![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet
This book overviews the drivers behind the smart city vision, describes its dimensions and introduces the reference architecture. It further enumerates and classifies threats targeting the smart city concept, links corresponding attacks, and traces the impact of these threats on operations, society and the environment. This book also introduces analytics-driven situational awareness, provides an overview of the respective solutions and highlights the prevalent limitations of these methods. The research agenda derived from the study emphasizes the demand and challenges for developing holistic approaches to transition these methods to practice equipping the user with extensive knowledge regarding the detected attack instead of a sole indicator of ongoing malicious events. It introduces a cyber-situational awareness framework that can be integrated into smart city operations to provide timely evidence-based insights regarding cyber incidents and respective system responses to assist decision-making. This book targets researchers working in cybersecurity as well as advanced-level computer science students focused on this field. Cybersecurity operators will also find this book useful as a reference guide.
The papers in this volume comprise the refereed proceedings of the Second IFIP International Conference on Computer and Computing Technologies in Agriculture (CCTA2008), in Beijing, China, 2008. The conference on the Second IFIP International Conference on Computer and Computing Technologies in Agriculture (CCTA 2008) is cooperatively sponsored and organized by the China Agricultural University (CAU), the National Engineering Research Center for Information Technology in Agriculture (NERCITA), the Chinese Society of Agricultural Engineering (CSAE) , International Federation for Information Processing (IFIP), Beijing Society for Information Technology in Agriculture, China and Beijing Research Center for Agro-products Test and Farmland Inspection, China. The related departments of China's central government bodies like: Ministry of Science and Technology, Ministry of Industry and Information Technology, Ministry of Education and the Beijing Municipal Natural Science Foundation, Beijing Academy of Agricultural and Forestry Sciences, etc. have greatly contributed and supported to this event. The conference is as good platform to bring together scientists and researchers, agronomists and information engineers, extension servers and entrepreneurs from a range of disciplines concerned with impact of Information technology for sustainable agriculture and rural development. The representatives of all the supporting organizations, a group of invited speakers, experts and researchers from more than 15 countries, such as: the Netherlands, Spain, Portugal, Mexico, Germany, Greece, Australia, Estonia, Japan, Korea, India, Iran, Nigeria, Brazil, China, etc.
Design intuitive navigation for the ideal user experience Hundreds of thousands of Web designers and developers have relied on web usability expert Steve Krug's guide to help them understand the principles of intuitive navigation and information design. Witty, commonsensical, and eminently practical, it's one of the best-loved and most recommended books on the subject. Fresh perspectives and examples New chapter on mobile usability Still short, profusely illustrated...and best of all-fun to read If you've read it before, you'll rediscover what made Don't Make Me Think so essential to Web designers and developers around the world. If you've never read it, you'll see why so many people have said it should be required reading for anyone working on websites. "After reading it over a couple of hours and putting its ideas to work for the past five years, I can say it has done more to improve my abilities as a Web designer than any other book." -Jeffrey Zeldman, author of Designing with Web Standards
Based on years of research and 121 real-life first dates, relationship expert Wendy Newman dishes up practical wisdom for navigating the online dating trenches with grace, efficiency, and a strong dose of humour. Wendy Newman has made every imaginable dating mistake so you don't have to. Part guidebook, part personal tell-all, 121 First Dates chronicles Wendy's funny, real-life misadventures and the practical wisdom she gained from them. Her dating tales will find you laughing, commiserating, and nodding your head as you learn how to stay in the dating game until you find the right man, just like Wendy did. This book busts myths, answers age-old questions, and examines pitfalls that make you want to give up on dating altogether. Just when you're about to submit to a lifetime at home with a pint of Haagen-Dazs and sitcom reruns, 121 First Dates will inspire you to keep stepping out. Wendy discusses how to date successfully and efficiently, avoid the most common dating pitfalls, have an amazing first date with anyone, end uncomfortable situations with grace, and much, much more. She offers up realistic Dos and Don'ts as well as tips for making the most of any situation you find yourself in-whether you want to run or you think he's the one. Brimming with humour, hope, and authenticity, 121 First Dates will give every woman the tools, confidence, and determination to be and stay real when dating. How else will you find the best match for you?
The Internet of Things (IoT) has become a major influence on the development of new technologies and innovations. When utilized properly, these applications can enhance business functions and make them easier to perform. Protocols and Applications for the Industrial Internet of Things discusses and addresses the difficulties, challenges, and applications of IoT in industrial processes and production and work life. Featuring coverage on a broad range of topics such as industrial process control, machine learning, and data mining, this book is geared toward academicians, computer engineers, students, researchers, and professionals seeking current and relevant research on applications of the IoT.
This book develops survey data analysis tools in Python, to create and analyze cross-tab tables and data visuals, weight data, perform hypothesis tests, and handle special survey questions such as Check-all-that-Apply. In addition, the basics of Bayesian data analysis and its Python implementation are presented. Since surveys are widely used as the primary method to collect data, and ultimately information, on attitudes, interests, and opinions of customers and constituents, these tools are vital for private or public sector policy decisions. As a compact volume, this book uses case studies to illustrate methods of analysis essential for those who work with survey data in either sector. It focuses on two overarching objectives: Demonstrate how to extract actionable, insightful, and useful information from survey data; and Introduce Python and Pandas for analyzing survey data.
Containing the edited research papers resulting from an ambitious, cross-disciplinary research project, this volume examines the spatiality of virtual inhabited 3D worlds - virtual reality and cyberspace. (Three other volumes look at Interaction, Staging and Methodology.) It is about the communication spaces emerging at the Internet and supported by special 3D interfaces. It is also about the virtual spaces created by virtual reality hardware (CAVEs, panoramic screens, head mounted display systems etc.) and software.Virtual Space: Spatiality in Virtual Inhabited 3D Worlds is interdisciplinary. It deals with philosophical, psychological, communicational, technological and aesthetic aspects of space. While philosophy raises the question concerning the ontology of space - what is space - psychology deals with our perception of space. Communication theory looks at the way in which space supports communication (i.e. that space is a medium for communication), and finally aesthetic analyses exemplify the use of virtual space in virtual cities, in museums and in art.
This book provides an overview of the emerging smart connected world, and discusses the roles and the usage of underlying semantic computing and Internet-of-Things (IoT) technologies. The book comprises ten chapters overall, grouped in two parts. Part I "Smart Connected World: Overview and Technologies" consists of seven chapters and provides a holistic overview of the smart connected world and its supporting tools and technologies. Part II "Applications and Case Studies" consists of three chapters that describe applications and case studies in manufacturing, smart cities, health, and more. Each chapter is self-contained and can be read independently; taken together, readers get a bigger picture of the technological and application landscape of the smart connected world. This book is of interest for researchers, lecturers, and practitioners in Semantic Web, IoT and related fields. It can serve as a reference for instructors and students taking courses in hybrid computing getting abreast of cutting edge and future directions of a connected ecosystem. It will also benefit industry professionals like software engineers or data scientists, by providing a synergy between Web technologies and applications. This book covers the most important topics on the emerging field of the smart connected world. The contributions from leading active researchers and practitioners in the field are thought provoking and can help in learning and further research. The book is a valuable resource that will benefit academics and industry. It will lead to further research and advancement of the field. Bharat K. Bhargava, Professor of Computer Science, Purdue University, United States
The book presents the proceedings of the World Congress on Engineering and Technology, Innovation and its Sustainability (WCETIS 2018), which took place on November 28-29, 2018 in Manila, Philippines. The conference featured the following tracks: Industrial Engineering and Healthcare, Sustainable Infrastructure; Water Resources Planning and Management; Heat transfer and fluids; Electronics and Electrical Engineering; and Internet of Things. Papers stem from academia and industry throughout the world, showing a variety of perspectives. Presents the proceedings of the World Congress on Engineering and Technology, Innovation and its Sustainability (WCETIS 2018), November 28-29, 2018 in Manila, Philippines Shows how engineering and technology serve to support a variety for industries from manufacturing to water resources Features papers from a variety of researchers and developers from around the world
This book presents the proceedings of the 4th International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2021), which took place at University of KwaZulu-Natal, South Africa, October 13-15, 2021. The book addresses issues related to new dependability paradigms, design, and performance of dependable network computing and mobile systems, as well as issues related to the security of these systems. The main tracks include infrastructure, architecture, algorithms, and protocols. The goal of the conference is to provide a forum for researchers, students, scientists and engineers working in academia and industry to share their experiences, new ideas and research results in the above-mentioned areas.
This book provides an accessible and comprehensive tutorial on the key enabling technologies for 5G and beyond, covering both the fundamentals and the state-of-the-art 5G standards. The book begins with a historical overview of the evolution of cellular technologies and addresses the questions on why 5G and what is 5G. Following this, six tutorial chapters describe the fundamental technology components for 5G and beyond. These include modern advancements in channel coding, multiple access, massive multiple-input and multiple-output (MIMO), network densification, unmanned aerial vehicle enabled cellular networks, and 6G wireless systems. The second part of this book consists of five chapters that introduce the basics of 5G New Radio (NR) standards developed by 3GPP. These include 5G architecture, protocols, and physical layer aspects. The third part of this book provides an overview of the key 5G NR evolution directions. These directions include ultra-reliable low-latency communication (URLLC) enhancements, operation in unlicensed spectrum, positioning, integrated access and backhaul, air-to-ground communication, and non-terrestrial networks with satellite communication.
This book provides practical information about web archives, offers inspiring examples for web archivists, raises new challenges, and shares recent research results about access methods to explore information from the past preserved by web archives. The book is structured in six parts. Part 1 advocates for the importance of web archives to preserve our collective memory in the digital era, demonstrates the problem of web ephemera and shows how web archiving activities have been trying to address this challenge. Part 2 then focuses on different strategies for selecting web content to be preserved and on the media types that different web archives host. It provides an overview of efforts to address the preservation of web content as well as smaller-scale but high-quality collections of social media or audiovisual content. Next, Part 3 presents examples of initiatives to improve access to archived web information and provides an overview of access mechanisms for web archives designed to be used by humans or automatically accessed by machines. Part 4 presents research use cases for web archives. It also discusses how to engage more researchers in exploiting web archives and provides inspiring research studies performed using the exploration of web archives. Subsequently, Part 5 demonstrates that web archives should become crucial infrastructures for modern connected societies. It makes the case for developing web archives as research infrastructures and presents several inspiring examples of added-value services built on web archives. Lastly, Part 6 reflects on the evolution of the web and the sustainability of web archiving activities. It debates the requirements and challenges for web archives if they are to assume the responsibility of being societal infrastructures that enable the preservation of memory. This book targets academics and advanced professionals in a broad range of research areas such as digital humanities, social sciences, history, media studies and information or computer science. It also aims to fill the need for a scholarly overview to support lecturers who would like to introduce web archiving into their courses by offering an initial reference for students.
Contains everything that a project team needs to know about the development and deployment of Web services with the IBM WebSphere product family. Includes examples for all development artifacts in a format that can be reused in the reader’s project. The text combines the authors’ own practical experiences with consolidated information on the latest product capabilities in a unique approach that allows the book to be easily accessible to a broad spectrum of readers. Finding a balance between a euphoric/optimistic and down-to earth/realistic view on the subject, this book should sit on every Web service developer’s bookshelf.
This comprehensive volume explores the evolving fields of consumer informatics and telemedicine as envisioned by the Institute of Medicine in its landmark reports on the electronic medical record, patient safety, and quality care. Each chapter describes the role of computers, technology, and telecommunications as enablers within a specific application focused on the needs of consumers. The applications covered are ones which empower consumers as they seek information, analyze their health care needs, and make decisions about their own health care. Such applications empower professionals in their efforts to serve patients, while increasing the knowledge of the consumer. Richly illustrated with detailed examples, this volume speaks to a wide range of audiences as it addresses issues raised by consumer informatics, the use of technology, research and development effects, and telemedicine. Chapter highlights include: Patient-Centered Communication; Using the Internet Toward Reliable Consumer Health Information; Disease Management and Home Telehealth; and Biothreats and Disaster Management. The book's audience includes all healthcare professionals, healthcare administrators, IT professionals, health informaticians, and students.
This book covers a variety of smart IoT applications for industry and research. For industry, the book is a guide for considering the real-time aspects of automation of application domains. The main topics covered in the industry section include real-time tracking and navigation, smart transport systems and application for GPS domains, modern electric grid control for electricity industry, IoT prospectives for modern society, IoT for modern medical science, and IoT automation for Industry 4.0. The book then provides a summary of existing IoT research that underlines enabling technologies, such as fog computing, wireless sensor networks, data mining, context awareness, real-time analytics, virtual reality, and cellular communications. The book pertains to researchers, outcome-based academic leaders, as well as industry leaders.
Building Flickr Applications with PHP teaches you how to use today's most popular online photo management system. You'll learn to work with both your own photos and Flickr's enormous cache, and create new and compelling extensions to the Flickr platform. This book is a great pick because It's written by experienced developer Rob Kunkle and Phlickr developer Andrew Morton. You'll learn how to use the PHP API Phlickr to write and retrieve photos. Flicker is growing quickly in popularity in the online photo management world. Using the popular PHP-driven Phlickr API in conjunction with MySQL, you'll discover how to take advantage of open source tools like PHP, Apache, and MySQL, as well as the Flickr architecture, to manage, retrieve, and format photos in imaginative ways. You'll also learn how to build upon Flickr's photo collaboration features to create interfaces for working with others on photo album projects. And you'll learn how to format Flickr tags--taking advantage of RSS to distribute photo updates.
This book is a collection of best selected research papers presented at the Conference on Machine Learning, Deep Learning and Computational Intelligence for Wireless Communication (MDCWC 2020) held during October 22nd to 24th 2020, at the Department of Electronics and Communication Engineering, National Institute of Technology Tiruchirappalli, India. The presented papers are grouped under the following topics (a) Machine Learning, Deep learning and Computational intelligence algorithms (b)Wireless communication systems and (c) Mobile data applications and are included in the book. The topics include the latest research and results in the areas of network prediction, traffic classification, call detail record mining, mobile health care, mobile pattern recognition, natural language processing, automatic speech processing, mobility analysis, indoor localization, wireless sensor networks (WSN), energy minimization, routing, scheduling, resource allocation, multiple access, power control, malware detection, cyber security, flooding attacks detection, mobile apps sniffing, MIMO detection, signal detection in MIMO-OFDM, modulation recognition, channel estimation, MIMO nonlinear equalization, super-resolution channel and direction-of-arrival estimation. The book is a rich reference material for academia and industry.
An Interdisciplinary Approach to Modern Network Security presents the latest methodologies and trends in detecting and preventing network threats. Investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students, professionals, practitioners, network analysts and technology specialists interested in the simulation and application of computer network protection. It presents theoretical frameworks and the latest research findings in network security technologies, while analyzing malicious threats which can compromise network integrity. It discusses the security and optimization of computer networks for use in a variety of disciplines and fields. Touching on such matters as mobile and VPN security, IP spoofing and intrusion detection, this edited collection emboldens the efforts of researchers, academics and network administrators working in both the public and private sectors. This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, web security and much more. Information and communication systems are an essential component of our society, forcing us to become dependent on these infrastructures. At the same time, these systems are undergoing a convergence and interconnection process that has its benefits, but also raises specific threats to user interests. Citizens and organizations must feel safe when using cyberspace facilities in order to benefit from its advantages. This book is interdisciplinary in the sense that it covers a wide range of topics like network security threats, attacks, tools and procedures to mitigate the effects of malware and common network attacks, network security architecture and deep learning methods of intrusion detection.
Advances in hardware technology have lead to an ability to collect data with the use of a variety of sensor technologies. In particular sensor notes have become cheaper and more efficient, and have even been integrated into day-to-day devices of use, such as mobile phones. This has lead to a much larger scale of applicability and mining of sensor data sets. The human-centric aspect of sensor data has created tremendous opportunities in integrating social aspects of sensor data collection into the mining process. Managing and Mining Sensor Data is a contributed volume by prominent leaders in this field, targeting advanced-level students in computer science as a secondary text book or reference. Practitioners and researchers working in this field will also find this book useful.
It is a general trend in computing that computers are becoming ever smaller and ever more interconnected. Sensor networks - large networks of small, simple devices - are a logical extreme of this trend. Wireless sensor networks (WSNs) are attracting an increasing degree of research interest, with a growing number of industrial applications starting to emerge. Two of these applications, personal health monitoring and emergency/disaster recovery, are the focus of the European Commission project ProSense: Promote, Mobilize, Reinforce and Integrate Wireless Sensor Networking Research and Researchers. This hands-on introduction to WSN systems development presents a broad coverage of topics in the field, contributed by researchers involved in the ProSense project. An emphasis is placed on the practical knowledge required for the successful implementation of WSNs. Divided into four parts, the first part covers basic issues of sensors, software, and position-based routing protocols. Part two focuses on multidisciplinary issues, including sensor network integration, mobility aspects, georouting, medical applications, and vehicular sensor networks. The remaining two parts present case studies and further applications. Topics and features: presents a broad overview of WSN technology, including an introduction to sensor and sensing technologies; contains an extensive section on case studies, providing details of the development of a number of WSN applications; discusses frameworks for WSN systems integration, through which WSN technology will become fundamental to the Future Internet concept; investigates real-world applications of WSN systems in medical and vehicular sensor networks; with a Foreword by the Nobel Laurate Professor Martin Perl of Stanford University. Providing holistic coverage of WSN technology, this text/reference will enable graduate students of computer science, electrical engineering and telecommunications to master the specific domains of this emerging area. The book will also be a valuable resource for researchers and practitioners interested in entering the field.
C++ is a powerful, much sought after programming language, but can be daunting to work with, even for engineering professionals. Why is this book so useful? Have you ever wondered: - How do keywords like static and virtual change their meanings according to context? - What are the similarities and differences between Pointers and References, Pointers and Arrays, Constructors and Copy Constructors, Nested and Local Inner Classes? - Why is Multiple Interface Inheritance seen to be beautiful but Multiple Implementation Inheritance considered evil? - When is Polymorphism Static or Dynamic, Bounded or Unbounded? Answers on these questions, and much more, are explained in this book, Cybernetics in C++. What makes this text so different and appealing in comparison to existing books on the market? - The Bulleted style, as opposed to Prose, produces results much faster, both in learning and reference - Rules of Thumb, and further expert Tips are given throughout in how to optimise your code - The Prospective Evils sections tell you what to avoid - The thorough coverage ensures you will be trained to expert level in each of Imperative, Procedural, Memory & Resource Management, Object Oriented and Generic Programming Cybernetics in C++ combines a theoretical overview and practical approach in one book, which should prove to be a useful reference for computer scientists, software programmers, engineers and students in this and related field. |
You may like...
Responsive Web Design with HTML 5 & CSS
Jessica Minnick
Paperback
Towards A Semantic Web - Connecting…
Bill Cope, Mary Kalantzis, …
Paperback
|