![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet
"One of the most significant books in my life." -Obie Fernandez, Author, The Rails Way "Twenty years ago, the first edition of The Pragmatic Programmer completely changed the trajectory of my career. This new edition could do the same for yours." -Mike Cohn, Author of Succeeding with Agile , Agile Estimating and Planning , and User Stories Applied ". . . filled with practical advice, both technical and professional, that will serve you and your projects well for years to come." -Andrea Goulet, CEO, Corgibytes, Founder, LegacyCode.Rocks ". . . lightning does strike twice, and this book is proof." -VM (Vicky) Brasseur, Director of Open Source Strategy, Juniper Networks The Pragmatic Programmer is one of those rare tech books you'll read, re-read, and read again over the years. Whether you're new to the field or an experienced practitioner, you'll come away with fresh insights each and every time. Dave Thomas and Andy Hunt wrote the first edition of this influential book in 1999 to help their clients create better software and rediscover the joy of coding. These lessons have helped a generation of programmers examine the very essence of software development, independent of any particular language, framework, or methodology, and the Pragmatic philosophy has spawned hundreds of books, screencasts, and audio books, as well as thousands of careers and success stories. Now, twenty years later, this new edition re-examines what it means to be a modern programmer. Topics range from personal responsibility and career development to architectural techniques for keeping your code flexible and easy to adapt and reuse. Read this book, and you'll learn how to: Fight software rot Learn continuously Avoid the trap of duplicating knowledge Write flexible, dynamic, and adaptable code Harness the power of basic tools Avoid programming by coincidence Learn real requirements Solve the underlying problems of concurrent code Guard against security vulnerabilities Build teams of Pragmatic Programmers Take responsibility for your work and career Test ruthlessly and effectively, including property-based testing Implement the Pragmatic Starter Kit Delight your users Written as a series of self-contained sections and filled with classic and fresh anecdotes, thoughtful examples, and interesting analogies, The Pragmatic Programmer illustrates the best approaches and major pitfalls of many different aspects of software development. Whether you're a new coder, an experienced programmer, or a manager responsible for software projects, use these lessons daily, and you'll quickly see improvements in personal productivity, accuracy, and job satisfaction. You'll learn skills and develop habits and attitudes that form the foundation for long-term success in your career. You'll become a Pragmatic Programmer. Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.
This book investigates the characteristics of simple versus complex systems, and what the properties of a cyber-physical system design are that contribute to an effective implementation and make the system understandable, simple to use, and easy to maintain. The targeted audience is engineers, managers and advanced students who are involved in the design of cyber-physical systems and are willing to spend some time outside the silo of their daily work in order to widen their background and appreciation for the pervasive problems of system complexity. In the past, design of a process-control system (now called cyber-physical systems) was more of an art than an engineering endeavor. The software technology of that time was concerned primarily with functional correctness and did not pay much attention to the temporal dimension of program execution, which is as important as functional correctness when a physical process must be controlled. In the ensuing years, many problems in the design of cyber-physical systems were simplified. But with an increase in the functional requirements and system size, the complexity problems have appeared again in a different disguise. A sound understanding of the complexity problem requires some insight in cognition, human problem solving, psychology, and parts of philosophy. This book presents the essence of the author's thinking about complexity, accumulated over the past forty years.
The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists. "Quantum Attacks on Public-Key Cryptosystems" presemts almost allknown quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems. This book is intended to be used either as a graduate text in computing, communications and mathematics, or as a basic reference in the field.
This book presents cutting-edge work on real-time modelling and processing, a highly active research field in both the research and industrial domains. Going beyond conventional real-time systems, major efforts are required to develop accurate and computational efficient real-time modelling algorithms and design automation tools that reflect the technological advances in high-speed and ultra-low-power transceiver communication architectures based on nanoscale devices. The book addresses basic and more advanced topics, such as I/O buffer circuits for ensuring reliable chip-to-chip communication, I/O buffer behavioural modelling, multiport empirical models for memory interfaces, compact behavioural modelling for memristive devices, and resource reservation modelling for distributed embedded systems. The respective chapters detail new research findings, new models, algorithms, implementations and simulations of the above-mentioned topics. As such, the book will help both graduate students and researchers understand the latest research into real-time modelling and processing.
Towards a Digital Renaissance traces the excitement and optimism of the early internet, the outsider cyberpunk ethic and open access. But it also monitors the more complex but ultimately more commercialised online world of today, a world dominated by corporate business in which many feel that surveillance has become overwhelming. Jeremy Silver's involvement in various start-ups, both as CEO and investor, led to his leadership of Digital Catapult. Towards a Digital Renaissance examines the interplay between state and private financing in the digital sector. It also argues for the internet's potential to transition from a 'medieval' world of the GAFA big four (Google, Amazon, Facebook and Apple), closed and walled up like medieval city states, to a 'digital renaissance' based on the free exchange of ideas and an enabling metaverse made up of virtual reality and artificial intelligence that deepens our experience of reality rather than restricting or monitoring it.
Web search engines are not just indispensable tools for finding and accessing information online, but have become a defining component of the human condition and can be conceptualized as a complex behavior embedded within an individual's everyday social, cultural, political, and information-seeking activities. This book investigates Web search from the non-technical perspective, bringing together chapters that represent a range of multidisciplinary theories, models, and ideas.
What the international phenomenon of The Rules did for conventional dating, The Rules for Online Dating does for the search for love on the Internet. You'll never hit the "reply" button the same way again. Millions of women around the world are meeting men on the Internet, or they've met in person and are corresponding by e-mail. But though e-mail and Net-based dating services have revolutionized the dating landscape, they've created their own pitfalls and challenges. Women need new strategies that will improve their chances of capturing Mr. Right. Boasting the same time-tested formula and romantic spirit that made The Rules an international bestseller and launched thousands of women down the path to committed relationships, The Rules for Online Dating shows all women -- regardless of age, status, or computer savvy -- how to use electronic communication to relate to men in a way that maintains self-esteem and leads to a healthy relationship. Here is a comprehensive list of dos and don'ts that will help every woman conduct an e-courtship safely and successfully; find and keep the interest of suitable mates; and save time, energy, and potential heartache by weeding out dead wood. The Rules for Online Dating takes women through the process -- step by step, Rule by Rule -- to the ultimate goal: a relationship based on mutual attraction, interest, and respect.
IT changes everyday's life, especially in education and medicine. The goal of ITME 2014 is to further explore the theoretical and practical issues of Ubiquitous Computing Application and Wireless Sensor Network. It also aims to foster new ideas and collaboration between researchers and practitioners. The organizing committee is soliciting unpublished papers for the main conference and its special tracks.
This volume explores the nature of the Internet's impact on civil society, addressing the following central questions: is the Internet qualitatively different from the more traditional forms of the media? has the Internet demonstrated real potential to improve civil society through a wider provision of information, an enhancement of communication between government and citizen, or via better state transparency? does the Internet pose a threat to the coherence of civil society as people are encouraged to abandon shared media experiences and pursue narrow interests? in authoritarian states, does the Internet function as a beacon for free speech or as another tool for propaganda?
The Internet has redefined how maps are used. No longer restricted to paper, maps are now transmitted almost instantly and delivered to the user in a fraction of the time required to distribute maps on paper. They are viewed in a more timely fashion. The Internet presents the map user with both a faster method of map distribution and different forms of mapping. This book provides an international perspective on this growing area of information dissemination.
Java is an exciting new object-oriented technology. Hardware for supporting objects and other features of Java such as multithreading, dynamic linking and loading is the focus of this book. The impact of Java's features on micro-architectural resources and issues in the design of Java-specific architectures are interesting topics that require the immediate attention of the research community. While Java has become an important part of desktop applications, it is now being used widely in high-end server markets, and will soon be widespread in low-end embedded computing. Java Microarchitectures contains a collection of papers providing a snapshot of the state of the art in hardware support for Java. The book covers the behavior of Java applications, embedded processors for Java, memory system design, and high-performance single-chip architectures designed to execute Java applications efficiently.
The book presents theory and algorithms for secure networked inference in the presence of Byzantines. It derives fundamental limits of networked inference in the presence of Byzantine data and designs robust strategies to ensure reliable performance for several practical network architectures. In particular, it addresses inference (or learning) processes such as detection, estimation or classification, and parallel, hierarchical, and fully decentralized (peer-to-peer) system architectures. Furthermore, it discusses a number of new directions and heuristics to tackle the problem of design complexity in these practical network architectures for inference.
Small and medium-sized enterprises (SMEs) are recognized as the backbone of today's world economy. However, SMEs are well known for having limitations and acceptance barriers in adopting new technology even though the internet and communications channel's revolution has changed the way people conduct business today. Further, the COVID-19 pandemic has disturbed the operations of SMEs and increased the burden on social media application globally. It is essential that SMEs utilize social media to strengthen their performance. Strengthening SME Performance Through Social Media Adoption and Usage explores experiences in different technological, managerial, organizational, and entrepreneurial environmental issues. It focuses on different conceptions of factors and consequences influencing social media usage and SME performance. Covering topics such as corporate social responsibility, marketing frameworks, and social media adoption, this premier reference source is a valuable resource for entrepreneurs, business leaders and managers, human resource managers, marketers, consultants, students and educators of higher education, librarians, researchers, and academicians.
The book provides complete coverage of fundamental IP networking in Java. It introduces the concepts behind TCP/IP and UDP and their intended use and purpose; gives complete coverage of Java networking APIs, includes an extended discussion of advanced server design, so that the various design principles and tradeoffs concerned are discussed and equips the reader with analytic queuing-theory tools to evaluate design alternatives; covers UDP multicasting, and covers multi-homed hosts, leading the reader to understand the extra programming steps and design considerations required in such environments. After reading this book the reader will have an advanced knowledge of fundamental network design and programming concepts in the Java language, enabling them to design and implement distributed applications with advanced features and to predict their performance. Special emphasis is given to the scalable I/O facilities of Java 1.4 as well as complete treatments of multi-homing and UDP both unicast and multicast.
Advances in automation for electronic commerce require improved understanding and formalization of the objects, processes, and policies of commerce itself. These include business objects such as bills of lading and contracts; processes such as workflows and trade procedures; and policies covering such problems as contract or procedure validation and strategic behaviour. This book is about theory, formalization, and proof-of-concept implementation of these and related matters. In addition to presenting state-of-the-art results, the book places this work in the context of nearly twenty years of developments in formal modelling for electronic commerce. A comprehensive bibliography and index are provided.
In recent years, the emerging field of agent technologies has become mainstream in Web engineering. With constant field developments and updates, a reference source is needed that reflects the increased scope of agent technology application domains and development practices and tools. ""Agent Technologies and Web Engineering: Applications and Systems"" presents the latest tools and applications addressing critical issues involved with information technology and Web engineering research. Covering topics such as next-generation networks, XML query processing, and Semantic Web services, this book provides cutting-edge research for practitioners and academicians involved in agent technology and Web engineering fields.
This volume is a collection of selected papers using the framework
of inframarginal analysis of the division of labour held at Monash
University on 6-7 July 2001. This framework, pioneered mainly by
Professor Xiaokai Yang, (with joint researches involving all the
three editors and many of the authors), has been recommended by
Professor James Buchanan (Nobel Laureate in Economics) as the most
important analysis in economics in the world today.
This book introduces the concepts, applications and development of data science in the telecommunications industry by focusing on advanced machine learning and data mining methodologies in the wireless networks domain. Mining Over Air describes the problems and their solutions for wireless network performance and quality, device quality readiness and returns analytics, wireless resource usage profiling, network traffic anomaly detection, intelligence-based self-organizing networks, telecom marketing, social influence, and other important applications in the telecom industry. Written by authors who study big data analytics in wireless networks and telecommunication markets from both industrial and academic perspectives, the book targets the pain points in telecommunication networks and markets through big data. Designed for both practitioners and researchers, the book explores the intersection between the development of new engineering technology and uses data from the industry to understand consumer behavior. It combines engineering savvy with insights about human behavior. Engineers will understand how the data generated from the technology can be used to understand the consumer behavior and social scientists will get a better understanding of the data generation process. |
You may like...
The Socialist Imperative - From Gotha to…
Michael A Lebowitz
Hardcover
R2,212
Discovery Miles 22 120
|