Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 9 of 9 matches in All Departments
The author’s previous book Getting to Good Slams (published by Honors, October 2018, ISBN 9781771401920), was an in-depth discussion of how to improve your slam bidding. Using examples from tournament play, the author identified hard-to-bid, but good, slams. He focused on the factors that make the slam possible, often with far fewer than the traditional number of points, and on how to evaluate your hand during the bidding to become aware that these factors are present. This new book turns the spotlight on an even more useful area -- how to get to good game contracts without just guessing, again often with fewer than the officially-sanctioned number of high card points (HCP) in the partnership. Anyone who plays International Match Points (IMPs) will tell you that this is the area where most matches are won and lost.
This book considers a relatively new metric in complex systems, transfer entropy, derived from a series of measurements, usually a time series. After a qualitative introduction and a chapter that explains the key ideas from statistics required to understand the text, the authors then present information theory and transfer entropy in depth. A key feature of the approach is the authors' work to show the relationship between information flow and complexity. The later chapters demonstrate information transfer in canonical systems, and applications, for example in neuroscience and in finance. The book will be of value to advanced undergraduate and graduate students and researchers in the areas of computer science, neuroscience, physics, and engineering.
"In Human Dimensions of Cyber Security, Terry Bossomaier, Steven D'Alessandro, and Roger Bradbury have produced a book that ... shows how it is indeed possible to achieve what we all need; a multidisciplinary, rigorously researched and argued, and above all accessible account of cybersecurity - what it is, why it matters, and how to do it." --Professor Paul Cornish, Visiting Professor, LSE IDEAS, London School of Economics Human Dimensions of Cybersecurity explores social science influences on cybersecurity. It demonstrates how social science perspectives can enable the ability to see many hazards in cybersecurity. It emphasizes the need for a multidisciplinary approach, as cybersecurity has become a fundamental issue of risk management for individuals, at work, and with government and nation states. This book explains the issues of cybersecurity with rigor, but also in simple language, so individuals can see how they can address these issues and risks. The book provides simple suggestions, or cybernuggets, that individuals can follow to learn the dos and don'ts of cybersecurity. The book also identifies the most important human and social factors that affect cybersecurity. It illustrates each factor, using case studies, and examines possible solutions from both technical and human acceptability viewpoints.
Implement Your Own Applications Using Online GIS An in-depth study detailing the online applications of geographic information systems (GIS), Online GIS and Spatial Metadata, Second Edition outlines how GIS data are published, organized, accessed, searched, maintained, purchased, and processed over the web. This latest work describes how the internet has become a platform for the delivery and integration of geographic information. It highlights the growth that has taken place since the first edition and includes new chapters on popular XML formats used in online GIS, SDI Metadata Portals, Mobile GIS and Location-Based services. It also updates metadata standards and explains how metadata links it all together. Designed To Help Non-Technical Readers Understand Technical Issues The book provides a brief overview of the basic technology of online GIS before introducing the technical methods used to develop and implement GIS on the web. It includes an introduction to the protocols and standards now in use online and provides technical background and real-world examples of scripts, markup, and other elements that make this technology work. Expanding on the previous edition, the book offers a global perspective of online GIS, contains links and references to online resources, and includes future directions, applications, and trends. Reviewing major advances that have occurred over the past decade, this seminal work: Discusses the detail of four XML-based standards now in common use for Online GIS and spatial metadata Outlines the nature of Information Networks, systems in which information is distributed across many different sites Examines the conceptual framework of metadata, by studying the RDF and similar standards for the Web Describes several metadata standards in use around the world for spatial metadata P
"In Human Dimensions of Cyber Security, Terry Bossomaier, Steven D'Alessandro, and Roger Bradbury have produced a book that ... shows how it is indeed possible to achieve what we all need; a multidisciplinary, rigorously researched and argued, and above all accessible account of cybersecurity - what it is, why it matters, and how to do it." --Professor Paul Cornish, Visiting Professor, LSE IDEAS, London School of Economics Human Dimensions of Cybersecurity explores social science influences on cybersecurity. It demonstrates how social science perspectives can enable the ability to see many hazards in cybersecurity. It emphasizes the need for a multidisciplinary approach, as cybersecurity has become a fundamental issue of risk management for individuals, at work, and with government and nation states. This book explains the issues of cybersecurity with rigor, but also in simple language, so individuals can see how they can address these issues and risks. The book provides simple suggestions, or cybernuggets, that individuals can follow to learn the dos and don'ts of cybersecurity. The book also identifies the most important human and social factors that affect cybersecurity. It illustrates each factor, using case studies, and examines possible solutions from both technical and human acceptability viewpoints.
This book covers technical fundamentals, complexity and social networks, and communication and language. It raises readers interest in social networks, the importance of language in the emergence and maintenance of networks, the integral patterns of interconnectivity, and the means to measure and model social structure. It presents a broad range of ideas from several fields of research endeavor. It also explores social networks and their integration with communication and language, thereby providing a discussion of relevant theory, modeling, metrics, and application to business, natural resource management, and technology.
This book considers a relatively new metric in complex systems, transfer entropy, derived from a series of measurements, usually a time series. After a qualitative introduction and a chapter that explains the key ideas from statistics required to understand the text, the authors then present information theory and transfer entropy in depth. A key feature of the approach is the authors' work to show the relationship between information flow and complexity. The later chapters demonstrate information transfer in canonical systems, and applications, for example in neuroscience and in finance. The book will be of value to advanced undergraduate and graduate students and researchers in the areas of computer science, neuroscience, physics, and engineering.
Implement Your Own Applications Using Online GIS An in-depth study detailing the online applications of geographic information systems (GIS), Online GIS and Spatial Metadata, Second Edition outlines how GIS data are published, organized, accessed, searched, maintained, purchased, and processed over the web. This latest work describes how the internet has become a platform for the delivery and integration of geographic information. It highlights the growth that has taken place since the first edition and includes new chapters on popular XML formats used in online GIS, SDI Metadata Portals, Mobile GIS and Location-Based services. It also updates metadata standards and explains how metadata links it all together. Designed To Help Non-Technical Readers Understand Technical Issues The book provides a brief overview of the basic technology of online GIS before introducing the technical methods used to develop and implement GIS on the web. It includes an introduction to the protocols and standards now in use online and provides technical background and real-world examples of scripts, markup, and other elements that make this technology work. Expanding on the previous edition, the book offers a global perspective of online GIS, contains links and references to online resources, and includes future directions, applications, and trends. Reviewing major advances that have occurred over the past decade, this seminal work: Discusses the detail of four XML-based standards now in common use for Online GIS and spatial metadata Outlines the nature of Information Networks, systems in which information is distributed across many different sites Examines the conceptual framework of metadata, by studying the RDF and similar standards for the Web Describes several metadata standards in use around the world for spatial metadata Provides current examples of SDI metadata portals, catalogues, and clearinghouses Looks at ways in which distributed information can be built into data warehouses, and introduces basic ideas in data mining
|
You may like...
|