![]() |
![]() |
Your cart is empty |
||
Showing 1 - 4 of 4 matches in All Departments
As the first book about software culture, this book discusses software culture from three perspectives including historical perspective, the classification of software and software applications. This book takes credit from the view of science and technology development. It analyzed scientific innovations and the social areas promoted following the growth of technology. And according to the fact that information helps to build human cultural form, we proposed the concept and researching method of software culture. The aim of writing this book is to strengthen the connection between software and culture, to replenish knowledge system in the subject of software engineering, and to establish a new area of study that is the culture of software.
As the first book about software culture, this book discusses software culture from three perspectives including historical perspective, the classification of software and software applications. This book takes credit from the view of science and technology development. It analyzed scientific innovations and the social areas promoted following the growth of technology. And according to the fact that information helps to build human cultural form, we proposed the concept and researching method of software culture. The aim of writing this book is to strengthen the connection between software and culture, to replenish knowledge system in the subject of software engineering, and to establish a new area of study that is the culture of software.
This book constitutes the refereed proceedings of the 11th Chinese Conference on Trusted Computing and Information Security, CTCIS 2017, held in Changsha, China, in September 2017. The 28 revised full papers presented were carefully reviewed and selected from 96 submissions. The papers focus on topics such as theory of trusted computing, trustworthy software; infrastructure of trusted computing, application and evaluation of trusted computing; network security and communication security; theory and technology of cryptographic techniques; information content security; system security for mobile network and IoT systems, industrial control and embedded systems; security for Cloud computing, virtualization systems and big data.
Adhering to the combination of theoretical introduction and practical case introduction, this book summarizes the basic concepts and methods in management and big data analysis at home and abroad and introduces a large number of relevant practical cases, especially new cases in the Internet era, to help readers integrate theoretical knowledge into practical applications. The chapters of this book are interrelated and independent of each other, making it easy for the reader to study in pieces or to delve deeper into a particular topic of interest. Covering an array of theories about management and big data at home and abroad, this book lays a solid foundation for being an authentic manager. It is organized into sections on decision-making, organization, leadership, control, innovation, and big data to fully dissect and summarize the basic concepts of these characters in management and to show the basic methods that managers can use to solve problems. Each section contains a large number of examples to demonstrate how entrepreneurs successfully manage their large companies and overcome the difficulties in the business, utilizing the corresponding management functions or big data technology. Further, in order to adapt to the development of the Internet era, this book also absorbs a lot of practice cases of management innovation and big data which have emerged in recent years based on advanced network platform and big data analysis. This book puts great emphasis on the innovative function of management, adding more comprehensive methods and more updated cases related to the Internet.
|
![]() ![]() You may like...
Discovering Daniel - Finding Our Hope In…
Amir Tsarfati, Rick Yohn
Paperback
|