0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (111)
  • R250 - R500 (425)
  • R500+ (1,376)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > General

Digital Media and Democratic Futures (Hardcover): Michael X.Delli Carpini Digital Media and Democratic Futures (Hardcover)
Michael X.Delli Carpini
R1,916 Discovery Miles 19 160 Ships in 18 - 22 working days

The revolution in digital communications has altered the relationship between citizens and political elites, with important implications for democracy. As new information ecosystems have evolved, as unforeseen examples of their positive and negative consequences have emerged, and as theorizing, data, and research methods have expanded and improved, the central question has shifted from if the digital information environment is good or bad for democratic politics to how and in what contexts particular attributes of this environment are having an influence. It is only through the careful analysis of specific cases that we can begin to build a more comprehensive and nuanced understanding of the role of digital media in democratic theory and practice. The essays in Digital Media and Democratic Futures focus on a variety of information and communication technologies, politically relevant actors, substantive issues, and digital political practices, doing so from distinct theoretical perspectives and methodological approaches. Individually, each of these case studies provides deep insights into the complex and context-dependent relationship between media and democracy. Collectively, they show that there is no single outcome for democracy in the digital age, only a range of possible futures. Contributors: Rena Bivens, Michael X. Delli Carpini, Jennifer Earl, Thomas Elliott, Deen Freelon, Kelly Gates, Philip N. Howard, Daniel Kreiss, Ting Luo, Helen Nissenbaum, Beth Simone Noveck, Jennifer Pan, Lisa Poggiali, Daniela Stockmann.

Tim Noakes - The Quiet Maverick (Paperback): Daryl Ilbury Tim Noakes - The Quiet Maverick (Paperback)
Daryl Ilbury 5
R262 Discovery Miles 2 620 Ships in 4 - 6 working days

On 5 February 2014, world-renowned scientist Tim Noakes fired off a tweet allegedly dispensing dietary advice to a young mother into a highly volatile media space; the fallout threatened to destroy his career. This is the untold backstory.

Veteran journalist and writer Daryl Ilbury unveils, layer by layer, a combustible mix of scientific ignorance, academic jealousy, the collapse of media ethics, and the interests of a world-renowned scientist in highlighting the intricacies of human nutrition and exposing those he believes have vested interests in regulating it.

Featuring interviews with people who have worked closely with Noakes, including former Springbok coach Jake White and polar swimmer Lewis Gordon Pugh, as well as award-winning journalists and fellow scientists and academics, some of whom now consider Noakes dangerous and out of control, this book is bound to be as controversial as the man himself.

Handbuch zum Internetrecht (German, Paperback, Softcover reprint of the original 1st ed. 2000): Detlef Kroger, Marc A Gimmy Handbuch zum Internetrecht (German, Paperback, Softcover reprint of the original 1st ed. 2000)
Detlef Kroger, Marc A Gimmy
R1,604 Discovery Miles 16 040 Ships in 18 - 22 working days

Das Internet stellt eine interessante und bedeutende Herausforderung an die Rechtswissenschaften dar. Die rasante technische Entwicklung dieses Mediums fiihrte zunachst zu der Erfahrung, daB es zu jeder Regel eine technische Umge hungsmOglichkeit zu geben schien, die diese ihrer Wirkung beraubte. Sowohl der Gesetzgeber als auch die mit der Thematik bescWiftigten Juristen haben Schwie rigkeiten, sich auf diese Situation einzustellen. Gleichwohl ist die Vorstellung von Rechtssicherheit im Internet zu einem entscheidenden Gesichtspunkt fUr dessen positive Fortentwickiung geworden. Der elektronische Geschliftsverkehr und die Bereitschaft von Unternehmen, neue Marketing-und Distributionswege zu bege hen, hangt ma6geblich von der zu erzielenden Rechtssicherheit abo Aber auch der in der Presse in den Vordergrund gespielte Mi6brauch des Mediums erfordert angemessene rechtliche MaBnalunen. Allerdings sind LOsungen fur derartige Pro blemlagen nicht mehr alleine durch Rechtsregeln zu erreichen, sondern miissen von technischen Rahmenbedingungen wie etwa die "Digitale Signatur," Sicher heitskonzepte etc. flankiert werden. Dieses Handbuch verfolgt das Ziel, dem Nutzer in der juristischen oder unter nehmerischen Praxis ebenso wie an Universitat oder Fachhochschule einen Weg durch dieses neue Rechtsgebiet zu schlagen. Obschon es fUr dieses junge Rechts gebiet noch keine festgelegten systematischen Strukturen gibt, wird ein vorsichti ger Versuch unternommen, eine Gliederung zu entwerfen, die sich an die Gege benheit der Materie anIehnt. Dazu ist das Werk in vier Abschnitte unterteilt. 1m ersten Abschnitt werden "Grund/agen" behandelt. Den Einstieg bildet ein Kapitel fiber "Europarechtliche und Internationalrechtliche Regelungen.""

Business-Webdesign - Benutzerfreundlichkeit, Konzeptionierung, Technik, Wartung (German, Paperback, Softcover Reprint of the... Business-Webdesign - Benutzerfreundlichkeit, Konzeptionierung, Technik, Wartung (German, Paperback, Softcover Reprint of the Original 1st 2002 ed.)
Thorsten Stocksmeier
R1,503 Discovery Miles 15 030 Ships in 18 - 22 working days

Die Optimierung des Web-Auftritts ist fur Entscheider und Mediengestalter ein wesentliches Ziel ihrer Tatigkeit. Anhand von Erkenntnissen der Ergonomie und Arbeitswissenschaft erklart der Autor, was Besucher auf Internetseiten fesselt und zum Kauf anregt, aber auch, was abschreckt. Fur die Planung eines erfolgreichen E-Business-Auftritts vermittelt das Buch wichtige Grundsatze. Fur das Design einer Informationsseite werden Internet-spezifische Prasentationsregeln erlautert, deren Ziel ein Internet-Auftritt ist. Ein Uberblick uber die grundlegenden Internet-Konzepte rundet das Werk ab."

Introduction to Modern Cryptography (Hardcover, 3rd Edition): Jonathan Katz, Yehuda Lindell Introduction to Modern Cryptography (Hardcover, 3rd Edition)
Jonathan Katz, Yehuda Lindell
R1,210 R1,142 Discovery Miles 11 420 Save R68 (6%) Ships with 15 working days

Now the most used texbook for introductory cryptography courses in both mathematics and computer science, the Third Edition builds upon previous editions by offering several new sections, topics, and exercises. The authors present the core principles of modern cryptography, with emphasis on formal definitions, rigorous proofs of security.

Table of Contents

I Introduction and Classical Cryptography

1. Introduction

Cryptography and Modern Cryptography

The Setting of Private-Key Encryption

Historical Ciphers and Their Cryptanalysis

Principles of Modern Cryptography

Principle 1 - Formal Definitions

Principle 2 - Precise Assumptions

Principle 3 - Proofs of Security

Provable Security and Real-World Security

References and Additional Reading

Exercises

2. Perfectly Secret Encryption

Definitions

The One-Time Pad

Limitations of Perfect Secrecy

*Shannon's Theorem

References and Additional Reading

Exercises

II Private-Key (Symmetric) Cryptography

3. Private-Key Encryption

Computational Security

The Concrete Approach

The Asymptotic Approach

Defining Computationally Secure Encryption

The Basic Definition of Security (EAV-Security)

*Semantic Security

Constructing an EAV-Secure Encryption Scheme

Pseudorandom Generators

Proofs by Reduction

EAV-Security from a Pseudorandom Generator

Stronger Security Notions

Security for Multiple Encryptions

Chosen-Plaintext Attacks and CPA-Security

CPA-Security for Multiple Encryptions

Constructing a CPA-Secure Encryption Scheme

Pseudorandom Functions and Permutations

CPA-Security from a Pseudorandom Function

Modes of Operation and Encryption in Practice

Stream Ciphers

Stream-Cipher Modes of Operation

Block Ciphers and Block-Cipher Modes of Operation

*Nonce-Based Encryption

References and Additional Reading

Exercises

4. Message Authentication Codes

Message Integrity

Secrecy vs Integrity

Encryption vs Message Authentication

Message Authentication Codes (MACs) - Definitions

Constructing Secure Message Authentication Codes

A Fixed-Length MAC

Domain Extension for MACs

CBC-MAC

The Basic Construction

*Proof of Security

GMAC and Poly

MACs from Difference-Universal Functions

Instantiations

*Information-Theoretic MACs

One-Time MACs from Strongly Universal Functions

One-Time MACs from Difference-Universal Functions

Limitations on Information-Theoretic MACs

References and Additional Reading

Exercises

5. CCA-Security and Authenticated Encryption

Chosen-Ciphertext Attacks and CCA-Security

Padding-Oracle Attacks

Defining CCA-Security

Authenticated Encryption

Defining Authenticated Encryption

CCA Security vs Authenticated Encryption

Authenticated Encryption Schemes

Generic Constructions

Standardized Schemes

Secure Communication Sessions

References and Additional Reading

Exercises

6. Hash Functions and Applications

Definitions

Collision Resistance

Weaker Notions of Security

Domain Extension: The Merkle-Damgard Transform

Message Authentication Using Hash Functions

Hash-and-MAC

HMAC

Generic Attacks on Hash Functions

Birthday Attacks for Finding Collisions

Small-Space Birthday Attacks

*Time/Space Tradeo s for Inverting Hash Functions

The Random-Oracle Model

The Random-Oracle Model in Detail

Is the Random-Oracle Methodology Sound?

Additional Applications of Hash Functions

Fingerprinting and Deduplication

Merkle Trees

Password Hashing

Key Derivation

Commitment Schemes

References and Additional Reading

Exercises

7. Practical Constructions of Symmetric-Key Primitives

Stream Ciphers

Linear-Feedback Shift Registers

Adding Nonlinearity

Trivium

RC4

ChaCha20

Block Ciphers

Substitution-Permutation Networks

Feistel Networks

DES - The Data Encryption Standard

3 DES: Increasing the Key Length of a Block Cipher

AES -The Advanced Encryption Standard

*Differential and Linear Cryptanalysis

Compression Functions and Hash Functions

Compression Functions from Block Ciphers

MD5, SHA-1, and SHA-2

The Sponge Construction and SHA-3 (Keccak)

References and Additional Reading

Exercises

8. *Theoretical Constructions of Symmetric-Key Primitives

One-Way Functions

Definitions

Candidate One-Way Functions

Hard-Core Predicates

From One-Way Functions to Pseudorandomness

Hard-Core Predicates from One-Way Functions

A Simple Case

A More Involved Case

The Full Proof

Constructing Pseudorandom Generators

Pseudorandom Generators with Minimal Expansion

Increasing the Expansion Factor

Constructing Pseudorandom Functions

Constructing (Strong) Pseudorandom Permutations

Assumptions for Private-Key Cryptography

Computational Indistinguishability

References and Additional Reading

Exercises

III Public-Key (Asymmetric) Cryptography

9. Number Theory and Cryptographic Hardness Assumptions

Preliminaries and Basic Group Theory

Primes and Divisibility

Modular Arithmetic

Groups

The Group ZN

*Isomorphisms and the Chinese Remainder Theorem

Primes, Factoring, and RSA

Generating Random Primes

*Primality Testing

The Factoring Assumption

The RSA Assumption

*Relating the Factoring and RSA Assumptions

Cryptographic Assumptions in Cyclic Groups

Cyclic Groups and Generators

The Discrete-Logarithm/Diffie-Hellman Assumptions

Working in (Subgroups of) Zp

Elliptic Curves

*Cryptographic Applications

One-Way Functions and Permutations

Collision-Resistant Hash Functions

References and Additional Reading

Exercises

10. *Algorithms for Factoring and Computing Discrete Logarithms

Algorithms for Factoring

Pollard's p - Algorithm

Pollard's Rho Algorithm

The Quadratic Sieve Algorithm

Generic Algorithms for Computing Discrete Logarithms

The Pohlig-Hellman Algorithm

The Baby-Step/Giant-Step Algorithm

Discrete Logarithms from Collisions

Index Calculus: Computing Discrete Logarithms in Zp

Recommended Key Lengths

References and Additional Reading

Exercises

11. Key Management and the Public-Key Revolution

Key Distribution and Key Management

A Partial Solution: Key-Distribution Centers

Key Exchange and the Diffie-Hellman Protocol

The Public-Key Revolution

References and Additional Reading

Exercises

12. Public-Key Encryption

Public-Key Encryption - An Overview

Definitions

Security against Chosen-Plaintext Attacks

Multiple Encryptions

Security against Chosen-Ciphertext Attacks

Hybrid Encryption and the KEM/DEM Paradigm

CPA-Security

CCA-Security

CDH/DDH-Based Encryption

El Gamal Encryption

DDH-Based Key Encapsulation

*A CDH-Based KEM in the Random-Oracle Model

*Chosen-Ciphertext Security and DHIES/ECIES

RSA-Based Encryption

Plain RSA Encryption

Padded RSA and PKCS # v

*CPA-Secure Encryption without Random Oracles

OAEP and PKCS # v

*A CCA-Secure KEM in the Random-Oracle Model

RSA Implementation Issues and Pitfalls

References and Additional Reading

Exercises

13. Digital Signature Schemes

Digital Signatures - An Overview

Definitions

The Hash-and-Sign Paradigm

RSA-Based Signatures

Plain RSA Signatures

RSA-FDH and PKCS #1 Standards

Signatures from the Discrete-Logarithm Problem

Identification Schemes and Signatures

The Schnorr Identification/Signature Schemes

DSA and ECDSA

Certificates and Public-Key Infrastructures

Putting It All Together { TLS

*Signcryption

References and Additional Reading

Exercises

14. *Post-Quantum Cryptography

Post-Quantum Symmetric-Key Cryptography

Grover's Algorithm and Symmetric-Key Lengths

Collision-Finding Algorithms and Hash Functions

Shor's Algorithm and its Impact on Cryptography

Post-Quantum Public-Key Encryption

Post-Quantum Signatures

Lamport's Signature Scheme

Chain-Based Signatures

Tree-Based Signatures

References and Additional Reading

Exercises

15. *Advanced Topics in Public-Key Encryption

Public-Key Encryption from Trapdoor Permutations

Trapdoor Permutations

Public-Key Encryption from Trapdoor Permutations

The Paillier Encryption Scheme

The Structure of Z_N

The Paillier Encryption Scheme

Homomorphic Encryption

Secret Sharing and Threshold Encryption

Secret Sharing

Verifiable Secret Sharing

Threshold Encryption and Electronic Voting

The Goldwasser-Micali Encryption Scheme

Quadratic Residues Modulo a Prime

Quadratic Residues Modulo a Composite

The Quadratic Residuosity Assumption

The Goldwasser-Micali Encryption Scheme

The Rabin Encryption Scheme

Computing Modular Square Roots

A Trapdoor Permutation Based on Factoring

The Rabin Encryption Scheme

References and Additional Reading

Exercises

Index of Common Notation

Appendix A Mathematical Background

A Identities and Inequalities

A Asymptotic Notation

A Basic Probability

A The \Birthday" Problem

A *Finite Fields

Appendix B Basic Algorithmic Number Theory

B Integer Arithmetic

B Basic Operations

B The Euclidean and Extended Euclidean Algorithms

B Modular Arithmetic

B Basic Operations

B Computing Modular Inverses

B Modular Exponentiation

B *Montgomery Multiplication

B Choosing a Uniform Group Element

B *Finding a Generator of a Cyclic Group

B Group-Theoretic Background

B Efficient Algorithms

References and Additional Reading

Exercises



 

/

iMARKET Handbook - Optimization Guide (Paperback): Lizzy McNett iMARKET Handbook - Optimization Guide (Paperback)
Lizzy McNett
R318 Discovery Miles 3 180 Ships in 18 - 22 working days
Scambait (Paperback): Ryan R Campbell Scambait (Paperback)
Ryan R Campbell
R368 Discovery Miles 3 680 Ships in 18 - 22 working days
Information Hiding - 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers... Information Hiding - 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers (Paperback, 2009 ed.)
Stefan Katzenbeisser, Ahmad-Reza Sadeghi
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-workshop proceedings of the 11th International Workshop on Information Hiding, IH 2009, held in Darmstadt, Germany, in June 2009.

The 19 revised full papers presented were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on steganography, steganalysis, watermarking, fingerprinting, hiding in unusual content, novel applications and forensics.

Computational Forensics - Third International Workshop, IWCF 2009, The Hague, The Netherlands, August 13-14, 2009, Proceedings... Computational Forensics - Third International Workshop, IWCF 2009, The Hague, The Netherlands, August 13-14, 2009, Proceedings (Paperback, 2009 ed.)
Zeno J.M.H. Geradts, Katrin Franke, Cor J. Veenman
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

ThisLectureNotesinComputerScience(LNCS)volumecontainsthepapersp- sentedatthe ThirdInternationalWorkshoponComputationalForensics(IWCF 2009), held August 13-14, 2009 at The Netherlands Forensic Institute in The Hague, The Netherlands. Computational forensics is a research domain focusing on the investigation of forensic problems using computational methods. Its primary goal is the d- covery and advancement of forensic knowledge involving modeling, computer simulation, and computer-based analysis and recognition in studying and so- ing forensic problems. The Computational Forensics Workshop series is intended as a forum for researchers and practicioners in all areas of computational and forensic s- ences. This forum discusses current challenges in computer-assisted forensics and presents recent progress and advances. IWCF addressesa broadspectrum of forensicdisciplines fromcriminal inv- tigation. The NAS report "Strengthening Forensic Science in the United States: A Path Forward," published in 2009, already concluded that: "With the exc- tion of nuclear DNA analysis, no forensic method has been rigorously shown to havethecapacitytoconsistentlyandwithahighdegreeofcertaintydemonstrate aconnectionbetweenevidenceandspeci?cindividualorsource."Computational methods can assist with statistical methods using, for example, likelihood ratios to strengthen the di?erent ?elds of forensic science. The organization of such an event is not possible without the e?ort and the enthousiasm of everyone involved. We thank all the members of the P- gram Committee for the timely reviewing process and the adherence to high standards. June 2009 Zeno J.M.H. Geradts Katrin Y. Franke Cor J. Veenman IWCF2009 Organization IWCF2009 was jointly organized by The Netherlands Forensic Institute, The Hague, The Netherlands and the University of Amsterdam, Amsterdam, The Netherlands.

Biowissenschaftlich recherchieren - UEber den Einsatz von Datenbanken und anderen Ressourcen der Bioinformatik (German,... Biowissenschaftlich recherchieren - UEber den Einsatz von Datenbanken und anderen Ressourcen der Bioinformatik (German, Paperback, 2007 ed.)
Nicola Gaedeke
R796 Discovery Miles 7 960 Ships in 18 - 22 working days

Praktischer Leitfaden fur die Informationssuche: Die Autorin berucksichtigt insbesondere die Datenbanken und Ressourcen des National Center for Biotechnology Information (NCBI), mit dem sie eng zusammenarbeitete. Beispiele und Ubungen aus dem Laboralltag veranschaulichen den sicheren Umgang mit biowissenschaftlichen Datenbanken und Sequenzanalyse-Programmen. Eine praktische Orientierungshilfe fur alle, die effizient recherchieren wollen."

Blogging on Instagram - Engagement Writing on One of the World's Best Social Media Platforms (Paperback): Terri Nakamura Blogging on Instagram - Engagement Writing on One of the World's Best Social Media Platforms (Paperback)
Terri Nakamura
R424 R400 Discovery Miles 4 000 Save R24 (6%) Ships in 18 - 22 working days
Instagram Marketing SECRETS - The Complete Guide for Effective Improving Brand Awareness, Growing Your Real Following, How to... Instagram Marketing SECRETS - The Complete Guide for Effective Improving Brand Awareness, Growing Your Real Following, How to Crack the Instagram Algorithm & Generate Calculable Profits (Paperback)
Uwe W Klemm
R410 Discovery Miles 4 100 Ships in 18 - 22 working days
Pissed Off (Paperback): Michael Thornton Pissed Off (Paperback)
Michael Thornton
R534 Discovery Miles 5 340 Ships in 18 - 22 working days
Medizinische Informatik Und Bioinformatik - Ein Kompendium Fur Studium Und Praxis (German, Hardcover, 2003 ed.): Martin Dugas,... Medizinische Informatik Und Bioinformatik - Ein Kompendium Fur Studium Und Praxis (German, Hardcover, 2003 ed.)
Martin Dugas, Karin Schmidt
R1,002 Discovery Miles 10 020 Ships in 18 - 22 working days

Das Buch bietet sowohl Medizinern und Biologen als auch Informatikern einen umfassenden und verstAndlichen Einstieg in die Medizinische Informatik und Bioinformatik. Die Darstellung der Themen ist abgestimmt auf die Studieninhalte dieser neuen Fachrichtungen.
In den ersten Kapiteln werden die Grundbegriffe der Medizin (z.B. Anatomie, Biochemie, Physiologie, Genetik, Gesundheitswesen) und der Informatik (z.B. Algorithmen, Datenbanken, Internet, Software Engineering) erlAutert. Dies ermAglicht dem Informatiker bzw. Mediziner einen schnellen Zugang zum jeweils komplementAren Fachgebiet. In den folgenden Kapiteln werden alle relevanten Themen der Medizinischen Informatik (z.B. Krankenhausinformationssysteme, PACS, Datenschutz, ICD, DRG, Computer-based-Training) und der Bioinformatik (z.B. Sequenzanalyse, Gen-Datenbanken, Proteomics, Genomics, Genexpressionsanalyse) anschaulich dargestellt.

In the Swarm, Volume 3 - Digital Prospects (Paperback): Byung-Chul Han In the Swarm, Volume 3 - Digital Prospects (Paperback)
Byung-Chul Han; Translated by Erik Butler
R319 R293 Discovery Miles 2 930 Save R26 (8%) Ships in 18 - 22 working days

A prominent German thinker argues that-contrary to "Twitter Revolution" cheerleading-digital communication is destroying political discourse and political action. The shitstorm represents an authentic phenomenon of digital communication. -from In the Swarm Digital communication and social media have taken over our lives. In this contrarian reflection on digitized life, Byung-Chul Han counters the cheerleaders for Twitter revolutions and Facebook activism by arguing that digital communication is in fact responsible for the disintegration of community and public space and is slowly eroding any possibility for real political action and meaningful political discourse. In the predigital, analog era, by the time an angry letter to the editor had been composed, mailed, and received, the immediate agitation had passed. Today, digital communication enables instantaneous, impulsive reaction, meant to express and stir up outrage on the spot. "The shitstorm," writes Han, "represents an authentic phenomenon of digital communication." Meanwhile, the public, the senders and receivers of these communications have become a digital swarm-not a mass, or a crowd, or Negri and Hardt's antiquated notion of a "multitude," but a set of isolated individuals incapable of forming a "we," incapable of calling dominant power relations into question, incapable of formulating a future because of an obsession with the present. The digital swarm is a fragmented entity that can focus on individual persons only in order to make them an object of scandal. Han, one of the most widely read philosophers in Europe today, describes a society in which information has overrun thought, in which the same algorithms are employed by Facebook, the stock market, and the intelligence services. Democracy is under threat because digital communication has made freedom and control indistinguishable. Big Brother has been succeeded by Big Data.

Calm The F*ck Down I'm a designer - Swear Word Coloring Book For Adults: Humorous job Cusses, Snarky Comments, Motivating... Calm The F*ck Down I'm a designer - Swear Word Coloring Book For Adults: Humorous job Cusses, Snarky Comments, Motivating Quotes & Relatable designer Reflections for Work Anger Management, Stress Relief & Relaxation Mindful Book For Grown-ups (Paperback)
Swear Word Coloring Book
R237 Discovery Miles 2 370 Ships in 18 - 22 working days
Advanced Applications of NLP and Deep Learning in Social Media Data (Paperback): Ahmed A. Abd El-Latif, Mudasir Ahmad Wani,... Advanced Applications of NLP and Deep Learning in Social Media Data (Paperback)
Ahmed A. Abd El-Latif, Mudasir Ahmad Wani, Mohammed A. El-Affendi
R5,126 Discovery Miles 51 260 Ships in 18 - 22 working days

Social media platforms are one of the main generators of textual data where people around the world share their daily life experiences and information with online society. The social, personal, and professional lives of people on these social networking sites generate not only a huge amount of data but also open doors for researchers and academicians with numerous research opportunities. This ample amount of data needs advanced machine learning, deep learning, and intelligent tools and techniques to receive, process, and interpret the information to resolve real-life challenges and improve the online social lives of people. Advanced Applications of NLP and Deep Learning in Social Media Data bridges the gap between natural language processing (NLP), advanced machine learning, deep learning, and online social media. It hopes to build a better and safer social media space by making human language available on different social media platforms intelligible for machines with the blessings of AI. Covering topics such as machine learning-based prediction, emotion recognition, and high-dimensional text clustering, this premier reference source is an essential resource for OSN service providers, psychiatrists, psychologists, clinicians, sociologists, students and educators of higher education, librarians, researchers, and academicians.

Datenanalyse in der Biologie - Eine Einfuhrung in Methoden der nichtlinearen Dynamik, fraktalen Geometrie und... Datenanalyse in der Biologie - Eine Einfuhrung in Methoden der nichtlinearen Dynamik, fraktalen Geometrie und Informationstheorie (German, Paperback, 2001 ed.)
Marc-Thorsten Hutt
R829 Discovery Miles 8 290 Ships in 18 - 22 working days

Datenanalyse geht heute weit uber die Ermittlung einfacher Mittelwerte, Varianzen und Signifikanztests hinaus. Ein Grossteil der experimentellen Untersuchungen erfordert aufwandige mathematische Methoden. Der Autor stellt besonders bemerkenswerte und elegante Analysestrategien aus der Forschungsliteratur der letzten zehn Jahre vor. Drei wesentlichen Techniken der fortgeschrittenen Datenanalyse sind Einzelkapitel gewidmet: nichtlineare Zeitreihenanalyse, Methoden der fraktalen Geometrie und Analyse von Daten mit raumzeitlicher Dynamik."

iPhone 11 & 11 Pro (Paperback): Tracey W. Lay iPhone 11 & 11 Pro (Paperback)
Tracey W. Lay
R377 Discovery Miles 3 770 Out of stock
Tag, You're I.T. (Paperback): Todd Sullivan Tag, You're I.T. (Paperback)
Todd Sullivan
R449 Discovery Miles 4 490 Ships in 18 - 22 working days
Bildverarbeitung Fur Die Medizin 1998 - Algorithmen -- Systeme -- Anwendungen Proceedings Des Workshops Am 26. Und 27. Marz... Bildverarbeitung Fur Die Medizin 1998 - Algorithmen -- Systeme -- Anwendungen Proceedings Des Workshops Am 26. Und 27. Marz 1998 in Aachen (German, Hardcover)
Thomas Lehmann, Volker Metzler, Klaus Spitzer, Thomas Tolxdorff
R1,789 Discovery Miles 17 890 Ships in 18 - 22 working days

Durch die zunehmende Digitalisierung bildgebender Systeme in der medizinischen Diagnostik gewinnt die digitale Bildverarbeitung eine immer starkere Bedeutung fur die Medizin. Die Themen des Workshops umfassen alle Bereiche der medizinischen Bildverarbeitung, insbesondere Algorithmen, eingesetzte Hard- und Softwaresysteme sowie deren klinische Anwendung."

The Gypsy Woman - Representations in Literature and Visual Culture (Paperback): Jodie Matthews The Gypsy Woman - Representations in Literature and Visual Culture (Paperback)
Jodie Matthews
R1,317 Discovery Miles 13 170 Ships in 18 - 22 working days

The exotic and dangerous stereotype of the Gypsy woman formed in 19th-century literature and visual culture remains alive today. These contemporary cliches about Gypsy culture - both negative and romanticised - have a long history. In The Gypsy Woman, Jodie Matthews analyses why the representation of female Gypsy figures in print, painting, television series such as Big Fat Gypsy Weddings and social media sites like Instagram matters so much. Some of these images have been so damaging that they require legal regulation, but Matthews claims that supposedly positive portrayals are just as detrimental by reiterating the same story about Gypsies that have been told since the 19th century. Her study makes this book a highly relevant resource for students, teachers and researchers working in literary, cultural, gender and Romani studies.

The Ultimate Clubhouse Playbook - Make Powerful Connections to Secure Your Next Promotion or Get More Clients and Customers... The Ultimate Clubhouse Playbook - Make Powerful Connections to Secure Your Next Promotion or Get More Clients and Customers (Paperback)
Adriane Simpson
R315 Discovery Miles 3 150 Ships in 18 - 22 working days
Adobe After Effects - Tips, Tricks, and Techniques - Learn the ins and outs of motion graphics, post-production, rotoscoping,... Adobe After Effects - Tips, Tricks, and Techniques - Learn the ins and outs of motion graphics, post-production, rotoscoping, and VFX (Paperback)
Vishu Aggarwal
R1,022 Discovery Miles 10 220 Ships in 18 - 22 working days

Explore the best tricks and techniques for Adobe After Effects by creating highly contextual real-world projects that will take your skills to the next level Key Features * Master After Effects by creating small projects and following the best practices * Exploit the settings and hidden options in After Effects optimize the workflow * Learn the skills and techniques that will set you apart from other graphic designers Book Description Visual effects and motion graphics are everywhere: film, TV, games, websites, applications... the list is never ending. It's a competitive field, so even if you have used some of the many tools out there, you need to stand out to get ahead. Adobe After Effects Tips, Tricks, and Techniques is the guide you need. Not only will it provide the skills and techniques you need to stand out from the crowd, it will also take you through real projects that you can add to your portfolio. In this book, you'll learn by doing. Once you've got to grips with the UI and workflow, you'll undertake projects in text animation, shape layers, and rotoscoping, to name a few. You'll take your graphic design and post production skills to the next level with chroma keying, particle simulations, and 2D and 3D tracking. You'll progress faster than someone taking a formal course in Adobe After Effects! And it's not all about creating; you'll import graphics from Illustrator and Photoshop and apply post production effects to them to give them a new life, and once you've finished, you'll be shown how to export and manage your projects. It's a complete, end to end journey. By the end of the book, you'll have a comprehensive knowledge of Adobe After Effects and will have the skills and practice you need to forge ahead with your career in graphic design. What you will learn * Import media files to create compositions * Create new text layers and import text from Photoshop * Add audio and audio effects to shape layers * Create Motion Graphics templates that can be edited in Premiere Pro * Correct and grade colors in your projects * Remove and mask objects with rotoscoping * Create rain, fire, and smoke effects with particle simulations * Use Media Encoder when exporting your projects Who This Book Is For This book is for someone who has a basic level of understating in After effects and wants to learn the capabilities of After effects for motion graphics, VFX, composting, etc. Graphic Designers, UX & UI designers, Motion Graphics artists, Video Editors, VFX artists would benefit the most from this book. Basic understanding of After Effects and knowledge of Illustrator and Photoshop will be an added advantage.

Designing the Adobe InDesign Way - Over 100 recipes to leverage the designer's favourite tool for creating professional... Designing the Adobe InDesign Way - Over 100 recipes to leverage the designer's favourite tool for creating professional layouts (Paperback)
Andy Gardiner
R1,123 Discovery Miles 11 230 Ships in 18 - 22 working days

Layout multipage documents faster for print and digital output, with consistent control over typography, color and positioning, all whilst using the latest InDesign features to automate repetitive and complex tasks Key Features * Easy to follow step-by-step instructions from planning the design project to generating the desired output for web and print * Create engaging design solutions for print media such as posters, magazines, books, and brochures * Discover InDesign tips and tricks to increase productivity and simplify the design process Book Description Adobe InDesign is the leading desktop publishing and layout software for producing brochures, magazines, flyers, books, posters and a wide range of digital documents. It allows you to rapidly layout your documents with precise control over typography, images, positioning and alignment, color, and a wide variety of interactive features if needed. Designing the Adobe InDesign Way you will learn to apply best practice techniques, ensuring your work with InDesign is not only fast and efficient but also easily maintained. You will learn to add and edit content, create color swatches, and use features like tables. Additionally, you will make use of advanced InDesign features such as text styles, parent pages, tables of contents, and pre-flighting. Finally, we will look at the many different export options InDesign offers, as well as explore some of the ways the software can be further extended. By the end of this book, you will be able to layout and design your own materials, using best practice techniques and ensure your work is compatible with industry standards for print and digital documents. What you will learn * Learn to navigate and customize the InDesign interface * Understand how to set up new documents for different types of content * Learn how to add and adjust content within your documents * Learn a variety of tools to speed up your workflow and make you more efficient * Check your documents for errors and fix any errors found * Learn how to output your documents to a variety of different formats Who This Book Is For This book is ideal for marketing and communications professionals in roles such as marketing executive, marketing manager, marketing assistant, communications officer, or comms manager. Additionally, professionals working in roles such as graphic designer, publisher, bids and tender team, pr professionals, and brand manager will also find the book really helpful. Other computer literate users who want to start using InDesign to create more professional content, or who already use InDesign to a basic level and want to develop their skills further, will also find the book to be a useful resource.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Gamma-Ray Bursts
Andrew Levan Hardcover R2,718 Discovery Miles 27 180
Abundance Effects in Classification…
B. Hauck, P.C. Keenan Hardcover R4,166 Discovery Miles 41 660
Star Formation in Galaxy Evolution…
Nickolay Y. Gnedin, Simon C. O. Glover, … Hardcover R4,778 Discovery Miles 47 780
Highlights of Spanish Astrophysics III…
Jesus Gallego, Jaime Zamorano, … Hardcover R5,438 Discovery Miles 54 380
Wild Signs and Star Paths - 52 keys that…
Tristan Gooley Paperback  (1)
R371 R337 Discovery Miles 3 370
Galaxies - Formation and Evolution
F. Combes Hardcover R3,761 Discovery Miles 37 610
The Last Stargazers - The Enduring Story…
Emily Levesque Paperback R346 R315 Discovery Miles 3 150
Observational Constraints on the…
Christopher Mark Harrison Hardcover R3,316 Discovery Miles 33 160
Spectral Classification and Multicolour…
Ch. Fehrenbach, B.E. Westerlund Hardcover R5,318 Discovery Miles 53 180
A Statistical and Multi-wavelength Study…
Corentin Schreiber Hardcover R3,333 Discovery Miles 33 330

 

Partners