0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (5)
  • R100 - R250 (596)
  • R250 - R500 (2,048)
  • R500+ (12,466)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet

The Fundamentals of Brand SERPs for Business (Hardcover): Jason Barnard The Fundamentals of Brand SERPs for Business (Hardcover)
Jason Barnard
R646 Discovery Miles 6 460 Ships in 10 - 15 working days
Collecting and Conserving Net Art - Moving beyond Conventional Methods (Hardcover): Annet Dekker Collecting and Conserving Net Art - Moving beyond Conventional Methods (Hardcover)
Annet Dekker
R4,487 Discovery Miles 44 870 Ships in 10 - 15 working days

Collecting and Conserving Net Art explores the qualities and characteristics of net art and its influence on conservation practices. By addressing and answering some of the challenges facing net art and providing an exploration of its intersection with conservation, the book casts a new light on net art, conservation, curating and museum studies. Viewing net art as a process rather than as a fixed object, the book considers how this is influenced by and executed through other systems and users. Arguing that these processes and networks are imbued with ambiguity, the book suggests that this is strategically used to create suspense, obfuscate existing systems and disrupt power structures. The rapid obsolescence of hard and software, the existence of many net artworks within restricted platforms and the fact that artworks often act as assemblages that change or mutate, make net art a challenging case for conservation. Taking the performative and interpretive roles conservators play into account, the book demonstrates how practitioners can make more informed decisions when responding to, critically analysing or working with net art, particularly software-based processes. Collecting and Conserving Net Art is intended for researchers, academics and postgraduate students, especially those engaged in the study of museum studies, conservation and heritage studies, curatorial studies, digital art and art history. The book should also be interesting to professionals who are involved in the conservation and curation of digital arts, performance, media and software.

Protocol Engineering (Hardcover, 2012 ed.): Hartmut Koenig Protocol Engineering (Hardcover, 2012 ed.)
Hartmut Koenig
R2,294 Discovery Miles 22 940 Ships in 18 - 22 working days

Communication protocols form the operational basis of computer networks and tele communication systems. They are behavior conventions that describe how com munication systems inter act with each other, defining the temporal order of the interactions and the formats of the data units exchanged - essentially they determine the efficiency and reliability of computer networks. Protocol Engineering is an important discipline covering the design, validation, and implementation of communication protocols. Part I of this book is devoted to the fundamentals of communication protocols, describing their working principles and implicitly also those of computer networks. The author introduces the concepts of service, protocol, layer, and layered architecture, and introduces the main elements required in the description of protocols using a model language. He then presents the most important protocol functions. Part II deals with the description of communication proto cols, offering an overview of the various formal methods, the essence of Protocol Engineering. The author introduces the fundamental description methods, such as finite state machines, Petri nets, process calculi, and temporal logics, that are in part used as semantic models for formal description techniques. He then introduces one represen tative technique for each of the main description approaches, among others SDL and LOTOS, and surveys the use of UML for describing protocols. Part III covers the protocol life cycle and the most important development stages, presenting the reader with approaches for systematic protocol design, with various verification methods, with the main implementation techniques, and with strategies for their testing, in particular with conformance and interoperability tests, and the test description language TTCN. The author uses the simple data transfer example protocol XDT (eXample Data Transfer) throughout the book as a reference protocol to exemplify the various description techniques and to demonstrate important validation and implementation approaches. The book is an introduction to communication protocols and their development for undergraduate and graduate students of computer science and communication technology, and it is also a suitable reference for engineers and programmers. Most chapters contain exercises, and the author's accompanying website provides further online material including a complete formal description of the XDT protocol and an animated simulation visualizing its behavior.

Virtualization Techniques for Mobile Systems (Hardcover, 2014 ed.): David Jaramillo, Borko Furht, Ankur Agarwal Virtualization Techniques for Mobile Systems (Hardcover, 2014 ed.)
David Jaramillo, Borko Furht, Ankur Agarwal
R1,381 Discovery Miles 13 810 Ships in 18 - 22 working days

This book presents effective ways to partition mobile devices such that the enterprise system access and its information are completely separated from the personal information. For those using mobile devices for personal and business purposes, the ability to keep the data secure and separate is critical. The applications for security in smart platforms range from personal email accounts to global enterprise systems. Several approaches for mobile virtualization are described, all creating secure and secluded environments for enterprise information. The authors present a reference architecture that allows for integration with existing enterprise mobile device management systems and provides a lightweight solution for containerizing mobile applications. This solution is then benchmarked with several of the existing mobile virtualization solutions across a range of mobile devices. Virtualization Techniques for Mobile Systems is an excellent resource for researchers and professionals working in mobile systems. Advanced-level students studying computer science and electrical engineering will also find the content helpful.

Congestion Control in Data Transmission Networks - Sliding Mode and Other Designs (Hardcover, 2013 ed.): Przemyslaw Ignaciuk,... Congestion Control in Data Transmission Networks - Sliding Mode and Other Designs (Hardcover, 2013 ed.)
Przemyslaw Ignaciuk, Andrzej Bartoszewicz
R2,718 Discovery Miles 27 180 Ships in 18 - 22 working days

Congestion Control in Data Transmission Networks details the modeling and control of data traffic in communication networks. It shows how various networking phenomena can be represented in a consistent mathematical framework suitable for rigorous formal analysis. The monograph differentiates between fluid-flow continuous-time traffic models, discrete-time processes with constant sampling rates, and sampled-data systems with variable discretization periods.
The authors address a number of difficult real-life problems, such as:
optimal control of flows with disparate, time-varying delay;
the existence of source and channel nonlinearities;
the balancing of quality of service and fairness requirements; and
the incorporation of variable rate allocation policies.
Appropriate control mechanisms which can handle congestion and guarantee high throughput in various traffic scenarios (with different networking phenomena being considered) are proposed. Systematic design procedures using sound control-theoretic foundations are adopted. Since robustness issues are of major concern in providing efficient data-flow regulation in today s networks, sliding-mode control is selected as the principal technique to be applied in creating the control solutions. The controller derivation is given extensive analytical treatment and is supported with numerous realistic simulations. A comparison with existing solutions is also provided. The concepts applied are discussed in a number of illustrative examples, and supported by many figures, tables, and graphs walking the reader through the ideas and introducing their relevance in real networks.
Academic researchers and graduate students working in computer networks and telecommunications and in control (especially time-delay systems and discrete-time optimal and sliding-mode control) will find this text a valuable assistance in ensuring smooth data-flow within communications networks."

Future Directions for Intelligent Systems and Information Sciences - The Future of Speech and Image Technologies, Brain... Future Directions for Intelligent Systems and Information Sciences - The Future of Speech and Image Technologies, Brain Computers, WWW, and Bioinformatics (Hardcover, 2000 ed.)
Nikola Kasabov
R4,237 Discovery Miles 42 370 Ships in 18 - 22 working days

This edited volume comprises invited chapters that cover five areas of the current and the future development of intelligent systems and information sciences. Half of the chapters were presented as invited talks at the Workshop "Future Directions for Intelligent Systems and Information Sciences" held in Dunedin, New Zealand, 22-23 November 1999 after the International Conference on Neuro-Information Processing (lCONIPI ANZIISI ANNES '99) held in Perth, Australia. In order to make this volume useful for researchers and academics in the broad area of information sciences I invited prominent researchers to submit materials and present their view about future paradigms, future trends and directions. Part I contains chapters on adaptive, evolving, learning systems. These are systems that learn in a life-long, on-line mode and in a changing environment. The first chapter, written by the editor, presents briefly the paradigm of Evolving Connectionist Systems (ECOS) and some of their applications. The chapter by Sung-Bae Cho presents the paradigms of artificial life and evolutionary programming in the context of several applications (mobile robots, adaptive agents of the WWW). The following three chapters written by R.Duro, J.Santos and J.A.Becerra (chapter 3), GCoghill . (chapter 4), Y.Maeda (chapter 5) introduce new techniques for building adaptive, learning robots.

Social Media Marketing 2019-2020 - How to Build Your Personal Brand to Become an Influencer by Leveraging Facebook, Twitter,... Social Media Marketing 2019-2020 - How to Build Your Personal Brand to Become an Influencer by Leveraging Facebook, Twitter, YouTube & Instagram Complete Volume (Hardcover)
Income Mastery
R637 R571 Discovery Miles 5 710 Save R66 (10%) Ships in 18 - 22 working days
Fire Your Boss - How to quit your job, stop selling your time and start making passive income while you sleep...and possibly... Fire Your Boss - How to quit your job, stop selling your time and start making passive income while you sleep...and possibly move to a tropical island (Hardcover)
Jonathan Green; Edited by Alice Fogliata
R605 Discovery Miles 6 050 Ships in 18 - 22 working days
Peer to Peer Accommodation Networks - An Examination (Hardcover): Sara Dolnicar Peer to Peer Accommodation Networks - An Examination (Hardcover)
Sara Dolnicar
R3,125 Discovery Miles 31 250 Ships in 10 - 15 working days

Peer to Peer Accommodation networks presents a new conceptual framework which offers an initial explanation for the continuing and rapid success of 'disruptive innovators' and their effects on the international hospitality industry, with a specific focus on Airbnb, in the international context. Using her first-hand experience as a host on both traditional holiday accommodation webpages and a peer-to-peer accommodation network, respected tourism academic Sara Dolnicar examines possible reasons for the explosive success of peer to peer accommodation networks, investigates related topics which are less frequently discussed - such as charitable activities and social activism - and offers a future research agenda. Using first hand empirical results, this text provides much needed insight into this 'disruptive innovator' for those studying and working within the tourism and hospitality industries. This book discusses a wealth of issues including: * The disruptive innovation model - the criteria for identifying and understanding new disruptive innovators, and how peer-to-peer accommodation networks comply with these; * The factors postulated to drive the success of these networks and the celebration of variation; * Who are genuine networks members, tourist motivators and the chance of the 'perfect match'; * Pricing, discrimination and stimulation of the creation of new businesses.

Trust and Fairness in Open, Distributed Systems (Hardcover, 2010 ed.): Adam Wierzbicki Trust and Fairness in Open, Distributed Systems (Hardcover, 2010 ed.)
Adam Wierzbicki
R4,150 Discovery Miles 41 500 Ships in 18 - 22 working days

This book is an attempt to bring closer the greater vision of the development of Social Informatics. Social Informatics can be de?ned as a discipline of informatics that studies how information systems can realize social goals, use social concepts, or become sources of information about social phenomena. All of these research directions are present in this book: fairness is a social goal; trust is a social concept; and much of this book bases on the study of traces of Internet auctions (used also to drive social simulations) that are a rich source of information about social phenomena. The book has been written for an audience of graduate students working in the area of informatics and the social sciences, in an attempt to bridge the gap between the two disciplines. Because of this, the book avoids the use of excessive mathematical formalism, especially in Chapter 2 that attempts to summarize the theoretical basis of the two disciplines of trust and fa- ness management. Readers are usually directed to quoted literature for the purpose of studying mathematical proofs of the cited theorems.

Guide to Cisco Routers Configuration - Becoming a Router Geek (Hardcover, 2nd ed. 2017): Mohammed M. Alani Guide to Cisco Routers Configuration - Becoming a Router Geek (Hardcover, 2nd ed. 2017)
Mohammed M. Alani
R1,890 Discovery Miles 18 900 Ships in 10 - 15 working days

This easy-to-follow text/reference presents a practical guide to the configuration of Cisco routers, from tasks for beginners to advanced operations. The work starts with the simple step-by-step task of connecting the router and performing basic configuration, before building up to complex and sensitive operations such as router IOS upgrade and Site-to-Site VPNs. This updated and expanded new edition has been enhanced with a more detailed treatment of each topic, supported by a set of training scenarios. Features: discusses basic configuration, domestic duties, standard and advanced routing, WAN technologies, security, router management, remote connectivity, and practical tips; explains in detail the steps required to configure different protocols on Cisco routers; includes coverage of MPLS, multicasting, GRE, HSRP, reflexive and timed-access lists, and configuration steps for IPv6 (NEW); provides an extensive selection of training scenarios, designed to offer hands-on practice in the relevant tasks (NEW).

Decompiling Java (Hardcover, 1st ed.): Godfrey Nolan Decompiling Java (Hardcover, 1st ed.)
Godfrey Nolan
R1,436 R1,189 Discovery Miles 11 890 Save R247 (17%) Ships in 18 - 22 working days

Both Java and .NET use the idea of a virtual machine (VM) rather than a true executable. While very useful for some purposes, VMs make your source code and hence your intellectual property (IP) inherently less secure because the process can be reversed or decompiled. This book is useful because you must understand how decompilation works in order to properly protect your IP. Anyone interested in protecting Java code from prying eyes will want to buy this one of a kind book as it separates fact from fiction about just how ineffective obfuscators are at protecting your corporate secrets.While it is very easy for anyone to decompile Java code and almost as easy to run it through an obfuscation protection tool, there is very little information on just what happens when you do this. How secure is your code after you run an obfuscator, for example? bytecodes and the Java Virtual Machine (JVM) than in any book yet published. This book redresses the imbalance by providing insights into the features and limitations of todays decompilers and obfuscators, as well as offering a detailed look at what JVMs actually do.Virtual machine is the computer science term used when (most often in an attempt to gain greater portability) you create an abstract virtual processor and write code for it instead of having your compiler generate actual machine language for a chip like the Pentium 4. want the code to run. This translates the virtual machine language to the real machine language of your processor. The intermediary code for the virtual machine is what can more easily be decompiled, although with a loss of security, since in order for the code to be converted to real machine language it must be relatively transparent and not just a sequence of 0s and 1s

Forex and Cryptocurrency 2021 - The Best Methods For Forex And Crypto Trading. How To Make Money Online By Trading Forex and... Forex and Cryptocurrency 2021 - The Best Methods For Forex And Crypto Trading. How To Make Money Online By Trading Forex and Cryptos With The $11,000 per Month Guide (Hardcover)
David Uchiha
R628 R579 Discovery Miles 5 790 Save R49 (8%) Ships in 18 - 22 working days
Foundation Flash Applications for Mobile Devices (Hardcover, 1st Corrected ed., Corr. 3rd printing): Richard Leggett, Weyert De... Foundation Flash Applications for Mobile Devices (Hardcover, 1st Corrected ed., Corr. 3rd printing)
Richard Leggett, Weyert De Boer, Scott Janousek
R1,533 Discovery Miles 15 330 Ships in 18 - 22 working days

With a growing number of mobile devices offering Flash support, it is an increasingly viable platform for the development of mobile applications. Foundation Flash Applications for Mobile Devices is just the book you need to learn how to take advantage of this new audience of mobile application users. Inside, it covers every facet of mobile Flash, from the essentials of the Flash Lite 1.1 and 2.X platforms and writing applications to testing your work and deploying to mobile users.

Applications presented include screensavers, wallpapers, data-consuming informational programs (such as movie, news, and stock tickers), quiz games, action games, and more. You are given tips on mobile Flash development best practices, and all of the essential topics are covered, including creating and using sound, vector graphics, and bitmaps; optimizing assets for the small screen; coding realistic physics for games; and consuming web services using PHP, Java, ColdFusion, and .NET.

Throughout the book, there are many samples to put together and learn from, and several bonus applications are also available to download and check out.

Applied Evolutionary Algorithms in Java (Hardcover, 2003 ed.): Robert Ghanea-Hercock Applied Evolutionary Algorithms in Java (Hardcover, 2003 ed.)
Robert Ghanea-Hercock
R2,666 Discovery Miles 26 660 Ships in 18 - 22 working days

Genetic algorithms provide a powerful range of methods for solving complex engineering search and optimization algorithms. Their power can also lead to difficulty for new researchers and students who wish to apply such evolution-based methods. "Applied Evolutionary Algorithms in Java" offers a practical, hands-on guide to applying such algorithms to engineering and scientific problems. The concepts are illustrated through clear examples, ranging from simple to more complex problems domains; all based on real-world industrial problems. Examples are taken from image processing, fuzzy-logic control systems, mobile robots, and telecommunication network optimization problems. The Java-based toolkit provides an easy-to-use and essential visual interface, with integrated graphing and analysis tools. Topics and features: *inclusion of a complete Java toolkit for exploring evolutionary algorithms *strong use of visualization techniques, to increase understanding *coverage of all major evolutionary algorithms in common usage *broad range of industrially based example applications *includes examples and an appendix based on fuzzy logic This book is intended for students, researchers, and professionals interested in using evolutionary algorithms in their work. No mathematics beyond basic algebra and Cartesian graphs methods are required, as the aim is to encourage applying the Java toolkit to develop the power of these techniques.

The Economics of the Internet and E-commerce (Hardcover): Michael R. Baye The Economics of the Internet and E-commerce (Hardcover)
Michael R. Baye
R3,785 Discovery Miles 37 850 Ships in 10 - 15 working days

The Internet has revolutionized the way consumers and firms interact in the marketplace, and it has dramatically changed the information enjoyed by market participants at various points in the value chain. This volume on the Internet and e-commerce provides academics and practitioners with useful research on the 'glue' that holds the new economy together. The first six chapters of the text examine four broad issues: the role of the Internet in fostering competition, its impact on price dispersion and on business-to-business transactions, and the importance of reputation and trust in the new economy. The last four chapters examine the impact of the Internet on the organization of firms, the efficiency of auctions in the Internet age, how consumers choose websites and acquire product information, and the growing problem of congestion on the Internet. This volume is part of Emerald's "Advances in Applied Microeconomics" series - an annual research volume that seeks to disseminate frontier research well in advance of journals and other outlets.

Passive Income - 2 Manuscripts including blogging and dropshipping with Ideas and Strategies (Hardcover): Gary Loomer Passive Income - 2 Manuscripts including blogging and dropshipping with Ideas and Strategies (Hardcover)
Gary Loomer
R493 Discovery Miles 4 930 Ships in 18 - 22 working days
Scaling Networks v6 Labs & Study Guide (Paperback): Cisco Networking Academy, Allan Johnson Scaling Networks v6 Labs & Study Guide (Paperback)
Cisco Networking Academy, Allan Johnson
R1,470 Discovery Miles 14 700 Ships in 10 - 15 working days

Lab Manuals provide students enrolled in a Cisco Networking Academy course of the same name with a convenient, complete collection of all the course lab exercises that provide hands-on practice and challenges. The only authorized Labs & Study Guide for the Cisco Networking Academy Routing and Switching Essentials course in the CCNA Routing and Switching curriculum Each chapter of this book is divided into a Study Guide section followed by a Lab section. The Study Guide section offers exercises that help you learn the concepts, configurations, and troubleshooting skills crucial to your success as a CCENT exam candidate. Each chapter is slightly different and includes some or all the following types of exercises: Vocabulary Matching Exercises Concept Questions Exercises Skill-Building Activities and Scenarios Configuration Scenarios Packet Tracer Exercises Troubleshooting Scenarios The Labs & Activities include all the online course Labs and Packet Tracer activity instructions. If applicable, this section begins with a Command Reference that you will complete to highlight all the commands introduced in the chapter.

Handbook of Mobile Ad Hoc Networks for Mobility Models (Hardcover, Edition.): Radhika Ranjan Roy Handbook of Mobile Ad Hoc Networks for Mobility Models (Hardcover, Edition.)
Radhika Ranjan Roy
R8,269 Discovery Miles 82 690 Ships in 18 - 22 working days

The Mobile Ad Hoc Network (MANET) has emerged as the next frontier for wireless communications networking in both the military and commercial arena. "Handbook of Mobile Ad Hoc Networks for Mobility Models" introduces 40 different major mobility models along with numerous associate mobility models to be used in a variety of MANET networking environments in the ground, air, space, and/or under water mobile vehicles and/or handheld devices. These vehicles include cars, armors, ships, under-sea vehicles, manned and unmanned airborne vehicles, spacecrafts and more. This handbook also describes how each mobility pattern affects the MANET performance from physical to application layer; such as throughput capacity, delay, jitter, packet loss and packet delivery ratio, longevity of route, route overhead, reliability, and survivability. Case studies, examples, and exercises are provided throughout the book.

"Handbook of Mobile Ad Hoc Networks for Mobility Models" is for advanced-level students and researchers concentrating on electrical engineering and computer science within wireless technology. Industry professionals working in the areas of mobile ad hoc networks, communications engineering, military establishments engaged in communications engineering, equipment manufacturers who are designing radios, mobile wireless routers, wireless local area networks, and mobile ad hoc network equipment will find this book useful as well.

Product Configurators - Tools and Strategies for the Personalization of Objects (Hardcover): Fabio Schillaci Product Configurators - Tools and Strategies for the Personalization of Objects (Hardcover)
Fabio Schillaci
R4,502 Discovery Miles 45 020 Ships in 10 - 15 working days

This book provides a source of inspiration and a manual for designers, entrepreneurs and professionals who are looking into the practical application of product configurators. In this growing profession, there is a need for a book which focuses on the configuration process from a design perspective. The book delves into the practical application of configurators using case studies of selected firms that present their most significant works. It offers the reader tips, suggestions, technical details and critical issues which need to be considered, from experienced actors and pioneers worldwide, which include: Unfold, Belgium In-flexions, France Nervous System, USA Okinlab, Germany SkimLab, France Twikit, Belgium INDG, The Netherlands ZeroLight, United Kingdom 3Dimerce, The Netherlands 3DSource, USA Bagaar, Belgium MyCustomizer, Canada Combeenation, Austria

Objects and Systems - Principled Design with Implementations in C++ and Java (Hardcover, 1997 ed.): Bernard P. Zeigler Objects and Systems - Principled Design with Implementations in C++ and Java (Hardcover, 1997 ed.)
Bernard P. Zeigler
R1,604 Discovery Miles 16 040 Ships in 18 - 22 working days

The author's aim in this textbook is to provide students with a clear understanding of the relationship between the principles of object-oriented programming and software engineering. Professor Zeigler takes an approach based on state representation to formal specification. Consequently, this book is unique through its - emphasis on formulating primitives from which all other functionality can be built; - integral use of a semi-formal behaviour specification language based on state transition concepts; -differentiation between behaviour and implementation; -a reusable heterogeneous container class library; -ability to show the elegance and power of ensemble methods with non-trivial examples. As a result, students studying software engineering will find this a distinctive and valuable approach to programming and systems engineering.

Internet E-Mail - Protocols, Standards, and Implementation (Hardcover): Lawrence Hughes Internet E-Mail - Protocols, Standards, and Implementation (Hardcover)
Lawrence Hughes
R3,256 Discovery Miles 32 560 Ships in 18 - 22 working days

Aims to strengthen the reader's knowledge of the fundamental concepts and technical details necessary to develop, implement, or debug e-mail software. The text explains the underlying technology and describes the key Internet e-mail protocols and extensions such as SMTP, POP3, IMAP, MIME and DSN. It aims to help the reader build a sound understanding of e-mail archtitecture, message flow and tracing protocols, and includes real-world examples of message exchanges with program code that they can refer to when developing or debugging their own systems. The reader should also gain valuable insight into various security topics, including public and secret key encryption, digital signatures and key management. Each chapter begins with a detailed definition list to help speed the reader's understanding of technical terms and acronyms. The CD-ROM contains a listing of related Internet RFCs, as well as RSA PKCS documents, Eudora 3.0 freeware client, and the free user version of Software.com.Post.Office Server for Windows NT 3.0.

These Things Really Do Happen To Me (Paperback): Khaya Dlanga These Things Really Do Happen To Me (Paperback)
Khaya Dlanga 1
R250 R227 Discovery Miles 2 270 Save R23 (9%) Ships in 5 - 10 working days

Sometimes real life is stranger than fiction. That certainly is the case when considering the things that happen to Khaya Dlanga in the course of his everyday life. Khaya often shares these stories in brief via Instagram or his other social media platforms. He is finally succumbing to the pressure from the many people who read his posts and want more details, and is telling all of these stories and more in These Things Really Do Happen To Me.

Always entertaining, and often containing astute observations regarding various social practices and situations, Khaya tells wide-ranging stories – his lunch with William Shatner; how he fell asleep next to President Thabo Mbeki; how he got hit on by a deaf girl; how his dreadlocks didn’t get the expected reaction from his mom; the greatest pick-up line ever used on him; awkward encounters with exes; what happens when you parallel park in Parkhurst; and what he has learnt in the course of his eventful life – that are guaranteed to entertain and enlighten readers.

User Community Discovery (Hardcover, 1st ed. 2015): Georgios Paliouras, Symeon Papadopoulos, Dimitrios Vogiatzis, Yiannis... User Community Discovery (Hardcover, 1st ed. 2015)
Georgios Paliouras, Symeon Papadopoulos, Dimitrios Vogiatzis, Yiannis Kompatsiaris
R1,402 Discovery Miles 14 020 Ships in 18 - 22 working days

This book redefines community discovery in the new world of Online Social Networks and Web 2.0 applications, through real-world problems and applications in the context of the Web, pointing out the current and future challenges of the field. Particular emphasis is placed on the issues of community representation, efficiency and scalability, detection of communities in hypergraphs, such as multi-mode and multi-relational networks, characterization of social media communities and online privacy aspects of online communities. User Community Discovery is for computer scientists, data scientists, social scientists and complex systems researchers, as well as students within these disciplines, while the connections to real-world problem settings and applications makes the book appealing for engineers and practitioners in the industry, in particular those interested in the highly attractive fields of data science and big data analytics.

branding@thedigitalage (Hardcover): H Meyers, R. Gerstman branding@thedigitalage (Hardcover)
H Meyers, R. Gerstman
R1,398 Discovery Miles 13 980 Ships in 18 - 22 working days

The advent of the Internet and other new digital technologies means that companies—be they virtual or traditional bricks-and-mortar—must develop a successful strategy for presenting compelling brands in the virtual world. Drawing on their experience with Interbrand, the world's largest branding consultancy, and including chapters by branding experts from such companies as Pepsi-Cola, Procter & Gamble, and Hewlett Packard, the authors focus on the strategic role of e-branding. Practical, tested, and designed for companies in any industry, this book presents a lively look at creating and sustaining e-brands beyond the current dot-com fizzle.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Six Years With Al Qaeda - The Stephen…
Tudor Caradoc-Davies Paperback R307 Discovery Miles 3 070
Conceptualizing Terrorism
Anthony Richards Hardcover R2,871 Discovery Miles 28 710
With the Hungarian Independence…
Istvan Szent-Miklosy Hardcover R2,541 Discovery Miles 25 410
Open Source Intelligence in a Networked…
Anthony Olcott Hardcover R4,318 Discovery Miles 43 180
Sword of Islam - Muslim Extremists from…
John F. Murphy Hardcover R658 Discovery Miles 6 580
Terrorism, U.S. Strategy, and Reagan…
Marc A. Celmer Hardcover R2,528 Discovery Miles 25 280
How Globalization Spurs Terrorism - The…
Fathali M. Moghaddam Hardcover R1,551 Discovery Miles 15 510
Apartheid Spies And The Revolutionary…
Billy Keniston Paperback R450 R415 Discovery Miles 4 150
Extremist Groups and Conflict Resolution…
Hitkias Assefa, Paul Wahrhaftig Hardcover R1,463 Discovery Miles 14 630
Funding Extended Conflicts - Korea…
Richard M Miller Hardcover R1,767 Discovery Miles 17 670

 

Partners