![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General
The term “cyberspace” that entered into our lives towards the end of the 20th century is defined as: “a global platform that consists of the network containing the infrastructures of information technologies with Internet, communication networks, computer systems, embedded processors and controllers”. When this term is analysed, it is seen that nearly all informatics systems minimize the human control and at many platforms, they are connected to each other. Although the term “cyberspace” is very new, it is like a living organism that is coordinated with scientific disciplines such as finance, defence, health, education, transportation and security, in all manned and unmanned areas. Our interaction with this organism covers almost all our lifespan. When looked closer, it is seen that cyberspace must be researched not only from technology side but also from sociology and psychology sides. So, welcome to the cyberspace journey that we prepared for you in our book What’s Happening in Cyberspace?
Although the terms "data mining" and "knowledge discovery and data mining" (KDDM) are sometimes used interchangeably, data mining is actually just one step in the KDDM process. Data mining is the process of extracting useful information from data, while KDDM is the coordinated process of understanding the business and mining the data in order to identify previously unknown patterns. Knowledge Discovery Process and Methods to Enhance Organizational Performance explains the knowledge discovery and data mining (KDDM) process in a manner that makes it easy for readers to implement. Sharing the insights of international KDDM experts, it details powerful strategies, models, and techniques for managing the full cycle of knowledge discovery projects. The book supplies a process-centric view of how to implement successful data mining projects through the use of the KDDM process. It discusses the implications of data mining including security, privacy, ethical and legal considerations. Provides an introduction to KDDM, including the various models adopted in academia and industry Details critical success factors for KDDM projects as well as the impact of poor quality data or inaccessibility to data on KDDM projects Proposes the use of hybrid approaches that couple data mining with other analytic techniques (e.g., data envelopment analysis, cluster analysis, and neural networks) to derive greater value and utility Demonstrates the applicability of the KDDM process beyond analytics Shares experiences of implementing and applying various stages of the KDDM process in organizations The book includes case study examples of KDDM applications in business and government. After reading this book, you will understand the critical success factors required to develop robust data mining objectives that are in alignment with your organization’s strategic business objectives.
This practical book explains the process of landscape photography, leading you easily through the stages of editing an image to lift your photographs and bring out the image you captured at the taking stage. Topics covered include: screen grabs, black and white landscapes, combining photos into realistic high-dynamic-range images, creating stitched panoramas, popular plug-ins for Photoshop, and shortcuts and keystrokes to speed-up your Photoshop work. With step-by-step instructions and practical advice, this book an essential guide for photographers keen to capture the true beauty of a scene.
- The book discusses the recent techniques in NGS data analysis which is the most needed material by biologists (students and researchers) in the wake of numerous genomic projects and the trend toward genomic research. - The book includes both theory and practice for the NGS data analysis. So, readers will understand the concept and learn how to do the analysis using the most recent programs. - The steps of application workflows are written in a manner that can be followed for related projects. - Each chapter includes worked examples with real data available on the NCBI databases. Programming codes and outputs are accompanied with explanation. - The book content is suitable as teaching material for biology and bioinformatics students. Meets the requirements of a complete semester course on Sequencing Data Analysis Covers the latest applications for Next Generation Sequencing Covers data reprocessing, genome assembly, variant discovery, gene profiling, epigenetics, and metagenomics
How we interface and interact with computing, communications and entertainment devices is going through revolutionary changes, with natural user inputs based on touch, voice, and vision replacing or augmenting the use of traditional interfaces based on the keyboard, mouse, joysticks, etc. As a result, displays are morphing from one-way interface devices that merely show visual content to two-way interaction devices that provide more engaging and immersive experiences. This book provides an in-depth coverage of the technologies, applications, and trends in the rapidly emerging field of interactive displays enabled by natural human-interfaces. Key features: * Provides a definitive reference reading on all the touch technologies used in interactive displays, including their advantages, limitations, and future trends. * Covers the fundamentals and applications of speech input, processing and recognition techniques enabling voice-based interactions. * Offers a detailed review of the emerging vision-based sensing technologies, and user interactions using gestures of hands, body, face, and eye gazes. * Discusses multi-modal natural user interface schemes which intuitively combine touch, voice, and vision for life-like interactions. * Examines the requirements and technology status towards realizing true 3D immersive and interactive displays.
If you're a web designer or app developer interested in sophisticated page styling, improved accessibility, and less time and effort expended, this book is for you. This revised fifth edition provides a comprehensive guide to CSS implementation along with a thorough review of the latest CSS specifications. Authors Eric Meyer and Estelle Weyl show you how to improve user experience, speed development, avoid potential bugs, and add life and depth to your applications through layout, transitions and animations, borders, backgrounds, text properties, and many other tools and techniques. We read the specs so you don't have to! This guide covers: Selectors, specificity, and the cascade, including information on the new cascade layers New and old CSS values and units, including CSS variables and ways to size based on viewports Details on font technology and ways to use any available font variants Text styling, from basic decoration to changing the entire writing mode Padding, borders, outlines, and margins, now discussed in terms of the new block- and inline-direction layout paradigm used by modern browsers Colors, backgrounds, and gradients, including the conic gradients Accessible data tables Flexible box and grid layout systems, including new subgrid capabilities 2D and 3D transforms, transitions, and animation Filters, blending, clipping, and masking Media, feature, and container queries
A compelling firsthand investigation of how social media and big data have amplified the close relationship between privacy and inequality  Online privacy is under constant attack by social media and big data technologies. But we cannot rely on individual actions to remedy this—it is a matter of social justice. Alice E. Marwick offers a new way of understanding how privacy is jeopardized, particularly for marginalized and disadvantaged communities—including immigrants, the poor, people of color, LGBTQ+ populations, and victims of online harassment.  Marwick shows that few resources or regulations for preventing personal information from spreading on the internet. Through a new theory of “networked privacy,” she reveals how current legal and technological frameworks are woefully inadequate in addressing issues of privacy—often by design. Drawing from interviews and focus groups encompassing a diverse group of Americans, Marwick shows that even heavy social media users care deeply about privacy and engage in extensive “privacy work” to protect it. But people are up against the violation machine of the modern internet. Safeguarding privacy must happen at the collective level.
* A useful summary of the findings of a project researching the use of information communication technologies (ICTs) for development* Includes a functional best practice framework--who should do what, and when--and suggestions for further research* Features a review of the literature and illustrates lessons learned through the example of a case study of a project in PeruThis paper summarizes the findings from a research project conducted by ITDG and Cranfield School of Management (Bedford, U.K.) into using ICTs (like the Internet or mobile telephony) to share information with people at grassroots level "connecting the first mile."Across the world, development agencies are piloting projects to use ICTs to provide people with improved access to up-to-date information, equip them with new skills, or connect them to an international market. Evidence suggests that many of these projects are not succeeding. "Connecting the First Mile" outlines the challenges involved in sharing information with people who have little experience with ICTs, low levels of literacy, little time or money, and very specific knowledge and language requirements. It provides a best practice framework that embraces many applications of ICT (eg for agriculture, e-governance etc.) and many technologies, and it includes suggestions for further research.Of interest to Development, and ICT for Development: practitioners, students, academics, and donor organizations.
Inspired by the format of Frequently Asked Questions, SWIPE presents questions about the smartphone that users might (not) have frequently asked themselves. In order to reflect the endlessly diverse and dynamic content users daily swipe for on their smartphone, these questions are not followed by single sentences, but by image collections consisting of Internet-found visuals. Contemporary writers and artists help you embrace your newly acquired knowledge by guiding you through reflective visions of the age of the smartphone. In SWIPE you will encounter five categories that offer guidance. SURVIVAL speaks about how the smartphone helps users survive, and whether it itself will survive. SENSE OF SELF reflects on how the user's being is constructed by the smartphone, and vice versa. HABITS focuses on the user's daily use of the smartphone, and how its constant presence shapes daily life. RESOURCES speaks about how nature and users give power to the smartphone. And lastly, EXISTENTIAL CRISIS reflects on how the smartphone is used to escape the anxieties of real-life.
ITIL 4 is the latest evolution of the leading best-practice framework for ITSM (IT service management). It has been significantly updated from ITIL v3 and addresses new ITSM challenges, includes new technologies and incorporates new ways of working. ITIL Foundation Essentials - ITIL 4 Edition* is the ultimate revision guide for candidates preparing for the ITIL 4 Foundation exam. It is fully aligned with the Foundation course syllabus and gives a clear and concise overview of the facts. You can use it in place of writing revision notes, giving you more time to focus on learning the information you need to pass the exam. Whether you are taking an ITIL 4 Foundation training course or are a self-study candidate, new to the framework or looking to upgrade your ITIL 2011 certification, this guide is the essential companion. It: -Provides definitions of the key terms and concepts used in ITIL 4; -Presents detailed information in clear, user-friendly and easy-to-follow ways through tables, bullet points and diagrams; and -Explains the key figures and diagrams in the ITIL syllabus. New for the ITIL 4 Edition: -Fully updated to reflect the changes introduced in ITIL 4. -New sections on the guiding principles of ITIL and the four dimensions of service management. -Updated overview of the ITIL Foundation exam.
`Two years ago, I taught an introductory level course on eGovernment. If only I had had this book to draw upon at the time.... I strongly recommend this text to students of eGovernment, whether in universities or the public sector. Each can read the book at a different level and can reap significant gain from the variety of material available. The chapters are well organized, as is the comprehensive index, while academic readers will appreciate the extensive bibliography' - Information Technology for Development Implementing and Managing eGovernment fills an important gap. It provides comprehensive coverage of the e-government issues faced by managers, consultants and other practitioners. Richard Heeks draws on international examples to guide readers through crucial e-government management issues such as the management of strategy and projects; data security; quality; people, money and policies, and dealing with political and ethical challenges. The second part of the book focuses on the implementation of e-government systems. It explores activities such as: feasibility studies, system analysis, system design, construction and marketing. Instructive diagrams, synoptic models and case studies underpin the book's content while class and practitioner assessments will help readers monitor their understanding. Additional material is also available on a companion Website. This book will be welcomed by students pursuing an MPA, undergraduates studying public policy and administration, and practitioners on government in-service training.
This book offers an original and informative view of the development of fundamental concepts of computability theory. The treatment is put into historical context, emphasizing the motivation for ideas as well as their logical and formal development. In Part I the author introduces computability theory, with chapters on the foundational crisis of mathematics in the early twentieth century, and formalism. In Part II he explains classical computability theory, with chapters on the quest for formalization, the Turing Machine, and early successes such as defining incomputable problems, c.e. (computably enumerable) sets, and developing methods for proving incomputability. In Part III he explains relative computability, with chapters on computation with external help, degrees of unsolvability, the Turing hierarchy of unsolvability, the class of degrees of unsolvability, c.e. degrees and the priority method, and the arithmetical hierarchy. Finally, in the new Part IV the author revisits the computability (Church-Turing) thesis in greater detail. He offers a systematic and detailed account of its origins, evolution, and meaning, he describes more powerful, modern versions of the thesis, and he discusses recent speculative proposals for new computing paradigms such as hypercomputing. This is a gentle introduction from the origins of computability theory up to current research, and it will be of value as a textbook and guide for advanced undergraduate and graduate students and researchers in the domains of computability theory and theoretical computer science. This new edition is completely revised, with almost one hundred pages of new material. In particular the author applied more up-to-date, more consistent terminology, and he addressed some notational redundancies and minor errors. He developed a glossary relating to computability theory, expanded the bibliographic references with new entries, and added the new part described above and other new sections.
Generative AI is the hottest topic in tech. This practical book teaches machine learning engineers and data scientists how to use TensorFlow and Keras to create impressive generative deep learning models from scratch, including variational autoencoders (VAEs), generative adversarial networks (GANs), Transformers, normalizing flows, energy-based models, and denoising diffusion models. The book starts with the basics of deep learning and progresses to cutting-edge architectures. Through tips and tricks, you'll understand how to make your models learn more efficiently and become more creative. Discover how VAEs can change facial expressions in photos Train GANs to generate images based on your own dataset Build diffusion models to produce new varieties of flowers Train your own GPT for text generation Learn how large language models like ChatGPT are trained Explore state-of-the-art architectures such as StyleGAN2 and ViT-VQGAN Compose polyphonic music using Transformers and MuseGAN Understand how generative world models can solve reinforcement learning tasks Dive into multimodal models such as DALL.E 2, Imagen, and Stable Diffusion This book also explores the future of generative AI and how individuals and companies can proactively begin to leverage this remarkable new technology to create competitive advantage.
A CUNNING CHRONICLE OF THE 50 CODES THAT ALTERED THE COURSE OF HISTORY AND CHANGED THE WORLD From the bestselling author of Bletchley Park Brainteasers and The Scotland Yard Puzzle Book. There have been secret codes since before the Old Testament, and there were secret codes in the Old Testament too. Almost as soon as writing was invented, so too were the devious means to hide messages and keep them under the wraps of secrecy. In 50 Codes that Changed the World, Sinclair McKay explores these uncrackable codes, secret cyphers and hidden messages from across time to tell a new history of a secret world. From the temples of Ancient Greece to the court of Elizabeth I; from antique manuscripts whose codes might hold prophecies of doom to the modern realm of quantum mechanics, you will see how a few concealed words could help to win wars, spark revolutions and even change the faces of great nations. Here is the complete guide to the hidden world of codebreaking, with opportunities for you to see if you could have cracked some of the trickiest puzzles and lip-chewing codes ever created. ----------------------- Praise for Sinclair McKay's books: 'This book [The Secret Life of Bletchley Park] seems a remarkably faithful account of what we did, why it mattered, and how it all felt at the time by someone who couldn't possibly have been born then. - THE GUARDIAN [Bletchley Park Brainteasers] is outrageously difficult but utterly fascinating. - THE EXPRESS 'Sinclair McKay's account of this secret war of the airwaves in [Secret Listeners] is as painstakingly researched and fascinating as his bestselling The Secret Life Of Bletchley Park, and an essential companion to it.' - DAILY MAIL
Chosen as one of the best books of 2022 by the Financial Times and the Telegraph. Longlisted for the Moore Prize for Human Rights Writing 'Compelling, powerful and necessary.' Shoshana Zuboff, author of The Age of Surveillance Capitalism 'Fascinating' Guardian Without a moment's pause, we share our most intimate thoughts with trillion-dollar tech companies. Their algorithms categorize us and jump to troubling conclusions about who we are. They also shape our everyday thoughts, choices and actions - from who we date to whether we vote. But this is just the latest front in an age-old struggle. Part history and part manifesto, Freedom to Think explores how the powerful have always sought to influence how we think and what we buy. Connecting the dots from Galileo to Alexa, human rights lawyer Susie Alegre charts the history and fragility of our most important human right: freedom of thought. Filled with shocking case-studies across politics, criminal justice, and everyday life, this ground-breaking book shows how our mental freedom is under threat like never before. Bold and radical, Alegre argues that only by recasting our human rights for the digital age can we safeguard our future.
This book presents best selected research papers presented at Innovation in Sustainable Energy and Technology India (ISET 2020), organized by Energy Institute Bangalore (A unit of RGIPT, an Institute of National Importance), India, during 3-4 December 2020. The book covers various topics of sustainable energy and technologies which includes renewable energy (solar photovoltaic, solar thermal and CSP, biomass, wind energy, micro hydro power, hydrogen energy, geothermal energy, energy materials, energy storage, hybrid energy), smart energy systems (electrical vehicle, cybersecurity, charging infrastructures, IOT & AI, waste management, PHEV (CNG/EV) and mobility (smart grids, IOT & AI, energy-efficient buildings, mart agriculture).
Different Engines investigates the emergence of technologies in Latin America to create images, sounds, video games, and physical interactions. The book contributes to the construction of a historiographical and theoretical framework for understanding the work of creators who have been geographically and historically marginalized through the study of five exemplary and yet relatively unknown artifacts built by engineers, scientists, artists, and innovators. It offers a broad and detailed view of the complex and sometimes unlikely conditions under which technological innovation is possible and of the problematic logics under which these innovations may come to be devalued as historically irrelevant. Through its focus on media technologies, the book presents the interactions between technological and artistic creativity, working towards a wider understanding of the shifts in both fields that have shaped current perceptions, practices, and design principles while bringing into view the personal, social, and geopolitical singularities embodied by particular devices. It will be an engaging and insightful read for scholars, researchers, and students across a wide range of disciplines, such as media studies, art and design, architecture, cultural history, and the digital humanities.
This volume, like those prior to it, features chapters by experts in various fields of computational chemistry. Two chapters focus on molecular docking, one of which relates to drug discovery and cheminformatics and the other to proteomics. In addition, this volume contains tutorials on spin-orbit coupling and cellular automata modeling, as well as an extensive bibliography of computational chemistry books. FROM REVIEWS OF THE SERIES "Reviews in Computational Chemistry remains the most valuable reference to methods and techniques in computational chemistry."—JOURNAL OF MOLECULAR GRAPHICS AND MODELLING "One cannot generally do better than to try to find an appropriate article in the highly successful Reviews in Computational Chemistry. The basic philosophy of the editors seems to be to help the authors produce chapters that are complete, accurate, clear, and accessible to experimentalists (in particular) and other nonspecialists (in general)."—JOURNAL OF THE AMERICAN CHEMICAL SOCIETY
Product information not available.
Analyses of specific, animated films with timecodes give concrete lessons with pinpointed examples: Flee, Soul, Porco Rosso, and The Triplets of Belleville. Makes acting theory simple and straightforward for non-expert animation professionals and students. An updated online database of Ed’s previous film analyses, all in one place. |
You may like...
Knowledge Management in Fuzzy Databases
Olga Pons, Maria A. Vila
Hardcover
R4,226
Discovery Miles 42 260
Intelligent Decision Making in Quality…
Cengiz Kahraman, Seda Yanik
Hardcover
NASM Personal Trainer Exam Study Guide…
Nasm Exam Secrets Test Prep
Paperback
|