![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General
Unique selling point: Comprehensive tome on developing and implementing parallel and distributed systems Core audience: Computer science title for systems developers and designers Place in the market: Professional title for a niche segment of developers and programmers
This book highlights leading-edge research in multi-disciplinary areas in Physics, Engineering, Medicine, and Health care, from the 6th IRC Conference on Science, Engineering and Technology (IRC-SET 2020) held in July 2020 at Singapore. The papers were shortlisted after extensive rounds of reviews by a panel of esteemed individuals who are pioneers in their domains. The book also contains excerpts of the speeches by eminent personalities who graced the occasion, thereby providing written documentation of the event.
This book engages with contemporary, and often polarizing, debates surrounding the risks of adolescent use of digital media and internet technologies. By drawing on multiple research studies, the text synthesizes current understandings of the impacts of social network use, online gaming, pornography, and phenomena, including cyberbullying, cyberstalking, and internet addiction, to develop recommendations for the effective identification of at-risk youth, as well as strategies for informed communication about online risks and opportunities. It shows how media discussion of risks to children and teenagers from new technology is highly emotive and often exaggerated, rooted in the “moral panic†surrounding new cultural practices that young people engage in, but which adults do not understand. Online risks are thus conceptualized as centering on three areas, specific to adolescence, which have undergone radical changes due to new internet technology. These include young people’s identity, the types of content that are accessed, and social relationships. The author shows how these matters stem from the potential of new technology to establish new interpersonal connections, emphasizing how it brings opportunities, as much as risks. As such, he provides a uniquely balanced discussion of potential dangers, while also emphasizing the opportunities for social, academic, and personal growth which new technologies afford young people. It will be indispensable for researchers and clinicians interested in assessing levels of online risk, as well as scholars and educators with interests in cyberpsychology, social psychology, cyber culture, social aspects of computing and media, and adolescent development.
Application of Artificial Intelligence in Early Detection of Lung Cancer presents the most up-to-date computer-aided diagnosis techniques used to effectively predict and diagnose lung cancer. The presence of pulmonary nodules on lung parenchyma is often considered an early sign of lung cancer, thus using machine and deep learning technologies to identify them is key to improve patients’ outcome and decrease the lethal rate of such disease. The book discusses topics such as basics of lung cancer imaging, pattern recognition techniques, deep learning, and nodule detection and localization. In addition, the book discusses risk prediction based on radiological analysis and 3D modeling. This is a valuable resource for cancer researchers, oncologists, graduate students, radiologists, and members of biomedical field who are interested in the potential of AI technologies in the diagnosis of lung cancer.
Stopping Losses from Accidental and Malicious Actions Around the world, users cost organizations billions of dollars due to simple errors and malicious actions. They believe that there is some deficiency in the users. In response, organizations believe that they have to improve their awareness efforts and making more secure users. This is like saying that coalmines should get healthier canaries. The reality is that it takes a multilayered approach that acknowledges that users will inevitably make mistakes or have malicious intent, and the failure is in not planning for that. It takes a holistic approach to assessing risk combined with technical defenses and countermeasures layered with a security culture and continuous improvement. Only with this kind of defense in depth can organizations hope to prevent the worst of the cybersecurity breaches and other user-initiated losses. Using lessons from tested and proven disciplines like military kill-chain analysis, counterterrorism analysis, industrial safety programs, and more, Ira Winkler and Dr. Tracy Celaya's You CAN Stop Stupid provides a methodology to analyze potential losses and determine appropriate countermeasures to implement. Minimize business losses associated with user failings Proactively plan to prevent and mitigate data breaches Optimize your security spending Cost justify your security and loss reduction efforts Improve your organization’s culture Business technology and security professionals will benefit from the information provided by these two well-known and influential cybersecurity speakers and experts.
The lovely ladies and lads of Street Fighter take a break from fist fights and tournaments to hit up the world's hottest beaches, pools, volleyball courts, and more! Everyone from Chun-Li to Poison to Guile shows off their favorite swimwear, plus guest appearances from the cast of Darkstalkers, Rival Schools, and Final Fight! This beautiful hardcover tome gathers four years of UDON’s Street Fighter Swimsuit and Pin-up specials in an over-sized art book format, including rare covers and never-before-seen rough concepts.
Outsourcing permeates the IT world and has had a profound impact on the work of IS professionals. Nearly all will, at some stage in their careers, work with outsourced services as customer or supplier. Elizabeth Sparrow's insights into the benefits and pitfalls of this complex area will help IS professionals tackle the challenges of outsourcing. Combining relevant background information with practical guidance this book covers the whole outsourcing process, from the initial decision to outsource through to managing the outsourced services on a day-to-day basis. Successful IT Outsourcing considers: - The objectives behind outsourcing - The selection of a service provider - The management and measurement of the performance of outsourced services - The role of the outsourcing contract - Why outsourcing sometimes fails and how to turn failure into success Features and Benefits: - Describes the origins of IT outsourcing, and recent developments - Examines the way in which an organization might determine whether to outsource and how it can choose a service provider - Discusses how to develop effective outsourcing relationships- Provides context and advice to assist IS professionals, whose work is being outsourced, as they consider their future careers and the possibility of transferring to a new employer
Python programmieren lernen lohnt sich. Es ist eine moderne sich ständig weiterentwickelnde Programmiersprache. Dieses Buch hilft Ihnen, wenn Sie Python von der Pike auf lernen wollen, aber auch mehr als nur die Grundlagen verstehen wollen. Johannes Hofmeister erklärt Ihnen Grundlagen wie Syntax, Module und Basic-Funktionen und schreitet dann zu fort zu höheren Konzepten wie Funktionen und Objekte. Er zeigt Ihnen auch, wie Sie diese testen können, um fehlerfrei Software zu schreiben. Danach widmet sich der Autor Internettechnologien wie E-Mail, Apis und Browsing und erklärt Ihnen, wie Sie mit Django eine Webanwendung bauen. Sie erfahren, wie Sie mithilfe von Python komplexe Datensätze analysieren und zuletzt beweist Ihnen der Autor, wie vielseitig nutzbar Python ist.
Digital forensics is the science of detecting evidence from digital media like a computer, smart phone, server, or network. It provides the forensic team with the most beneficial methods to solve confused digital-related cases. AI and blockchain can be applied to solve online predatory chat cases and photo forensics cases, provide network service evidence, custody of digital files in forensic medicine, and identify roots of data scavenging. The increased use of PCs and extensive use of internet access, has meant easy availability of hacking tools. Over the past two decades, improvements in the information technology landscape have made the collection, preservation, and analysis of digital evidence extremely important. The traditional tools for solving cybercrimes and preparing court cases are making investigations difficult. We can use AI and blockchain design frameworks to make the digital forensic process efficient and straightforward. AI features help determine the contents of a picture, detect spam email messages and recognize swatches of hard drives that could contain suspicious files. Blockchain-based lawful evidence management schemes can supervise the entire evidence flow of all of the court data. This book can provide a wide-ranging overview of how AI and blockchain can be used to solve problems in digital forensics using advanced tools and applications available on the market.
This peer-reviewed book explores the technologies driving broadband internet connectivity in the fourth industrial revolution (Industry 4.0). It particularly focuses on potential solutions to introduce these technologies in emerging markets and rural areas, regions that typically form part of the digital divide and often have under-developed telecommunications infrastructures, a lack of skilled workers, and geographical restrictions that limit broadband connectivity. Research shows that ubiquitous internet access boosts socio-economic growth through innovations in science and technology, with the common goal of bringing positive change to the lives of individuals. Fifth-generation (5G) networks based on millimeter-wave (mm-wave) frequency information transfer have the potential to provide future-proof, affordable and sustainable broadband connectivity in areas where previous-generation mobile networks were unable to do so. This book discusses the principles of various technologies that enable electronic circuits to operate at mm-wave frequencies. It examines the importance of identifying, describing, and analyzing technology from a purely technological standpoint, but also acknowledges and investigates the challenges and limitations of introducing such technologies in emerging markets. Presenting recent research, the book spearheads participation in Industry 4.0 in these areas.
|
You may like...
Digital Libraries - Integrating Content…
Mark V Dahl, Kyle Banerjee, …
Paperback
R1,150
Discovery Miles 11 500
Institutions guaranteeing access to…
Organisation for Economic Cooperation and Development
Paperback
R1,384
Discovery Miles 13 840
Machine Learning and Artificial…
Barry S. Rosenstein, Tim Rattay, …
Paperback
R3,518
Discovery Miles 35 180
The Coming Wave - AI, Power and Our…
Mustafa Suleyman, Michael Bhaskar
Paperback
Principles of Business Information…
George Reynolds, Ralph M. Stair, …
Paperback
Going digital guide to data governance…
Organisation for Economic Cooperation and Development
Paperback
R613
Discovery Miles 6 130
OECD report on public communication…
Organisation for Economic Cooperation and Development
Paperback
R1,953
Discovery Miles 19 530
Principles Of Business Information…
Ralph Stair, George Reynolds, …
Paperback
(1)R1,199 Discovery Miles 11 990
|