![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General
Agents are computational systems that are capable of autonomous, reactive and proactive behaviour, and are also able to interact with each other. The application of agents in e-Commerce is one of the fastest-growing and most exciting areas of computer science. This emerging technology is enabling individuals and businesses to take advantage of the new and powerful medium of the World Wide Web. "Agent Technology for e-Commerce" introduces the main theory behind and the applications of agent technology in e-Commerce in a way that is accessible to students with a basic background in computer science. Bringing together economics, game theory and multi-agent systems in a clear and accessible way, this book offers an introduction to agent technology and architectures, as well as providing more in-depth coverage of subjects such as negotiation, auctions, bargaining, voting protocols and coalition formation. Mobile agents and issues of trust and security are also addressed. Containing exercises and topics for discussion, this book is ideal for classroom use or self-study, and will be of considerable interest to computing and IT professionals who wish explore the fast-moving discipline of agent technology for e-Commerce.
Whether you want to automate tasks, analyze data, parse logs, talk to network services, or address other systems requirements, writing your own command-line tool may be the fastest - and perhaps the most fun - way to do it. The Go programming language is a great choice for developing tools that are fast, reliable, and cross-platform. Create command-line tools that work with files, connect to services, and even manage external processes, all while using tests and benchmarks to ensure your programs are fast and correct. When you want to develop cross platform command-line tools that are fast and reliable, use Go, a modern programming language that combines the reliability of compiled languages with the ease of use and flexibility of dynamic typed languages. Work through practical examples to develop elegant and efficient tools by applying Go's rich standard library, its built in support for concurrency, and its expressive syntax. Use Go's integrated testing capabilities to automatically test your tools, ensuring they work reliably even across code refactoring. Develop CLI tools that interact with your users by using common input/output patterns, including environment variables and flags. Handle files to read or persist data, and manipulate paths consistently in cross-platform scenarios. Control processes and handle signals, and use a benchmark driven approach and Go's concurrency primitives to create tools that perform well. Use powerful external libraries such as Cobra to create modern and flexible tools that handle subcommands, and develop tools that interact with databases, APIs, and network services. Finally, leverage what you learned by tackling additional challenges at the end of each chapter. What You Need: Go 1.8 or higher, an internet connection to download the example files and additional libraries, and a text editor to write your programs.
You've seen the movie, now PLAY the movie! Long before gaming came to the big screen, cinema arrived in the homes of millions in the form of licensed video games; playable merchandise that tied in to some of the major tentpoles of cinematic history. Many of these games followed the storylines of the movies on which they were based, as well as providing supplementary adventures to major franchises. Collected in this book are some of the biggest games to come from Hollywood adventures during the '80s and '90s. In this comprehensive book, you'll find over 300 games across 18 chapters, with sections dedicated to major movie franchises such as Star Wars, Jurassic Park, Top Gun, Pixar, Aliens and Indiana Jones, along with nearly 200 full-colour screenshots of major releases. Showcasing the highs and lows of early computer gaming through the 16-bit era and onto the advent of 3D console gaming, A Guide to Movie Based Video Games: 1982 - 2000 covers two decades of video games with trivia, analysis and recommendations. Grab your controller, step into the silver screen and get ready to play!
Java developers usually tackle the complexity of software development through object-oriented programming (OOP). But not every problem is a good match for OOP. The functional programming (FP) paradigm offers you another approach to solving problems, and Java provides easy-to-grasp FP tools such as lambdas and streams. If you're interested in applying FP concepts to your Java code, this book is for you. Author Ben Weidig highlights different aspects of functional programming and shows you how to incorporate them in your code without going "fully functional." You'll learn how, when, and why to use FP concepts such as immutability and pure functions to write more concise, reasonable, and future-proof code. Many developers seek to expand their horizons by using OOP and FP together. It's no longer either-or; it's both. In two parts, this book includes: A Functional Approach: Get a high-level overview of functional programming, including the types already available to Java developers. Then explore different FP concepts and learn how to use them. Real-World Problems, Patterns, and Recipes: Apply what you've learned in part one to the typical real-world problems you might encounter in your daily work.
Data is getting bigger and more complex by the day, and so are your choices in handling it. Explore some of the most cutting-edge databases available - from traditional relational databases to newer NoSQL approaches - and make informed decisions about challenging data storage problems. This is the only comprehensive guide to the world of NoSQL databases, with in-depth practical and conceptual introductions to seven different technologies: Redis, Neo4J, CouchDB, MongoDB, HBase, Postgres, and DynamoDB. This second edition includes a new chapter on DynamoDB and updated content for each chapter. While relational databases such as MySQL remain as relevant as ever, the alternative, NoSQL paradigm has opened up new horizons in performance and scalability and changed the way we approach data-centric problems. This book presents the essential concepts behind each database alongside hands-on examples that make each technology come alive. With each database, tackle a real-world problem that highlights the concepts and features that make it shine. Along the way, explore five database models - relational, key/value, columnar, document, and graph - from the perspective of challenges faced by real applications. Learn how MongoDB and CouchDB are strikingly different, make your applications faster with Redis and more connected with Neo4J, build a cluster of HBase servers using cloud services such as Amazon's Elastic MapReduce, and more. This new edition brings a brand new chapter on DynamoDB, updated code samples and exercises, and a more up-to-date account of each database's feature set. Whether you're a programmer building the next big thing, a data scientist seeking solutions to thorny problems, or a technology enthusiast venturing into new territory, you will find something to inspire you in this book. What You Need: You'll need a *nix shell (Mac OS or Linux preferred, Windows users will need Cygwin), Java 6 (or greater), and Ruby 1.8.7 (or greater). Each chapter will list the downloads required for that database.
Dieser Band der „Bibliothek der Mediengestaltung“ behandelt die Schrifterkennung und Schriftklassifikation, die Lesbarkeit von Schrift und den gestalterischen und technischen Einsatz von Schriften. Außerdem werden die Schrifttechnologie und die Verwaltung von Schriften thematisiert. Für diese Bibliothek wurden die Themen des Kompendiums der Mediengestaltung neu strukturiert, vollständig überarbeitet und in ein handliches Format gebracht. Leitlinien waren hierbei die Anpassung an die Entwicklungen in der Werbe- und Medienbranche sowie die Berücksichtigung der aktuellen Rahmenpläne und Studienordnungen sowie Prüfungsanforderungen der Ausbildungs- und Studiengänge. Die Bände der „Bibliothek der Mediengestaltung“ enthalten zahlreiche praxisorientierte Aufgaben mit Musterlösungen und eignen sich als Lehr- und Arbeitsbücher an Schulen sowie Hochschulen und zum Selbststudium.
Includes an entirely new chapter on AI and GIS, including ontologies and the Semantic Web, knowledge representation (KR) and spatial reasoning, machine learning and spatial analysis, and neural networks and deep learning. Presents new material reflecting the advances made in cloud computing, stream computing, and sensor networks, as well as extensively revised and updated content on cartography, visualization, and interaction design. Connects the technology to the social aspects and implications of GIS, including privacy and fair information practices, FATE (fairness, accountability, transparency, and ethics), and codes of conduct for responsible use of GIS. Integrates the necessary background to foundational areas, such as databases and data structures, algorithms and indexes, system architecture and AI, provided in context so readers new to those topics can still understand the concepts being discussed. Incorporates over 20 carefully explained spatial algorithms; over 60 inset boxes with in-depth material that enriches the central topics; and more than 300 color figures to support the reader in mastering key concepts. Welcomes a new coauthor, Qian (Chayn) Sun, to the third edition who brings her expertise in topics such as web mapping, cloud computing, critical geography, and machine learning with big spatial data.
Discover the new cybersecurity landscape of the interconnected software supply chain In Software Transparency: Supply Chain Security in an Era of a Software-Driven Society, a team of veteran information security professionals delivers an expert treatment of software supply chain security. In the book, you’ll explore real-world examples and guidance on how to defend your own organization against internal and external attacks. It includes coverage of topics including the history of the software transparency movement, software bills of materials, and high assurance attestations. The authors examine the background of attack vectors that are becoming increasingly vulnerable, like mobile and social networks, retail and banking systems, and infrastructure and defense systems. You’ll also discover: Use cases and practical guidance for both software consumers and suppliers Discussions of firmware and embedded software, as well as cloud and connected APIs Strategies for understanding federal and defense software supply chain initiatives related to security An essential resource for cybersecurity and application security professionals, Software Transparency will also be of extraordinary benefit to industrial control system, cloud, and mobile security professionals.
Free and open source is the foundation of software development, and it's built by people just like you. Discover the fundamental tenets that drive the movement. Take control of your career by selecting the right project to meet your professional goals. Master the language and avoid the pitfalls that typically ensnare new contributors. Join a community of like-minded people and change the world. Programmers, writers, designers, and everyone interested in software will make their mark through free and open source software contributions. Free and open source software is the default choice for the programming languages and technologies which run our world today, and it's all built and maintained by people just like you. No matter your skill level or area of expertise, with this book you will contribute to free and open source software projects. Using this practical approach you'll understand not only the mechanics of contributing, but also how doing so helps your career as well as the community. This book doesn't assume that you're a programmer, or even that you have prior experience with free and open source software. Learn what open source is, where it came from, and why it's important. Start on the right foot by mastering the structure and tools you need before you contribute. Choose the right project for you, amplifying the impact of your contribution. Submit your first contribution, whether it's code, writing, design, or community organising. Find out what to do when things don't go the way you expect. Discover how to start your own project and make it friendly and welcoming to contributors. Anyone can contribute! Make your mark today and help others while also helping yourself.
Write code that's clean, concise, and to the point: code that others will read with pleasure and reuse. Comparing your code to that of expert programmers is a great way to improve your coding skills. Get hands-on advice to level up your coding style through small and understandable examples that compare flawed code to an improved solution. Discover handy tips and tricks, as well as common bugs an experienced Java programmer needs to know. Make your way from a Java novice to a master craftsman. This book is a useful companion for anyone learning to write clean Java code. The authors introduce you to the fundamentals of becoming a software craftsman, by comparing pieces of problematic code with an improved version, to help you to develop a sense for clean code. This unique before-and-after approach teaches you to create clean Java code. Learn to keep your booleans in check, dodge formatting bugs, get rid of magic numbers, and use the right style of iteration. Write informative comments when needed, but avoid them when they are not. Improve the understandability of your code for others by following conventions and naming your objects accurately. Make your programs more robust with intelligent exception handling and learn to assert that everything works as expected using JUnit5 as your testing framework. Impress your peers with an elegant functional programming style and clear-cut object-oriented class design. Writing excellent code isn't just about implementing the functionality. It's about the small important details that make your code more readable, maintainable, flexible, robust, and faster. Java by Comparison teaches you to spot these details and trains you to become a better programmer. What You Need: You need a Java 8 compiler, a text editor, and a fresh mind. That's it.
This book will help its readers to learn the first step of R statistics as it will help its readers to sit before the computer and to enter the commands, Practice makes perfect and the best way to learn R is to work with it and ask questions when you don't get the results.
A highly contentious, very readable and totally up-to-the-minute investigation of women's natural relationship with modern technology, an association which, Plant argues, will trigger a new sexual revolution. Zeros and Ones is an intelligent, provocative and accessible investigation of the intersection between women, feminism, machines and in particular, information technology. Arguing that the computer is rewriting the old conceptions of man and his world, it suggests that the telecoms revolution is also a sexual revolution which undermines the fundamental assumptions crucial to patriarchal culture. Historical, contemporary and future developments in telecommunications and in IT are interwoven with the past, present and future of feminism, women and sexual difference, and a wealth of connections, parallels and affinities between machines and women are uncovered as a result. Challenging the belief that man was ever in control of either his own agency, the planet, or his machines, this book argues it is seriously undermined by the new scientific paradigms emergent from theories of chaos, complexity and connectionism, all of which suggest that the old distinctions between man, woman, nature and technology need to be radically reassessed.
Exclusive title on the application of AI and Digital Technology in the Oil and Gas industry Explains Cloud Data Management in reservoir simulation Discussed intelligent oil and gas-well completion in detail Covers marketing aspect of oil and gas business during exploration phase Reviews development of digital system for business purpose
A practical collection of the most important Python techniques. For beginning to intermediate Python programmers. Python How-To by Yong Cui, walks you through the most important coding techniques in Python. Whether you are doing data science, building web applications, or writing admin scripts, you will find answers to your “how-to†questions in this book. Author Yong Cui's clear and practical writing is perfect for beginners and veterans alike, with insightful code snippets, interesting graphics, and challenging exercises. Python How-To includes over 60 detailed answers to questions like: How do I join and split strings? How do I access dictionary keys, values, and items? How do I set and use the return value in function calls? How do I process JSON data? How do I create lazy attributes to improve performance? How do I change variables in a different namespace? ... and much more Along the way, you will also learn how to take advantage of Python's versatile tools and libraries. About the technology No matter where you are on your Python journey, you will run into situations where you ask yourself: “How do I do that?†This book provides concrete answers to the most common questions in areas such as manipulating text, working with collections, managing objects and functions, file management, etc.
Functional programming is becoming a required skill for all programmers, and for good reason. The functional style of programming lets developers to write more concise code, which tends to have fewer bugs. Functional Programming in C++ teaches developers the practical side of functional programming and what tools C++ provides to develop software in the functional style.  KEY FEATURES • Practical-guide • Hands-on examples • Step-by-step instructions This book is for developers who have worked professionally with C++ for 2 or more years.  ABOUT THE TECHNOLOGY Broadly speaking, Functional Programming is a style of programming where the main programming building blocks are functions, as opposed to objects and procedures.  AUTHOR BIO Ivan Čukić has been teaching modern C++ techniques and functional programming at the Faculty of Mathematics in Belgrade for 6 years and has been using C++ for more than 15 years. He has been researching functional programming in C++ before and during his PhD studies, and uses the techniques in real-world projects. He is one of the core developers in KDE, the largest free/libre open source C++ project.
Value-Driven Data explains how data and business leaders can co-create and deploy data-driven solutions for their organizations. Value-Driven Data explores how organizations can understand their problems and come up with better solutions, aligning data storytelling with business needs. The book reviews the main challenges that plague most data-to-business interactions and offers actionable strategies for effective data value implementation, including methods for tackling obstacles and incentivizing change. Value-Driven Data is supported by tried-and-tested frameworks that can be applied to different contexts and organizations. It features cutting-edge examples relating to digital transformation, data strategy, resolving conflicts of interests, building a data P&L and AI value prediction methodology. Recognizing different types of data value, this book presents tangible methodologies for identifying, capturing, communicating, measuring and deploying data-enabled opportunities. This is essential reading for data specialists, business stakeholders and leaders involved in capturing and executing data value opportunities for organizations and for informing data value strategies.
Atari’s 1981 arcade hit Tempest was a “tube shooter†built around glowing, vector-based geometric shapes. Among its many important contributions to both game and cultural history, Tempest was one of the first commercial titles to allow players to choose the game’s initial play difficulty (a system Atari dubbed “SkillStepâ€), a feature that has since became standard for games of all types. Tempest was also one of the most aesthetically impactful games of the twentieth century, lending its crisp, vector aesthetic to many subsequent movies, television shows, and video games. In this book, Ruggill and McAllister enumerate and analyze Tempest’s landmark qualities, exploring the game’s aesthetics, development context, and connections to and impact on video game history and culture. By describing the game in technical, historical, and ludic detail, they unpack the game’s latent and manifest audio-visual iconography and the ideological meanings this iconography evokes.
Up-to-date practice questions that cover every topic on the 2022 version of the CISM exam Take the current version of the challenging CISM exam with complete confidence using the detailed information contained in this fully updated self-study guide. Written by an expert in the field, the book features hundreds of practice exam questions that match those on the live test in content, format, tone, and feel. In-depth answer explanations are provided for both the correct and incorrect answer choices. CISM Certified Information Security Manager Practice Exams, Second Edition supplements the CISM All-in-One Exam Guide and completely covers every objective of the 2022 exam release. In total, the book contains more than 300 realistic practice questions. •  Offers 100% coverage of all four CISM exam domains •  Online content includes access to an additional 150 practice questions in the TotalTester Online customizable test   engine •  Written by a computer security expert, author, and lecturer
Printed in full color.Software development happens in your head. Not in an editor, IDE, or designtool. You're well educated on how to work with software and hardware, but what about "wetware"--our own brains? Learning new skills and new technology is critical to your career, and it's all in your head.In this book by Andy Hunt, you'll learn how our brains are wired, and how to take advantage of your brain's architecture. You'll learn new tricks and tipsto learn more, faster, and retain more of what you learn.You need a pragmatic approach to thinking and learning. You need to "Refactor Your Wetware."Programmers have to learn constantly; not just the stereotypical new technologies, but also the problem domain of the application, the whims of the user community, the quirks of your teammates, the shifting sands of the industry, and the evolving characteristics of the project itself as it is built. We'll journey together through bits of cognitive and neuroscience, learning and behavioral theory. You'll see some surprising aspects of how our brains work, and how you can take advantage of the system to improve your own learning and thinking skills. In this book you'll learn how to: Use the Dreyfus Model of Skill Acquisition to become more expertLeverage the architecture of the brain to strengthen different thinking modesAvoid common "known bugs" in your mindLearn more deliberately and more effectivelyManage knowledge more efficiently
Since the late 1990s, Information and Communication Technologies (ICTs) have been hailed as a potentially revolutionary feature of the planning and management of Western cities. Economic regeneration and place promotion strategies have exploited these new technologies; city management has experimented with electronically distributed services, and participation in public life and democratic decision-making processes can be made more flexible by the use of ICTs. All of these technological initiatives have often been presented and accessed via an urban front-end information site known as 'digital city' or 'city network.' Illustrated by a range of European case studies, this volume examines the social, political and management issues and potential problems in the establishment of an electronic layer of information and services in cities. The book provides a better understanding of the direction European cities are going towards in the implementation of ICTs in the urban arena.
First gives an introduction to computers. This provides an overview of anatomy, generation and classification of computers. In addition to this, it discusses about the personal computers, booting and viruses. Second entitled "Operating Systems" describes about disk operating system and its commands. three discusses Working in Windows. four describes word processing and creating, saving, opening and editing a document. Besides formatting options has also been described in four. Introduction to Ms-Excel and creating, editing and saving a document are explained in five and six. seven describes Mathematical Functions and their use in excel. The various features of data analysis using excel which deals with data analysis tools, tests, graphs and ANOVA along with illustrated examples are described in eight and nine. The tenth introduces the reader with Ms-Access database. number eleven gives the basic concepts of internet. number twelve discusses with pictures flow chart and algorithm.
Explore the potentialand the pitfallsof digital technology in international business courses! Digital Technology in Teaching International Business will familiarize you with techniques that have proven effective in digitizing content or presenting traditional material in an untraditional way. You'll learn how to introduce digital technologies into bricks and mortar classrooms and how to construct an effective online learning environment. This timely and informative book discusses computer-mediated communication systems, shows how students can use the Internet to personally participate in international problem-solving exercises, presents a fascinating case study of a CLD program designed to address educational values, communication competencies, and business practices in former republics of the Soviet Union, and much more! Digital Technology in Teaching International Business outlines the challenges and demands of the knowledge-based economy and discusses the path that universities should follow in providing business students with the skills they need to succeed in this complex environment. It describes the implementation of Internet-based experiential projects in an international business classroom setting and summarizes students' perceptions and attitudes toward their assignments. In addition, it shows how to adapt experiential exercises from live courses for electronic application and examines ways in which electronic media can: increase the availabilityand reduce the costof interactive programs that connect students from distant locations complement or replace the traditional roles of textbooks and teachers promote more interactive learning enable faculty, students, scientists, technicians, entrepreneurs, and NGO leaders in separate locations to collaborate effectively help to overcome the developed-country bias present in many business strategy courses via specially designed courses and simulations of emerging economies aid in teaching financial reporting and the analysis of multinational enterprises address the traditional tradeoffs between richness (depth of knowledge) and reach (geographic area coverage)
Documentation of our cultural heritage is experiencing an explosion of innovation. New tools have appeared in recent decades including laser scanning, rapid prototyping, high dynamic range spherical and infrared imagery, drone photography, augmented and virtual reality and computer rendering in multiple dimensions. These give us visualisations and data that are at once interesting, intriguing and yet sometimes deceptive. This text provides an objective and integrated approach to the subject, bringing together the techniques of conservation with management, photographic methods, various modelling techniques and the use of unmanned aerial systems. This interdisciplinary approach addresses the need for knowledge about deploying advanced digital technologies and the materials and methods for the assessment, conservation, rehabilitation and maintenance of the sustainability of existing structures and designated historic buildings. Furthermore, this book actively provides the knowhow to facilitate the creation of heritage inventories, assessing risk, and addressing the need for sustainability.In so doing it becomes more feasible to mitigate the threats from inherent and external causes, not only for the built heritage but also for moveable objects and intangible heritage that suffer abandonment and negligence as well as looting and illegal trafficking. The book is written by a team of international experts based upon their practical experience and expertise. It therefore creates a unique book that encapsulates the knowledge of this discipline required by anyone working in this field.
Building a successful product usually involves teams of people, and many choose the Scrum approach to aid in creating products that deliver the highest possible value. Implementing Scrum gives teams a collection of powerful ideas they can assemble to fit their needs and meet their goals. The ninety-four patterns contained within are elaborated nuggets of insight into Scrumâ (TM)s building blocks, how they work, and how to use them. They offer novices a roadmap for starting from scratch, yet they help intermediate practitioners fine-tune or fortify their Scrum implementations. Experienced practitioners can use the patterns and supporting explanations to get a better understanding of how the parts of Scrum complement each other to solve common problems in product development. The patterns are written in the well-known Alexandrian form, whose roots in architecture and design have enjoyed broad application in the software world. The form organizes each pattern so you can navigate directly to organizational design tradeoffs or jump to the solution or rationale that makes the solution work. The patterns flow together naturally through the context sections at their beginning and end. Learn everything you need to know to master and implement Scrum one step at a time'the agile way.
The second edition of this accepted reference work has been updated to reflect the rapid developments in the field and now covers both 2D and 3D imaging. Written by expert practitioners from leading companies operating in machine vision, this one-stop handbook guides readers through all aspects of image acquisition and image processing, including optics, electronics and software. The authors approach the subject in terms of industrial applications, elucidating such topics as illumination and camera calibration. Initial chapters concentrate on the latest hardware aspects, ranging from lenses and camera systems to camera-computer interfaces, with the software necessary discussed to an equal depth in later sections. These include digital image basics as well as image analysis and image processing. The book concludes with extended coverage of industrial applications in optics and electronics, backed by case studies and design strategies for the conception of complete machine vision systems. As a result, readers are not only able to understand the latest systems, but also to plan and evaluate this technology. With more than 500 images and tables to illustrate relevant principles and steps. |
You may like...
The Coming Wave - AI, Power and Our…
Mustafa Suleyman, Michael Bhaskar
Paperback
Principles Of Business Information…
Ralph Stair, George Reynolds, …
Paperback
(1)R1,780 Discovery Miles 17 800
Digital Libraries - Integrating Content…
Mark V Dahl, Kyle Banerjee, …
Paperback
R1,150
Discovery Miles 11 500
|