![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General
Discover the importance of learning C++ with Diane Zak's popular AN INTRODUCTION TO PROGRAMMING WITH C++, 8E. This book's distinctive emphasis clarifies how mastering C++ programming skills will benefit you now and throughout your career. This unique text incorporates a student-focused approach that continually highlights the importance and relevance of the programming concepts you are learning. Memorable new examples portray concepts in action, while abundant new hands-on exercises, including mini-quizzes, Labs, and "Try This" features, guide you in absorbing, practicing, and applying concepts as you progress. Trust AN INTRODUCTION TO PROGRAMMING WITH C++, 8E to keep you enthusiastic about learning as you master the skills of C++.
Investors recognize that technology is a powerful tool for obtaining and interpreting financial data that could give them the one thing everyone on Wall Street wants: an edge. Yet, many don’t realize that you don’t need to be a programmer to access behind-the-scenes financial information from Bloomberg, IHS Markit, or other systems found at most banks and investment firms. This practical guide teaches analysts a useful subset of Excel skills that will enable them to access and interpret financial information—without any prior programming experience. This book will show analysts, step-by-step, how to quickly produce professional reports that combine their views with Bloomberg or Markit data including historical financials, comparative analysis, and relative value. For portfolio managers, this book demonstrates how to create professional summary reports that contain a high-level view of a portfolio’s performance, growth, risk-adjusted return, and composition. If you are a programmer, this book also contains a parallel path that covers the same topics using C#. Topics include: Access additional data that isn’t visible on Bloomberg screens Create tables containing corporate data that makes it possible to compare multiple companies, bonds, or loans side-by- side Build one-page analytic (“Tear Sheet”) reports for individual companies that incorporates important financials, custom notes, relative value comparison of the company to its peers, and price trends with research analyst targets Build two-page portfolio summary report that contains a high-level view of the portfolio’s performance, growth, risk-adjusted return, and composition Explore daily prices and facility information for most of the tradable corporate bond and loan market Determine the relationship between two securities (or index) using correlation and regression Compare each security’s performance to a cohort made of up of securities with similar risk and return characteristics Measure portfolio risk-adjusted return by calculating variance, standard deviation, and Sharpe ratio Use Markit data to identify meaningful trends in prices, new issue spreads, and refinancings
From Business Strategy to IT Action gives companies of all sizes
the tools to effectively link IT to business strategy and produce
effective, actionable strategies for bottom-line results. The
authors present CEOs, CFOs, CIOs, and IT managers with a powerful
and accessible resource packed with such useful material as:
BASED ON THE NO 1 HIT PODCAST 'The Lazarus Heist' 'You'll never see North Korea the same way again' Oliver Bullough, author of Moneyland 'One of the most incredible cyber-espionage stories I've ever heard' Jamie Bartlett, author of The Missing Crypto Queen 'Pacy and eye-popping' - Tom Burgis, author of Kleptopia They have been accused of causing mayhem in Hollywood with 2014's infamous Sony hack. They're allegedly behind WannaCry, a cyber-attack which brought NHS hospitals to a dangerous standstill. And it has been claimed that they have stolen more than $ 1bn in an international crime spree. They are the Lazarus Group, a shadowy cabal of hackers accused of working on behalf of the North Korean state. From the streets of Dhaka to the casinos of Macau to the secretive capital of Pyongyang, this shocking story uncovers the secret world of the Lazarus Group, their victims and those who have tried - and so far, failed - to stop them. 'Madly intriguing' Guardian
Physics forms the basis for many of the motions and behaviors seen in both the real world and in the virtual worlds of animated films, visual effects, and computer games. By describing the underlying physical principles and then creating simulations based on these principles, these computer-generated worlds are brought to life. Physically Based Modeling and Animation goes behind the scenes of computer animation and details the mathematical and algorithmic foundations that are used to determine the behavior underlying the movement of virtual objects and materials. Dr. Donald House and Dr. John Keyser offer an approachable, hands-on view of the equations and programming that form the foundations of this field. They guide readers from the beginnings of modeling and simulation to more advanced techniques, enabling them to master what they need to know in order to understand and create their own animations Emphasizes the underlying concepts of the field, and is not tied to any particular software package, language, or API. Develops concepts in mathematics, physics, numerical methods, and software design in a highly integrated way, enhancing both motivation and understanding. Progressively develops the material over the book, starting from very basic techniques, and building on these to introduce topics of increasing complexity. Motivates the topics by tying the underlying physical and mathematical techniques directly to applications in computer animation.
YouTube's most successful purveyor of computer nostalgia brings those stories to print. This book celebrates the most exciting period in the history of technology - the arrival of the home computer and home gaming console. For a time, an exciting and ever-changing array of different companies fought for supremacy, leaving a lasting legacy of great gameplay and surreal design we'll never experience again. Features screenshots of nostalgic games that will bring joy to the heart of anyone who grew up in the 80s or early 90s, alongside stunning studio photography of the computers that imprinted themselves on a generation's minds
This enthusiastic introduction provides support for Excel beginners and focuses on using the program immediately for maximum efficiency. With 1,104 screenshots and explicit information on everything from rows, columns, and cells to subtotaling, sorting, and pivot tables, this guide aims to alleviate the frustrations that come with using the program for the first time. This manual offers strategies for avoiding problems and streamlining efficiency and assists readers from start to finish, turning Excel 2010 novices into experts.
From technologist and strategist Brian Evergreen, a bold new agenda for the role of organizational leaders in creating a more human future with technology Social good initiatives are incompatible with the current network of systems that make up and support the private and public sectors. Millions of dollars have been invested in bringing leaders together from organizations around the world to design solutions for global challenges such as the climate crisis, child labor, racism, war, and many more. Despite executive buy-in, alignment of core capabilities and resources, passionate leadership, and well-designed strategies, these initiatives inevitably fail (with a few, notable exceptions). The dawn of the Internet ignited a global redesign and rebuild of the interlocking systems that make up and support the private and public sectors today. The era of Digital Transformation extended this further through the adoption of cloud technologies and distributed computing. With a recent wave of technological advancements, organizations have arrived at another global redesign and rebuilding of the network of systems that make up society: Autonomous Transformation, revealing an opportunity for leaders to create Profitable Good through systemic design in combination with emerging autonomous technologies and surprising and remarkable partnerships. Autonomous Transformation provides a blueprint for leaders and managers who have aspired or attempted to harness artificial intelligence and its adjacent technologies for the betterment of their organization and the world, weaving strategy, business, economics, systemic design, and philosophy into four actionable steps with accompanying frameworks: Clear the Digital Fog See the Systems Choose a Problem Future Design Inevitability
Here is a book containing information about more than 500 Web sites about dinosaurs. Sites are rated for quality and cross-referenced by type, level of complexity, and availability of special features.
Haunted Data explores the concepts that are at work in our complex relationships with data. Our engagement with data - big or small - is never as simplistic or straightforward as might first appear. Indeed, Blackman argues that our relationship with data is haunted with errors, dead ends, ghostly figures, and misunderstandings that challenge core assumptions about the nature of thought, consciousness, mind, cognition, affect, communication, control and rationality, both human and non-human. Using contemporary controversies from 'weird science' including the field of priming and its uncanny relations to animal telepathy, as well as artificial intelligences and their curious relation to psychic research ('clairvoyant computers'), Blackman shows how some of the current crises in science in these areas reveal more than scientists are willing or even able to acknowledge. In addition to proposing a new theory of how we might engage with data, Haunted Data also provides a nuanced survey of the historical context to contemporary debates, going back to the 19th Century origins of modern computation and science to explain the ubiquity and oddness of our data relations. Drawing from radical philosophies of science, feminist science studies, queer theory, cultural studies, and the field of affect studies, the book develops a manifesto for how artists, philosophers and scientists might engage creatively and critically with science within the context of digital communication.
Design systems optimized for deep learning models. Written for software engineers, this book teaches you how to implement a maintainable platform for developing deep learning models. In Engineering Deep Learning Systems you will learn how to: Transfer your software development skills to deep learning systems Recognize and solve common engineering challenges for deep learning systems Understand the deep learning development cycle Automate training for models in TensorFlow and PyTorch Optimize dataset management, training, model serving and hyperparameter tuning Pick the right open-source project for your platform Engineering Deep Learning Systems is a practical guide for software engineers and data scientists who are designing and building platforms for deep learning. It’s full of hands-on examples that will help you transfer your software development skills to implementing deep learning platforms. You’ll learn how to build automated and scalable services for core tasks like dataset management, model training/serving, and hyperparameter tuning. This book is the perfect way to step into an exciting—and lucrative—career as a deep learning engineer. about the technology Behind every deep learning researcher is a team of engineers bringing their models to production. To build these systems, you need to understand how a deep learning system’s platform differs from other distributed systems. By mastering the core ideas in this book, you’ll be able to support deep learning systems in a way that’s fast, repeatable, and reliable.
Nioh is brutal action game series from Team NINJA and Koei Tecmo Games. In the age of samurai, a lone traveler lands on the shores of Japan. He must fight his way through the vicious warriors and supernatural Yokai that infest the land in order to find that which he seeks. Nioh & Nioh 2: Official Artworks collects the fantastic artwork behind the challenging video game franchise. Included are character artwork, monster designs, key art, rough concepts and more! Plus, dive deep into the world of Nioh through detailed character profiles and a complete guide to the weapons, armor, and items of the games.
Online algorithms are a rich area of research with widespread applications in scheduling, combinatorial optimization, and resource allocation problems. This lucid textbook provides an easy but rigorous introduction to online algorithms for graduate and senior undergraduate students. In-depth coverage of most of the important topics is presented with special emphasis on elegant analysis. The book starts with classical online paradigms like the ski-rental, paging, list-accessing, bin packing, where performance of online algorithms is studied under the worst-case input and moves on to newer paradigms like 'beyond worst case', where online algorithms are augmented with predictions using machine learning algorithms. The book goes on to cover multiple applied problems such as routing in communication networks, server provisioning in cloud systems, communication with energy harvested from renewable sources, and sub-modular partitioning. Finally, a wide range of solved examples and practice exercises are included, allowing hands-on exposure to the concepts.
Contrary to popular myth, we do not yet live in the “Information Age.” At best, we live the “Data Age,” obsessed with the production, collection, storage, dissemination, and monetization of digital data. But data, in and of itself, isn’t valuable. Data only becomes valuable when we make sense of it. We rely on “information professionals” to help us understand data, but most fail in their efforts. Why? Not because they lack intelligence or tools, but mostly because they lack the necessary skills. Most information professionals have been trained primarily in the use of data analysis tools (Tableau, PowerBI, Qlik, SAS, Excel, R, etc.), but even the best tools are only useful in the hands of skilled individuals. Anyone can pick up a hammer and pound a nail, but only skilled carpenters can use a hammer to build a reliable structure. Making sense of data is skilled work, and developing those skills requires study and practice. Weaving data into understanding involves several distinct but complementary thinking skills. Foremost among them are critical thinking and scientific thinking. Until information professionals develop these capabilities, we will remain in the dark ages of data. This book is for information professionals, especially those who have been thrust into this important work without having a chance to develop these foundational skills. If you’re an information professional and have never been trained to think critically and scientifically with data, this book will get you started. Once on this path, you’ll be able to help usher in an Information Age worthy of the name.
Get practical walkthroughs for the most useful Excel features Looking for easy-to-understand, practical guidance on how to go from Excel newbie to number crunching pro? Excel Workbook For Dummies is the hands-on tutorial you've been waiting for. This step-by-step guide is packed with exercises that walk you through the basic and advanced functions and formulas included in Excel. At your own speed, you'll learn how to enter data, format your spreadsheet, and apply the mathematical and statistical capabilities of the program. Work through the book from start to finish or, if you'd prefer, jump right to the section that's giving you trouble, whether that's data visualization, macros, analysis, or anything else. You can also: Brush up on and practice time-saving keyboard shortcuts for popular commands and actions Get a handle on multi-functional and practical pivot tables with intuitive practice exercises Learn to secure your data with spreadsheet password protections Perfect for new users of Excel, Excel Workbook For Dummies is also the ideal resource for those who know their way around a spreadsheet but need a refresher on some of the more advanced features of this powerful program.
An effective Chief Technology Officer shapes almost every aspect of a modern business. This book shares the experience and advice of veteran CTOs and industry experts for handling IT crises, leading tech teams, and creating an inspiring vision for your company. In Think Like a CTO you will learn: Effective interaction and relationship building with other C-level executives Creating long term visions and executing on short term goals Interviewing, hiring, and terminating team members Negotiating salaries and managing promotions Architecting future proofed systems Handling security breaches and ransomware attacks Putting together budgets and working with your CFO Identifying and managing outsourced vendor opportunities Managing and communicating bad news by leading with data, not passion Being the kind of leader that employees want to follow and emulate Becoming a CTO is an incredible accomplishment. It’s also one of the hardest transitions a technologist can make. This high-power and high-pressure role demands skills that are rarely developed as a software engineer. Think Like a CTO shines a light on all the areas an aspiring CTO needs to master to succeed. You’ll learn how to build incredible working relationships with the rest of the C-suite, transform a company with private equity, and recruit and manage your development team. With this book as your guide, you’ll quickly become a trusted leader figure with an inspiring vision for your company. about the technology Every modern company is a technology company, and that makes the CTO one of the most important leaders in an organization. The CTO must plan a company’s technology vision, build and lead the team to get it done, and effectively interact with business leaders, clients, and investors. A highly effective CTO is vital for a company’s continued growth and success. This book will show you how to be that CTO. about the reader For technology leaders working in or aspiring towards a CTO role.
This book contains revised selected papers from the 18th International Conference on Membrane Computing, CMC 2017, held in Bradford, UK, in July 2017. The 18 full papers presented in this volume were carefully reviewed and selected from 29 submissions. They deal with membrane computing (P systems theory), an area of computer science aiming to abstract computing ideas and models from the structure and the functioning of living cells, as well as from the way the cells are organized in tissues or higher order structures. The volume also contains 2 invited talks.
Designed to provide you with the knowledge and skills needed to protect your technology devices from increasingly sophisticated cyberattacks, SECURITY AWARENESS: APPLYING PRACTICAL CYBERSECURITY IN YOUR WORLD, 6th EDITION continues to present the same practical information that has made previous editions so popular. For most students, practical cybersecurity poses daunting challenges: Do I need antivirus software? How can I manage all my passwords? Can I prevent a ransomware attack? Is there a way to make my Web browser secure? What are patches? This text is designed to help you understand the answers to these questions and to protect your devices and even Wi-Fi networks from cyberattacks. In addition, hands-on projects and case studies give you the opportunity to test your knowledge and apply what you have learned.
Are you trying to figure out how to safely use social media but finding yourself struggling? Here’s a book specifically designed to help regular people figure out social media platforms. It begins with a chapter about social media basics: how they normally work, why people use them, and general safety tips. It is easy to get confused by the large number of options that are out there so this book breaks down each major network into its own chapter. Chapters are included for: ·Facebook ·Snapchat ·Pinterest ·LinkedIn ·Instagram ·YouTube ·Twitter ·Reddit, and ·Tumblr. Because each social media platform has its their own rules, benefits, and challenges, each chapter gives a summary of the platform and tells the reader why people use it. Next, each chapter has a glossary of terms to explain language and slang that are used. This will help people who are new to social media learn about terminology like subreddits, retweets, and more. If readers decide to use the platform (or already use it and want to learn more), each chapter guides users through a “how-to” of using each platform. This includes the basic functionality, setting up profiles, settings, and odd features that even current users may not know about. Privacy and safety are also covered, with a platform-specific section devoted to these important issues in each chapter. Two final chapters cover other notable social media platforms that readers might want to know about and archiving tips for saving social media posts and information. This book can help people new to social media, people joining new social media, and people who are already on but want to learn how to better manage and protect their accounts.
This book is both a reference for engineers and scientists and a teaching resource, featuring tutorial chapters and research papers on feature extraction. Until now there has been insufficient consideration of feature selection algorithms, no unified presentation of leading methods, and no systematic comparisons.
Learn to write C++ programs by interfacing a computer to a wide range of popular and fundamental real-world technologies. Unique and original approach to use the PC to do real things- not just number crunching and graphics – but writing programs to interact with the outside world. Learn C++ programming in an enjoyable and powerful way. Includes a purpose-designed circuit board
Fuzzy Cognitive Maps (FCM) constitute cognitive models in the form of fuzzy directed graphs consisting of two basic elements: the nodes, which basically correspond to “concepts” bearing different states of activation depending on the knowledge they represent, and the “edges” denoting the causal effects that each source node exercises on the receiving concept expressed through weights. Weights take values in the interval [-1,1], which denotes the positive, negative or neutral causal relationship between two concepts. An FCM can be typically obtained through linguistic terms, inherent to fuzzy systems, but with a structure similar to the neural networks, which facilitates data processing, and has capabilities for training and adaptation. During the last 10 years, an exponential growth of published papers in FCMs was followed showing great impact potential. Different FCM structures and learning schemes have been developed, while numerous studies report their use in many contexts with highly successful modeling results. The aim of this book is to fill the existing gap in the literature concerning fundamentals, models, extensions and learning algorithms for FCMs in knowledge engineering. It comprehensively covers the state-of-the-art FCM modeling and learning methods, with algorithms, codes and software tools, and provides a set of applications that demonstrate their various usages in applied sciences and engineering.
This book is devoted to a novel approach for dimensionality reduction based on the famous nearest neighbor method that is a powerful classification and regression approach. It starts with an introduction to machine learning concepts and a real-world application from the energy domain. Then, unsupervised nearest neighbors (UNN) is introduced as efficient iterative method for dimensionality reduction. Various UNN models are developed step by step, reaching from a simple iterative strategy for discrete latent spaces to a stochastic kernel-based algorithm for learning submanifolds with independent parameterizations. Extensions that allow the embedding of incomplete and noisy patterns are introduced. Various optimization approaches are compared, from evolutionary to swarm-based heuristics. Experimental comparisons to related methodologies taking into account artificial test data sets and also real-world data demonstrate the behavior of UNN in practical scenarios. The book contains numerous color figures to illustrate the introduced concepts and to highlight the experimental results. |
You may like...
Advances in Electromagnetics Empowered…
Sawyer D. Campbell, Douglas H. Werner
Hardcover
R3,522
Discovery Miles 35 220
Principles Of Business Information…
Ralph Stair, George Reynolds, …
Paperback
(1)
Digital Libraries - Integrating Content…
Mark V Dahl, Kyle Banerjee, …
Paperback
R1,150
Discovery Miles 11 500
|