![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Personal computers > General
A fully updated version of Pearson's bestselling Brilliant Windows titles, covering Windows 10 - the latest release of the widely-used Microsoft operating system. Brilliant Windows 10 gives you the information you need easily and without fuss. It guides you through all tasks and applications using a highly visual, full-colour, step-by-step approach and tells you exactly what you need to know, when you need to know it. For the first time, this book comes with FREE downloadable bonus material. An extra 140 pages, which cover chapters on advanced subjects like customising Windows, maintaining your computer and managing your hardware as well as the key, new features of Office 2016. Spend less time reading and more time doing with a simple step-by-step approach to beginner and intermediate level tasks. Brilliant guides provide the quick, easy-to-access information that you need: Numbered steps guide you through each task or problem Numerous colour screenshots illustrate each step Cross reference boxes point you to related tasks and information in the book "Did you know ?..." sections alert you to relevant expert tips, tricks and advice
This book constitutes the refereed proceedings of the 1st IFIP Entertainment Computing Symposium held in Milan, Italy on September 7-10, 2008. The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.
This book constitutes the refereed post-proceedings of the 4th IFIP WG 9.7 Conference on the History of Nordic Computing, HiNC 4, held in Copenhagen, Denmark, in August 2014. The 37 revised full papers were carefully reviewed and selected for inclusion in this volume. The papers focus on innovative ICT milestones that transformed the nordic societies and on the new ideas, systems and solutions that helped creating the welfare societies of today, in particular solutions and systems for public services, e.g., tax, social benefits, health care and education; solutions and systems for the infrastructure of the society, e.g., banking, insurance, telephones, transport and energy supply; and technologies and IT policies behind the major IT milestones, e.g., user centric innovation, programming techniques and IT ethics. They are organized in topical sections on IT policy, infrastructure, public services, private services, telesystems, health care, IT in banking, transport and IT technology.
How did the Commodore 64 conquer the hearts of millions and become a platform people still actively develop for even today? What made it so special? This book will appeal to both those who like tinkering with old technology as a hobby and nostalgic readers who simply want to enjoy a trip down memory lane. It discusses in a concise but rigorous format the different areas of home gaming and personal computing where the C64 managed to innovate and push forward existing boundaries. Starting from Jack Tramiel's vision of designing computers "for the masses, not the classes," the book introduces the 6510, VIC-II and SID chips that made the C64 unique. It briefly discusses its Basic programming language and then proceeds to illustrate not only many of the games that are still so fondly remembered but also the first generation of game engines that made game development more approachable among other topics that are often neglected but are necessary to provide a comprehensive overview of how far reaching theC64 influence was. Written in a straightforward and accessible style, readers will relive the dawn of modern technology and gain a better understanding of the legacy that was built, bit by bit, in those pioneering days by computers that had only a tiny fraction of the power modern machines have and, yet, were used to create the technological world we are now living in. With a foreword by Michael Tomczyk
Time series with mixed spectra are characterized by hidden periodic components buried in random noise. Despite strong interest in the statistical and signal processing communities, no book offers a comprehensive and up-to-date treatment of the subject. Filling this void, Time Series with Mixed Spectra focuses on the methods and theory for the statistical analysis of time series with mixed spectra. It presents detailed theoretical and empirical analyses of important methods and algorithms. Using both simulated and real-world data to illustrate the analyses, the book discusses periodogram analysis, autoregression, maximum likelihood, and covariance analysis. It considers real- and complex-valued time series, with and without the Gaussian assumption. The author also includes the most recent results on the Laplace and quantile periodograms as extensions of the traditional periodogram. Complete in breadth and depth, this book explains how to perform the spectral analysis of time series data to detect and estimate the hidden periodicities represented by the sinusoidal functions. The book not only extends results from the existing literature but also contains original material, including the asymptotic theory for closely spaced frequencies and the proof of asymptotic normality of the nonlinear least-absolute-deviations frequency estimator.
Everything you need to know to choose and use your laptop. Brilliant Laptops guides you through the essential tasks step-by-step, showing you how to:
From fundamental concepts and theories to implementation protocols and cutting-edge applications, the Handbook of Mobile Systems Applications and Services supplies a complete examination of the evolution of mobile services technologies. It examines service-oriented architecture (SOA) and explains why SOA and service oriented computing (SOC) will play key roles in the development of future mobile services. Investigating current service discovery frameworks, the book covers the basics of mobile services and applications developed in various contexts. The first section provides readers with the required background in mobile services architecture. Next, it details of middleware support for mobile services. The final section discusses security and applications of mobile services. Containing the contributions of leading researchers and academics from around the world, the book: Introduces a new location-based access control model Unveils a simple, yet powerful enhancement that enables Web services to locally manage workflow dependencies and handle messages resulting from multiple workflows Examines an event-based location aware query model that continuously aggregates data in specific areas around mobile sensors of interest Addresses the problem of location-based access control in the context of privacy protection Presents a layered architecture of context-aware middleware Considers the development of assistive technology solutions for the blind or visually impaired Discussing architecture for supporting multi-mode terminals in integrated heterogeneous wireless networks, this book addresses the network availability constraint to serve all mobile services originating from a single-user terminal. It examines QoS protocols and their enhancements in supporting user mobility. Analyzing mobile services security vulnerabilities, it details security design best practices that mobile service developers can use to improve the security of their mobile systems.
Use your laptop or tablet with confidence This practical book will have you achieving immediate results using: a friendly, visual approach simple language practical, task-based examples large, full-colour screenshots. Discover everything you want to know about choosing and using your laptop or tablet in this easy-to-use guide; from the most essential tasks that you'll want to perform, to solving the most common problems you'll encounter. Practical. Simple. Fast. Get the most out of your laptop or tablet with practical tips on every page: * ALERT: Solutions to common problems * HOT TIP: Time-saving shortcuts * SEE ALSO: Related tasks and information * DID YOU KNOW? Additional features to explore * WHAT DOES THIS MEAN? Jargon explained in plain English
The world of smart shoes, appliances, and phones is already here,
but the practice of user experience (UX) design for ubiquitous
computing is still relatively new. Design companies like IDEO and
frogdesign are regularly asked to design products that unify
software interaction, device design and service design -- which are
all the key components of ubiquitous computing UX -- and practicing
designers need a way to tackle practical challenges of design.
Theory is not enough for them -- luckily the industry is now mature
enough to have tried and tested best practices and case studies
from the field.
Aimed at people over the age of 50 and written by an expert in the field, Joli Ballew, this book covers the topic of laptop computers.
1 Die wirtschaftliche Bedeutung der Schutzmassnahmen fur EDV-Anlagen.- 2 Voraussetzungen und Anforderungen an die sicherheits-gerechte Konzipierung eines Hochsicherheitsbereichs.- 3 Unterschiedliche Gefahrdungen fur Rechenzentren.- 3.1 Einbruch/Diebstahl, Sabotage und Vandalismus.- 3.2 Brand, Verrauchung.- 3.3 Fehlfunktionen in der Klimatisierung.- 3.4 Wassereinbruch.- 3.5 Elektrische Versorgung.- 3.5.1 Aufrechterhaltung der Stromversorgung.- 3.5.2 UEberspannungen und Blitzschlag.- 3.6 Datenverlust.- 3.7 Sonstige Gefahren.- 4 Moegliche Analysemethoden.- 5 Schema der konkreten Risiko- und Schutzniveauermittlung.- 5.1 Massnahmen gegen Einbruch, Diebstahl, Sabotage und Vandalismus.- 5.2 Massnahmen gegen Feuer und Verrauchung.- 5.3 Massnahmen gegen Fehlfunktionen der Klimatisierung.- 5.4 Massnahmen gegen Beschadigungen durch Wasser bzw. fehlerhafte Versorgung.- 5.5 Massnahmen zur Aufrechterhaltung der gleichbleibenden Stromversorgung.- 5.6 Massnahmen gegen Datenverlust.- 5.7 Sonstige sicherheitsrelevante Kriterien.- 5.8 Zusammenfassende Benotung der analysierten Risiken.- 6 Sicherheitsmanagement: Organisation und Realisierung der sicherheitstechnischen Massnahmen.- 7 Sicherheitsgerechter EDV-Betrieb.- 8 Organisatorische Schritte zur permanenten Beibehaltung des Niveaus des ursprunglich entworfenen Sicherheitskonzepts.- 8.1 Menschliche Aspekte.- 8.2 Technische Massnahmen.- 9 Katastrophenvorsorge.- 9.1 Katastrophenplan.- 9.2 Backup-Konzepte.- 9.3 Versicherungskonzepte fur Hochsicherheitsbereiche.- 10 Schlussworte und Aussicht.
Over the last decade, there has been a growing interest in human behavior analysis, motivated by societal needs such as security, natural interfaces, affective computing, and assisted living. However, the accurate and non-invasive detection and recognition of human behavior remain major challenges and the focus of many research efforts. Traditionally, in order to identify human behavior, it is first necessary to continuously collect the readings of physical sensing devices (e.g., camera, GPS, and RFID), which can be worn on human bodies, attached to objects, or deployed in the environment. Afterwards, using recognition algorithms or classification models, the behavior types can be identified so as to facilitate advanced applications. Although such traditional approaches deliver satisfactory performance and are still widely used, most of them are intrusive and require specific sensing devices, raising issues such as privacy and deployment costs. In this book, we will present our latest findings on non-invasive sensing and understanding of human behavior. Specifically, this book differs from existing literature in the following senses. Firstly, we focus on approaches that are based on non-invasive sensing technologies, including both sensor-based and device-free variants. Secondly, while most existing studies examine individual behaviors, we will systematically elaborate on how to understand human behaviors of various granularities, including not only individual-level but also group-level and community-level behaviors. Lastly, we will discuss the most important scientific problems and open issues involved in human behavior analysis.
The bestselling PC reference on the planet now available in its 13th edition Completely updated to cover the latest technology and software, the 13th edition of PCs For Dummies tackles using a computer in friendly, human terms. Focusing on the needs of the beginning computer user, while also targeting those who are familiar with PCs, but need to get up to speed on the latest version of Windows. This hands-on guide takes the dread out of working with a personal computer. Leaving painful jargon and confusing terminology behind, it covers Windows 10 OS, connecting to and using services and data in the cloud, and so much more. Written by Dan Gookin, the original For Dummies author, it tells you how to make a PC purchase, what to look for in a new PC, how to work with the latest operating system, ways to protect your files, what you can do online, media management tips, and even basic topics you're probably too shy to ask a friend about. * Determine what you need in a PC and how to set it up * Configure your PC, hook up a printer, and connect to the Internet * Find your way around Windows 10 OS with ease and confidence * Play movies and music, view photos, and explore social media If you're a first-time PC user at home or at work or just need to brush up on the latest technological advancements, the new edition of this bestselling guide gets you up and running fast.
Microcomputers are an increasingly important tool in all aspects of development as the need to handle and assimilate vast quantities of information becomes ever more critical for both the international development community and the developing countries. In addition, the microcomputer represents the first significant technological advance that a developing country can assimilate and exploit with a relatively low capital investment and without prior knowledge or involvement in other technologies. Unfortunately this new technology represents not only an opportunity if properly exploited but a threat if ignored. The widespread and increasing incorporation of microcomputers into all aspects of the developed countries represents a major technological advance and an inevitable social change. If a developing country fails to take advantage of the opportunity that microcomputer technology represents, its level of development in relation to developed countries will be significantly lowered. Organized by the Board on Science and Technology for International Development in response to a request from the U.S. Agency for International Development, this book is an overview of microcomputer applications in developing countries and the issues associated with their use and abuse. The first section of the book is an assessment of the need for microcomputers in development. Written primarily for those in the development field and other computer-literate individuals, the second part is divided into applications in agriculture, health, energy, and municipal management. Policy concerns are addressed in the final section. It discusses the technology transfer that takes place as countries try to establish national computer policies that meet local needs while encouraging creative and useful applications.
This new edition has been updated with information relevant to the newest Basic Stamp, the BS2P, and revised to present more advanced projects. The result is a superb hands-on teaching text with dozens of completely new projects in addition to enhanced projects that take advantage of its latest features. (Computer Books - Languages/Programming)
Providing a comprehensive introduction into an overview of the field of pervasive healthcare applications, this volume incorporates a variety of timely topics ranging from medical sensors and hardware infrastructures, to software platforms and applications and addresses issues of user experience and technology acceptance. The recent developments in the area of information and communication technologies have laid the groundwork for new patient-centred healthcare solutions. While the majority of computer-supported healthcare tools designed in the last decades focused mainly on supporting care-givers and medical personnel, this trend changed with the introduction of pervasive healthcare technologies, which provide supportive and adaptive services for a broad variety and diverse set of end users. With contributions from key researchers the book integrates the various aspects of pervasive healthcare systems including application design, hardware development, system implementation, hardware and software infrastructures as well as end-user aspects providing an excellent overview of this important and evolving field.
Why purchase expensive add-on cards or bus interfaces when you can develop effective and economical data acquisition and process controls using C programs? Using the under-employed printer adapter (that is, the parallel port of your PC), you can turn your computer into a powerful tool for developing microprocessor applications. Learn how to build a complete data acquisition system and such varied applications as a CCD camera controller, a photometer interface, and a wave form generator. The book also covers the enhanced parallel port (EPP), the extended capabilities port (ECP), interfacing analog-to-digital converters, and data acquisition under Linux. This extraordinary software approach to interfacing through the parallel port will be especially appealing to programmers involved in control systems design and device development, as well as to those who work with real-time and embedded systems. ;
This second edition of Compact Numerical Methods for Computers presents reliable yet compact algorithms for computational problems. As in the previous edition, the author considers specific mathematical problems of wide applicability, develops approaches to a solution and the consequent algorithm, and provides the program steps. He emphasizes useful applicable methods from various scientific research fields, ranging from mathematical physics to commodity production modeling. While the ubiquitous personal computer is the particular focus, the methods have been implemented on computers as small as a programmable pocket calculator and as large as a highly parallel supercomputer. New to the Second Edition Presents program steps as Turbo Pascal code Includes more algorithmic examples Contains an extended bibliography The accompanying software (available by coupon at no charge) includes not only the algorithm source codes, but also driver programs, example data, and several utility codes to help in the software engineering of end-user programs. The codes are designed for rapid implementation and reliable use in a wide variety of computing environments. Scientists, statisticians, engineers, and economists who prepare/modify programs for use in their work will find this resource invaluable. Moreover, since little previous training in numerical analysis is required, the book can also be used as a supplementary text for courses on numerical methods and mathematical software.
"Covers all areas of computer-based data acquisition--from basic concepts to the most recent technical developments--without the burden of long theoretical derivations and proofs. Offers practical, solution-oriented design examples and real-life case studies in each chapter and furnishes valuable selection guides for specific types of hardware."
Microprocessors and Microcomputer-Based System Design, Second Edition, builds on the concepts of the first edition. It discusses the basics of microprocessors, various 32-bit microprocessors, the 8085 microprocessor, the fundamentals of peripheral interfacing, and Intel and Motorola microprocessors. This edition includes new topics such as floating-point arithmetic, Program Array Logic, and flash memories. It covers the popular Intel 80486/80960 and Motorola 68040 as well as the Pentium and PowerPC microprocessors. The final chapter presents system design concepts, applying the design principles covered in previous chapters to sample problems.
"The Encyclopedia of Microcomputers serves as the ideal companion reference to the popular Encyclopedia of Computer Science and Technology. Now in its 10th year of publication, this timely reference work details the broad spectrum of microcomputer technology, including microcomputer history; explains and illustrates the use of microcomputers throughout academe, business, government, and society in general; and assesses the future impact of this rapidly changing technology."
My iPad for Seniors, 5th Edition, is a comprehensive guide to using all of Apple’s iPad models. It includes everything from basic setup information to finding and installing new apps to using the iPad for communication, entertainment, and productivity. The information presented in this book is targeted at users aged 50 and up; whenever possible, one best way for any given task is presented, and instructions are simplified with older users in mind. In addition, much content specific for people 50+ is included. This edition features completely new content from front to back. The emphasis is on how this audience uses their iPads, covering those apps and features in simple step-by-step fashion. Coverage of relevant apps is included in the appropriate content chapters, instead of taking up space in their own chapters. - Use Siri to dictate email, messages, notes and more - Take video with the front and rear camera - Video chat with your friends using FaceTime over Wi-Fi or cellular - Stream audio and video to Apple TV and other devices - Connect your iPad to your Wi-Fi network and cellular networks - Move information between your computer and iPad - Share photos using Shared Photo Stream - Edit and share photos and video - Entertain yourself with movies, TV shows, YouTube, podcasts, games and more - Quickly and easily keep up with your social networks using integrated FaceBook and Twitter features - Use iCloud tabs in Safari to make browsing easier across devices - Download apps to make your iPad even more useful - Use Passbook to keep track of movie and airline tickets and much more - Create documents and spreadsheets - Build and display presentations - Find locations and get directions using the new Maps app - Connect with your friends and family using apps such as FaceTime, Skype and Facebook
Have we resigned ourselves to a cyber-future that has been decided behind our backs? Why is technology - and our understanding of it - central to the concerns of critical social theory? In developing the PC technologists have borrowed ideas from the human sciences about what people are like, about the nature of meaning and the desirability of some experiences over others. Yet, to date, the academic disciplines most concerned with these ideas have offered neither resistance nor debate. In this book, Graeme Kirkpatrick shows why it is crucial that we initiate that debate. Offering a revealing critique of PC design and the social assumptions that underlie it, Kirkpatrick argues that it relies on a particular conception of a capitalistic society that expects its technology to come pre-packaged, mass-marketed and "user-friendly". Anyone who is critical of such a society and its commodification of human achievement should, he suggests, be suspicious. Kirkpatrick argues that the computer is a contested space within which major social conflicts are played out. On the one hand, there is a narrative of flexibility and human empowerment, and on the other a sense of a "system" that controls our lives, leaving us in thrall to the computer corporations, and at constant risk from phishers and hackers. The outcomes of these conflicts are extremely important as they will shape our future experience of technology, society and politics. Critical Technology is a lively, provocative and often radical book, which forces us to reflect on the meaning of an artefact that is central to our daily lives, yet that we too often take for granted.
"The Encyclopedia of Microcomputers serves as the ideal companion reference to the popular Encyclopedia of Computer Science and Technology. Now in its 10th year of publication, this timely reference work details the broad spectrum of microcomputer technology, including microcomputer history; explains and illustrates the use of microcomputers throughout academe, business, government, and society in general; and assesses the future impact of this rapidly changing technology."
"The Encyclopedia of Microcomputers serves as the ideal companion reference to the popular Encyclopedia of Computer Science and Technology. Now in its 10th year of publication, this timely reference work details the broad spectrum of microcomputer technology, including microcomputer history; explains and illustrates the use of microcomputers throughout academe, business, government, and society in general; and assesses the future impact of this rapidly changing technology." |
You may like...
European Audiovisual Policy in…
Heritiana Ranaivoson, Sally Broughton Micova, …
Hardcover
R4,067
Discovery Miles 40 670
The Quintessence of Strategic Management…
Philip Kotler, Roland Berger, …
Hardcover
When Media Succumbs to Rising…
Ezequiel Korin, Paromita Pain
Hardcover
R1,655
Discovery Miles 16 550
|