![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General
Security and smart spaces are among the most significant topics in IoT nowadays. The implementation of secured smart spaces is at the heart of this concept, and its development is a key issue in the next generation IoT. This book addresses major security aspects and challenges in realizing smart spaces and sensing platforms in critical Cloud and IoT applications. The book focuses on both the design and implementation aspects of security models and strategies in smart that are enabled by wireless sensor networks and RFID systems. It mainly examines seamless data access approaches and encryption and decryption aspects in reliable IoT systems.
The need for continual development and transformation of healthcare information systems is evident, though progress in this arena is often met with a significant number of challenges. Developments in Healthcare Information Systems and Technologies: Models and Methods presents the latest research in healthcare information systems design, development, and deployment, benefiting researchers, practitioners, and students. Contributions investigate topics such as clinical education, electronic medical records, clinical decision support systems, and IT adoption in healthcare.
Discover one-of-a-kind AI strategies never before seen outside of academic papers! Learn how the principles of evolutionary computation overcome deep learning’s common pitfalls and deliver adaptable model upgrades without constant manual adjustment. In Evolutionary Deep Learning you will learn how to: Solve complex design and analysis problems with evolutionary computation Tune deep learning hyperparameters with evolutionary computation (EC), genetic algorithms, and particle swarm optimization Use unsupervised learning with a deep learning autoencoder to regenerate sample data Understand the basics of reinforcement learning and the Q Learning equation Apply Q Learning to deep learning to produce deep reinforcement learning Optimize the loss function and network architecture of unsupervised autoencoders Make an evolutionary agent that can play an OpenAI Gym game Evolutionary Deep Learning is a guide to improving your deep learning models with AutoML enhancements based on the principles of biological evolution. This exciting new approach utilizes lesser-known AI approaches to boost performance without hours of data annotation or model hyperparameter tuning. about the technology Evolutionary deep learning merges the biology-simulating practices of evolutionary computation (EC) with the neural networks of deep learning. This unique approach can automate entire DL systems and help uncover new strategies and architectures. It gives new and aspiring AI engineers a set of optimization tools that can reliably improve output without demanding an endless churn of new data. about the reader For data scientists who know Python.
Machine learning --also known as data mining or predictive analytics-- is a fundamental part of data science. It is used by organizations in a wide variety of arenas to turn raw data into actionable information. Machine Learning for Business Analytics: Concepts, Techniques, and Applications in Analytic Solver Data Mining provides a comprehensive introduction and an overview of this methodology. The fourth edition of this best-selling textbook covers both statistical and machine learning algorithms for prediction, classification, visualization, dimension reduction, rule mining, recommendations, clustering, text mining, experimentation, time series forecasting and network analytics. Along with hands-on exercises and real-life case studies, it also discusses managerial and ethical issues for responsible use of machine learning techniques. This fourth edition of Machine Learning for Business Analytics also includes: An expanded chapter focused on discussion of deep learning techniques A new chapter on experimental feedback techniques including A/B testing, uplift modeling, and reinforcement learning A new chapter on responsible data science Updates and new material based on feedback from instructors teaching MBA, Masters in Business Analytics and related programs, undergraduate, diploma and executive courses, and from their students A full chapter devoted to relevant case studies with more than a dozen cases demonstrating applications for the machine learning techniques End-of-chapter exercises that help readers gauge and expand their comprehension and competency of the material presented A companion website with more than two dozen data sets, and instructor materials including exercise solutions, slides, and case solutions This textbook is an ideal resource for upper-level undergraduate and graduate level courses in data science, predictive analytics, and business analytics. It is also an excellent reference for analysts, researchers, and data science practitioners working with quantitative data in management, finance, marketing, operations management, information systems, computer science, and information technology.
This book brings together the insights and practical experience of some of the most experienced Data Plane Development Kit (DPDK) technical experts, detailing the trend of DPDK, data packet processing, hardware acceleration, packet processing and virtualization, as well as the practical application of DPDK in the fields of SDN, NFV, and network storage. The book also devotes many chunks to exploring various core software algorithms, the advanced optimization methods adopted in DPDK, detailed practical experience, and the guides on how to use DPDK.
Looking towards the future can be daunting, but with Future Hackers, the sequel to The Future Is Now, you can prepare for the exciting changes that lie ahead. From technological advancements to cultural shifts, the coming years will bring unprecedented transformations that will shape our lives in ways we can't even imagine. This book is your essential guide to understanding these changes and adapting to them with optimism and confidence. With expert insights into the latest trends in work, leadership and technology, Future Hackers is your indispensable tool for thriving in a rapidly changing world. Whether you're a business leader, a student, or just someone who wants to stay ahead of the curve, this book will help you navigate the road to 2030 and beyond.
Safeguarding Our Privacy and Our Values in an Age of Mass Surveillance America's mass surveillance programs, once secret, can no longer be ignored. While Edward Snowden began the process in 2013 with his leaks of top secret documents, the Obama administration's own reforms have also helped bring the National Security Agency and its programs of signals intelligence collection out of the shadows. The real question is: What should we do about mass surveillance? Timothy Edgar, a long-time civil liberties activist who worked inside the intelligence community for six years during the Bush and Obama administrations, believes that the NSA's programs are profound threat to the privacy of everyone in the world. At the same time, he argues that mass surveillance programs can be made consistent with democratic values, if we make the hard choices needed to bring transparency, accountability, privacy, and human rights protections into complex programs of intelligence collection. Although the NSA and other agencies already comply with rules intended to prevent them from spying on Americans, Edgar argues that the rules-most of which date from the 1970s-are inadequate for this century. Reforms adopted during the Obama administration are a good first step but, in his view, do not go nearly far enough. Edgar argues that our communications today-and the national security threats we face-are both global and digital. In the twenty first century, the only way to protect our privacy as Americans is to do a better job of protecting everyone's privacy. Beyond Surveillance: Privacy, Mass Surveillance, and the Struggle to Reform the NSA explains both why and how we can do this, without sacrificing the vital intelligence capabilities we need to keep ourselves and our allies safe. If we do, we set a positive example for other nations that must confront challenges like terrorism while preserving human rights. The United States already leads the world in mass surveillance. It can lead the world in mass surveillance reform.
This book is an attempt to establish in the readers the importance of creating interoperable data stores and writing rules for handling this data. It also covers extracts from a few project dissertations and a research funded project that the author had supervised.• Describes the power of ontologies for better data management• Provides an overview of knowledge engineering including ontology engineering, tools and techniques• Provides sample development procedures for creating two domain ontologies.• Depicts the utility of ontological representation in situation awareness• Demonstrates recommendation engine for unconventional emergencies using a hybrid reasoning approach.• The text explains how to make better utilization of resources when emergency strikesGraduates and undergraduates doing courses in artificial intelligence, semantic web and knowledge engineering will find this book beneficial.
Estimating software development often produces more angst than value, but it doesn't have to. Identify the needs behind estimate requests and determine how to meet those needs simply and easily. Choose estimation techniques based on current needs and available information, gaining benefit while reducing cost and effort. Detect bad assumptions that might sink your project if you don't adjust your plans. Discover what to do when an estimate is wrong, how to recover, and how to use that knowledge for future planning. Learn to communicate about estimates in a healthy and productive way, maximizing advantage to the organization and minimizing damage to the people. In a world where most developers hate estimation and most managers fear disappointment with the results, there is hope for both. It requires giving up some widely held misconceptions. Let go of the notion that "an estimate is an estimate" and estimate for the particular need you, and your organization, have. Realize that estimates have a limited shelf-life, and reestimate frequently if it's important. When reality differs from your estimate, don't lament; mine that disappointment for the gold that can be the longer-term jackpot. Estimate in comparison to past experience, by modeling the work mathematically, or a hybrid of both. Learn strategies for effective decomposition of work and aspects of the work that likely affect your estimates. Hedge your bets by comparing the results of different approaches. Find out what to do when an estimate proves wrong. And they will. They're estimates, after all. You'll discover that you can use estimates to warn you of danger so you can take appropriate action in time. Learn some crucial techniques to understand and communicate with those who need to understand. Address both the technical and sociological aspects of estimation, and you'll help your organization achieve its desired goals with less drama and more benefit. What You Need: No software needed, just your past experience and concern for the outcomes.
Ditch the devices and bring back the magic of being a kid Screens are everywhere. Children spend an average of 7.5 hours on digital devices every day with profoundly negative consequences. While some tech may “amplify” real life experience (online music lessons or Zoom calls with faraway family, for example), the vast majority “amputates” by limiting physical activity, creating anxiety, or damaging self-esteem. Childhood Unplugged takes a bold approach to creating healthy boundaries around the use of digital media, suggesting kids should be offline for the majority of their time. Drawing on her own family’s experience, plus interviews with digital minimalists, educators, and child development experts, author Katherine Martinko presents: Meticulously researched analysis of the impacts of excessive screen time on children's physical, neurological, emotional, and social development Specific pathways to reduced screen exposure, naturally leading to more time spent outdoors, increased confidence and empathy, more creative and active play, and other benefits Inspiration for caregivers overwhelmed by the thought of severing ties with the digital babysitter Age-appropriate advice for fundamental change, with specific sections for babies and toddlers, school-aged children, and adolescents. Taking a calming, nonjudgmental approach, Childhood Unplugged is a lifeline for parents, caregivers, educators, and anyone who questions the role of digital media and yearns for the young people in their life to experience the profound beauty and magic of childhood.
The book is about a very active research field in software engineering. In modern society, the fact of the world's high reliance on software requires the system's robustness, i.e., continual availability and satisfactory service quality. This requirement gives rise to the popularity of the research on the self-adaptive software in open environment. There are some academic conferences dedicated to this field. But there is a lack of monographs about the topic. We believe such need is unmet in marketplace. By publishing the book, it can help bridge the gap and bring benefits to readers thereof. Key Features: The topic is well-motivated, interesting and actively studied worldwide The research represents as the state-of-the-art in the field The technical part of the book is rigidly evaluated The theoretical part of the book is sound and proved The organization and presentation of the book will be double-checked by professional scholars
Artificial Intelligence was meant to be the great social equalizer that helps promote fairness by removing human bias from the equation, but is this true? Given that the policing and judicial systems can display human bias, this book explores how the technology they use can also reflect these prejudices. From healthcare services to social scoring in exams, to applying for and getting loans, AI outcomes often restrict those most in need of these services. Through personal stories from an esteemed Black Data Scientist and AI expert, this book attempts to demystify the algorithmic black box. AI pervades all aspects of modern society and affects everyone within it, yet its internal biases are rarely confronted. This book advises readers on what they can do to fight against it, including the introduction of a proposed AI Bill of Rights, whilst also providing specific recommendations for AI developers and technologists. https://hiddeninwhitesight.com/
In order to perform effective analysis of today’s information security systems, numerous components must be taken into consideration. This book presents a well-organized, consistent solution created by the author, which allows for precise multilevel analysis of information security systems and accounts for all of the significant details. Enabling the multilevel modeling of secure systems, the quality of protection modeling language (QoP-ML) approach provides for the abstraction of security systems while maintaining an emphasis on quality protection. This book introduces the basis of the QoP modeling language along with all the advanced analysis modules, syntax, and semantics. It delineates the steps used in cryptographic protocols and introduces a multilevel protocol analysis that expands current understanding. Introduces quality of protection evaluation of IT Systems Covers the financial, economic, and CO2 emission analysis phase Supplies a multilevel analysis of Cloud-based data centers Details the structures for advanced communication modeling and energy analysis Considers security and energy efficiency trade-offs for the protocols of wireless sensor network architectures Includes case studies that illustrate the QoP analysis process using the QoP-ML Examines the robust security metrics of cryptographic primitives Compares and contrasts QoP-ML with the PL/SQL, SecureUML, and UMLsec approaches by means of the SEQUAL framework The book explains the formal logic for representing the relationships between security mechanisms in a manner that offers the possibility to evaluate security attributes. It presents the architecture and API of tools that ensure automatic analysis, including the automatic quality of protection analysis tool (AQoPA), crypto metrics tool (CMTool), and security mechanisms evaluation tool (SMETool). The book includes a number of examples and case studies that illustrate the QoP analysis process by the QoP-ML. Every operation defined by QoP-ML is described within parameters of security metrics to help you better evaluate the impact of each operation on your system's security.
Although the terms "data mining" and "knowledge discovery and data mining" (KDDM) are sometimes used interchangeably, data mining is actually just one step in the KDDM process. Data mining is the process of extracting useful information from data, while KDDM is the coordinated process of understanding the business and mining the data in order to identify previously unknown patterns. Knowledge Discovery Process and Methods to Enhance Organizational Performance explains the knowledge discovery and data mining (KDDM) process in a manner that makes it easy for readers to implement. Sharing the insights of international KDDM experts, it details powerful strategies, models, and techniques for managing the full cycle of knowledge discovery projects. The book supplies a process-centric view of how to implement successful data mining projects through the use of the KDDM process. It discusses the implications of data mining including security, privacy, ethical and legal considerations. Provides an introduction to KDDM, including the various models adopted in academia and industry Details critical success factors for KDDM projects as well as the impact of poor quality data or inaccessibility to data on KDDM projects Proposes the use of hybrid approaches that couple data mining with other analytic techniques (e.g., data envelopment analysis, cluster analysis, and neural networks) to derive greater value and utility Demonstrates the applicability of the KDDM process beyond analytics Shares experiences of implementing and applying various stages of the KDDM process in organizations The book includes case study examples of KDDM applications in business and government. After reading this book, you will understand the critical success factors required to develop robust data mining objectives that are in alignment with your organization’s strategic business objectives.
A unique set of 100 cards with over 200 TikTok challenges for you to shoot and upload, from lip synchs, dances and dares to ridiculous pranks.
Explores the history, business, and technology of video games, including social, political, and economic motivations Facilitates learning with clear objectives, key terms, illustrative timelines, color images, tables and graphs Highlights the technical specifications and key titles of all major game consoles, handhelds, personal computers, and mobile platforms Reinforces material with market summaries, reviews of breakthroughs and trends, as well as end-of-chapter activities and quizzes New content in every chapter, from the PC-98, MSX, Amstrad, and ZX Spectrum to expanded coverage on mobile gaming, virtual reality, Steam Deck, Nintendo Switch, Xbox Series X|S, and PlayStation 5
Der mit der Digitalisierung der Kommunikation einhergehende Wandel von Kommunikations- und Medienkulturen beeinflusst die Produktionsbedingungen und den Rezeptionsrahmen von Texten sowie kommunikative Praktiken und kommunikatives Handeln. Um kommunikative Praktiken zu vollziehen und kommunikatives Handeln möglichst effektiv zu gestalten, entstehen vielfältige diskursive Kommunikationsräume, in denen mediale Akteure zu verschiedenen Zwecken miteinander agieren. Mit der Verlagerung der kommunikativen Praktiken in die digitale Welt kommt es zur Verlinkung von Texten zu Diskursen, die multisemiotisch und multimedial geprägt und auf Interaktion ausgerichtet sind. Dieses Buch ist solchen diversen textuellen und diskursiven Erscheinungsformen der massenmedialen Kommunikation gewidmet, die auf der Grundlage erschlossener Textkorpora interdisziplinär untersucht werden. Gegenstand der breit gefächerten Diskussion sind hier einzelne Texte und zusammenhängende Textformate in verschiedenen Medien sowie diskursiv organisierte Textwelten diverser multimodaler und -medialer Ausgestaltung.
What are the borders of risk? How is the perception of risk related to new technologies and digital changing? This book discusses these topics, moving from theories to research data, looking for concrete answers now, or taking a picture of reality. The volume is divided into three main sections: Exploring the Edges of Risk, according to sociological, psychological and artificial intelligence perspective; Technological and Digital Risks, exploring social media, cyberbullying, hate speech, social bots on digital platforms; Risk in the Cities, working with risk and deviance, risk communication, environmental and nuclear risks. Inside, research data from Europe, USA and Mexico are discussed.
This is the first book available on the market that shows people how to create more advanced data visualizations in the Excel software tool. It provides step-by-step instructions and downloadable Excel files, that readers can use to expand how they use Excel and communicate their data to their audiences.
See Dungeons & Dragons come to life through the incredible craftwork of pop-up legend Matthew Reinhart! Let a paper craft D20 guide your adventure as you explore iconic D&D locations and enjoy scores of easter eggs waiting to be discovered behind interactive doors and flaps! This immersive pop-up book is a unique addition to any D&D collection! Experience the Forgotten Realms like you've never seen it before! From lands such as Waterdeep and Icewind Dale, to creatures like mind flayers, dragons, mimics, owl bears, and beholders, the expansive world of Dungeons & Dragons is brought to life in a whole new way through this immersive pop-up book. Use this pop-up book's paper craft D20 to guide your adventure! Readers who roll a critical hit will discover auspicious interactive features, while others may meet certain doom. Packed with easter eggs from fan-favourite campaigns, a wealth of hidden surprises to discover, and all-new artwork, Dungeons & Dragons: The Ultimate Pop-Up Book is a must have for any D&D fan!
Explore numerous techniques to improve the way you write CSS as you build 12 tiny projects. For readers who know the basics of HTML and frontend development. No previous experience of CSS is required. In Tiny CSS Projects, you will build twelve exciting and useful web projects with CSS — a must-know tool. This textbook teaches you how to make beautiful websites and applications by gilding you through a dozen fun coding challenges. You will learn important skills through hands-on practice as you tinker with your own coding and will make actual creative decisions about the projects you re building. You will rapidly master the basic features, including A loading screen created by styling SVG graphics A responsive newspaper layout with multi-columns Animating social media buttons with pseudo-elements Designing layouts using CSS grids Summary cards that utilise hover interactions Styling forms to make them more appealing to your users The projects may be tiny, but the CSS skills you will learn are huge! Press on with CSS s exciting layout features, including grid and flexbox, animations, transitions, and media queries. About the technology Cascading Style Sheets (CSS) make the web beautiful. Where HTML structures a page and JavaScript gives it additional functionality, CSS handles colours, layouts, and typography — everything your users love about your site. While CSS is an established tool used in almost all production websites, it s also evolving to include new features.
|
You may like...
Principles Of Business Information…
Ralph Stair, George Reynolds, …
Paperback
(1)R1,780 Discovery Miles 17 800
Partition-Based Trapdoor Ciphers
Arnaud Bannier, Eric Filiol
Hardcover
R2,578
Discovery Miles 25 780
The Coming Wave - AI, Power and Our…
Mustafa Suleyman, Michael Bhaskar
Paperback
Algorithms, Collusion and Competition…
Steven Van Uytsel, Salil K. Mehra, …
Hardcover
R3,597
Discovery Miles 35 970
|