Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 8 of 8 matches in All Departments
This book considers a relatively new metric in complex systems, transfer entropy, derived from a series of measurements, usually a time series. After a qualitative introduction and a chapter that explains the key ideas from statistics required to understand the text, the authors then present information theory and transfer entropy in depth. A key feature of the approach is the authors' work to show the relationship between information flow and complexity. The later chapters demonstrate information transfer in canonical systems, and applications, for example in neuroscience and in finance. The book will be of value to advanced undergraduate and graduate students and researchers in the areas of computer science, neuroscience, physics, and engineering.
"In Human Dimensions of Cyber Security, Terry Bossomaier, Steven D'Alessandro, and Roger Bradbury have produced a book that ... shows how it is indeed possible to achieve what we all need; a multidisciplinary, rigorously researched and argued, and above all accessible account of cybersecurity - what it is, why it matters, and how to do it." --Professor Paul Cornish, Visiting Professor, LSE IDEAS, London School of Economics Human Dimensions of Cybersecurity explores social science influences on cybersecurity. It demonstrates how social science perspectives can enable the ability to see many hazards in cybersecurity. It emphasizes the need for a multidisciplinary approach, as cybersecurity has become a fundamental issue of risk management for individuals, at work, and with government and nation states. This book explains the issues of cybersecurity with rigor, but also in simple language, so individuals can see how they can address these issues and risks. The book provides simple suggestions, or cybernuggets, that individuals can follow to learn the dos and don'ts of cybersecurity. The book also identifies the most important human and social factors that affect cybersecurity. It illustrates each factor, using case studies, and examines possible solutions from both technical and human acceptability viewpoints.
Implement Your Own Applications Using Online GIS An in-depth study detailing the online applications of geographic information systems (GIS), Online GIS and Spatial Metadata, Second Edition outlines how GIS data are published, organized, accessed, searched, maintained, purchased, and processed over the web. This latest work describes how the internet has become a platform for the delivery and integration of geographic information. It highlights the growth that has taken place since the first edition and includes new chapters on popular XML formats used in online GIS, SDI Metadata Portals, Mobile GIS and Location-Based services. It also updates metadata standards and explains how metadata links it all together. Designed To Help Non-Technical Readers Understand Technical Issues The book provides a brief overview of the basic technology of online GIS before introducing the technical methods used to develop and implement GIS on the web. It includes an introduction to the protocols and standards now in use online and provides technical background and real-world examples of scripts, markup, and other elements that make this technology work. Expanding on the previous edition, the book offers a global perspective of online GIS, contains links and references to online resources, and includes future directions, applications, and trends. Reviewing major advances that have occurred over the past decade, this seminal work: Discusses the detail of four XML-based standards now in common use for Online GIS and spatial metadata Outlines the nature of Information Networks, systems in which information is distributed across many different sites Examines the conceptual framework of metadata, by studying the RDF and similar standards for the Web Describes several metadata standards in use around the world for spatial metadata P
"In Human Dimensions of Cyber Security, Terry Bossomaier, Steven D'Alessandro, and Roger Bradbury have produced a book that ... shows how it is indeed possible to achieve what we all need; a multidisciplinary, rigorously researched and argued, and above all accessible account of cybersecurity - what it is, why it matters, and how to do it." --Professor Paul Cornish, Visiting Professor, LSE IDEAS, London School of Economics Human Dimensions of Cybersecurity explores social science influences on cybersecurity. It demonstrates how social science perspectives can enable the ability to see many hazards in cybersecurity. It emphasizes the need for a multidisciplinary approach, as cybersecurity has become a fundamental issue of risk management for individuals, at work, and with government and nation states. This book explains the issues of cybersecurity with rigor, but also in simple language, so individuals can see how they can address these issues and risks. The book provides simple suggestions, or cybernuggets, that individuals can follow to learn the dos and don'ts of cybersecurity. The book also identifies the most important human and social factors that affect cybersecurity. It illustrates each factor, using case studies, and examines possible solutions from both technical and human acceptability viewpoints.
This book covers technical fundamentals, complexity and social networks, and communication and language. It raises readers interest in social networks, the importance of language in the emergence and maintenance of networks, the integral patterns of interconnectivity, and the means to measure and model social structure. It presents a broad range of ideas from several fields of research endeavor. It also explores social networks and their integration with communication and language, thereby providing a discussion of relevant theory, modeling, metrics, and application to business, natural resource management, and technology.
This book considers a relatively new metric in complex systems, transfer entropy, derived from a series of measurements, usually a time series. After a qualitative introduction and a chapter that explains the key ideas from statistics required to understand the text, the authors then present information theory and transfer entropy in depth. A key feature of the approach is the authors' work to show the relationship between information flow and complexity. The later chapters demonstrate information transfer in canonical systems, and applications, for example in neuroscience and in finance. The book will be of value to advanced undergraduate and graduate students and researchers in the areas of computer science, neuroscience, physics, and engineering.
Implement Your Own Applications Using Online GIS An in-depth study detailing the online applications of geographic information systems (GIS), Online GIS and Spatial Metadata, Second Edition outlines how GIS data are published, organized, accessed, searched, maintained, purchased, and processed over the web. This latest work describes how the internet has become a platform for the delivery and integration of geographic information. It highlights the growth that has taken place since the first edition and includes new chapters on popular XML formats used in online GIS, SDI Metadata Portals, Mobile GIS and Location-Based services. It also updates metadata standards and explains how metadata links it all together. Designed To Help Non-Technical Readers Understand Technical Issues The book provides a brief overview of the basic technology of online GIS before introducing the technical methods used to develop and implement GIS on the web. It includes an introduction to the protocols and standards now in use online and provides technical background and real-world examples of scripts, markup, and other elements that make this technology work. Expanding on the previous edition, the book offers a global perspective of online GIS, contains links and references to online resources, and includes future directions, applications, and trends. Reviewing major advances that have occurred over the past decade, this seminal work: Discusses the detail of four XML-based standards now in common use for Online GIS and spatial metadata Outlines the nature of Information Networks, systems in which information is distributed across many different sites Examines the conceptual framework of metadata, by studying the RDF and similar standards for the Web Describes several metadata standards in use around the world for spatial metadata Provides current examples of SDI metadata portals, catalogues, and clearinghouses Looks at ways in which distributed information can be built into data warehouses, and introduces basic ideas in data mining
|
You may like...
Transparency in Insurance Regulation and…
Pierpaolo Marano, Kyriaki Noussia
Hardcover
R5,070
Discovery Miles 50 700
|