![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General
Whether you want to automate tasks, analyze data, parse logs, talk to network services, or address other systems requirements, writing your own command-line tool may be the fastest - and perhaps the most fun - way to do it. The Go programming language is a great choice for developing tools that are fast, reliable, and cross-platform. Create command-line tools that work with files, connect to services, and even manage external processes, all while using tests and benchmarks to ensure your programs are fast and correct. When you want to develop cross platform command-line tools that are fast and reliable, use Go, a modern programming language that combines the reliability of compiled languages with the ease of use and flexibility of dynamic typed languages. Work through practical examples to develop elegant and efficient tools by applying Go's rich standard library, its built in support for concurrency, and its expressive syntax. Use Go's integrated testing capabilities to automatically test your tools, ensuring they work reliably even across code refactoring. Develop CLI tools that interact with your users by using common input/output patterns, including environment variables and flags. Handle files to read or persist data, and manipulate paths consistently in cross-platform scenarios. Control processes and handle signals, and use a benchmark driven approach and Go's concurrency primitives to create tools that perform well. Use powerful external libraries such as Cobra to create modern and flexible tools that handle subcommands, and develop tools that interact with databases, APIs, and network services. Finally, leverage what you learned by tackling additional challenges at the end of each chapter. What You Need: Go 1.8 or higher, an internet connection to download the example files and additional libraries, and a text editor to write your programs.
Data is getting bigger and more complex by the day, and so are your choices in handling it. Explore some of the most cutting-edge databases available - from traditional relational databases to newer NoSQL approaches - and make informed decisions about challenging data storage problems. This is the only comprehensive guide to the world of NoSQL databases, with in-depth practical and conceptual introductions to seven different technologies: Redis, Neo4J, CouchDB, MongoDB, HBase, Postgres, and DynamoDB. This second edition includes a new chapter on DynamoDB and updated content for each chapter. While relational databases such as MySQL remain as relevant as ever, the alternative, NoSQL paradigm has opened up new horizons in performance and scalability and changed the way we approach data-centric problems. This book presents the essential concepts behind each database alongside hands-on examples that make each technology come alive. With each database, tackle a real-world problem that highlights the concepts and features that make it shine. Along the way, explore five database models - relational, key/value, columnar, document, and graph - from the perspective of challenges faced by real applications. Learn how MongoDB and CouchDB are strikingly different, make your applications faster with Redis and more connected with Neo4J, build a cluster of HBase servers using cloud services such as Amazon's Elastic MapReduce, and more. This new edition brings a brand new chapter on DynamoDB, updated code samples and exercises, and a more up-to-date account of each database's feature set. Whether you're a programmer building the next big thing, a data scientist seeking solutions to thorny problems, or a technology enthusiast venturing into new territory, you will find something to inspire you in this book. What You Need: You'll need a *nix shell (Mac OS or Linux preferred, Windows users will need Cygwin), Java 6 (or greater), and Ruby 1.8.7 (or greater). Each chapter will list the downloads required for that database.
Free and open source is the foundation of software development, and it's built by people just like you. Discover the fundamental tenets that drive the movement. Take control of your career by selecting the right project to meet your professional goals. Master the language and avoid the pitfalls that typically ensnare new contributors. Join a community of like-minded people and change the world. Programmers, writers, designers, and everyone interested in software will make their mark through free and open source software contributions. Free and open source software is the default choice for the programming languages and technologies which run our world today, and it's all built and maintained by people just like you. No matter your skill level or area of expertise, with this book you will contribute to free and open source software projects. Using this practical approach you'll understand not only the mechanics of contributing, but also how doing so helps your career as well as the community. This book doesn't assume that you're a programmer, or even that you have prior experience with free and open source software. Learn what open source is, where it came from, and why it's important. Start on the right foot by mastering the structure and tools you need before you contribute. Choose the right project for you, amplifying the impact of your contribution. Submit your first contribution, whether it's code, writing, design, or community organising. Find out what to do when things don't go the way you expect. Discover how to start your own project and make it friendly and welcoming to contributors. Anyone can contribute! Make your mark today and help others while also helping yourself.
This new self-study system delivers complete coverage of every topic on the Certified in Cybersecurity exam Take the Certified in Cybersecurity exam from (ISC)2 with confidence using the information contained in this comprehensive study guide. Written by two cybersecurity experts and successful authors, CC Certified in Cybersecurity All-in-One Exam Guide offers background material, detailed examples, and accurate practice questions—all in a single volume. Each exam domain is presented with information mapped directly to the body of knowledge. Using the trusted “All-in-One” format, the book reviews every topic on the test and lays out the foundational knowledge, skills, and abilities necessary to be successful in an entry-level cybersecurity role. You will get historical and background information and technical details on core concepts as well as stories, discussions, and anecdotes from real-world cybersecurity experts. • Covers all exam domains established by the governing body, (ISC)2 • Online content includes 200+ practice questions in the customizable Total Tester exam engine • Written by a pair of cybersecurity experts and well-known authors
Write code that's clean, concise, and to the point: code that others will read with pleasure and reuse. Comparing your code to that of expert programmers is a great way to improve your coding skills. Get hands-on advice to level up your coding style through small and understandable examples that compare flawed code to an improved solution. Discover handy tips and tricks, as well as common bugs an experienced Java programmer needs to know. Make your way from a Java novice to a master craftsman. This book is a useful companion for anyone learning to write clean Java code. The authors introduce you to the fundamentals of becoming a software craftsman, by comparing pieces of problematic code with an improved version, to help you to develop a sense for clean code. This unique before-and-after approach teaches you to create clean Java code. Learn to keep your booleans in check, dodge formatting bugs, get rid of magic numbers, and use the right style of iteration. Write informative comments when needed, but avoid them when they are not. Improve the understandability of your code for others by following conventions and naming your objects accurately. Make your programs more robust with intelligent exception handling and learn to assert that everything works as expected using JUnit5 as your testing framework. Impress your peers with an elegant functional programming style and clear-cut object-oriented class design. Writing excellent code isn't just about implementing the functionality. It's about the small important details that make your code more readable, maintainable, flexible, robust, and faster. Java by Comparison teaches you to spot these details and trains you to become a better programmer. What You Need: You need a Java 8 compiler, a text editor, and a fresh mind. That's it.
There are many textbooks on algorithms focusing on big-O notation and basic design principles. This book offers a unique approach to taking the design and analyses to the level of predictable practical efficiency, discussing core and classic algorithmic problems that arise in the development of big data applications, and presenting elegant solutions of increasing sophistication and efficiency. Solutions are analyzed within the classic RAM model, and the more practically significant external-memory model that allows one to perform I/O-complexity evaluations. Chapters cover various data types, including integers, strings, trees, and graphs, algorithmic tools such as sampling, sorting, data compression, and searching in dictionaries and texts, and lastly, recent developments regarding compressed data structures. Algorithmic solutions are accompanied by detailed pseudocode and many running examples, thus enriching the toolboxes of students, researchers, and professionals interested in effective and efficient processing of big data.
This book offers a mathematical foundation for modern cryptography. It is primarily intended as an introduction for graduate students. Readers should have basic knowledge of probability theory, but familiarity with computational complexity is not required. Starting from Shannon's classic result on secret key cryptography, fundamental topics of cryptography, such as secret key agreement, authentication, secret sharing, and secure computation, are covered. Particular attention is drawn to how correlated randomness can be used to construct cryptographic primitives. To evaluate the efficiency of such constructions, information-theoretic tools, such as smooth min/max entropies and information spectrum, are developed. The broad coverage means the book will also be useful to experts as well as students in cryptography as a reference for information-theoretic concepts and tools.
Includes an entirely new chapter on AI and GIS, including ontologies and the Semantic Web, knowledge representation (KR) and spatial reasoning, machine learning and spatial analysis, and neural networks and deep learning. Presents new material reflecting the advances made in cloud computing, stream computing, and sensor networks, as well as extensively revised and updated content on cartography, visualization, and interaction design. Connects the technology to the social aspects and implications of GIS, including privacy and fair information practices, FATE (fairness, accountability, transparency, and ethics), and codes of conduct for responsible use of GIS. Integrates the necessary background to foundational areas, such as databases and data structures, algorithms and indexes, system architecture and AI, provided in context so readers new to those topics can still understand the concepts being discussed. Incorporates over 20 carefully explained spatial algorithms; over 60 inset boxes with in-depth material that enriches the central topics; and more than 300 color figures to support the reader in mastering key concepts. Welcomes a new coauthor, Qian (Chayn) Sun, to the third edition who brings her expertise in topics such as web mapping, cloud computing, critical geography, and machine learning with big spatial data.
This book provides new and seasoned users with step-by-step procedures on creating and modifying 3D models, working with cameras and lights, assigning materials to objects, rendering, and printing. Unlike many AutoCAD competitors, it uses both metric and imperial units to illustrate the myriad tools for this popular application. Use the companion CD to set up drawing exercises and projects and see all of the book's figures including color. AutoCAD 2021 3DModeling includes 50 'mini-workshops' that complete small projects from concept through actual plotting. Solving all of the workshops will simulate the creation of full projects (architectural and mechanical) from beginning to end, without overlooking any of the basic commands and functions in AutoCAD 2021. Features Provides new and seasoned users with step-by-step procedures on creating and modifying 3D models in both metric and imperial units CD can be used to set up in-text drawing exercises and projects and to see the book's figures in color
Since the late 1990s, Information and Communication Technologies (ICTs) have been hailed as a potentially revolutionary feature of the planning and management of Western cities. Economic regeneration and place promotion strategies have exploited these new technologies; city management has experimented with electronically distributed services, and participation in public life and democratic decision-making processes can be made more flexible by the use of ICTs. All of these technological initiatives have often been presented and accessed via an urban front-end information site known as 'digital city' or 'city network.' Illustrated by a range of European case studies, this volume examines the social, political and management issues and potential problems in the establishment of an electronic layer of information and services in cities. The book provides a better understanding of the direction European cities are going towards in the implementation of ICTs in the urban arena.
From humble evolutions in research papers and labs, artificial intelligence (AI)—which encompasses Machine Learning (ML) and Deep Learning (DL)—has matured in its many forms, infused in applications that can learn on their own and become progressively smarter with each interaction and transaction. Coupled with immense stores of data, maturity in CPU and GPU hardware, the invention of new, open source deep learning algorithms, and cloud technologies, operational AI has become available to the masses, setting the wheels in motion for a worldwide AI revolution that has never been seen before. This book attempts to help the reader on their AI journey by covering the concepts of AI, Machine Learning, and Deep Learning in its many forms; key ML and DL algorithms data scientists should learn; ethical challenges for the use of AI; how AI is being used across industries; possible future outlook for AI, and an AI Ladder to help accelerate the AI journey.
NEW YORK TIMES AND SUNDAY TIMES BUSINESS BESTSELLER SHORTLISTED FOR THE FT AND MCKINSEY BUSINESS BOOK OF THE YEAR AWARD 2019 'Reads more like a delicious page-turning novel...Put it on your holiday gift list for your favourite hedge-fund honcho' Bloomberg 'A compelling read' Economist 'Captivating' New York Times book review Jim Simons is the greatest moneymaker in modern financial history. His record bests those of legendary investors, including Warren Buffett, George Soros and Ray Dalio. Yet Simons and his strategies are shrouded in mystery. The financial industry has long craved a look inside Simons's secretive hedge fund, Renaissance Technologies and veteran Wall Street Journal reporter Gregory Zuckerman delivers the goods. After a legendary career as a mathematician and a stint breaking Soviet codes, Simons set out to conquer financial markets with a radical approach. Simons hired physicists, mathematicians and computer scientists - most of whom knew little about finance - to amass piles of data and build algorithms hunting for the deeply hidden patterns in global markets. Experts scoffed, but Simons and his colleagues became some of the richest in the world, their strategy of creating mathematical models and crunching data embraced by almost every industry today. As Renaissance became a major player in the financial world, its executives began exerting influence on other areas. Simons became a major force in scientific research, education and Democratic politics, funding Hilary Clinton's presidential campaign. While senior executive Robert Mercer is more responsible than anyone else for the Trump presidency - he placed Steve Bannon in the campaign, funded Trump's victorious 2016 effort and backed alt-right publication Breitbart. Mercer also impacted the success of the Brexit campaign as he made significant investments in Cambridge Anatlytica. For all his prescience, Simons failed to anticipate how Mercer's activity would impact his firm and the world. In this fast-paced narrative, Zuckerman examines how Simons launched a quantitative revolution on Wall Street, and reveals the impact that Simons, the quiet billionaire king of the quants, has had on worlds well beyond finance.
Exclusive title on the application of AI and Digital Technology in the Oil and Gas industry Explains Cloud Data Management in reservoir simulation Discussed intelligent oil and gas-well completion in detail Covers marketing aspect of oil and gas business during exploration phase Reviews development of digital system for business purpose
Explore the potentialand the pitfallsof digital technology in international business courses! Digital Technology in Teaching International Business will familiarize you with techniques that have proven effective in digitizing content or presenting traditional material in an untraditional way. You'll learn how to introduce digital technologies into bricks and mortar classrooms and how to construct an effective online learning environment. This timely and informative book discusses computer-mediated communication systems, shows how students can use the Internet to personally participate in international problem-solving exercises, presents a fascinating case study of a CLD program designed to address educational values, communication competencies, and business practices in former republics of the Soviet Union, and much more! Digital Technology in Teaching International Business outlines the challenges and demands of the knowledge-based economy and discusses the path that universities should follow in providing business students with the skills they need to succeed in this complex environment. It describes the implementation of Internet-based experiential projects in an international business classroom setting and summarizes students' perceptions and attitudes toward their assignments. In addition, it shows how to adapt experiential exercises from live courses for electronic application and examines ways in which electronic media can: increase the availabilityand reduce the costof interactive programs that connect students from distant locations complement or replace the traditional roles of textbooks and teachers promote more interactive learning enable faculty, students, scientists, technicians, entrepreneurs, and NGO leaders in separate locations to collaborate effectively help to overcome the developed-country bias present in many business strategy courses via specially designed courses and simulations of emerging economies aid in teaching financial reporting and the analysis of multinational enterprises address the traditional tradeoffs between richness (depth of knowledge) and reach (geographic area coverage)
BASED ON THE NO 1 HIT PODCAST 'The Lazarus Heist' 'You'll never see North Korea the same way again' Oliver Bullough, author of Moneyland 'One of the most incredible cyber-espionage stories I've ever heard' Jamie Bartlett, author of The Missing Crypto Queen 'Pacy and eye-popping' - Tom Burgis, author of Kleptopia They have been accused of causing mayhem in Hollywood with 2014's infamous Sony hack. They're allegedly behind WannaCry, a cyber-attack which brought NHS hospitals to a dangerous standstill. And it has been claimed that they have stolen more than $ 1bn in an international crime spree. They are the Lazarus Group, a shadowy cabal of hackers accused of working on behalf of the North Korean state. From the streets of Dhaka to the casinos of Macau to the secretive capital of Pyongyang, this shocking story uncovers the secret world of the Lazarus Group, their victims and those who have tried - and so far, failed - to stop them. 'Madly intriguing' Guardian
This updated edition of the Build Your Own Gaming PC Manual will help readers get the performance they want on a budget they can afford. Whether they want the cutting-edge technology or are just interested in streaming video of themselves playing the latest hit games, readers will find the guidance needed to make their perfect PC a reality. Regardless of if they are looking to upgrade an existing computer or build a new one from scratch, they'll be able to play the newest games in style and be ready to face the challenges of next year's hottest titles. The new edition includes information on virtual reality, along with all the latest software, accessories and video technology.
The authors bring a dual perspective--that of a practicing consultant and that of a professor of economics--to the complex strategic questions facing managers and corporate leaders who want their firms to get the most out of their investments in information technology. The information economy is built upon the myriad and sometimes unforeseen ways in which information technologies have become engines of productivity in themselves, rather than just fancy adjuncts. In explaining the rise of the information economy, the authors provide not only valuable context often missing from today's discussions but also a thorough understanding of the origination, development, and diffusion process of innovations. They also examine prevailing practices and implications for the future, including the potential pitfalls common to some information technology strategies. Relying on an underpinning of economic theory combined with heavy empirical analysis, Kudyba and Diwan describe the true nature of the information economy, paying as much attention to its particularities as to its more profound implications. How is information technology being implemented across industry sectors, and how can it be harnessed to improve overall firm-level productivity? How have innovations in high technology impacted e-commerce? Which e-commerce strategies prevail, and what can be expected of them? How can traditional economic theory help managers evaluate such in-vogue strategies as customer relationship management, market exchanges, and supply chain management? The authors answer these questions and more, including one of the most vexing in the short history of e-commerce: What led to the demise of so many technology stocksand dot-coms following the spring 2000 Nasdaq plunge, and what are the longer-term prospects for e-business?
Building a successful product usually involves teams of people, and many choose the Scrum approach to aid in creating products that deliver the highest possible value. Implementing Scrum gives teams a collection of powerful ideas they can assemble to fit their needs and meet their goals. The ninety-four patterns contained within are elaborated nuggets of insight into Scrumâ (TM)s building blocks, how they work, and how to use them. They offer novices a roadmap for starting from scratch, yet they help intermediate practitioners fine-tune or fortify their Scrum implementations. Experienced practitioners can use the patterns and supporting explanations to get a better understanding of how the parts of Scrum complement each other to solve common problems in product development. The patterns are written in the well-known Alexandrian form, whose roots in architecture and design have enjoyed broad application in the software world. The form organizes each pattern so you can navigate directly to organizational design tradeoffs or jump to the solution or rationale that makes the solution work. The patterns flow together naturally through the context sections at their beginning and end. Learn everything you need to know to master and implement Scrum one step at a time'the agile way.
In this stimulating analysis, Hannes Gerhardt outlines the potentials and challenges of a technology-enabled, commons-focused transition out of capitalism. The book shows that openness and cooperation are more beneficial in today’s economies and societies than competition and profit-seeking. Driven by this conviction, Gerhardt identifies key imperatives for overcoming capitalism, from democratizing our digital, material, and financial economies to maintaining a robust, political mobilization. Using clear examples, he explores tactical openings through the lens of ‘compeerism’, a newly constructed framework that highlights the latent counter-capitalist possibilities, but also limits, of our emerging technological landscape. This is an accessible contribution to counter-capitalist discourse that is both inspiring and pragmatic for academics and activists alike.
As part of the best-selling Pocket Primer series, this book provides an overview of the major concepts to program using TensorFlow 2. The focus of this book is on basic programming instructions used in machine learning and deep learning. Includes companion files with source code (in Python) and figures. FEATURES: Provides an overview of the most important TensorFlow programming techniques used for machine learning, deep learning, linear and logical regression, etc. Covers TensorFlow 2 and previous versions that run with TF2. Includes companion files with source code (in Python) and figures.
The Complete Guide to OpenACC for Massively Parallel Programming Scientists and technical professionals can use OpenACC to leverage the immense power of modern GPUs without the complexity traditionally associated with programming them. OpenACCTM for Programmers is one of the first comprehensive and practical overviews of OpenACC for massively parallel programming. This book integrates contributions from 19 leading parallel-programming experts from academia, public research organizations, and industry. The authors and editors explain each key concept behind OpenACC, demonstrate how to use essential OpenACC development tools, and thoroughly explore each OpenACC feature set. Throughout, you’ll find realistic examples, hands-on exercises, and case studies showcasing the efficient use of OpenACC language constructs. You’ll discover how OpenACC’s language constructs can be translated to maximize application performance, and how its standard interface can target multiple platforms via widely used programming languages. Each chapter builds on what you’ve already learned, helping you build practical mastery one step at a time, whether you’re a GPU programmer, scientist, engineer, or student. All example code and exercise solutions are available for download at GitHub. Discover how OpenACC makes scalable parallel programming easier and more practical Walk through the OpenACC spec and learn how OpenACC directive syntax is structured Get productive with OpenACC code editors, compilers, debuggers, and performance analysis tools Build your first real-world OpenACC programs Exploit loop-level parallelism in OpenACC, understand the levels of parallelism available, and maximize accuracy or performance Learn how OpenACC programs are compiled Master OpenACC programming best practices Overcome common performance, portability, and interoperability challenges Efficiently distribute tasks across multiple processors Register your product at informit.com/register for convenient access to downloads, updates, and/or corrections as they become available.
A collection of essays by over 40 experts, including leading writers Charles Handy and Don Tapscott, giving their personal vision of the future of information. Information here is given its widest meaning and includes such subjects as the Internet, electronic commerce, cybernetics, robotics, artificial intelligence, and even computers as fashion accessories. Information as a phenomenon pervades all areas of life and its evolution has consequences for everyone. Many of the papers have central themes such as the future of computer intelligence, library and information services, interactive Internet marketing, and networked learning in higher education. One paper links the technology enabling remote and online communication to the deconstruction of the corporation and the rise of flexible working. Professor Kevin Warwick writes about cybernetics and artificial intelligence, and describes an experiment involving a surgically implanted computer chip in his arm. Other papers deal with scholarly communication, smart houses and intelligent appliances. Two of the chapters are written as fiction, one by contemporary fantasy writer, Lise Leroux, who paints a menacing vision of human error in
In 2012, the United Nations General Assembly determined that affordable Internet access is a human right, critical to citizen participation in democratic governments. Given the significance of information and communication technologies (ICTs) to social and political life, many U.S. tribes and Native organizations have created their own projects, from streaming radio to building networks to telecommunications advocacy. In Network Sovereignty, Marisa Duarte examines these ICT projects to explore the significance of information flows and information systems to Native sovereignty, and toward self-governance, self-determination, and decolonization. By reframing how tribes and Native organizations harness these technologies as a means to overcome colonial disconnections, Network Sovereignty shifts the discussion of information and communication technologies in Native communities from one of exploitation to one of Indigenous possibility. |
You may like...
Costa Rica 2020
Organisation for Economic Cooperation and Development
Paperback
R1,144
Discovery Miles 11 440
A Streetcar Named Desire: York Notes for…
Hana Sambrook, Steve Eddy
Paperback
(1)R237 Discovery Miles 2 370
|