|
Showing 1 - 4 of
4 matches in All Departments
As the first book about software culture, this book discusses
software culture from three perspectives including historical
perspective, the classification of software and software
applications. This book takes credit from the view of science and
technology development. It analyzed scientific innovations and the
social areas promoted following the growth of technology. And
according to the fact that information helps to build human
cultural form, we proposed the concept and researching method of
software culture. The aim of writing this book is to strengthen the
connection between software and culture, to replenish knowledge
system in the subject of software engineering, and to establish a
new area of study that is the culture of software.
As the first book about software culture, this book discusses
software culture from three perspectives including historical
perspective, the classification of software and software
applications. This book takes credit from the view of science and
technology development. It analyzed scientific innovations and the
social areas promoted following the growth of technology. And
according to the fact that information helps to build human
cultural form, we proposed the concept and researching method of
software culture. The aim of writing this book is to strengthen the
connection between software and culture, to replenish knowledge
system in the subject of software engineering, and to establish a
new area of study that is the culture of software.
|
Trusted Computing and Information Security - 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings (Paperback, 1st ed. 2017)
Ming Xu, Zheng Qin, Fei Yan, Shaojing Fu
|
R1,559
Discovery Miles 15 590
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 11th Chinese
Conference on Trusted Computing and Information Security, CTCIS
2017, held in Changsha, China, in September 2017. The 28 revised
full papers presented were carefully reviewed and selected from 96
submissions. The papers focus on topics such as theory of trusted
computing, trustworthy software; infrastructure of trusted
computing, application and evaluation of trusted computing; network
security and communication security; theory and technology of
cryptographic techniques; information content security; system
security for mobile network and IoT systems, industrial control and
embedded systems; security for Cloud computing, virtualization
systems and big data.
Adhering to the combination of theoretical introduction and
practical case introduction, this book summarizes the basic
concepts and methods in management and big data analysis at home
and abroad and introduces a large number of relevant practical
cases, especially new cases in the Internet era, to help readers
integrate theoretical knowledge into practical applications. The
chapters of this book are interrelated and independent of each
other, making it easy for the reader to study in pieces or to delve
deeper into a particular topic of interest. Covering an array of
theories about management and big data at home and abroad, this
book lays a solid foundation for being an authentic manager. It is
organized into sections on decision-making, organization,
leadership, control, innovation, and big data to fully dissect and
summarize the basic concepts of these characters in management and
to show the basic methods that managers can use to solve problems.
Each section contains a large number of examples to demonstrate how
entrepreneurs successfully manage their large companies and
overcome the difficulties in the business, utilizing the
corresponding management functions or big data technology. Further,
in order to adapt to the development of the Internet era, this book
also absorbs a lot of practice cases of management innovation and
big data which have emerged in recent years based on advanced
network platform and big data analysis. This book puts great
emphasis on the innovative function of management, adding more
comprehensive methods and more updated cases related to the
Internet.
|
|