![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Systems management
Access US Census Bureau geographic and demographic data directly within R. Wrangle Census data with tidyverse tools and work with margins of error in the American Community Survey. Make maps and interactive web visualizations with US Census data. Explore Census data with spatial analysis using the sf package. Integrate Census data into spatial and machine learning models.
Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues. It focuses on the practical programming materials that will teach readers how to implement security solutions using the most popular software packages. It's not limited to any specific cybersecurity subtopics and the chapters touch upon a wide range of cybersecurity domains, ranging from malware to biometrics and more. Features The book presents the implementation of a unique socio-technical solution for real-time cybersecurity awareness. It provides comprehensible knowledge about security, risk, protection, estimation, knowledge and governance. Various emerging standards, models, metrics, continuous updates and tools are described to understand security principals and mitigation mechanism for higher security. The book also explores common vulnerabilities plaguing today's web applications. The book is aimed primarily at advanced undergraduates and graduates studying computer science, artificial intelligence and information technology. Researchers and professionals will also find this book useful.
Presenting a reference model architecture for the design of intelligent systems Engineering of Mind presents the foundations for a computational theory of intelligence. It discusses the main streams of investigation that will eventually converge in a scientific theory of mind and proposes an avenue of research that might best lead to the development of truly intelligent systems. This book presents a model of the brain as a hierarchy of massive parallel computational modules and data structures interconnected by information pathways. Using this as the basic model on which intelligent systems should be based, the authors propose a reference model architecture that accommodates concepts from artificial intelligence, control theory, image understanding, signal processing, and decision theory. Algorithms, procedures, and data embedded within this architecture would enable the analysis of situations, the formulation of plans, the choice of behaviors, and the computation of uncertainties. The computational power to implement the model can be achieved in practical systems in the foreseeable future through hierarchical and parallel distribution of computational tasks. The authors’ reference model architecture is expressed in terms of the Real-time Control System (RCS) that has been developed primarily at the National Institute of Standards and Technology. Suitable for engineers, computer scientists, researchers, and students, Engineering of Mind blends current theory and practice to achieve a coherent model for the design of intelligent systems.
Technology Innovation discusses the fundamental aspects of processes and structures of technology innovation. It offers a new perspective concerning fundamentals aspects not directly involved in the complex relations existing between technology and the socio-economic system. By considering technology and its innovation from a scientific point of view, the book presents a novel definition of technology as a set of physical, chemical, and biological phenomena, producing an effect exploitable for human purposes. Expanding on the general model of technology innovation by linking the model of technology, based on a structure of technological operations, with the models of the structures for technology innovation, based on organization of fluxes of knowledge and capitals, the book considers various technological processes and the stages of the innovation process. Offers a perspective on the evolution of technology in the frame of an industrial platform network Explains a novel definition of technology as a set of physical, chemical, and biological phenomena producing an effect exploitable for human purposes Discusses technology innovation as result of structures organizing fluxes of knowledge and capitals Provides a technology model simulating the functioning of technology with its optimization Presents a technology innovation model explaining the territorial technology innovation process The book is intended for academics, graduate students, technology developers who are involved in operations management and research, innovation, and technology development.
ERP Systems for Manufacturing Supply Chains: Applications, Configuration, and Performance provides insight into the core architecture, modules, and process support of ERP systems used in a manufacturing supply chain. This book explains the building blocks of an ERP system and how they can be used to increase performance of manufacturing supply chains. Starting with an overview of basic concepts of supply chain and ERP systems, the book delves into the core ERP modules that support manufacturing facilities and organizations. It examines each module's structure and functionality as well as the process support the module provides. Cases illustrate how the modules can be applied in manufacturing environments. Also covered is how the ERP modules can be configured to support manufacturing supply chains. Setting up an ERP system to support the supply chain within single manufacturing facility provides insight into how an ERP system is used in the smallest of manufacturing enterprises, as well as lays the foundation for ERP systems in manufacturing organizations. The book then supplies strategies for larger manufacturing enterprises and discusses how ERP systems can be used to support a complete manufacturing supply chain across different facilities and companies. The ERP systems on the market today tend to use common terminology and naming for describing specific functions and data units in the software. However, there are differences among packages. The book discusses various data and functionalities found in different ERP-software packages and uses generic and descriptive terms as often as possible to make these valid for as many ERP systems as possible. Filled with insight into ERP system's core modules and functions, this book shows how ERP systems can be applied to support a supply chain in the smallest of manufacturing organizations that only consist of a single manufacturing facility, as well as large enterprises where the manufacturing supply chain crosses multiple facilities and companies.
As transactions and other business functions move online and grow more popular every year, the finance and banking industries face increasingly complex data management and identity theft and fraud issues. AI can bring many financial and business functions to the next level, as systems using deep learning technologies are able to analyze patterns and spot suspicious behavior and potential fraud. In this volume, the focus is on the application of artificial intelligence in finance, business, and related areas. The book presents a selection of chapters presenting cutting-edge research on current business practices in finance and management. Topics cover the use of AI in e-commerce systems, financial services, fraud prevention, identifying loan-eligible customers, online business, Facebook social commerce, insurance industry, online marketing, and more.
New Work and Industry 4.0 have matured and this book takes a practical, experience-based approach to project management in these areas. It introduces methods and covers the practical aspects. It critically examines existing approaches and practices and shows their limitations. The book covers appropriate methods as well as human and social aspects. It contributes to the ongoing discussion of business practices and methods. It also aims to stimulate dialogue in the professional community. Digital Project Practice for New Work and Industry 4.0 begins by introducing basic concepts in the context of Industry 4.0 and discussing how they might influence organizational communication and impact the work environment. After examining the possibilities and challenges of remote work and collaboration in distributed teams all over the world, the book looks at a company's fundamental changes related to New Work from a practical business perspective as well as legal and ethical perspectives. It reviews the case of the VW emission scandal and recommends ways to improve corporate culture. Legal issues include New Work and hybrid forms of collaboration as well as liability for automated decisions (i.e., the potential need for an 'electronic person'). Other implications for the workplace include how: Industry 4.0 might influence the potential demand for "Digital Unions" Industry 4.0, and lean production, and their applications can change industrial practices Open Banking presents new approaches and new business models Work structures and systems can empower employees' work self-management This book also looks at how New Work effects individual workers. It addresses digital stress, introduces strategies for coping with it, and discusses related topics. It also explores the benefits of meditation and the economics of mind, body, and spirit. In essence, this book cover appropriate methods along with human and social factors. It also covers practice, different perspectives, and various experiences from all around the globe. Contributing to the ongoing discussion on business practices and methods, this book will nourish and stimulate dialogue in the professional community.
Advanced Methods of Pharmacokinetic and Pharmocodynamic Systems
Analysis Volume 3 is vital to professionals and academicians
working in drug development and bioengineering. Both basic and
clinical scientists will benefit from this work.
This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usability on security. The book also unveils the impact of digital currency and the dark web on the loT-security economy. It's both informative and entertaining. "Filled with practical and relevant examples based on years of experience ... with lively discussions and storytelling related to loT security design flaws and architectural issues."- Dr. James F. Ransome, Senior Director of Security Development Lifecycle (SOL) Engineering, Intel 'There is an absolute treasure trove of information within this book that will benefit anyone, not just the engineering community. This book has earned a permanent spot on my office bookshelf."- Erv Comer, Fellow of Engineering, Office of Chief Architect Zebra Technologies 'The importance of this work goes well beyond the engineer and architect. The IoT Architect's Guide to Attainable Security & Privacy is a crucial resource for every executive who delivers connected products to the market or uses connected products to run their business."- Kurt Lee, VP Sales and Strategic Alliances at PWNIE Express "If we collectively fail to follow the advice described here regarding loT security and Privacy, we will continue to add to our mounting pile of exploitable computing devices. The attackers are having a field day. Read this book, now."- Brook S.E. Schoenfield, Director of Advisory Services at IOActive, previously Master Security Architect at McAfee, and author of Securing Systems
This book delves into the essential concepts and technologies of acquiring systems. It fills the gap left by manuals and standards and provides practical knowledge and insight that allow engineers to navigate systems as well as the massive tomes containing standards and manuals. Dedicated to card acquiring exclusively, the book covers: Payment cards and protocols EMV contact chip and contactless transactions Disputes, arbitration, and compliance Data security standards in the payment card industry Validation algorithms Code tables Basic cryptography Pin block formats and algorithms When necessary the book discusses issuer-side features or standards insomuch as they are required for the sake of completeness. For example, protocols such as EMV 3-D Secure are not covered to the last exhaustive detail. Instead, this book provides an overview, justification, and logic behind each message of the protocol and leaves the task of listing all fields and their formats to the standard document itself. The chapter on EMV contact transactions is comprehensive to fully explain this complex topic in order to provide a basis for understanding EMV contactless transaction. A guide to behind-the-scenes business processes, relevant industry standards, best practices, and cryptographic algorithms, Acquiring Card Payments covers the essentials so readers can master the standards and latest developments of card payment systems and technology
One of the most difficult, yet important, questions regarding projects is "What advantages will this project create for the investors and key stakeholders?" Projects and programs should be treated as investments. This means that the focus of projects shifts from delivering within the triple constraints (time-cost-quality) towards some of the more fundamental questions: What is the purpose of this investment? What are the specific advantages expected? Are these benefits worth the investment? Implementing Project and Program Benefit Management is written for executives and practitioners within the portfolio, program, and project environment. It guides them through the important work that must be addressed as the investment progresses towards the realization of benefits. The processes discussed cover the strategic elements of benefits realization as well as the more detailed requirements, which are the domain of the program delivery teams and the operational users. Using real cases to explain complex situations, operational teams and wider groups of stakeholders, including communities affected by infrastructure projects, will be able to engage in the conversation with the sponsors and delivery teams. Covering an area of program and project management that is rapidly becoming more widely valued, this book blends theory with practical experience to present a clear process flow to managing the benefits life cycle. Best practices are defined, and pitfalls and traps are identified to enable practitioners to apply rigor and structure to this crucial discipline.
"Vivek Kale's Creating Smart Enterprises goes smack-dab at the heart of harnessing technology for competing in today's chaotic digital era. Actually, for him, it's SMACT-dab: SMACT (Social media, Mobile, Analytics and big data, Cloud computing, and internet of Things) technologies. This book is required reading for those that want to stay relevant and win, and optional for those that don't." -Peter Fingar, Author of Cognitive Computing and business technology consultant Creating Smart Enterprises unravels the mystery of social media, mobile, analytics and big data, cloud, and Internet of Things (SMACT) computing and explains how it can transform the operating context of business enterprises. It provides a clear understanding of what SMACT really means, what it can do for smart enterprises, and application areas where it is practical to use them. All IT professionals who are involved with any aspect of a SMACT computing project will profit by using this book as a roadmap to make a more meaningful contribution to the success of their computing initiatives. This pragmatic book: Introduces the VUCA (volatility, uncertainty, complexity, and ambiguity) business ecosystem confronted by the businesses today. Describes the challenges of defining business and IT strategies and of aligning them as well as their impact on enterprise governance. Provides a very wide treatment of the various components of SMACT computing, including the Internet of Things (IoT) and its constituting technologies like RFID, wireless networks, sensors, and wireless sensor networks (WSNs). This book addresses the key differentiator of SMACT computing environments and solutions that combine the power of an elastic infrastructure with analytics. The SMACT environment is cloud-based and inherently mobile. Information management processes can analyze and discern recurring patterns in colossal pools of operational and transactional data. Analytics, big data, and IoT computing leverage and transform these data patterns to help create successful, smart enterprises.
Within this context, big data analytics (BDA) can be an important tool given that many analytic techniques within the big data world have been created specifically to deal with complexity and rapidly changing conditions. The important task for public sector organizations is to liberate analytics from narrow scientific silos and expand it across internally to reap maximum benefit across their portfolios of programs. This book highlights contextual factors important to better situating the use of BDA within government organizations and demonstrates the wide range of applications of different BDA techniques. It emphasizes the importance of leadership and organizational practices that can improve performance. It explains that BDA initiatives should not be bolted on but should be integrated into the organization's performance management processes. Equally important, the book includes chapters that demonstrate the diversity of factors that need to be managed to launch and sustain BDA initiatives in public sector organizations.
Benefits realization management (BRM) is a key part of governance, because it supports the strategic creation of value and provides the correct level of prioritization and executive support to the correct initiatives. Because of its relevance to the governance process, BRM has a strong influence over project success and is a link between strategic planning and strategy execution. This book guides portfolio, program, and project managers through the process of benefits realization management so they can maximize business value. It discusses why and how programs and projects are expected to enable value creation, and it explains the role of BRM in value creation. The book provides a flexible framework for: Translating business strategy drivers into expected benefits and explains the subsequent composition of a program and project portfolio that can realize expected benefits Planning the benefits realization expected from programs and projects and then making it happen Keeping programs and projects on track Reviewing and evaluating the benefits achieved or expected against the original baselines and the current expectations. To help project, program, and portfolio managers on their BRM journey, as well as to support business managers in executing business strategies, the book identifies key organizational responsibilities and roles involved in BRM practices, and it provides a simple reference that can be mapped against any organizational structure. A detailed and comprehensive case study illustrates each phase of the BRM framework as it links business strategy to project work, benefits, and business value. Each chapter ends with a series questions that provide a BRM self-assessment. The book concludes with a set of templates and detailed instructions to ensure successful deployment of BRM.
This book gives a review of the principles, methods and techniques of important and emerging research topics and technologies in Channel Coding, including theory, algorithms, and applications. Edited by leading people in the field who, through their reputation, have been able to commission experts to write on a particular topic. With this reference source you will: Quickly grasp a new area of research Understand the underlying principles of a topic and its applications Ascertain how a topic relates to other areas and learn of the research issues yet to be resolved
1) What to do when you get hacked 2) A guide to incident response 3) Incident response and cybersecurity for small businesses
1) What to do when you get hacked 2) A guide to incident response 3) Incident response and cybersecurity for small businesses
Unique selling point: A project management book that focuses on managing projects in business Core audience: Project and business managers Place in the market: Professional book that can be used for continuing education
Written for those starting a career in IT or whose career is well advanced, this career guide shows how to blaze a path to success through the jungle of modern IT. With a career spanning five decades, the author shares lessons he learned the hard way so readers do not have to learn them the hard way. By emphasizing the importance of business processes and applications to IT, this book explains how to understand the value and positioning of hardware and software technology in order to make appropriate decisions. It addresses the importance of IT architecture and the roles service and systems management play. It also explains service level agreements (SLAs) and provides sample SLAs. Readers learn how to conduct IT assessments using SWOT (strengths, weaknesses, opportunities, and threats) analysis. It also shows how to use root-cause analysis (RCA) to detect the sources of failure and poor performance. An overview of risk management and the steps involved in developing a business continuity plan are also included. The book looks at all facets of an IT professional's career. It explains how to build an IT team and examines the roles and responsibilities within the team. It shows how to provide professional customer care to IT clients. Business executives recognize the importance of IT, and this book shows technology professionals how to thrive in the business world. It covers: Making effective presentations Report and proposal writing Negotiating and persuasion skills Running productive meetings Time and stress management The book also discusses such important career skills as listening, continual and incremental learning, and communicating at all levels. From its templates and checklists to its comprehensive and holistic view of a successful IT career, this book is an indispensable guide for every professional working in IT today and tomorrow.
Is your enterprise's strategy for cybersecurity just crossing its fingers and hoping nothing bad ever happens? If so...you're not alone. Getting cybersecurity right is all too often an afterthought for Fortune 500 firms, bolted on and hopefully creating a secure environment. We all know this approach doesn't work, but what should a smart enterprise do to stay safe? Today, cybersecurity is no longer just a tech issue. In reality, it never was. It's a management issue, a leadership issue, a strategy issue: It's a "must have right"...a survival issue. Business leaders and IT managers alike need a new paradigm to work together and succeed. After years of distinguished work as a corporate executive, board member, author, consultant, and expert witness in the field of risk management and cybersecurity, David X Martin is THE pioneering thought leader in the new field of CyRMSM. Martin has created an entirely new paradigm that approaches security as a business problem and aligns it with business needs. He is the go-to guy on this vitally important issue. In this new book, Martin shares his experience and expertise to help you navigate today's dangerous cybersecurity terrain, and take proactive steps to prepare your company-and yourself -to survive, thrive, and keep your data (and your reputation) secure.
Building a data-driven organization (DDO) is an enterprise-wide initiative that may consume and lock up resources for the long term. Understandably, any organization considering such an initiative would insist on a roadmap and business case to be prepared and evaluated prior to approval. This book presents a step-by-step methodology in order to create a roadmap and business case, and provides a narration of the constraints and experiences of managers who have attempted the setting up of DDOs. The emphasis is on the big decisions - the key decisions that influence 90% of business outcomes - starting from decision first and reengineering the data to the decisions process-chain and data governance, so as to ensure the right data are available at the right time, every time. Investing in artificial intelligence and data-driven decision making are now being considered a survival necessity for organizations to stay competitive. While every enterprise aspires to become 100% data-driven and every Chief Information Officer (CIO) has a budget, Gartner estimates over 80% of all analytics projects fail to deliver intended value. Most CIOs think a data-driven organization is a distant dream, especially while they are still struggling to explain the value from analytics. They know a few isolated successes, or a one-time leveraging of big data for decision making does not make an organization data-driven. As of now, there is no precise definition for data-driven organization or what qualifies an organization to call itself data-driven. Given the hype in the market for big data, analytics and AI, every CIO has a budget for analytics, but very little clarity on where to begin or how to choose and prioritize the analytics projects. Most end up investing in a visualization platform like Tableau or QlikView, which in essence is an improved version of their BI dashboard that the organization had invested into not too long ago. The most important stakeholders, the decision-makers, are rarely kept in the loop while choosing analytics projects. This book provides a fail-safe methodology for assured success in deriving intended value from investments into analytics. It is a practitioners' handbook for creating a step-by-step transformational roadmap prioritizing the big data for the big decisions, the 10% of decisions that influence 90% of business outcomes, and delivering material improvements in the quality of decisions, as well as measurable value from analytics investments. The acid test for a data-driven organization is when all the big decisions, especially top-level strategic decisions, are taken based on data and not on the collective gut feeling of the decision makers in the organization.
Align IT projects strategically to achieve business goals and objectives Project management and leadership to seize opportunities and manage threats Build and follow a roadmap to implement strategic governance Assess and improve project management capabilities Includes templates and case studies
This book offers a straight-forward guide to the fundamental work of governing bodies and the people who serve on them. The aim is of the book is to help every member serving on a governing body understand and improve their contribution to the entity and governing body they serve. The book is rooted in research, including five years' work by the author as a Research Fellow of Nuffield College, Oxford.
With all signs pointing to an increased use of and interest in project-based work in modern organizations, the better scholars are able to make sense of the current state of the field through theory development and empirical investigation, the more successful projects promise to become. This book is a welcome addition to our field and will be, I am sure, an important work and source for future reference well into the future. -Dr. Jeffrey Pinto, Pennsylvania State University The goal of practicing project managers and scholars alike lies in solving the puzzle of how to manage projects toward successful completion. However, understanding what comprises project "success"-seemingly such an innocent question-has come to represent one of the most challenging problems for project managers and scholars. Who determines success? At what point in time is success best measured? How do diverse stakeholders define success? What happens when their perspectives collide? What is the difference between project success and project management success? These are surprisingly complex problems. For every principle or rule posited, a brief investigation reveals that there are numerous exceptions, muddying the waters and making these ideas increasingly opaque. Project Management Methodologies, Governance and Success addresses this challenge head-on, putting into proper context the critical issues that shape our understanding of the project management research process. Employing a concept referred to as "philosophical triangulation," the book shows how to overcome the weaknesses or intrinsic biases that disrupt and minimize the impact of so much organizational research. It places organizational governance and success within their proper context allowing scholars to identify the best methods for investigating project-based work. It links together in a cogent manner the diverse themes of research theory and design, projects and project success, and organizational governance. In effect, this book demonstrates that to fully understand how to undertake research in projects, theory and method are inextricably interwoven.
Unique selling point: Combines theory with practice and applications for advanced intelligent healthcare informatics Core audience: Researchers and academics in healthcare informatics and machine learning Place in the market: Reference work |
You may like...
Cloud Analytics for Industry 4.0
Sirisha Potluri, Sachi Nandan Mohanty, …
Hardcover
R4,661
Discovery Miles 46 610
Intersecting Cultures in Music and Dance…
Linda Ashley, David Lines
Hardcover
R3,419
Discovery Miles 34 190
Handbook of Vascular Biometrics
Andreas Uhl, Christoph Busch, …
Hardcover
R1,604
Discovery Miles 16 040
Enzymes - Mechanisms, Dynamics and…
Christo Christov, Tatyana Karabencheva-Christova
Hardcover
R3,905
Discovery Miles 39 050
Computer Vision Using Local Binary…
Matti Pietikainen, Abdenour Hadid, …
Hardcover
R1,418
Discovery Miles 14 180
Regulatory RNAs - Basics, Methods and…
Bibekanand Mallick, Zhumur Ghosh
Hardcover
R5,243
Discovery Miles 52 430
Infrastructure Computer Vision
Ioannis Brilakis, Carl Thomas Michael Haas
Paperback
R3,039
Discovery Miles 30 390
|