![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General
Der mit der Digitalisierung der Kommunikation einhergehende Wandel von Kommunikations- und Medienkulturen beeinflusst die Produktionsbedingungen und den Rezeptionsrahmen von Texten sowie kommunikative Praktiken und kommunikatives Handeln. Um kommunikative Praktiken zu vollziehen und kommunikatives Handeln möglichst effektiv zu gestalten, entstehen vielfältige diskursive Kommunikationsräume, in denen mediale Akteure zu verschiedenen Zwecken miteinander agieren. Mit der Verlagerung der kommunikativen Praktiken in die digitale Welt kommt es zur Verlinkung von Texten zu Diskursen, die multisemiotisch und multimedial geprägt und auf Interaktion ausgerichtet sind. Dieses Buch ist solchen diversen textuellen und diskursiven Erscheinungsformen der massenmedialen Kommunikation gewidmet, die auf der Grundlage erschlossener Textkorpora interdisziplinär untersucht werden. Gegenstand der breit gefächerten Diskussion sind hier einzelne Texte und zusammenhängende Textformate in verschiedenen Medien sowie diskursiv organisierte Textwelten diverser multimodaler und -medialer Ausgestaltung.
Security and smart spaces are among the most significant topics in IoT nowadays. The implementation of secured smart spaces is at the heart of this concept, and its development is a key issue in the next generation IoT. This book addresses major security aspects and challenges in realizing smart spaces and sensing platforms in critical Cloud and IoT applications. The book focuses on both the design and implementation aspects of security models and strategies in smart that are enabled by wireless sensor networks and RFID systems. It mainly examines seamless data access approaches and encryption and decryption aspects in reliable IoT systems.
The book is about a very active research field in software engineering. In modern society, the fact of the world's high reliance on software requires the system's robustness, i.e., continual availability and satisfactory service quality. This requirement gives rise to the popularity of the research on the self-adaptive software in open environment. There are some academic conferences dedicated to this field. But there is a lack of monographs about the topic. We believe such need is unmet in marketplace. By publishing the book, it can help bridge the gap and bring benefits to readers thereof. Key Features: The topic is well-motivated, interesting and actively studied worldwide The research represents as the state-of-the-art in the field The technical part of the book is rigidly evaluated The theoretical part of the book is sound and proved The organization and presentation of the book will be double-checked by professional scholars
What are the borders of risk? How is the perception of risk related to new technologies and digital changing? This book discusses these topics, moving from theories to research data, looking for concrete answers now, or taking a picture of reality. The volume is divided into three main sections: Exploring the Edges of Risk, according to sociological, psychological and artificial intelligence perspective; Technological and Digital Risks, exploring social media, cyberbullying, hate speech, social bots on digital platforms; Risk in the Cities, working with risk and deviance, risk communication, environmental and nuclear risks. Inside, research data from Europe, USA and Mexico are discussed.
A unique set of 100 cards with over 200 TikTok challenges for you to shoot and upload, from lip synchs, dances and dares to ridiculous pranks.
How will artificial intelligence change our world within twenty years?
The term “cyberspace†that entered into our lives towards the end of the 20th century is defined as: “a global platform that consists of the network containing the infrastructures of information technologies with Internet, communication networks, computer systems, embedded processors and controllersâ€. When this term is analysed, it is seen that nearly all informatics systems minimize the human control and at many platforms, they are connected to each other. Although the term “cyberspace†is very new, it is like a living organism that is coordinated with scientific disciplines such as finance, defence, health, education, transportation and security, in all manned and unmanned areas. Our interaction with this organism covers almost all our lifespan. When looked closer, it is seen that cyberspace must be researched not only from technology side but also from sociology and psychology sides. So, welcome to the cyberspace journey that we prepared for you in our book What’s Happening in Cyberspace?
Begin your JavaScript journey with this comprehensive, hands-on guide. You’ll learn everything there is to know about professional JavaScript programming, from core language concepts to essential client-side tasks. Build dynamic web applications with step-by-step instructions and expand your knowledge by exploring server-side development and mobile development. Work with advanced language features, write clean and efficient code, and much more! · Your all-in-one guide to JavaScript· Work with objects, reference types, events, forms, and web APIs· Build server-side applications, mobile applications, desktop applications, and more· Consult and download practical code examples Language ReviewRefresh your knowledge or learn JavaScript as a beginner with in-depth coverage of JavaScript basics. Understand how to store values, use data types, control flow, and debug your code. Client-Side ProgrammingBuild dynamic web applications by learning to process events, load content, create images, and use web APIs. Advanced ConceptsExplore server-side application development with Node.js, mobile application development with React Native and Iconic, and desktop programming with Electron and NW.js. Work with advanced language features and more. This book includes: 1) More than 1,000 pages of JavaScript knowledge from a leading expert 2) A compendium of basics and advanced topics for professionals 3) Detailed, numbered code listings 4) Diagrams, charts, tables, note boxes, definitions, and background information 5) Numerous illustrations and screenshots 6) A comprehensive index This book is for you if: 1) You’re a beginner without extensive programming experience who wants to learn the JavaScript language: In addition to JavaScript basics, this book provides you with information about programming concepts and paradigms, as well as the most important APIs and application areas of JavaScript. The best way to work with the book as a beginner is to read it from cover to cover. Prior knowledge of HTML and CSS will make it easier to follow along with this book. 2) You’re a professional programmer looking to add JavaScript to your language repertoire: You can deepen your knowledge and learn from a comprehensive and versatile reference guide. Explore advanced topics and follow along with in-depth exercises. Since the code examples do not build on each other, you can read the chapters in any order you prefer. Highlights: Reference types Objects Events Forms Web APIs Object-oriented programming Functional programming Client-side applications Server-side applications Mobile and desktop applications
* A useful summary of the findings of a project researching the use of information communication technologies (ICTs) for development* Includes a functional best practice framework--who should do what, and when--and suggestions for further research* Features a review of the literature and illustrates lessons learned through the example of a case study of a project in PeruThis paper summarizes the findings from a research project conducted by ITDG and Cranfield School of Management (Bedford, U.K.) into using ICTs (like the Internet or mobile telephony) to share information with people at grassroots level "connecting the first mile."Across the world, development agencies are piloting projects to use ICTs to provide people with improved access to up-to-date information, equip them with new skills, or connect them to an international market. Evidence suggests that many of these projects are not succeeding. "Connecting the First Mile" outlines the challenges involved in sharing information with people who have little experience with ICTs, low levels of literacy, little time or money, and very specific knowledge and language requirements. It provides a best practice framework that embraces many applications of ICT (eg for agriculture, e-governance etc.) and many technologies, and it includes suggestions for further research.Of interest to Development, and ICT for Development: practitioners, students, academics, and donor organizations.
Teaches readers to identify and avoid deceit and misinformation online. We are commonly deceived by numbers in our everyday lives. From lotteries, product warranties, and weight loss fads to misleading headlines, numbers are used in manipulative ways to lure us into making decisions about our life. Data Duped will help you avoid common pitfalls and develop a sense of ‘data defense’ by learning what types of questions to ask and how to maintain a healthy level of curiosity and data skepticism. Data Duped gives readers a super power, or at least we hope so. Knowledge is power. With knowledge of how data can be manipulated, how it can influence our decisions and how it can deceive, readers will face data with a new empowered approach. This book purposefully raises more questions than answers and guides readers to seek the differences between the plausible and the ridiculous along a journey of informed critical thinking and data literacy. With historical parallels and both practical and relatable examples, readers will learn how to separate the ‘malarkey’ from the truth, become able to comfortably bring a little more data into their lives, and ultimately avoid being hoodwinked by misinformation.
Explore numerous techniques to improve the way you write CSS as you build 12 tiny projects. For readers who know the basics of HTML and frontend development. No previous experience of CSS is required. In Tiny CSS Projects, you will build twelve exciting and useful web projects with CSS — a must-know tool. This textbook teaches you how to make beautiful websites and applications by gilding you through a dozen fun coding challenges. You will learn important skills through hands-on practice as you tinker with your own coding and will make actual creative decisions about the projects you re building. You will rapidly master the basic features, including A loading screen created by styling SVG graphics A responsive newspaper layout with multi-columns Animating social media buttons with pseudo-elements Designing layouts using CSS grids Summary cards that utilise hover interactions Styling forms to make them more appealing to your users The projects may be tiny, but the CSS skills you will learn are huge! Press on with CSS s exciting layout features, including grid and flexbox, animations, transitions, and media queries. About the technology Cascading Style Sheets (CSS) make the web beautiful. Where HTML structures a page and JavaScript gives it additional functionality, CSS handles colours, layouts, and typography — everything your users love about your site. While CSS is an established tool used in almost all production websites, it s also evolving to include new features.
ITIL 4 is the latest evolution of the leading best-practice framework for ITSM (IT service management). It has been significantly updated from ITIL v3 and addresses new ITSM challenges, includes new technologies and incorporates new ways of working. ITIL Foundation Essentials - ITIL 4 Edition* is the ultimate revision guide for candidates preparing for the ITIL 4 Foundation exam. It is fully aligned with the Foundation course syllabus and gives a clear and concise overview of the facts. You can use it in place of writing revision notes, giving you more time to focus on learning the information you need to pass the exam. Whether you are taking an ITIL 4 Foundation training course or are a self-study candidate, new to the framework or looking to upgrade your ITIL 2011 certification, this guide is the essential companion. It: -Provides definitions of the key terms and concepts used in ITIL 4; -Presents detailed information in clear, user-friendly and easy-to-follow ways through tables, bullet points and diagrams; and -Explains the key figures and diagrams in the ITIL syllabus. New for the ITIL 4 Edition: -Fully updated to reflect the changes introduced in ITIL 4. -New sections on the guiding principles of ITIL and the four dimensions of service management. -Updated overview of the ITIL Foundation exam.
This book offers an original and informative view of the development of fundamental concepts of computability theory. The treatment is put into historical context, emphasizing the motivation for ideas as well as their logical and formal development. In Part I the author introduces computability theory, with chapters on the foundational crisis of mathematics in the early twentieth century, and formalism. In Part II he explains classical computability theory, with chapters on the quest for formalization, the Turing Machine, and early successes such as defining incomputable problems, c.e. (computably enumerable) sets, and developing methods for proving incomputability. In Part III he explains relative computability, with chapters on computation with external help, degrees of unsolvability, the Turing hierarchy of unsolvability, the class of degrees of unsolvability, c.e. degrees and the priority method, and the arithmetical hierarchy. Finally, in the new Part IV the author revisits the computability (Church-Turing) thesis in greater detail. He offers a systematic and detailed account of its origins, evolution, and meaning, he describes more powerful, modern versions of the thesis, and he discusses recent speculative proposals for new computing paradigms such as hypercomputing. This is a gentle introduction from the origins of computability theory up to current research, and it will be of value as a textbook and guide for advanced undergraduate and graduate students and researchers in the domains of computability theory and theoretical computer science. This new edition is completely revised, with almost one hundred pages of new material. In particular the author applied more up-to-date, more consistent terminology, and he addressed some notational redundancies and minor errors. He developed a glossary relating to computability theory, expanded the bibliographic references with new entries, and added the new part described above and other new sections.
Although the terms "data mining" and "knowledge discovery and data mining" (KDDM) are sometimes used interchangeably, data mining is actually just one step in the KDDM process. Data mining is the process of extracting useful information from data, while KDDM is the coordinated process of understanding the business and mining the data in order to identify previously unknown patterns. Knowledge Discovery Process and Methods to Enhance Organizational Performance explains the knowledge discovery and data mining (KDDM) process in a manner that makes it easy for readers to implement. Sharing the insights of international KDDM experts, it details powerful strategies, models, and techniques for managing the full cycle of knowledge discovery projects. The book supplies a process-centric view of how to implement successful data mining projects through the use of the KDDM process. It discusses the implications of data mining including security, privacy, ethical and legal considerations. Provides an introduction to KDDM, including the various models adopted in academia and industry Details critical success factors for KDDM projects as well as the impact of poor quality data or inaccessibility to data on KDDM projects Proposes the use of hybrid approaches that couple data mining with other analytic techniques (e.g., data envelopment analysis, cluster analysis, and neural networks) to derive greater value and utility Demonstrates the applicability of the KDDM process beyond analytics Shares experiences of implementing and applying various stages of the KDDM process in organizations The book includes case study examples of KDDM applications in business and government. After reading this book, you will understand the critical success factors required to develop robust data mining objectives that are in alignment with your organization’s strategic business objectives.
This book presents best selected research papers presented at Innovation in Sustainable Energy and Technology India (ISET 2020), organized by Energy Institute Bangalore (A unit of RGIPT, an Institute of National Importance), India, during 3-4 December 2020. The book covers various topics of sustainable energy and technologies which includes renewable energy (solar photovoltaic, solar thermal and CSP, biomass, wind energy, micro hydro power, hydrogen energy, geothermal energy, energy materials, energy storage, hybrid energy), smart energy systems (electrical vehicle, cybersecurity, charging infrastructures, IOT & AI, waste management, PHEV (CNG/EV) and mobility (smart grids, IOT & AI, energy-efficient buildings, mart agriculture).
Attention to design patterns is unquestionably growing in software engineering because there is a strong belief that using made to measure solutions for solving frequently occurring problems encountered throughout the design phase greatly reduces the total cost and the time of developing software products. Stable Design Patterns for Software and Systems presents a new and fresh approach for creating stable, reusable, and widely applicable design patterns. It deals with the concept of stable design patterns based on software stability as a contemporary approach for building stable and highly reusable and widely applicable design patterns. This book shows that a formation approach to discovering and creating stable design patterns accords with Alexander’s current understanding of architectural patterns. Stable design patterns are a type of knowledge pattern that underline human problem solving methods and appeal to the pattern community. This book examines software design patterns with respect to four central themes: How do we develop a solution for the problem through software stability concepts? This book offers a direct application of using software stability concepts for modeling solutions. How do we achieve software stability over time and design patterns that are effective to use? What are the unique roles of stable design patterns in modeling the accurate solution of the problem at hand and in providing stable and undisputed design for such problems? This book enumerates a complete and domain-less list of stable patterns that are useful for designing and modeling solutions for frequently recurring problems. What is the most efficient way to document the stable design patters to ensure efficient reusability? This book is an extension to the contemporary templates that are used in documenting design patterns. This book gives a pragmatic and a novel approach toward understanding the problem domain and in proposing stable solutions for engineering stable software systems, components, and frameworks.
In order to perform effective analysis of today’s information security systems, numerous components must be taken into consideration. This book presents a well-organized, consistent solution created by the author, which allows for precise multilevel analysis of information security systems and accounts for all of the significant details. Enabling the multilevel modeling of secure systems, the quality of protection modeling language (QoP-ML) approach provides for the abstraction of security systems while maintaining an emphasis on quality protection. This book introduces the basis of the QoP modeling language along with all the advanced analysis modules, syntax, and semantics. It delineates the steps used in cryptographic protocols and introduces a multilevel protocol analysis that expands current understanding. Introduces quality of protection evaluation of IT Systems Covers the financial, economic, and CO2 emission analysis phase Supplies a multilevel analysis of Cloud-based data centers Details the structures for advanced communication modeling and energy analysis Considers security and energy efficiency trade-offs for the protocols of wireless sensor network architectures Includes case studies that illustrate the QoP analysis process using the QoP-ML Examines the robust security metrics of cryptographic primitives Compares and contrasts QoP-ML with the PL/SQL, SecureUML, and UMLsec approaches by means of the SEQUAL framework The book explains the formal logic for representing the relationships between security mechanisms in a manner that offers the possibility to evaluate security attributes. It presents the architecture and API of tools that ensure automatic analysis, including the automatic quality of protection analysis tool (AQoPA), crypto metrics tool (CMTool), and security mechanisms evaluation tool (SMETool). The book includes a number of examples and case studies that illustrate the QoP analysis process by the QoP-ML. Every operation defined by QoP-ML is described within parameters of security metrics to help you better evaluate the impact of each operation on your system's security.
This volume, like those prior to it, features chapters by experts in various fields of computational chemistry. Two chapters focus on molecular docking, one of which relates to drug discovery and cheminformatics and the other to proteomics. In addition, this volume contains tutorials on spin-orbit coupling and cellular automata modeling, as well as an extensive bibliography of computational chemistry books. FROM REVIEWS OF THE SERIES "Reviews in Computational Chemistry remains the most valuable reference to methods and techniques in computational chemistry."—JOURNAL OF MOLECULAR GRAPHICS AND MODELLING "One cannot generally do better than to try to find an appropriate article in the highly successful Reviews in Computational Chemistry. The basic philosophy of the editors seems to be to help the authors produce chapters that are complete, accurate, clear, and accessible to experimentalists (in particular) and other nonspecialists (in general)."—JOURNAL OF THE AMERICAN CHEMICAL SOCIETY
Product information not available. |
You may like...
Multimodal Behavior Analysis in the Wild…
Xavier Alameda-Pineda, Elisa Ricci, …
Paperback
Cybernetics, Cognition and Machine…
Vinit Kumar Gunjan, P.N Suganthan, …
Hardcover
R5,213
Discovery Miles 52 130
Harbour Protection Through Data Fusion…
Elisa Shahbazian, Galina Rogova, …
Hardcover
R5,776
Discovery Miles 57 760
Research Developments in Biometrics and…
Rajeev Srivastava, S.K. Singh, …
Hardcover
R4,837
Discovery Miles 48 370
Optoelectronics in Machine Vision-Based…
Moises Rivas-Lopez, Oleg Sergiyenko, …
Hardcover
R5,649
Discovery Miles 56 490
Pattern Recognition Applications in…
Diego Alexander Tibaduiza Burgos, Maribel Anaya Vejar, …
Hardcover
R5,960
Discovery Miles 59 600
Technological Innovation for…
Luis M. Camarinha-Matos, Antonio J Falcao, …
Hardcover
R2,758
Discovery Miles 27 580
Cyber Crime and Forensic Computing…
Gulshan Shrivastava, Deepak Gupta, …
Hardcover
R4,522
Discovery Miles 45 220
Deep Network Design for Medical Image…
Haofu Liao, S. Kevin Zhou, …
Paperback
R2,208
Discovery Miles 22 080
|