![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General theory of computing > Systems analysis & design
A collection of best practices and effective implementation recommendations that are proven to work, Secure, Resilient, and Agile Software Development leaves the boring details of software security theory out of the discussion as much as possible to concentrate on practical applied software security for practical people. Written to aid your career as well as your organization, the book shows how to gain skills in secure and resilient software development and related tasks. The book explains how to integrate these development skills into your daily duties, thereby increasing your professional value to your company, your management, your community, and your industry. Secure, Resilient, and Agile Software Development was written for the following professionals: AppSec architects and program managers in information security organizations Enterprise architecture teams with application development focus Scrum teams DevOps teams Product owners and their managers Project managers Application security auditors With a detailed look at Agile and Scrum software development methodologies, this book explains how security controls need to change in light of an entirely new paradigm on how software is developed. It focuses on ways to educate everyone who has a hand in any software development project with appropriate and practical skills to Build Security In. After covering foundational and fundamental principles for secure application design, this book dives into concepts, techniques, and design goals to meet well-understood acceptance criteria on features an application must implement. It also explains how the design sprint is adapted for proper consideration of security as well as defensive programming techniques. The book concludes with a look at white box application analysis and sprint-based activities to improve the security and quality of software under development.
This textbook details the architecture of a digital coherent optical system and describes its main digital signal processing (DSP) algorithms. The authors first show how the combination of advanced modulation techniques, DSP and coherent detection has led to significant gains in capacity and ease of operation. The authors follow the path of the information from its generation in the transmitter, to propagation through the fiber and processing by the DSP algorithms in the receiver. The work summarizes academic results and presents them in a didactic way to students and practitioners working on the area of optical communications. A full suite of classroom materials is included for easy integration into a curriculum, containing theoretic and simulation problems, and off-the-shelf Matlab/Octave functions.
This book serves three basic purposes: (1) a tutorial-type reference for complex systems engineering (CSE) concepts and associated terminology, (2) a recommendation of a proposed methodology showing how the evolving practice of CSE can lead to a more unified theory, and (3) a complex systems (CSs) initiative for organizations to invest some of their resources toward helping to make the world a better place. A wide variety of technical practitioners-e.g., developers of new or improved systems (particularly systems engineers), program and project managers, associated staff/workers, funders and overseers, government executives, military officers, systems acquisition personnel, contract specialists, owners of large and small businesses, professional society members, and CS researchers-may be interested in further exploring these topics. Readers will learn more about CS characteristics and behaviors and CSE principles and will therefore be able to focus on techniques that will better serve them in their everyday work environments in dealing with complexity. The fundamental observation is that many systems inherently involve a deeper complexity because stakeholders are engaged in the enterprise. This means that such CSs are more difficult to invent, create, or improve upon because no one can be in total control since people cannot be completely controlled. Therefore, one needs to concentrate on trying to influence progress, then wait a suitable amount of time to see what happens, iterating as necessary. With just three chapters in this book, it seems to make sense to provide a tutorial introduction that readers can peruse only as necessary, considering their background and understanding, then a chapter laying out the suggested artifacts and methodology, followed by a chapter emphasizing worthwhile areas of application.
The performance of an algorithm used depends on the GNA. This book focuses on the comparison of optimizers, it defines a stress-outcome approach which can be derived all the classic criteria (median, average, etc.) and other more sophisticated. Source-codes used for the examples are also presented, this allows a reflection on the "superfluous chance," succinctly explaining why and how the stochastic aspect of optimization could be avoided in some cases.
The volume contains latest research on software reliability assessment, testing, quality management, inventory management, mathematical modeling, analysis using soft computing techniques and management analytics. It links researcher and practitioner perspectives from different branches of engineering and management, and from around the world for a bird's eye view on the topics. The interdisciplinarity of engineering and management research is widely recognized and considered to be the most appropriate and significant in the fast changing dynamics of today's times. With insights from the volume, companies looking to drive decision making are provided actionable insight on each level and for every role using key indicators, to generate mobile-enabled scorecards, time-series based analysis using charts, and dashboards. At the same time, the book provides scholars with a platform to derive maximum utility in the area by subscribing to the idea of managing business through performance and business analytics.
Managing Trade-Offs in Adaptable Software Architectures explores the latest research on adapting large complex systems to changing requirements. To be able to adapt a system, engineers must evaluate different quality attributes, including trade-offs to balance functional and quality requirements to maintain a well-functioning system throughout the lifetime of the system. This comprehensive resource brings together research focusing on how to manage trade-offs and architect adaptive systems in different business contexts. It presents state-of-the-art techniques, methodologies, tools, best practices, and guidelines for developing adaptive systems, and offers guidance for future software engineering research and practice. Each contributed chapter considers the practical application of the topic through case studies, experiments, empirical validation, or systematic comparisons with other approaches already in practice. Topics of interest include, but are not limited to, how to architect a system for adaptability, software architecture for self-adaptive systems, understanding and balancing the trade-offs involved, architectural patterns for self-adaptive systems, how quality attributes are exhibited by the architecture of the system, how to connect the quality of a software architecture to system architecture or other system considerations, and more.
Control system design is a challenging task for practicing engineers. It requires knowledge of different engineering fields, a good understanding of technical specifications and good communication skills. The current book introduces the reader into practical control system design, bridging the gap between theory and practice. The control design techniques presented in the book are all model based., considering the needs and possibilities of practicing engineers. Classical control design techniques are reviewed and methods are presented how to verify the robustness of the design. It is how the designed control algorithm can be implemented in real-time and tested, fulfilling different safety requirements. Good design practices and the systematic software development process are emphasized in the book according to the generic standard IEC61508. The book is mainly addressed to practicing control and embedded software engineers - working in research and development - as well as graduate students who are faced with the challenge to design control systems and implement them in real-time."
This unique book deals with the migration of existing hard IP from one technology to another, using repeatable procedures. It will allow CAD practitioners to quickly develop methodologies that capitalize on the large volumes of legacy data available within a company today.
This open access book constitutes the refereed post-conference proceedings of the First IFIP International Cross-Domain Conference on Internet of Things, IFIPIoT 2018, held at the 24th IFIP World Computer Congress, WCC 2018, in Poznan, Poland, in September 2018. The 12 full papers presented were carefully reviewed and selected from 24 submissions. Also included in this volume are 4 WCC 2018 plenary contributions, an invited talk and a position paper from the IFIP domain committee on IoT. The papers cover a wide range of topics from a technology to a business perspective and include among others hardware, software and management aspects, process innovation, privacy, power consumption, architecture, applications.
This book surveys recent applications of inspection models, maintenance models and cumulative damage models, as well as discusses the policies involved with these models. It explains how a stochastic approach can be applied to systems using real-world examples. The book begins by introducing and summarizing standard inspection models. It dedicates chapters to random inspection models and general inspection models, before moving on to discuss inspection policies and checkpoint models. The book discusses inspection of reliability systems, such as missile maintenance systems, as well as Markov models of inspection. The book concludes with a summary of other inspection models, problems they face, and solutions to these problems. Each chapter utilizes examples to illustrate the various models, methods, and policies. This book is of interest to engineering students, researchers, and design and production engineers working in system manufacturing.
This book statistically confirms that complexity and changing technologies that affect the way operators interact within the systems of the nuclear facili-ties exacerbate the severity of incidents caused by human error and details the application of the systems engineering process to reduce human error given industries' rapidly advancing technology. Technology, Human Performance, and Nuclear Facilities: A Systems Engineering Approach to Reduce Human Error provides a basic understand-ing of Human Error/ P erformance and its relation to industrial operations and advancing technologies incorporated into facilities. The book discusses the context surrounding the complexity of changing technologies at nuclear facili-ties and the potential worsening of problems caused by human error when technology advancements concerning operator interaction with control sys-tems are implemented. It presents how to reduce human error propensity given the incorporation of advanced technology and covers ways to reduce human error using the systems engineering process. Also offered are several concepts related to the operator's involvement in the systems engineering process and the human performance integration with system operational requirements and system testing, evaluation, and validation, and the procedures and training development in the systems engineering process. This book presents empirical evidence for the importance of human performance management in the con-text of nuclear facilities and offers practical recommendations for the improve-ment of this function. Systems engineers, plant/ design engineers, the nuclear industry, plant operations management, and those involved in industrial and nuclear safety will find something of interest in this book.
This book presents soft computing techniques and applications used in healthcare systems, along with the latest advancements. Written as a guide for assessing the roles that these techniques play, the book also highlights implementation strategies, lists problem-solving solutions, and paves the way for future research endeavors in smart and next-generation healthcare systems. This book provides applications of soft computing techniques related to healthcare systems and can be used as a reference guide for assessing the roles that various techniques, such as machine learning, fuzzy logic, and statical mathematics, play in the advancements of smart healthcare systems. The book presents the basics as well as the advanced concepts to help beginners, as well as industry professionals, get up to speed on the latest developments in healthcare systems. The book examines descriptive, predictive, and social network techniques and discusses analytical tools and the important role they play in finding solutions to problems in healthcare systems. A framework of robust and novel healthcare techniques is highlighted, as well as implementation strategies and a setup for future research endeavors. Healthcare Systems Using Soft Computing Techniques is a valuable resource for researchers and postgraduate students in healthcare systems engineering, computer science, information technology, and applied mathematics. The book introduces beginners to-and at the same time brings industry professionals up to speed with-the important role soft computing techniques play in smart healthcare systems.
This book presents an examination of the middleware that can be used to configure and operate heterogeneous node platforms and sensor networks. The middleware requirements for a range of application scenarios are compared and analysed. The text then defines middleware architecture that has been integrated in an approach demonstrated live in a refinery. Features: presents a thorough introduction to the major concepts behind wireless sensor networks (WSNs); reviews the various application scenarios and existing middleware solutions for WSNs; discusses the middleware mechanisms necessary for heterogeneous WSNs; provides a detailed examination of platform-agnostic middleware architecture, including important implementation details; investigates the programming paradigms for WSNs, and for heterogeneous sensor networks in general; describes the results of extensive experimentation and testing, demonstrating that the generic architecture is viable for implementation on multiple platforms.
In this book, the authors write about creativity in teaching and how to enhance creativity in learners. They highlight the new reality of teaching and learning in the digital era, specifically the impact of artificial intelligence, data economy, and artificial minds on modern teaching practices, curriculum design, and the role of teachers in classrooms. Creativity in Teaching and Teaching for Creativity: Modern Practices in the Digital Era approaches human intelligence as a universal gift. It emphasizes that the creativity of human beings is not only a natural quality, but one that can be enhanced as a result of learning. The book suggests new teaching models and approaches and discusses how the role of teachers in the classroom has fundamentally changed, emphasizing the emotional connection between students and teachers. The book will find interest among higher education policymakers who believe in the transformation of the education industry, research scholars who are pursuing their Ph.D. in the fields of education technology and education and learning, as well as those working in the area of education technology and artificial intelligence.
Unleashing the Art of Digital Forensics is intended to describe and explain the steps taken during a forensic examination, with the intent of making the reader aware of the constraints and considerations that apply during a forensic examination in law enforcement and in the private sector. Key Features: * Discusses the recent advancements in Digital Forensics and Cybersecurity * Reviews detailed applications of Digital Forensics for real-life problems * Addresses the challenges related to implementation of Digital Forensics and Anti-Forensic approaches * Includes case studies that will be helpful for researchers * Offers both quantitative and qualitative research articles, conceptual papers, review papers, etc. * Identifies the future scope of research in the field of Digital Forensics and Cybersecurity. This book is aimed primarily at and will be beneficial to graduates, postgraduates, and researchers in Digital Forensics and Cybersecurity.
This book bridges fundamental gaps between control theory and formal methods. Although it focuses on discrete-time linear and piecewise affine systems, it also provides general frameworks for abstraction, analysis, and control of more general models. The book is self-contained, and while some mathematical knowledge is necessary, readers are not expected to have a background in formal methods or control theory. It rigorously defines concepts from formal methods, such as transition systems, temporal logics, model checking and synthesis. It then links these to the infinite state dynamical systems through abstractions that are intuitive and only require basic convex-analysis and control-theory terminology, which is provided in the appendix. Several examples and illustrations help readers understand and visualize the concepts introduced throughout the book.
Artificial Intelligence Techniques in IoT Sensor Networks is a technical book which can be read by researchers, academicians, students and professionals interested in artificial intelligence (AI), sensor networks and Internet of Things (IoT). This book is intended to develop a shared understanding of applications of AI techniques in the present and near term. The book maps the technical impacts of AI technologies, applications and their implications on the design of solutions for sensor networks. This text introduces researchers and aspiring academicians to the latest developments and trends in AI applications for sensor networks in a clear and well-organized manner. It is mainly useful for research scholars in sensor networks and AI techniques. In addition, professionals and practitioners working on the design of real-time applications for sensor networks may benefit directly from this book. Moreover, graduate and master's students of any departments related to AI, IoT and sensor networks can find this book fascinating for developing expert systems or real-time applications. This book is written in a simple and easy language, discussing the fundamentals, which relieves the requirement of having early backgrounds in the field. From this expectation and experience, many libraries will be interested in owning copies of this work.
Computational Intelligence for Wireless Sensor Networks: Principles and Applications provides an integrative overview of the computational intelligence (CI) in wireless sensor networks and enabled technologies. It aims to demonstrate how the paradigm of computational intelligence can benefit Wireless Sensor Networks (WSNs) and sensor-enabled technologies to overcome their existing issues. This book provides extensive coverage of the multiple design challenges of WSNs and associated technologies such as clustering, routing, media access, security, mobility, and design of energy-efficient network operations. It also describes various CI strategies such as fuzzy computing, evolutionary computing, reinforcement learning, artificial intelligence, swarm intelligence, teaching learning-based optimization, etc. It also discusses applying the techniques mentioned above in wireless sensor networks and sensor-enabled technologies to improve their design. The book offers comprehensive coverage of related topics, including: Emergence of intelligence in wireless sensor networks Taxonomy of computational intelligence Detailed discussion of various metaheuristic techniques Development of intelligent MAC protocols Development of intelligent routing protocols Security management in WSNs This book mainly addresses the challenges pertaining to the development of intelligent network systems via computational intelligence. It provides insights into how intelligence has been pursued and can be further integrated in the development of sensor-enabled applications.
Visual Perception and Control of Underwater Robots covers theories and applications from aquatic visual perception and underwater robotics. Within the framework of visual perception for underwater operations, image restoration, binocular measurement, and object detection are addressed. More specifically, the book includes adversarial critic learning for visual restoration, NSGA-II-based calibration for binocular measurement, prior knowledge refinement for object detection, analysis of temporal detection performance, as well as the effect of the aquatic data domain on object detection. With the aid of visual perception technologies, two up-to-date underwater robot systems are demonstrated. The first system focuses on underwater robotic operation for the task of object collection in the sea. The second is an untethered biomimetic robotic fish with a camera stabilizer, its control methods based on visual tracking. The authors provide a self-contained and comprehensive guide to understand underwater visual perception and control. Bridging the gap between theory and practice in underwater vision, the book features implementable algorithms, numerical examples, and tests, where codes are publicly available. Additionally, the mainstream technologies covered in the book include deep learning, adversarial learning, evolutionary computation, robust control, and underwater bionics. Researchers, senior undergraduate and graduate students, and engineers dealing with underwater visual perception and control will benefit from this work.
The Internet has changed significantly from its beginnings as a simple network used to pass data from one computer to another. Containing essential tools for everyday information processing, the Internet is used by small and large organizations alike and continues to evolve with the changing information technology landscape. Technologies and Protocols for the Future of Internet Design: Reinventing the Web aims to provide relevant methods and theories in the area of the Internet design. It is written for the research community and professionals who wish to improve their understanding of future Internet technologies and gain knowledge of new tools and techniques in future Internet design.
Systems Analysis and Design, Eighth Edition offers a practical, visually appealing approach to information systems development.
Human Factors in Systems Engineering shows how to integrate human factors into the design of tools, machines, and systems so that they match human abilities and limitations. Unlike virtually all other books on human factors, which leave the implementation of general guidelines to engineers and designers with little or no human factors expertise, this unique book shows that the proper role of the human factors specialist is to translate general guidelines into project specific design requirements to which engineers can design. Again, while other human factors books ignore the standards, specifications, requirements, and other work products that must be prepared by engineers, this book emphasizes the methods used to generate the human factors inputs for engineering work products, and the points in the development process where these inputs are needed. Comprehensive in its scope, Human Factors in Systems Engineering uses the systems engineering process to provide a broad understanding of the way human factors are used in the development process. It describes the full cycle of a design and shows what human factors inputs engineers and designers need at each stage of development. Well-organized and clearly written, this invaluable text is fully supported by over a hundred illustrations, thirty tables, handy appendices, and extensive bibliographies. Its practical, hands-on approach makes it an indispensable resource for professionals and advanced students in human factors, ergonomics, industrial engineering, and systems engineering. A unique, step-by-step guide to the application of human factors in the system development process Human Factors in Systems Engineering Unlike most current texts which provide general human factors recommendations but leave their interpretation to designers who are usually not trained for it, this book shows the reader how to prepare project specific system requirements that engineers can use easily and effectively. In addition, it fully explains the various work products—the standards and specifications—that engineers must produce during development, and shows what human factors inputs are required in each of them. Focusing on the entire systems engineering process, Human Factors in Systems Engineering offers professionals and advanced students a fresh, much-needed approach to the role of human factors in the design of tools, machines, and systems.
This book discusses the technological aspects for the implementation of Society 5.0. The foundation and recent advances of emerging technologies such as artificial intelligence, data science, Internet of Things, and Big Data for the realization of Society 5.0 are covered. Practical solutions to existing problems, examples, and case studies are also offered. Society 5.0 and the Future of Emerging Computational Technologies: Practical Solutions, Examples, and Case Studies discusses technologies such as machine learning, artificial intelligence, and Internet of Things for the implementation of Society 5.0. It offers a firm foundation and understanding of the recent advancements in various domains such as data analytics, neural networks, computer vision, and robotics, along with practical solutions to existing problems in fields such as healthcare, manufacturing industries, security, and infrastructure management. Applications and implementations are highlighted along with the correlation between technologies. Examples and case studies are presented throughout the book to augment text. This book can be used by research scholars in the engineering domain who wish to gain knowledge and contribute towards a modern and secure future society. The book will also be useful as a reference at universities for postgraduate students who are interested in technological advancements. |
You may like...
Loose Leaf for Fundamentals of Electric…
Charles Alexander, Matthew Sadiku
Loose-leaf
R5,510
Discovery Miles 55 100
|