![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet
Based on the latest version of the language, this book offers a self-contained, concise and coherent introduction to programming with Python. The book's primary focus is on realistic case study applications of Python. Each practical example is accompanied by a brief explanation of the problem-terminology and concepts, followed by necessary program development in Python using its constructs, and simulated testing. Given the open and participatory nature of development, Python has a variety of incorporated data structures, which has made it difficult to present it in a coherent manner. Further, some advanced concepts (super, yield, generator, decorator, etc.) are not easy to explain. The book specially addresses these challenges; starting with a minimal subset of the core, it offers users a step-by-step guide to achieving proficiency.
"IN The eBay Billionaires' Club, you will read thestories of twelve professional eBay merchants whorecognized a great business opportunity on the Internetand pursued it--some at great personal financial risk.In every case, the gamble has paid off. There are some powerful lessons to be learnedfrom these entrepreneurs, whose experiences truly runthe gamut. In the end, what they all have in common is that they started small--and some have purposely decided to stay that way. You'll quickly discover that eBay success really iswithin your reach, because every person in this bookbegan at the very bottom. What's more, a number of them have achievedincredible growth in a relatively short period of time, which should motivate you to stop thinking aboutyour idea and get started on the road to becoming amember of this elite club yourself. Get your highlighters out and fasten your seat belts for a
journey that will put you on the road to building your own
million-dollar--or perhaps even billion-dollar--eBay
business!"
Web Semantics Ontology provides an excellent overview of current research and development activities, while covering an extensive range of topics including ontological modeling, enterprise systems, querying and knowledge discovery, and a wide range of applications. Each chapter contains a thorough study of the topic, systematic proposed work, and a comprehensive list of references. The theoretical and practical aspects of Web semantics and ontology development combine to bring a unique perspective to this book. Researchers, software developers, and IT students who want to enhance their knowledge of issues relating to modeling, adopting, querying, discovering knowledge, and building ontologies and Web semantics will benefit from ""Web Semantics Ontology.
This book introduces the field of Health Web Science and presents methods for information gathering from written social media data. It explores the availability and utility of the personal medical information shared on social media platforms and determines ways to apply this largely untapped information source to healthcare systems and public health monitoring. Introducing an innovative concept for integrating social media data with clinical data, it addresses the crucial aspect of combining experiential data from social media with clinical evidence, and explores how the variety of available social media content can be analyzed and implemented. The book tackles a range of topics including social media's role in healthcare, the gathering of shared information, and the integration of clinical and social media data. Application examples of social media for health monitoring, along with its usage in patient treatment are also provided. The book also considers the ethical and legal issues of gathering and utilizing social media data, along with the risks and challenges that must be considered when integrating social media data into healthcare choices. With an increased interest internationally in E-Health, Health 2.0, Medicine 2.0 and the recent birth of the discipline of Web Science, this book will be a valuable resource for researchers and practitioners investigating this emerging topic.
The book provides a broad outlook on the applications of cyber-physical systems along with case studies and examples in healthcare, automotive electronics, industrial automation, environment monitoring, agriculture, and applications in civil and mechanical sectors. Topics include using an energy management system in smart grids, implementing an intelligent traffic management system, warehouse tracking and monitoring, medical cyber-physical systems security, remote healthcare monitoring, and more.
This book takes a holistic view of the roles of ICTs during the pandemic through the lens of social informatics, as it is critical to our understanding of the relations between society and technology. Specific attention is given to various stakeholders and social contexts, with analysis at the individual, group, community, and society levels. Pushing the boundaries of information science research with timely and critical research questions, this edited volume showcases information science research in the context of COVID-19, by specifically accentuating sociotechnical practices, activities, and ICT interventions during the pandemic. Its social informatics focus appeals to a broad audience, and its global and international orientation provides a timely, innovative, and much-needed perspective to information science. This book is unique in its interdisciplinary nature as it consists of research studies on the intersections between ICTs and health, culture, social interaction, civic engagement, information dissemination, work, and education. Chapters apply a range of research methods, including questionnaire surveys, content analyses, and case studies from countries in Asia, Europe, and America, as well as global and international comparisons. The book's primary target audience includes scholars and students in information and library science, particularly those interested in the social aspect of the information society. It may be of interest to information professionals, library practitioners, educators, and information policymakers, as well as scholars and students in science and technology studies, cultural studies, political science, public administration, sociology, and communication studies.
Rediscover how fun web development can be with Hugo, the static site generator and web framework that lets you build content sites quickly using the skills you already have. Design layouts with HTML and share common components across pages. Create Markdown templates that let you create new content quickly. Consume and generate JSON, enhance layouts with logic, and generate a site that works on any platform with no runtime dependencies or database. Hugo gives you everything you need to build your next content site and have fun doing it. Database-driven sites bring complexity you might not need, but building a site by hand is too much work. Hugo is a static site generator and web development framework that creates content sites quickly without the overhead or dependencies of a dyanmic web framework. With Hugo, you use HTML templates and Markdown to build static sites you can host anywhere, letting you use the skills you already have. Develop your own theme using standard HTML and CSS, using Hugo's powerful templating features to organize your site's components. Create your site's content with HTML or Markdown and use Hugo's content templating features to build new content quickly. Build a fully-featured blog with archive pages, tagging, and pagination, and integrate an external commenting system to provide interactivity. Use data from front-matter, site-wide configuration, and external JSON sources to add content, and generate JSON others can use. Integrate JavaScript with your site to create a search engine. Get Hugo working with Webpack so you can leverage the wider web development ecosystem, and explore ways to publish your site to various services. Finally, learn how you can move your existing content site to Hugo. Dive in and build your next site with Hugo!
Experts in research, industry, and academia cover recent trends and state-of-the art solutions in computer and communications engineering, focusing specifically on real-time applications of electronics, communications, computing, and information technology. The volume provides sound theoretical and application-oriented knowledge with a special focus on the development of safety-critical networks and integrated electrical and electronics systems. The volume also features numerous new algorithms that assist in solving computer and communication engineering problems.
One of The New York Times Book Review's 100 Notable Books of 2022. Named one of the best books of 2022 by The New Yorker, Pitchfork, Vanity Fair and TIME. A New York Times Book Review Editors' Choice. "On the internet, fandom can be a route toward cyberbullying a baby, or it can be a way of figuring some things out about yourself. Sometimes, it can even forge a writer as funny and perceptive as Kaitlyn Tiffany." --Amanda Hess, The New York Times "Wistful, winning, and unexpectedly funny." --Katy Waldman, The New Yorker A thrilling dive into the world of superfandom and the fangirls who shaped the social internet. In 2014, on the side of a Los Angeles freeway, a One Direction fan erected a shrine in the spot where, a few hours earlier, Harry Styles had vomited. "It's interesting for sure," Styles said later, adding, "a little niche, maybe." But what seemed niche to Styles was actually a signpost for an unfathomably large, hyper-connected alternate universe: stan culture. In Everything I Need I Get from You, Kaitlyn Tiffany, a staff writer at The Atlantic and a superfan herself, guides us through the online world of fans, stans, and boybands. Along the way we meet girls who damage their lungs from screaming too loud, fans rallying together to manipulate chart numbers using complex digital subversion, and an underworld of inside jokes and shared memories surrounding band members' allergies, internet typos, and hairstyles. In the process, Tiffany makes a convincing, and often moving, argument that fangirls, in their ingenuity and collaboration, created the social internet we know today. "Before most people were using the internet for anything," Tiffany writes, "fans were using it for everything." With humor, empathy, and an insider's eye, Everything I Need I Get from You reclaims internet history for young women, establishing fandom not as the territory of hysterical girls but as an incubator for digital innovation, art, and community. From alarming, fandom-splitting conspiracy theories about secret love and fake children, to the interplays between high and low culture and capitalism, Tiffany's book is a riotous chronicle of the movement that changed the internet forever.
This handbook covers the fundamental principles and theory, and the state-of-the-art research, systems and applications, in the area of mobility data privacy. It is primarily addressed to computer science and statistics researchers and educators, who are interested in topics related to mobility privacy. This handbook will also be valuable to industry developers, as it explains the state-of-the-art algorithms for offering privacy. By discussing a wide range of privacy techniques, providing in-depth coverage of the most important ones, and highlighting promising avenues for future research, this handbook also aims at attracting computer science and statistics students to this interesting field of research. The advances in mobile devices and positioning technologies, together with the progress in spatiotemporal database research, have made possible the tracking of mobile devices (and their human companions) at very high accuracy, while supporting the efficient storage of mobility data in data warehouses, which this handbook illustrates. This has provided the means to collect, store and process mobility data of an unprecedented quantity, quality and timeliness. As ubiquitous computing pervades our society, user mobility data represents a very useful but also extremely sensitive source of information. On one hand, the movement traces that are left behind by the mobile devices of the users can be very useful in a wide spectrum of applications such as urban planning, traffic engineering, and environmental pollution management. On the other hand, the disclosure of mobility data to third parties may severely jeopardize the privacy of the users whose movement is recorded, leading to abuse scenarios such as user tailing and profiling. A significant amount of research work has been conducted in the last 15 years in the area of mobility data privacy and important research directions, such as privacy-preserving mobility data management, privacy in location sensing technologies and location-based services, privacy in vehicular communication networks, privacy in location-based social networks, privacy in participatory sensing systems which this handbook addresses.. This handbook also identifies important privacy gaps in the use of mobility data and has resulted to the adoption of international laws for location privacy protection (e.g., in EU, US, Canada, Australia, New Zealand, Japan, Singapore), as well as to a large number of interesting technologies for privacy-protecting mobility data, some of which have been made available through open-source systems and featured in real-world applications.
From the Occupy movement in the Western world to the Arab Spring and the role of Twitter in the Middle East, the internet and social media is changing the global landscape. China is next. Despite being a heavily-censored society, China has over 560 million active internet users, more than double that of the USA. In this book, social media expert and China-watcher Liz Carter tells the story of how the internet in China is leading to a coming together of activists, ordinary people and cultural trendsetters on a scale unknown in modern history. News about protests and natural disasters, or gossip and satirical jokes, are practically uncensorable and spread quickly through Weibo - the Chinese Twitter - and the Chinese internet underground. More than that, a grassroots, foundational shift of assumptions and expectations is taking place, as Chinese men and women cast off the communistera 'stability at all costs' mantra and find new forms of selfexpression, creativity and communication with the world.
This book focuses on key simulation and evaluation technologies for 5G systems. Based on the most recent research results from academia and industry, it describes the evaluation methodologies in depth for network and physical layer technologies. The evaluation methods are discussed in depth. It also covers the analysis of the 5G candidate technologies and the testing challenges, the evolution of the testing technologies, fading channel measurement and modeling, software simulations, software hardware cosimulation, field testing and other novel evaluation methods. The fifth-generation (5G) mobile communications system targets highly improved network performances in terms of the network capacity and the number of connections. Testing and evaluation technologies is widely recognized and plays important roles in the wireless technology developments, along with the research on basic theory and key technologies. The investigation and developments on the multi-level and comprehensive evaluations for 5G new technologies, provides important performance references for the 5G technology filtering and future standardizations. Students focused on telecommunications, electronic engineering, computer science or other related disciplines will find this book useful as a secondary text. Researchers and professionals working within these related fields will also find this book useful as a reference.
Praise for Executive’s Guide To Web Services "Finally, a very readable book about how Web services operate in the real world. This is a must-read primer for all C level executives who want to understand how Web services are fundamentally changing how enterprises integrate, collaborate, innovate, and dominate." "Following along the brilliant analytical path that he blazed with the release of his first book on IT, Business Darwinism: Evolve or Dissolve, Marks, with coauthor Mark Werrell, continues to observe, digest, analyze, and clearly explain the latest trends in IT innovation. The Executive’s Guide to Web Services is a must-read companion for any IT manager, technology innovator, or corporate executive committed to successfully navigating through the maze of technology change. With this book, Marks and Werrell deliver a timely and valuable analysis of an important IT innovation at the ideal moment–just as the necessary confluence of technology, standards, and industry acceptance is starting to make the Web services vision a reality." "Marks and Werrell have captured the true essence of Web services in their provocative new book Executive’s Guide to Web Services. Their overarching emphasis on business issues over technology issues makes Executive’s Guide essential reading for any business executive looking for new sources of competitive advantage."
This book presents an in-depth review of the state of the art of cyber-physical systems (CPS) and their applications. Relevant case studies are also provided, to help the reader to master the interdisciplinary material. Features: includes self-test exercises in each chapter, together with a glossary; offers a variety of teaching support materials at an associated website, including a comprehensive set of slides and lecture videos; presents a brief overview of the study of systems, and embedded computing systems, before defining CPS; introduces the concepts of the Internet of Things, and ubiquitous (or pervasive) computing; reviews the design challenges of CPS, and their impact on systems and software engineering; describes the ideas behind Industry 4.0 and the revolutions in digital manufacturing, including smart and agile manufacturing, as well as cybersecurity in manufacturing; considers the social impact of the changes in skills required by the globalized, digital work environment of the future.
A new era of complexity science is emerging, in which nature- and bio-inspired principles are being applied to provide solutions. At the same time, the complexity of systems is increasing due to such models like the Internet of Things (IoT) and fog computing. Will complexity science, applying the principles of nature, be able to tackle the challenges posed by highly complex networked systems? Bio-Inspired Optimization in Fog and Edge Computing: Principles, Algorithms, and Systems is an attempt to answer this question. It presents innovative, bio-inspired solutions for fog and edge computing and highlights the role of machine learning and informatics. Nature- or biological-inspired techniques are successful tools to understand and analyze a collective behavior. As this book demonstrates, algorithms, and mechanisms of self-organization of complex natural systems have been used to solve optimization problems, particularly in complex systems that are adaptive, ever-evolving, and distributed in nature. The chapters look at ways of enhancingto enhance the performance of fog networks in real-world applications using nature-based optimization techniques. They discuss challenges and provide solutions to the concerns of security, privacy, and power consumption in cloud data center nodes and fog computing networks. The book also examines how: The existing fog and edge architecture is used to provide solutions to future challenges. A geographical information system (GIS) can be used with fog computing to help users in an urban region access prime healthcare. An optimization framework helps in cloud resource management. Fog computing can improve the quality, quantity, long-term viability, and cost-effectiveness in agricultural production. Virtualization can support fog computing, increase resources to be allocated, and be applied to different network layers. The combination of fog computing and IoT or cloud computing can help healthcare workers predict and analyze diseases in patients.
This book provides information on data-driven infrastructure design, analytical approaches, and technological solutions with case studies for smart cities. This book aims to attract works on multidisciplinary research spanning across the computer science and engineering, environmental studies, services, urban planning and development, social sciences and industrial engineering on technologies, case studies, novel approaches, and visionary ideas related to data-driven innovative solutions and big data-powered applications to cope with the real world challenges for building smart cities.
This book presents the combined proceedings of the 7th International Conference on Computer Science and its Applications (CSA-15) and the International Conference on Ubiquitous Information Technologies and Applications (CUTE 2015), both held in Cebu, Philippines, December 15 - 17, 2015. The aim of these two meetings was to promote discussion and interaction among academics, researchers and professionals in the field of computer science covering topics including mobile computing, security and trust management, multimedia systems and devices, networks and communications, databases and data mining, and ubiquitous computing technologies such as ubiquitous communication and networking, ubiquitous software technology, ubiquitous systems and applications, security and privacy. These proceedings reflect the state-of-the-art in the development of computational methods, numerical simulations, error and uncertainty analysis and novel applications of new processing techniques in engineering, science, and other disciplines related to computer science.
This book provides a timely and comprehensive study of dynamic resource management for network slicing in service-oriented fifth-generation (5G) and beyond core networks. This includes the perspective of developing efficient computation resource provisioning and scheduling solutions to guarantee consistent service performance in terms of end-to-end (E2E) data delivery delay. Network slicing is enabled by the software defined networking (SDN) and network function virtualization (NFV) paradigms. For a network slice with a target traffic load, the E2E service delivery is enabled by virtual network function (VNF) placement and traffic routing with static resource allocations. When data traffic enters the network, the traffic load is dynamic and can deviate from the target value, potentially leading to QoS performance degradation and network congestion. Data traffic has dynamics in different time granularities. For example, the traffic statistics (e.g., mean and variance) can be non-stationary and experience significant changes in a coarse time granularity, which are usually predictable. Within a long time duration with stationary traffic statistics, there are traffic dynamics in small timescales, which are usually highly bursty and unpredictable. To provide continuous QoS performance guarantee and ensure efficient and fair operation of the network slices over time, it is essential to develop dynamic resource management schemes for the embedded services in the presence of traffic dynamics during virtual network operation. Queueing theory is used in system modeling, and different techniques including optimization and machine learning are applied to solving the dynamic resource management problems. Based on a simplified M/M/1 queueing model with Poisson traffic arrivals, an optimization model for flow migration is presented to accommodate the large-timescale changes in the average traffic rates with average E2E delay guarantee, while addressing a trade-off between load balancing and flow migration overhead. To overcome the limitations of Poisson traffic model, the authors present a machine learning approach for dynamic VNF resource scaling and migration. The new solution captures the inherent traffic patterns in a real-world traffic trace with non-stationary traffic statistics in large timescale, predicts resource demands for VNF resource scaling, and triggers adaptive VNF migration decision making, to achieve load balancing, migration cost reduction, and resource overloading penalty suppression in the long run. Both supervised and unsupervised machine learning tools are investigated for dynamic resource management. To accommodate the traffic dynamics in small time granularities, the authors present a dynamic VNF scheduling scheme to coordinate the scheduling among VNFs of multiple services, which achieves network utility maximization with delay guarantee for each service. Researchers and graduate students working in the areas of electrical engineering, computing engineering and computer science will find this book useful as a reference or secondary text. Professionals in industry seeking solutions to dynamic resource management for 5G and beyond networks will also want to purchase this book.
This introductory textbook is designed for a one-semester course on the use of the matrix and analytical methods for the performance analysis of telecommunication systems. It provides an introduction to the modelling and analysis of telecommunication systems for a broad interdisciplinary audience of students in mathematics and applied disciplines such as computer science, electronics engineering, and operations research.
This book aims to provide the latest research developments and results in the domain of AI techniques for smart cyber ecosystems. It presents a holistic insight into AI-enabled theoretic approaches and methodology in IoT networking, security analytics using AI tools and network automation, which ultimately enable intelligent cyber space. This book will be a valuable resource for students, researchers, engineers and policy makers working in various areas related to cybersecurity and privacy for Smart Cities. This book includes chapters titled "An Overview of the Artificial Intelligence Evolution and Its Fundamental Concepts, and Their Relationship with IoT Security", "Smart City: Evolution and Fundamental Concepts", "Advances in AI-Based Security for Internet of Things in Wireless Virtualization Environment", "A Conceptual Model for Optimal Resource Sharing of Networked Microgrids Focusing Uncertainty: Paving Path to Eco-friendly Smart Cities", "A Novel Framework for a Cyber Secure Smart City", "Contemplating Security Challenges and Threats for Smart Cities", "Self-Monitoring Obfuscated IoT Network", "Introduction to Side Channel Attacks and Investigation of Power Analysis and Fault Injection Attack Techniques", "Collaborative Digital Forensic Investigations Model for Law Enforcement: Oman as a Case Study", "Understanding Security Requirements and Challenges in the Industrial Internet of Things: A Review", "5G Security and the Internet of Things", "The Problem of Deepfake Videos and How to Counteract Them in Smart Cities", "The Rise of Ransomware Aided by Vulnerable IoT Devices", "Security Issues in Self-Driving Cars within Smart Cities", and "Trust-Aware Crowd Associated Network-Based Approach for Optimal Waste Management in Smart Cities". This book provides state-of-the-art research results and discusses current issues, challenges, solutions and recent trends related to security and organization within IoT and Smart Cities. We expect this book to be of significant importance not only to researchers and practitioners in academia, government agencies and industries, but also for policy makers and system managers. We anticipate this book to be a valuable resource for all those working in this new and exciting area, and a "must have" for all university libraries.
The only authorized Labs & Study Guide for the Cisco Networking Academy Introduction to Networks course in the CCNA Routing and Switching curriculum Each chapter of this book is divided into a Study Guide section followed by a Lab section. The Study Guide section offers exercises that help you learn the concepts, configurations, and troubleshooting skills crucial to your success as a CCENT exam candidate. Each chapter is slightly different and includes some or all the following types of exercises: * Vocabulary Matching Exercises * Concept Questions Exercises * Skill-Building Activities and Scenarios * Configuration Scenarios * Packet Tracer Exercises * Troubleshooting Scenarios The Labs & Activities include all the online course Labs and Packet Tracer activity instructions. If applicable, this section begins with a Command Reference that you will complete to highlight all the commands introduced in the chapter.
This textbook details the architecture of a digital coherent optical system and describes its main digital signal processing (DSP) algorithms. The authors first show how the combination of advanced modulation techniques, DSP and coherent detection has led to significant gains in capacity and ease of operation. The authors follow the path of the information from its generation in the transmitter, to propagation through the fiber and processing by the DSP algorithms in the receiver. The work summarizes academic results and presents them in a didactic way to students and practitioners working on the area of optical communications. A full suite of classroom materials is included for easy integration into a curriculum, containing theoretic and simulation problems, and off-the-shelf Matlab/Octave functions.
This book targets major issues in terrestrial-satellite communication networks and presents the solutions. While the terrestrial networks can achieve high-speed data service at low cost, satellite based access is one way to complement terrestrial based networks to ensure ubiquitous, 100% geographic coverage. The coexistence and cooperation between terrestrial and satellite networks are of great potential in future communication networks, and satellite radio access networks has already been considered in the fifth-generation (5G) networks to be supported for phase 2. Therefore, it is important to study the architectures of terrestrial-satellite networks, as well as the possible techniques and challenges. The authors introduce the technique of beamforming in satellite communication systems, which is an efficient transmitting method for multiple access, and they discuss the main challenges as well as prospective applications. The authors introduce possible methods for interference cancelation reception in terrestrial-satellite communication networks when reusing the frequency band between the two networks. Due to the limitation of spectrum resources, spectrum sharing will become one of the important issues in terrestrial-satellite communication networks. The problems of spectrum coexistence between GEO and Terrestrial Systems and between GEO and NEGO systems are also discussed. Finally, taking both the two system into consideration, the resource allocation problem will be more complex due to the coupling between resources and the interference. Based on this, the authors propose several resource allocation schemes in different scenarios of terrestrial-satellite communication networks, which can optimize the capacity performance of the system. The expected audience for this book includes (but not limited to) graduate students, professors, researchers, scientists, practitioners, engineers, industry managers, and government researchers working in the field of satellite communications and networks. The expected audience for this book includes (but not limited to) graduate students, professors, researchers, scientists, practitioners, engineers, industry managers, and government researchers working in the field of satellite communications and networks.
This book systematically reviews world Internet development over the past 50 years, and comprehensively discusses the great contributions it has made to economic and social advances. Further, it describes the development, status and trends related to the Internet in major countries around the globe in 2019, and provides an in-depth analysis of the latest conditions, dynamics and development trends in key areas, including information infrastructure, information technology, digital economy, digital government, Internet media, cyberspace security, and international cyberspace governance. Moreover, the book further modifies and enhances the Global Internet Development Index System, in order to better show the Internet development strengths and advantages in various countries, and to reflect the global development trends more comprehensively, accurately and objectively. This book reviews the significant developments and summarizes the lessons learned as well as the future challenges. From a global perspective, it offers a vision of building a community with a shared future in cyberspace based on the new concepts, new ideas and new achievements of various countries participating in cyberspace development and construction. As such it is a valuable reference resource for anyone working in Internet related fields, such as those in government departments, internet enterprises, scientific research institutions, colleges and universities wanting to fully understand world Internet development. |
You may like...
Essential Java for Scientists and…
Brian Hahn, Katherine Malan
Paperback
R1,266
Discovery Miles 12 660
|