![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > General
Information networking has emerged as a multidisciplinary diversified area of research over the past few decades. From traditional wired telephony to cellular voice telephony and from wired access to wireless access to the Internet, information networks have profoundly impacted our lifestyles as they have undergone enormous growth. To understand this technology, students need to learn several disciplines and develop an intuitive feeling of how they interact with one another. To achieve this goal, the book describes important networking standards, classifying their underlying technologies in a logical manner and gives detailed examples of successful applications. The emergence of wireless access and dominance of the Ethernet in LAN technologies has shifted the innovations in networking towards the physical layer and characteristics of the medium. This book pays attention to the physical layer while we provide fundamentals of information networking technologies which are used in wired and wireless networks designed for local and wide area operations. The book provides a comprehensive treatment of the wired IEEE802.3 Ethernet, and Internet as well as ITU cellular 2G-6G wireless networks, IEEE 802.11 for Wi-Fi, and IEEE 802.15 for Bluetooth, ZigBee and ultra-wideband (UWB) technologies. The novelty of the book is that it places emphasis on physical communications issues related to formation and transmission of packets and characteristics of the medium for transmission in variety of networks. Material presented in the book will be beneficial for students of Electrical and Computer Engineering, Computer Science, Robotics Engineering, Biomedical Engineering, or other disciplines who are interested in integration of navigation into their multi-disciplinary projects. The book provides examples with supporting MATLAB codes and hands-on projects throughout to improve the ability of the readers to understand and implement variety of algorithms.
Most discussions of the digital divide focus on the gap between African Americans and others when it comes to using, and benefiting from, the technological and business opportunities of the information age. Although many African Americans are locked out of the information revolution, others are an integral part of its development and progress. Barber profiles 26 of those leaders here, engagingly and informatively blending biography with insight and analysis. Most discussions of the digital divide focus on the gap between African Americans and others when it comes to using, and benefiting from, the technological and business opportunities of the information age. Although many African Americans are locked out of the information revolution, others are an integral part of its development and progress. Barber profiles 26 of them here, engagingly and informatively blending biography with insight and analysis. Documenting history as it is being made, this book features achievers in all fields of relevant endeavor, including scientists, business leaders, power brokers, and community leaders. Among them are Robert Johnson, CEO of Black Entertainment Television; Richard Parsons, CEO of AOL Time-Warner; congressmen and other policymakers in Washington, D.C.; and men and women who are working to bridge the digital divide in satellite radio, web-based portals, and on the ground with IT workshops. This book is not just about business success or technological progress. The African American digerati are solving one of the great social challenges of the 21st century: creating a black community that is prosperous in a society that has changed from being a land-based industrial society to a cyberspace-based information society.
Although the terms "data mining" and "knowledge discovery and data mining" (KDDM) are sometimes used interchangeably, data mining is actually just one step in the KDDM process. Data mining is the process of extracting useful information from data, while KDDM is the coordinated process of understanding the business and mining the data in order to identify previously unknown patterns. Knowledge Discovery Process and Methods to Enhance Organizational Performance explains the knowledge discovery and data mining (KDDM) process in a manner that makes it easy for readers to implement. Sharing the insights of international KDDM experts, it details powerful strategies, models, and techniques for managing the full cycle of knowledge discovery projects. The book supplies a process-centric view of how to implement successful data mining projects through the use of the KDDM process. It discusses the implications of data mining including security, privacy, ethical and legal considerations. Provides an introduction to KDDM, including the various models adopted in academia and industry Details critical success factors for KDDM projects as well as the impact of poor quality data or inaccessibility to data on KDDM projects Proposes the use of hybrid approaches that couple data mining with other analytic techniques (e.g., data envelopment analysis, cluster analysis, and neural networks) to derive greater value and utility Demonstrates the applicability of the KDDM process beyond analytics Shares experiences of implementing and applying various stages of the KDDM process in organizations The book includes case study examples of KDDM applications in business and government. After reading this book, you will understand the critical success factors required to develop robust data mining objectives that are in alignment with your organization’s strategic business objectives.
The free/open source approach has grown from a minor activity to
become a significant producer of robust, task-orientated software
for a wide variety of situations and applications. To life science
informatics groups, these systems present an appealing proposition
- high quality software at a very attractive price. Open source
software in life science research considers how industry and
applied research groups have embraced these resources, discussing
practical implementations that address real-world business
problems.
Explore numerous techniques to improve the way you write CSS as you build 12 tiny projects. For readers who know the basics of HTML and frontend development. No previous experience of CSS is required. In Tiny CSS Projects, you will build twelve exciting and useful web projects with CSS — a must-know tool. This textbook teaches you how to make beautiful websites and applications by gilding you through a dozen fun coding challenges. You will learn important skills through hands-on practice as you tinker with your own coding and will make actual creative decisions about the projects you re building. You will rapidly master the basic features, including A loading screen created by styling SVG graphics A responsive newspaper layout with multi-columns Animating social media buttons with pseudo-elements Designing layouts using CSS grids Summary cards that utilise hover interactions Styling forms to make them more appealing to your users The projects may be tiny, but the CSS skills you will learn are huge! Press on with CSS s exciting layout features, including grid and flexbox, animations, transitions, and media queries. About the technology Cascading Style Sheets (CSS) make the web beautiful. Where HTML structures a page and JavaScript gives it additional functionality, CSS handles colours, layouts, and typography — everything your users love about your site. While CSS is an established tool used in almost all production websites, it s also evolving to include new features.
Since the second edition of this widely acclaimed book was published, virtual reality technology continued to evolve, with new applications emerging in medicine, oil exploration, defense, manufacturing, and video games. The Third Edition brings the field completely up to date, giving scientists and engineers a thorough understanding of virtual reality and its current state of the art. Focusing equally on hardware, software, and applications, this work also discusses key design issues involving human factors. Many supplementary materials, including a Laboratory Manual and companion website are also included.
The coming of the AI revolution in brick-and-mortar retail In AI for Retail: A Practical Guide to Modernize Your Retail Business with AI and Automation, Francois Chaubard, AI researcher and retail technology CEO, delivers a practical guide for integrating AI into your brick-and-mortar retail business. In the book, you’ll learn how to make your business more efficient by automating inventory management, supply chain, front-end, merchandising, pricing, loss prevention, e-commerce processes, and more. The author takes you step by step from no AI Strategy at all to implementing a robust AI playbook that will permeate through your entire organization. In this book, you will learn: How AI works, including key terminology and fundamental AI applications in retail How AI can be applied to the major functions of retail with detailed P&L analysis of each application How to implement an AI strategy across your entire business to double or even triple Free Cash Flow AI for Retail is the comprehensive, hands-on blueprint for AI adoption that retail managers, executives, founders, entrepreneurs, board members, and other business leaders have been waiting for.
See Dungeons & Dragons come to life through the incredible craftwork of pop-up legend Matthew Reinhart! Let a paper craft D20 guide your adventure as you explore iconic D&D locations and enjoy scores of easter eggs waiting to be discovered behind interactive doors and flaps! This immersive pop-up book is a unique addition to any D&D collection! Experience the Forgotten Realms like you've never seen it before! From lands such as Waterdeep and Icewind Dale, to creatures like mind flayers, dragons, mimics, owl bears, and beholders, the expansive world of Dungeons & Dragons is brought to life in a whole new way through this immersive pop-up book. Use this pop-up book's paper craft D20 to guide your adventure! Readers who roll a critical hit will discover auspicious interactive features, while others may meet certain doom. Packed with easter eggs from fan-favourite campaigns, a wealth of hidden surprises to discover, and all-new artwork, Dungeons & Dragons: The Ultimate Pop-Up Book is a must have for any D&D fan!
Problem solving in computing is referred to as computational thinking. The theory behind this concept is challenging in its technicalities, yet simple in its ideas. This book introduces the theory of computation from its inception to current form of complexity; from explanations of how the field of computer science was formed using classical ideas in mathematics by Goedel, to conceptualization of the Turing Machine, to its more recent innovations in quantum computation, hypercomputation, vague computing and natural computing. It describes the impact of these in relation to academia, business and wider society, providing a sound theoretical basis for its practical application.Written for accessibility, Demystifying Computation provides the basic knowledge needed for non-experts in the field, undergraduate computer scientists and students of information and communication technology and software development.
Be a new face on Facebook! If you're new to the Facebook user community, don't be shy: you're joining around 2.7 billion users (roughly two-and-a-half Chinas) worldwide, so you'll want to make sure you're being as sociable as possible. And with more functionality and ways to say hello--like 3-D photos and Video Chat rooms--than ever before, Facebook For Dummies is the perfect, informative companion to get and new and inexperienced users acquainted with the main features of the platform and comfortable with sharing posts, pictures (or whatever else you find interesting) with friends, family, and the world beyond! In a chatty, straightforward style, your friendly hosts, Carolyn Abram and Amy Karasavas--both former Facebook employees--help you get settled in with the basics, like setting up your profile and adding content, as well as protecting your privacy when you want to decide who can and can't see your posts. They then show you how to get involved as you add new friends, toggle your newsfeed, shape your timeline story, join groups, and more. They even let you in on ways to go pro and use Facebook for work, such as building a promo page and showing off your business to the world. Once you come out of your virtual shell, there'll be no stopping you! Build your profile and start adding friends Send private messages and instant notes Share your memories Tell stories about your day Set your privacy and curate your news feed Don't be a wallflower: with this book you have the ideal icebreaker to get the party started so you can join in with all the fun!
Smart phones, tablets, Facebook, Twitter, and wireless Internet connections are the latest technologies to have quickly become entrenched in our culture. Although traditionalists have argued that computer-mediated communication and cyberspace are incongruent with the study of folklore,Trevor J. Blank sees the digital world as fully capable of generating, transmitting, performing, and archiving vernacular culture. Folk Culture in the Digital Age documents the emergent cultural scenes and expressive folkloric communications that are being made possible by digital "new media" technologies. New media is changing the ways in which people learn, share, participate, and engage with others as they adopt technologies to complement and supplement traditional means of vernacular expression. But behavioral and structural overlap in many folkloric forms exists between on- and offline, and emerging patterns in digital rhetoric mimic the dynamics of previously documented folkloric forms, invoking familiar social or behavior customs, linguistic inflections, and symbolic gestures. Folk Culture in the Digital Age provides insights and perspectives on the myriad ways in which folk culture manifests in the digital age and contributes to our greater understanding of vernacular expression in our ever-changing technological world.
Turning an anthropological eye toward cyberspace, Human No More explores how conditions of the online world shape identity, place, culture, and death within virtual communities. Online worlds have recently thrown into question the traditional anthropological conception of place-based ethnography. They break definitions, blur distinctions, and force us to rethink the notion of the "subject." Human No More asks how digital cultures can be integrated and how the ethnography of both the "unhuman" and the "digital" could lead to possible reconfiguring the notion of the "human." This provocative and groundbreaking work challenges fundamental assumptions about the entire field of anthropology. Cross-disciplinary research from well-respected contributors makes this volume vital to the understanding of contemporary human interaction. It will be of interest not only to anthropologists but also to students and scholars of media, communication, popular culture, identity, and technology.
The crypto wars have raged for half a century. In the 1970s, digital privacy activists prophesied the emergence of an Orwellian State, made possible by computer-mediated mass surveillance. The antidote: digital encryption. The U.S. government warned encryption would not only prevent surveillance of law-abiding citizens, but of criminals, terrorists, and foreign spies, ushering in a rival dystopian future. Both parties fought to defend the citizenry from what they believed the most perilous threats. The government tried to control encryption to preserve its surveillance capabilities; privacy activists armed citizens with cryptographic tools and challenged encryption regulations in the courts. No clear victor has emerged from the crypto wars. Governments have failed to forge a framework to govern the, at times conflicting, civil liberties of privacy and security in the digital age—an age when such liberties have an outsized influence on the citizen–State power balance. Solving this problem is more urgent than ever. Digital privacy will be one of the most important factors in how we architect twenty-first century societies—its management is paramount to our stewardship of democracy for future generations. We must elevate the quality of debate on cryptography, on how we govern security and privacy in our technology-infused world. Failure to end the crypto wars will result in societies sleepwalking into a future where the citizen–State power balance is determined by a twentieth-century status quo unfit for this century, endangering both our privacy and security. This book provides a history of the crypto wars, with the hope its chronicling sets a foundation for peace.
This book offers a survey of successful attributes of the systems engineer. It focuses on the key positive attributes of what today’s systems engineer should be and puts a model in place for achievement and behavior for future systems engineers. The book, in survey form, provides a description of how and why systems engineers can be, and have been, successful. It offers successful attributes, focuses on the key positive qualities, and drills down to the success features to aim for and the failure characteristics to avoid. The ending result is that it sets a model for achievement and behavior for future systems engineers to follow a successful path. This book will be helpful to systems engineers, industrial engineers, mechanical engineers, general engineers, and those in technical management.
Problem solving in computing is referred to as computational thinking. The theory behind this concept is challenging in its technicalities, yet simple in its ideas. This book introduces the theory of computation from its inception to current form of complexity; from explanations of how the field of computer science was formed using classical ideas in mathematics by Goedel, to conceptualization of the Turing Machine, to its more recent innovations in quantum computation, hypercomputation, vague computing and natural computing. It describes the impact of these in relation to academia, business and wider society, providing a sound theoretical basis for its practical application.Written for accessibility, Demystifying Computation provides the basic knowledge needed for non-experts in the field, undergraduate computer scientists and students of information and communication technology and software development.
This book brings together the insights and practical experience of some of the most experienced Data Plane Development Kit (DPDK) technical experts, detailing the trend of DPDK, data packet processing, hardware acceleration, packet processing and virtualization, as well as the practical application of DPDK in the fields of SDN, NFV, and network storage. The book also devotes many chunks to exploring various core software algorithms, the advanced optimization methods adopted in DPDK, detailed practical experience, and the guides on how to use DPDK.
Since the release of V0.01 in 2006, to the present V4.0 version, RT-Thread has developed a reputation among developers for its open source strategy. RT-Thread has gained a large following among members of the embedded open source community in China with hundreds of thousands of enthusiasts. RT-Thread is widely used in energy, automotive, medical, consumer electronics, among other applications, making it a mature and stable open source embedded operating system. The purpose of RT-Thread RTOS Design and Implementation is to create an easy learning curve for mastering RT-Thread, so that more developers can participate in the development of RT-Thread and work together to create an open source, tiny, and beautiful Internet of Things operating system. The book’s first part introduces the RT-Thread kernel and starts with an overview of RT-Thread before covering thread management, clock management, inter-thread synchronization, inter-thread communication, memory management, and interrupt management. The second part begins with RT-Thread kernel porting and explains how to port RT-Thread to a hardware board to run it. The second part also introduces RT-Thread components and discusses the Env development environment, FinSH console, device management, and network framework. Additional topics covered include: The I/O device framework Virtual file systems Peripheral interfaces Devices including the PIN device, UART device, and ADC device, among others. Each chapter features code samples, as well as helpful tables and graphs, so you can practice as you learn as well as perform your own experiments.
Security and smart spaces are among the most significant topics in IoT nowadays. The implementation of secured smart spaces is at the heart of this concept, and its development is a key issue in the next generation IoT. This book addresses major security aspects and challenges in realizing smart spaces and sensing platforms in critical Cloud and IoT applications. The book focuses on both the design and implementation aspects of security models and strategies in smart that are enabled by wireless sensor networks and RFID systems. It mainly examines seamless data access approaches and encryption and decryption aspects in reliable IoT systems.
The need for continual development and transformation of healthcare information systems is evident, though progress in this arena is often met with a significant number of challenges. Developments in Healthcare Information Systems and Technologies: Models and Methods presents the latest research in healthcare information systems design, development, and deployment, benefiting researchers, practitioners, and students. Contributions investigate topics such as clinical education, electronic medical records, clinical decision support systems, and IT adoption in healthcare.
The book is about a very active research field in software engineering. In modern society, the fact of the world's high reliance on software requires the system's robustness, i.e., continual availability and satisfactory service quality. This requirement gives rise to the popularity of the research on the self-adaptive software in open environment. There are some academic conferences dedicated to this field. But there is a lack of monographs about the topic. We believe such need is unmet in marketplace. By publishing the book, it can help bridge the gap and bring benefits to readers thereof. Key Features: The topic is well-motivated, interesting and actively studied worldwide The research represents as the state-of-the-art in the field The technical part of the book is rigidly evaluated The theoretical part of the book is sound and proved The organization and presentation of the book will be double-checked by professional scholars
Learn by doing with this user-friendly introduction to time series data analysis in R. This book explores the intricacies of managing and cleaning time series data of different sizes, scales and granularity, data preparation for analysis and visualization, and different approaches to classical and machine learning time series modeling and forecasting. A range of pedagogical features support students, including end-of-chapter exercises, problems, quizzes and case studies. The case studies are designed to stretch the learner, introducing larger data sets, enhanced data management skills, and R packages and functions appropriate for real-world data analysis. On top of providing commented R programs and data sets, the book's companion website offers extra case studies, lecture slides, videos and exercise solutions. Accessible to those with a basic background in statistics and probability, this is an ideal hands-on text for undergraduate and graduate students, as well as researchers in data-rich disciplines
Safeguarding Our Privacy and Our Values in an Age of Mass Surveillance America's mass surveillance programs, once secret, can no longer be ignored. While Edward Snowden began the process in 2013 with his leaks of top secret documents, the Obama administration's own reforms have also helped bring the National Security Agency and its programs of signals intelligence collection out of the shadows. The real question is: What should we do about mass surveillance? Timothy Edgar, a long-time civil liberties activist who worked inside the intelligence community for six years during the Bush and Obama administrations, believes that the NSA's programs are profound threat to the privacy of everyone in the world. At the same time, he argues that mass surveillance programs can be made consistent with democratic values, if we make the hard choices needed to bring transparency, accountability, privacy, and human rights protections into complex programs of intelligence collection. Although the NSA and other agencies already comply with rules intended to prevent them from spying on Americans, Edgar argues that the rules-most of which date from the 1970s-are inadequate for this century. Reforms adopted during the Obama administration are a good first step but, in his view, do not go nearly far enough. Edgar argues that our communications today-and the national security threats we face-are both global and digital. In the twenty first century, the only way to protect our privacy as Americans is to do a better job of protecting everyone's privacy. Beyond Surveillance: Privacy, Mass Surveillance, and the Struggle to Reform the NSA explains both why and how we can do this, without sacrificing the vital intelligence capabilities we need to keep ourselves and our allies safe. If we do, we set a positive example for other nations that must confront challenges like terrorism while preserving human rights. The United States already leads the world in mass surveillance. It can lead the world in mass surveillance reform. |
![]() ![]() You may like...
Current Topics in Language, Volume 68
Kara D. Federmeier, Duane Watson
Hardcover
R3,309
Discovery Miles 33 090
Virtual and Augmented Reality in…
Giuliana Guazzaroni, Anitha S. Pillai
Hardcover
R6,744
Discovery Miles 67 440
Auditing Notes For South African…
G. Richard, C. Roets, …
Paperback
Operations Management for Business…
David Gardiner, Hendrik Reefke
Hardcover
R5,609
Discovery Miles 56 090
|