as ethics and justice to ensure that future and ongoing legal engagements with socio-technological developments are tempered by legal normative constraints. Encouraging them to foreground questions of justice and critique when thinking about law and technology, the book addresses law students and teachers, lawyers and critical thinkers concerned with the proliferation of technology in our lives. |
You may like...
Discovering Computers - Digital…
Misty Vermaat, Mark Ciampa, …
Paperback
Discovering Computers, Essentials…
Susan Sebok, Jennifer Campbell, …
Paperback
Dynamic Web Application Development…
David Parsons, Simon Stobart
Paperback
Discovering Computers 2018 - Digital…
Misty Vermaat, Steven Freund, …
Paperback
R1,136
Discovery Miles 11 360
|