Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Applications of computing > General
For almost four decades, Software Engineering: A Practitioner's Approach (SEPA) has been the world's leading textbook in software engineering. The ninth edition represents a major restructuring and update of previous editions, solidifying the book's position as the most comprehensive guide to this important subject.
Value-Driven IT Management explains how huge sums are wasted by
companies (and governments) on poorly aligned, poorly justified and
poorly managed IT projects based on 'wishful thinking' cost and
benefit assumptions and that even 'successful' projects rarely seem
to realise the benefits promised.
Until now, those preparing to take the Certified Information Systems Security Professional (CISSP) examination were not afforded the luxury of studying a single, easy-to-use manual. Written by ten subject matter experts (SMEs) - all CISSPs - this test prep book allows CISSP candidates to test their current knowledge in each of the ten security domains that make up the Common Body of Knowledge (CBK) from which the CISSP examination is based on. The Total CISSP Exam Prep Book: Practice Questions, Answers, and Test Taking Tips and Techniques provides an outline of the subjects, topics, and sub-topics contained within each domain in the CBK, and with it you can readily identify terms and concepts that you will need to know for the exam.
Discusses digital fashion design and e-prototyping, including 2D/3D CAD, fashion simulation, fit analysis, digital pattern cutting, marker making, and the zero-waste concept Covers digital human modelling and VR/AR technology Details digital fashion business and promotion, including application of e-tools for supply chain, e-commerce, block chain technologies, big data, and AI
A First Course in Aerial Robots and Drones provides an accessible and student friendly introduction to aerial robots and drones. Drones figure prominently as opportunities for students to learn various aspects of aerospace engineering and design. Drones offer an enticing entry point for STEM studies. As the use of drones in STEM studies grows, there is an emerging generation of drone pilots who are not just good at flying, but experts in specific niches, such as mapping or thermography. Key Features: Focuses on algorithms that are currently used to solve diverse problems. Enables students to solve problems and improve their science skills. Introduces difficult concepts with simple, accessible examples. Suitable for undergraduate students, this textbook provides students and other readers with methods for solving problems and improving their science skills.
- presents in-depth insights regarding fundamentals associated with big data technologies involved in petroleum streams. - builds on earlier works of researchers and inventors, which is essential source material for students in this area of study. - discusses essential processes and methodologies in petroleum streams that will direct researchers to pursue a practical approach to the field. - sheds light on challenges and problems of individual streams and inert-relation issues, while asking the reader to innovate and ideate upon those issues. - Offers an analysis of the financial aspects and business perspective on the processes to help the reader make constructive and practical decision in the field.
Up-to-date coverage of every topic on the CEH v11 exam This effective self-study guide covers 100% of the EC Council's Certified Ethical Hacker Version 11 exam objectives. The book discusses the latest ethical hacking tools, techniques, and exploits. Readers will find learning objectives at the beginning of each chapter, step-by-step exercises, exam tips, practice exam questions, and in-depth explanations. An integrated test preparation system based on proven pedagogy, CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition covers all five phases of ethical hacking: reconnaissance, gaining access, enumeration, maintaining access, and covering tracks. Readers will learn about malware, hacking Web applications and mobile platforms, cloud computing vulnerabilities, and more. Designed to help candidates pass the exam with ease, this authoritative resource also serves as an essential on-the-job reference. Complete coverage of all CEH v11 exam objectives Includes online access to the Total Tester customizable practice exam software containing 300 practice questions Written by an experienced educator with more than 20 years of experience in the field
Today, Internet of Things (IoT) is ubiquitous as it is applied in practice in everything from Industrial Control Systems (ICS) to e-Health, e-commerce, Cyber Physical Systems (CPS), smart cities, smart parking, healthcare, supply chain management and many more. Numerous industries, academics, alliances and standardization organizations make an effort on IoT standardization, innovation and development. But there is still a need for a comprehensive framework with integrated standards under one IoT vision. Furthermore, the existing IoT systems are vulnerable to huge range of malicious attacks owing to the massive numbers of deployed IoT systems, inadequate data security standards and the resource-constrained nature. Existing security solutions are insufficient and therefore it is necessary to enable the IoT devices to dynamically counter the threats and save the system. Apart from illustrating the diversified IoT applications, this book also addresses the issue of data safekeeping along with the development of new security-enhancing schemes such as blockchain, as well as a range of other advances in IoT. The reader will discover that the IoT facilitates a multidisciplinary approach dedicated to create novel applications and develop integrated solutions to build a sustainable society. The innovative and fresh advances that demonstrate IoT and computational intelligence in practice are discussed in this book, which will be helpful and informative for scientists, research scholars, academicians, policymakers, industry professionals, government organizations and others. This book is intended for a broad target audience, including scholars of various generations and disciplines, recognized scholars (lecturers and professors) and young researchers (postgraduate and undergraduates) who study the legal and socio-economic consequences of the emergence and dissemination of digital technologies such as IoT. Furthermore, the book is intended for researchers, developers and operators working in the field of IoT and eager to comprehend the vulnerability of the IoT paradigm. The book will serve as a comprehensive guide for the advanced-level students in computer science who are interested in understanding the severity and implications of the accompanied security issues in IoT. Dr. Bharat Bhushan is an Assistant Professor of Department of Computer Science and Engineering (CSE) at School of Engineering and Technology, Sharda University, Greater Noida, India. Prof. (Dr.) Sudhir Kumar Sharma is currently a Professor and Head of the Department of Computer Science, Institute of Information Technology & Management affiliated to GGSIPU, New Delhi, India. Prof. (Dr.) Bhuvan Unhelkar (BE, MDBA, MSc, PhD; FACS; PSM-I, CBAP (R)) is an accomplished IT professional and Professor of IT at the University of South Florida, Sarasota-Manatee (Lead Faculty). Dr. Muhammad Fazal Ijaz is working as an Assistant Professor in Department of Intelligent Mechatronics Engineering, Sejong University, Seoul, Korea. Prof. (Dr.) Lamia Karim is a professor of computer science at the National School of Applied Sciences Berrechid (ENSAB), Hassan 1st University.
You will be breached--the only question is whether you'll be ready A cyber breach could cost your organization millions of dollars--in 2019, the average cost of a cyber breach for companies was $3.9M, a figure that is increasing 20-30% annually. But effective planning can lessen the impact and duration of an inevitable cyberattack. Cyber Breach Response That Actually Works provides a business-focused methodology that will allow you to address the aftermath of a cyber breach and reduce its impact to your enterprise. This book goes beyond step-by-step instructions for technical staff, focusing on big-picture planning and strategy that makes the most business impact. Inside, you'll learn what drives cyber incident response and how to build effective incident response capabilities. Expert author Andrew Gorecki delivers a vendor-agnostic approach based on his experience with Fortune 500 organizations. Understand the evolving threat landscape and learn how to address tactical and strategic challenges to build a comprehensive and cohesive cyber breach response program Discover how incident response fits within your overall information security program, including a look at risk management Build a capable incident response team and create an actionable incident response plan to prepare for cyberattacks and minimize their impact to your organization Effectively investigate small and large-scale incidents and recover faster by leveraging proven industry practices Navigate legal issues impacting incident response, including laws and regulations, criminal cases and civil litigation, and types of evidence and their admissibility in court In addition to its valuable breadth of discussion on incident response from a business strategy perspective, Cyber Breach Response That Actually Works offers information on key technology considerations to aid you in building an effective capability and accelerating investigations to ensure your organization can continue business operations during significant cyber events.
Richard P. Feynman made profoundly important and prescient contributions to the physics of computing, notably with his seminal articles "There's Plenty of Room at the Bottom" and "Simulating Physics with Computers." These two provocative papers (both reprinted in this volume) anticipated, decades before their time, several breakthroughs that have since become fields of science in their own right, such as nanotechnology and the newest, perhaps most exciting area of physics and computer science, quantum computing.The contributors to this book are all distinguished physicists and computer scientists, and many of them were guest lecturers in Feynman's famous CalTech course on the limits of computers. they include Charles Bennett on Quantum Information Theory, Geoffrey Fox on Internetics, Norman Margolus on Crystalline Computation, and Tommaso Toffoli on the Fungibility of Computation.Both a tribute to Feynman and a new exploration of the limits of computers by some of today's most influential scientists, "Feynman and Computation" continues the pioneering work started by Feynman and published by him in his own Lectures on Computation. This new computation volume consists of both original chapters and reprints of classic papers by leaders in the field. "Feynman and Computation" will generate great interest from the scientific community and provide essential background for further work in this field.
Computer Concepts: Illustrated Introductory, 9/e, International Edition is designed to help students learn and retain the most relevant and essential information about computers and technology in today's digital world This edition has been revised to cover the latest important computing trends and skills, but maintains the pedagogical and streamlined design elements that instructors and students know and love about the Illustrated Series. New for this edition, make the most of Computer Concepts: Illustrated Introductory, 9/e, International Edition with the all-in-one CourseMate digital solution complete with a media-rich ebook, interactive quizzes and activities, and the Engagement Tracker for hassle-free, automatic grading.
The availability of packaged clustering programs means that anyone with data can easily do cluster analysis on it. But many users of this technology don't fully appreciate its many hidden dangers. In today's world of "grab and go algorithms," part of my motivation for writing this book is to provide users with a set of cautionary tales about cluster analysis, for it is very much an art as well as a science, and it is easy to stumble if you don't understand its pitfalls. Indeed, it is easy to trip over them even if you do! The parenthetical word usually in the title is very important, because all clustering algorithms can and do fail from time to time. Modern cluster analysis has become so technically intricate that it is often hard for the beginner or the non-specialist to appreciate and understand its many hidden dangers. Here's how Yogi Berra put it, and he was right: In theory there's no difference between theory and practice. In practice, there is ~Yogi Berra This book is a step backwards, to four classical methods for clustering in small, static data sets that have all withstood the tests of time. The youngest of the four methods is now almost 50 years old: Gaussian Mixture Decomposition (GMD, 1898) SAHN Clustering (principally single linkage (SL, 1909)) Hard c-means (HCM, 1956, also widely known as (aka) "k-means") Fuzzy c-means (FCM, 1973, reduces to HCM in a certain limit) The dates are the first known writing (to me, anyway) about these four models. I am (with apologies to Marvel Comics) very comfortable in calling HCM, FCM, GMD and SL the Fantastic Four. Cluster analysis is a vast topic. The overall picture in clustering is quite overwhelming, so any attempt to swim at the deep end of the pool in even a very specialized subfield requires a lot of training. But we all start out at the shallow end (or at least that's where we should start!), and this book is aimed squarely at teaching toddlers not to be afraid of the water. There is no section of this book that, if explored in real depth, cannot be expanded into its own volume. So, if your needs are for an in-depth treatment of all the latest developments in any topic in this volume, the best I can do - what I will try to do anyway - is lead you to the pool, and show you where to jump in.
Within the last three decades, interest in the psychological
experience of human faces has drawn together cognitive science
researchers from diverse backgrounds. Computer scientists talk to
neural scientists who draw on the work of mathematicians who
explicitly influence those conducting behavioral experiments.
This text covers the use of computer applications in the mineral industries, encompassing topics such as the use of computer visualization in mining systems and aspects such as ventilation and safety.
Because of developments in powerful computer technology, computational techniques, advances in a wide spectrum of diverse technologies, and other advances coupled with cross disciplinary pursuits between technology and its greatly significant applied implications in human body processes, the field of biomechanics is evolving as a broadly significant area. The four volumes of Biomechanical Systems: Techniques and Applications presents the advances in widely diverse areas with significant implications for human betterment that occur continuously at a high rate. These include dynamics of musculo-skeletal systems; mechanics of hard and soft tissues; mechanics of muscle; mechanics of bone remodeling; mechanics of implant-tissue interfaces; cardiovascular and respiratory biomechanics; mechanics of blood flow, air flow, flow-prosthesis interfaces; mechanics of impact; dynamics of man machine interaction; and numerous other areas. The great breadth and depth of the field of biomechanics on the international scene requires at least four volumes for adequate treatment. These four volumes constitute a well integrated set that can be utilized as individual volumes. They provide a substantively significant and rather comprehensive, in-depth treatment of biomechanic systems and techniques that is most surely unique on the international scene.
The first edition of Exercises in Programming Style was honored as an ACM Notable Book and praised as "The best programming book of the decade." This new edition retains the same presentation but has been upgraded to Python 3, and there is a new section on neural network styles. Using a simple computational task (term frequency) to illustrate different programming styles, Exercises in Programming Style helps readers understand the various ways of writing programs and designing systems. It is designed to be used in conjunction with code provided on an online repository. The book complements and explains the raw code in a way that is accessible to anyone who regularly practices the art of programming. The book can also be used in advanced programming courses in computer science and software engineering programs. The book contains 40 different styles for writing the term frequency task. The styles are grouped into ten categories: historical, basic, function composition, objects and object interactions, reflection and metaprogramming, adversity, data-centric, concurrency, interactivity, and neural networks. The author states the constraints in each style and explains the example programs. Each chapter first presents the constraints of the style, next shows an example program, and then gives a detailed explanation of the code. Most chapters also have sections focusing on the use of the style in systems design as well as sections describing the historical context in which the programming style emerged.
Social Media Analytics and Practical Applications: The Change to the Competition Landscape provides a framework that allows you to understand and analyze the impact of social media in various industries. It illustrates how social media analytics can help firms build transformational strategies and cope with the challenges of social media technology. By focusing on the relationship between social media and other technology models, such as wisdom of crowds, healthcare, fintech and blockchain, machine learning methods, and 5G, this book is able to provide applications used to understand and analyze the impact of social media. Various industries are called out and illustrate how social media analytics can help firms build transformational strategies and at the same time cope with the challenges that are part of the landscape. The book discusses how social media is a driving force in shaping consumer behavior and spurring innovations by embracing and directly engaging with consumers on social media platforms. By closely reflecting on emerging practices, the book shows how to take advantage of recent advancements and how business operations are being revolutionized. Social Media Analytics and Practical Applications is written for academicians and professionals involved in social media and social media analytics.
An overview of the worldwide discussion of the information concept, this book presents thoughts of scholars from various disciplines including information and computer science, semiotics, system science, evolutionary theory, physics, biology, psychology, consciousness theory, sociology, and science and technology studies. The shortcomings of the old fashioned Shannon and Weaver's model of information are examined, providing insights into how research of evolutionary systems could lay the basis for a new theory of information that will bridge the gap between "hard" and "soft" sciences.
Computerized assessment offers many opportunities for innovations
in measurement. In contrast to static paper-and-pencil instruments,
computerized assessment can capitalize on the dynamic capabilities
of the computer. For example, the difficulty of administered items
can be adopted to the ability of the examinee, thus eliminating
items that are too hard or too easy. Multimedia computers provide
the opportunity to revolutionize assessment. Stereo sound,
animation, and full-motion video can be incorporated into
assessment tools and aid in the measurement of individual
differences ranging from musical skills to interpersonal abilities.
What is creative technological change? This text explores new ways of thinking and acting in relation to this question in contemporary organizations. It examines how technology shapes organizations and how organizations shape technology - especially "virtual" and other information and computing technologies. A wide range of thinking on these issues from organizational theory, political economy, evolutionary economics, feminist analysis, the sociology of technology and the "new socio-technical theory" is outlined. The idea of metaphor is deployed to capture the differences between, and strengths and weaknesses of, different ways of conceptualizing the technology/organization relationship. It is argued that this approach offers the possibility of developing new ways of thinking about, viewing and ultimately responding creatively to the organizational challenges posed by technological change. The book concludes by outlining a model of the process by which technology and organization are configured. Topics covered include: machine, biological and virtual ways of understanding technology and organization; the evolution of innovative organizational forms; the politics of consuming techno
Containing over one hundred and sixty line drawings, maps and one hundred tables, this book explains the fundamental hydrologic principles and favoured methods of analysis. Aimed at students interested in natural resources and environmental science, spreadsheet exercises and worked examples help to develop basic problem solving skills.
This volume contains papers presented during the first international PLAXIS symposium. Topics covered include: general geo-technical aspects; tunnels and deep excavations, and education and research. This pack is meant for the user of the PLAXIS program, as well as engineers and researchers. |
You may like...
Distributed Real-Time Architecture for…
Hamidreza Ahmadian, Roman Obermaisser, …
Hardcover
R4,524
Discovery Miles 45 240
Law, Economics and Cyberspace - The…
Niva Elkin-Koren, Eli M. Salzberger
Hardcover
R2,851
Discovery Miles 28 510
Discovering Computers 2018 - Digital…
Misty Vermaat, Steven Freund, …
Paperback
Discovering Computers (c)2017
Mark Frydenberg, Misty Vermaat, …
Paperback
(3)
Dynamic Web Application Development…
David Parsons, Simon Stobart
Paperback
|