Contact Info.
Products List
 
Python Programming in Context
  Bradley N. Miller/ 9781284175554/ Price:US$ 129.95
 
Python Programming in Context, Third Edition provides a comprehensive and accessible introduction to Python fundamentals. Updated with the latest version of Python, the new Third Edition offers a thorough overview of multiple applied areas, including image processing, cryptography, astronomy, the Internet, and bioinformatics. Taking an active learning approach, each chapter starts with a comprehensive real-world project that teaches core design techniques and Python programming while engaging students. An ideal first language for learners entering the rapidly expanding field of computer science, Python gives students a solid platform of key problem-solving skills that translate easily across programming languages. The Third Edition¡¦s emphasis on problem-solving, extrapolation, and development of independent exploration and solution-building provides students with a unique and innovative approach to learning programming. Python Programming in Context, Third Edition is the ideal introductory text for those learning the Python language.
   
VD05-1073 User-Centered Software Development for the Blind and Visually Impaired: Emerging Research and Opportunities
  Teresita de Jesus Alvarez Robles/ 9781522585398/ Price:US$ 195.00
 
Human-computer interaction studies the users and their interaction with an interactive software system (ISS). However, these studies are designed for people without any type of disability, causing there to be few existing techniques or tools that focus on the characteristics of a specific user, thus causing accessibility and utility issues for neglected segments of the population. This reference source intends to remedy this lack of research by supporting an ISS focused on people with visual impairment. User-Centered Software Development for the Blind and Visually Impaired: Emerging Research and Opportunities is a collection of innovative research on techniques, applications, and methods for carrying out software projects in which the main users are people with visual impairments. While highlighting topics including mobile technology, assistive technologies, and human-computer interaction, this book is ideally designed for software developers, computer engineers, designers, academics, researchers, professionals, and educators interested in current research on usable and accessible technologies. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EArtificial Network ¡EAssistive Technologies ¡EAugmented Reality ¡EColor Blindness ¡ECurriculum Development ¡EGame-Based Learning ¡EHuman-Computer Interaction ¡EInstructional Design ¡EMobile Technology ¡ESpecial Education
   
SD05-476 Hacker Techniques, Tools, and Incident Handling
  Sean-Philip Oriyano/ 9781284147803/ Price:NT$ 1800.00
 
Book Cover Hacker Techniques, Tools, and Incident Handling, Third Edition begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web. Written by subject matter experts, with numerous real-world examples, Hacker Techniques, Tools, and Incident Handling, Third Edition provides readers with a clear, comprehensive introduction to the many threats on our Internet environment and security and what can be done to combat them.
   
Computer Science Illuminated (includes Navigate 2 Advantage Access)
  Nell Dale/ 9781284155617/ Price:US$ 149.95
 
Designed for the introductory computing and computer science course, the student-friendly Computer Science Illuminated, Seventh Edition provides students with a solid foundation for further study, and offers non-majors a complete introduction to computing. Fully revised and updated, the Seventh Edition of this best-selling text retains the accessibility and in-depth coverage of previous editions, while incorporating all-new material on cutting-edge issues in computer science. Authored by the award-winning team Nell Dale and John Lewis, the text provides a unique and innovative layered approach, moving through the levels of computing from an organized, language-neutral perspective.
   
VSD05-004 Handbook of IoT and Big Data
  Vijender Kumar Solanki/ 9781138584204/ Price:¢G 130.00
 
Book Cover This multi-contributed handbook focuses on the latest workings of IoT (internet of Things) and Big Data. As the resources are limited, it's the endeavor of the authors to support and bring the information into one resource. The book is divided into 4 sections that covers IoT and technologies, the future of Big Data, algorithms, and case studies showing IoT and Big Data in various fields such as health care, manufacturing and automation. Features ¡EFocuses on the latest workings of IoT and Big Data ¡EDiscusses the emerging role of technologies and the fast-growing market of Big Data ¡ECovers the movement toward automation with hardware, software, and sensors, and trying to save on energy resources ¡EOffers the latest technology on IoT ¡EPresents the future horizons on Big Data
   
VSD05-003 Human-Computer Interaction and Cybersecurity Handbook
  Abbas Moallem/ 9781138739161/ Price:¢G 110.00
 
Book Cover Cyber security, or information technology security, focuses on protecting computers and data from criminal behavior. The understanding of human performance, capability, and behavior is one of the main areas that experts in cyber security focus on, both from a human computer interaction point of view, and human factors. This handbook is a unique source of information from the human factors perspective that covers all topics related to the discipline. It includes new areas such as smart networking and devices and will be a source of information for IT specialists, as well as other disciplines such as psychology, behavioral science, software engineering, and security management.
   
VD05-999 Handbook of Research on Technology Integration in the Global World
  Efosa C. Idemudia/ 9781522563679/ Price:US$ 195.00
 
Book Cover Technology¡¦s presence in society continues to increase as new products and programs emerge. As such, it is vital for various industries to rapidly adapt and learn to incorporate the latest technology applications and tools. The Handbook of Research on Technology Integration in the Global World is an essential reference source that examines a variety of approaches to integrating technology through technology diffusion, e-collaboration, and e-adoption. The book explores topics such as information systems agility, semantic web, and the digital divide. This publication is a valuable resource for academicians, practitioners, researchers, and upper-level graduate students. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡ECloud Computing ¡EDigital Divide ¡EElectronic Commerce ¡EInformation Systems Agility ¡ELinked Data ¡ESemantic Web ¡ESoftware Architecture ¡ETechnology Adoption ¡EWeb Services
   
VD05-997 Returning to Interpersonal Dialogue and Understanding Human Communication in the Digital Age
  Michael A. Brown Sr./ 9781522541684/ Price:US$ 180.00
 
Book Cover Digital collaboration is abundant in today¡¦s world, but it is often problematic and does not provide an apt solution to the human need for comprehensive communication. Humans require more personal interactions beyond what can be achieved online. Returning to Interpersonal Dialogue and Understanding Human Communication in the Digital Age is a collection of innovative studies on the methods and applications of comparing online human interactions to face-to-face interactions. While highlighting topics including digital collaboration, social media, and privacy, this book is a vital reference source for public administrators, educators, businesses, academicians, and researchers seeking current research on the importance of non-digital communication between people. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡ECommunication Platforms ¡EData Gathering ¡EDigital Collaboration ¡EEmotional Intelligence ¡EInter-Organizational Communication ¡EPrivacy ¡ESocial Media ¡ESocial Skills
   
VD05-996 Algorithms, Methods, and Applications in Mobile Computing and Communications
  Agustinus Borgy Waluyo/ 9781522556930/ Price:US$ 205.00
 
Book Cover The proliferation of wireless communications has led to mobile computing, a new era in data communication and processing allowing people to access information anywhere and anytime using lightweight computer devices. Aligned with this phenomenon, a vast number of mobile solutions, systems, and applications have been continuously developed. However, despite the opportunities, there exist constraints, challenges, and complexities in realizing the full potential of mobile computing, requiring research and experimentation. Algorithms, Methods, and Applications in Mobile Computing and Communications is a critical scholarly publication that examines the various aspects of mobile computing and communications from engineering, business, and organizational perspectives. The book details current research involving mobility challenges that hinder service applicability, mobile money transfer services and anomaly detection, and mobile fog environments. As a resource rich in information about mobile devices, wireless broadcast databases, and machine communications, it is an ideal source for computer scientists, IT specialists, service providers, information technology professionals, academicians, and researchers interested in the field of mobile computing. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EArtificial Neural Networks ¡EBandwidth Adaptation ¡EFog Computing ¡EInteractive User Navigation ¡EMachine-to-Machine Communications ¡EMobile Devices ¡ESmart Devices ¡EWireless Broadcast Databases ¡EWireless Mesh Networks
   
VD05-995 Handbook of Research on Children's Consumption of Digital Media
  Gulsah Sari/ 9781522557333/ Price:US$ 225.00
 
Book Cover One of the consequences of the digital revolution is the availability and pervasiveness of media and technology. They became an integral part of many people¡¦s lives, including children, who are often exposed to media and technology at an early age. Due to this early exposure, children have become targeted consumers for businesses and other organizations that seek to utilize the data they generate. The Handbook of Research on Children's Consumption of Digital Media is a scholarly research publication that examines how children have become consumers as well as how their consumption habits have changed in the age of digital and media technologies. Featuring current research on cyber bullying, social media, and digital advertising, this book is geared toward marketing and advertising professionals, consumer researchers, international business strategists, academicians, and upper-level graduate students seeking current research on the transformation of child to consumer. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡ECommunication Disorders ¡ECyber Bullying ¡EDigital Advertising ¡EDigital Natives ¡EMedia Addiction ¡ESmartphones ¡ESocial Media ¡ESocial Values ¡ESubliminal Advertising
   
VD05-994 Intimacy and Developing Personal Relationships in the Virtual World
  Rejani Thudalikunnil Gopalan/ 9781522540472/ Price:US$ 175.00
 
Book Cover Online communication has exploded in the past decade with the development of social networking sites like Facebook, as well as social media applications. As more people turn to the online world to connect with others, they must learn how to develop and maintain personal relationships with very little or no in-person interaction. Intimacy and Developing Personal Relationships in the Virtual World sheds light on the various issues that accompany online interactions. The book examines activities that have gone from occurring in reality to taking place in the online world such as cyberbullying, online social networking, and online dating. The publication also highlights the negative effects of spending a lot of time online such as mental health issues, internet addiction, and body image control. This book is a vital resource for psychiatrists, psychologists, clinicians, social workers, medical administrators, academicians, educators, and graduate-level students. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EBody Image ¡ECyberbullying ¡ECybersex ¡ECyberstalking ¡EMental Health ¡EOnline Dating ¡EOnline Social Networking ¡ESocial Media ¡EVirtual Reality ¡EVirtual Violence Prevention
   
VD05-992 Cross-Media Authentication and Verification: Emerging Research and Opportunities
  Anastasia Katsaounidou/ 9781522555926/ Price:US$ 145.00
 
Book Cover As media becomes more readily available in the digital age, it also becomes more vulnerable to tampering and manipulation, making techniques for verifying reliable news and media sources essential. Understanding online technologies¡¦ role in shaping the media environment allows for insight into the correlations between the rapidly transforming media landscape and its unwanted effect on news and content tampering. Cross-Media Authentication and Verification: Emerging Research and Opportunities is a collection of innovative research on the methods and applications of verifying the newsgathering and publishing process. While highlighting topics including human authentication, information evaluation, and tampered content, this book is ideally designed for researchers, students, publishers, and academicians seeking current research on media authenticity and misinformation. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡ECross-Media Publishing ¡EDigital Storytelling ¡EHuman Authentication ¡EInformation Evaluation ¡EMedia Landscape ¡EMedia Veracity ¡EMisinformation ¡EMultimodal Authentication ¡ESocial Media ¡ETampered Content
   
VD05-948 The SAGE Handbook of Web History
  Niels Brugger/ 9781473980051/ Price:¢G 120.00
 
Book Cover The Web has been with us now for almost 25 years. An integral part of our social, cultural and political lives, ¡¥new media¡¦ is simply not that new anymore. Despite the rapidly expanding archives of information at our disposal, and the recent growth of interest in web history as a field of research, the information available to us still far outstrips our understanding of how to interpret it. The SAGE Handbook of Web History marks the first comprehensive review of this subject to date. Its editors emphasise two main different forms of study: the use of the web as an historical resource, and the web as an object of study in its own right. Bringing together all the existing knowledge of the field, with an interdisciplinary focus and an international scope, this is an incomparable resource for researchers and students alike. Part One: The Web and Historiography Part Two: Theoretical and Methodological Reflections Part Three: Technical and Structural Dimensions of Web History Part Four: Platforms on the Web Part Five: Web History and Users, some Case Studies Part Six: The Roads Ahead
   
VD05-1076 Edge Computing and Computational Intelligence Paradigms for the IoT
  G. Nagarajan/ 9781522585558/ Price:US$ 285.00
 
Edge computing is focused on devices and technologies that are attached to the internet of things (IoT). Identifying IoT use across a range of industries and measuring strategic values helps identify what technologies to pursue and can avoid wasted resources on deployments with limited values. Edge Computing and Computational Intelligence Paradigms for the IoT is a critical research book that provides a complete insight on the recent advancements and integration of intelligence in IoT. This book highlights various topics such as disaster prediction, governance, and healthcare. It is an excellent resource for researchers, working professionals, academicians, policymakers, and defense companies. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EData Privacy ¡EDisaster Prediction ¡EEdge Computing ¡EFog Computing ¡EGovernance ¡EGreen IoT ¡EHealthcare ¡ESmart Cities ¡ESupply Chain Management ¡ETransportation
   
VD05-1074 Emerging Perspectives in Big Data Warehousing
  David Taniar/ 9781522555162/ Price:US$ 245.00
 
The concept of a big data warehouse appeared in order to store moving data objects and temporal data information. Moving objects are geometries that change their position and shape continuously over time. In order to support spatio-temporal data, a data model and associated query language is needed for supporting moving objects. Emerging Perspectives in Big Data Warehousing is an essential research publication that explores current innovative activities focusing on the integration between data warehousing and data mining with an emphasis on the applicability to real-world problems. Featuring a wide range of topics such as index structures, ontology, and user behavior, this book is ideally designed for IT consultants, researchers, professionals, computer scientists, academicians, and managers. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EBig Data Analytics ¡EBusiness Intelligence Platform ¡ECharacteristic Sequential Patterns ¡EData Warehousing ¡EDatalog ¡EIndex Structures ¡EOntology ¡EOpen Source ¡ERecommendation System ¡EUser Behavior
   
VD05-1072 Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications, 3-Vols/Set.
  Information Resources Management Association/ 9781522588979/ Price:US$ 2350.00
 
The internet is established in most households worldwide and used for entertainment purposes, shopping, social networking, business activities, banking, telemedicine, and more. As more individuals and businesses use this essential tool to connect with each other and consumers, more private data is exposed to criminals ready to exploit it for their gain. Thus, it is essential to continue discussions involving policies that regulate and monitor these activities, and anticipate new laws that should be implemented in order to protect users. Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications examines current internet and data protection laws and their impact on user experience and cybercrime, and explores the need for further policies that protect user identities, data, and privacy. It also offers the latest methodologies and applications in the areas of digital security and threats. Highlighting a range of topics such as online privacy and security, hacking, and online threat protection, this multi-volume book is ideally designed for IT specialists, administrators, policymakers, researchers, academicians, and upper-level students. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡ECyber Crime ¡EData Security ¡EHacking ¡EIntellectual Property and Piracy ¡EMobile and Wireless Security ¡EOnline Privacy and Security ¡EOnline Threat Protection ¡ESocial and Behavioral Aspects of Cyber Security ¡EVirtual Law
   
VD05-1071 Human Factors in Global Software Engineering
  Mobashar Rehman/ 9781522594482/ Price:US$ 245.00
 
More software engineers are likely to work in a globally distributed environment, which brings benefits that include quick and better software development, less manpower retention, scalability, and less software development cost and sharing of knowledge from the global pool of employees. However, these work environments also introduce a physical separation between team members and project leaders, which can create problems in communication and ultimately lead to the failure of the project. Human Factors in Global Software Engineering is a collection of innovative research focusing on the challenges, issues, and importance of human factors in global software engineering organizations in order to help these organizations better manage their manpower and provide an appropriate culture and technology in order to make their software development projects successful. While highlighting topics including agile software, knowledge management, and human-computer interaction, this book is ideally designed for project managers, administrators, business professionals, researchers, practitioners, students, and academicians. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAgile Software ¡EBig Data ¡EComputer Engineering ¡EData Analysis ¡EHuman-Computer Interaction ¡EKnowledge Management ¡EKnowledge Sharing ¡ENetwork Security ¡ESoftware Development ¡ESystem Security
   
VD05-1070 Novel Practices and Trends in Grid and Cloud Computing
  Pethuru Raj/ 9781522590231/ Price:US$ 255.00
 
Business and IT organizations are currently embracing new strategically sound concepts in order to be more customer-centric, competitive, and cognitive in their daily operations. While useful, the various software tools, pioneering technologies, as well as their unique contributions largely go unused due to the lack of information provided on their special characteristics. Novel Practices and Trends in Grid and Cloud Computing is a collection of innovative research on the key concerns of cloud computing and how they are being addressed, as well as the various technologies and tools empowering cloud theory to be participative, penetrative, pervasive, and persuasive. While highlighting topics including cyber security, smart technology, and artificial intelligence, this book is ideally designed for students, researchers, and business managers on the lookout for innovative IT solutions for all the business automation software and improvisations of computational technologies. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EArtificial Intelligence ¡ECloud Environments ¡EConsumer Resources ¡ECyber Security ¡EEdge Computing ¡EMobile Network ¡ENetwork Surveillance ¡ESmart Technology ¡ESocial Networking ¡EWireless Communication
   
VD05-1069 Emerging Technologies and Applications in Data Processing and Management
  Zongmin Ma/ 9781522584469/ Price:US$ 265.00
 
Advances in web technology and the proliferation of sensors and mobile devices connected to the internet have resulted in the generation of immense data sets available on the web that need to be represented, saved, and exchanged. Massive data can be managed effectively and efficiently to support various problem-solving and decision-making techniques. Emerging Technologies and Applications in Data Modeling and Processing is a critical scholarly publication that examines the importance of data management strategies that coincide with advancements in web technologies. Highlighting topics such as geospatial coverages, data analysis, and keyword query, this book is ideal for professionals, researchers, academicians, data analysts, web developers, and web engineers. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EData Analysis ¡EData Management ¡EGeospatial Coverages ¡EJavaScript ¡EJSON ¡EKeyword Query ¡ENoSQL ¡ESpatiotemporal Data ¡ESurvey ¡ETime Warping
   
VD05-1068 Advanced Digital Image Steganography Using LSB, PVD, and EMD: Emerging Research and Opportunities
  Gandharba Swain/ 9781522575160/ Price:US$ 165.00
 
Book Cover In the last few decades, the use of the Internet has grown tremendously, and the use of online communications has grown even more. The lack of security in private messages between individuals, however, allows hackers to collect loads of sensitive information. Modern security measures are required to prevent this attack on the world¡¦s communication technologies. Advanced Digital Image Steganography Using LSB, PVD, and EMD: Emerging Research and Opportunities provides evolving research exploring the theoretical and practical aspects of data encryption techniques and applications within computer science. The book provides introductory knowledge on steganography and its importance, detailed analysis of how RS and PDH are performed, discussion on pixel value differencing principles, and hybrid approaches using substitution, PVD, and EMD principles. It is ideally designed for researchers and graduate and under graduate students seeking current research on the security of data during transit. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EArtificial Intelligence ¡ECommunication Techniques ¡EComputer Encryption ¡EComputer Engineering ¡ECryptography ¡EData Hiding ¡EData Security ¡EDigital Communication ¡EDigital Watermarking ¡ENetwork Security
   
VD05-1067 Architectures and Frameworks for Developing and Applying Blockchain Technology
  Nansi Shi/ 9781522592570/ Price:US$ 245.00
 
Book Cover The blockchain revolution has drastically impacted global economics and the strategic practices within different industries. Cryptocurrency specifically has forever changed the face of business and the implementation of business online. While innovative, people are still in the early stages of building and developing blockchain technology and its applications, and it is critical that researchers and practitioners obtain a better understanding of this global phenomenon. Architectures and Frameworks for Developing and Applying Blockchain Technology is an essential reference source that presents the technological foundation, recent research findings, developments, and critical issues associated with blockchain technology from both computer science and social science perspectives. Featuring topics such as artificial intelligence, digital economy, and network technology, this book is ideally designed for academics, researchers, industry leaders, IT consultants, engineers, programmers, practitioners, government officials, policymakers, and students. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EArtificial Intelligence ¡EBig Data ¡ECryptocurrency ¡EData Privacy ¡EDecentralized System ¡EDigital Economy ¡EDistributed Computing ¡EMobile Computing ¡ENetwork Technology ¡ESocial Media
   
VD05-1066 Applying Integration Techniques and Methods in Distributed Systems and Technologies
  Gabor Kecskemeti/ 9781522582953/ Price:US$ 245.00
 
Book Cover Distributed systems intertwine with our everyday lives. The benefits and current shortcomings of the underpinning technologies are experienced by a wide range of people and their smart devices. With the rise of large-scale IoT and similar distributed systems, cloud bursting technologies, and partial outsourcing solutions, private entities are encouraged to increase their efficiency and offer unparalleled availability and reliability to their users. Applying Integration Techniques and Methods in Distributed Systems is a critical scholarly publication that defines the current state of distributed systems, determines further goals, and presents architectures and service frameworks to achieve highly integrated distributed systems and presents solutions to integration and efficient management challenges faced by current and future distributed systems. Highlighting topics such as multimedia, programming languages, and smart environments, this book is ideal for system administrators, integrators, designers, developers, researchers, and academicians. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAlgorithms ¡EBenchmarking ¡ECloud Computing ¡EDatabases ¡EMultimedia ¡EOperating Systems ¡EProgramming Languages ¡ESmart Environments ¡EStreaming ¡ESystems Architecture
   
VD05-1065 Electronic Hive Minds on Social Media: Emerging Research and Opportunities
  Shalin Hai-Jew/ 9781522593690/ Price:US$ 205.00
 
Book Cover Researchers have harnessed the flood of personal information and opinions shared on social media platforms in a variety of ways. People communicate not only what they imagine they are purposely sharing but also unintentionally leak information, which allows others to glimpse a sense of the subconscious and unconscious at a macro level. Electronic Hive Minds on Social Media: Emerging Research and Opportunities explores various research techniques to profile the electronic hive mind around social topics as expressed on various modalities of social media, from human, bot, and cyborg social media accounts, and proposes new research methods for harnessing public data from social media platforms. Highlighting topics such as knowledge sharing, swarm intelligence, and social psychology, this publication is designed for researchers, social psychologists, practitioners, and students in marketing, communications, mass media, and similar fields. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡ECommunication Technology ¡ECryptocurrency ¡EKnowledge Sharing ¡EOnline Presence ¡ESocial Consciousness ¡ESocial Media ¡ESocial Psychology ¡ESwarm Intelligence ¡EVirtual Community ¡EWeb Technology
   
VD05-1064 Handbook of Research on Human-Computer Interfaces and New Modes of Interactivity
  Katherine Blashki/ 9781522590699/ Price:US$ 275.00
 
Book Cover Due to its versatility and accessibility, individuals all around the world routinely use various forms of technology to interact with one another. Over the years, the design and development of technologies and interfaces have increasingly aimed to improve the human-computer interactive experience in unimaginable ways. The Handbook of Research on Human-Computer Interfaces and New Modes of Interactivity is a collection of innovative research on the methods and applications of interactive technologies in the modern age. Highlighting topics including digital environments, sensory applications, and transmedia applications, this book is ideally designed for academicians, researchers, HCI developers, programmers, IT consultants, and media specialists seeking current research on the design, application, and advancement of different media technologies and interfaces that can support interaction across a wide range of users. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡ECross-Cultural Design ¡EDesign Approaches ¡EDigital Environments ¡EEmerging Technologies ¡EGlobal Culture ¡EPersuasive Design ¡ESensory Applications ¡EStorytelling ¡ETransmedia Applications ¡EVirtual Learning
   
VD05-1063 Handbook of Research on Deep Learning Innovations and Trends
  Aboul Ella Hassanien/ 9781522578628/ Price:US$ 295.00
 
Book Cover Leading technology firms and research institutions are continuously exploring new techniques in artificial intelligence and machine learning. As such, deep learning has now been recognized in various real-world applications such as computer vision, image processing, biometrics, pattern recognition, and medical imaging. The deep learning approach has opened new opportunities that can make such real-life applications and tasks easier and more efficient. The Handbook of Research on Deep Learning Innovations and Trends is an essential scholarly resource that presents current trends and the latest research on deep learning and explores the concepts, algorithms, and techniques of data mining and analysis. Highlighting topics such as computer vision, encryption systems, and biometrics, this book is ideal for researchers, practitioners, industry professionals, students, and academicians. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAlgorithms ¡EBiometrics ¡EComputer vision ¡EDeep Learning ¡EE-Banking ¡EE-Commerce ¡EE-Government ¡EEncryption Systems ¡EImage Processing ¡EMedical Imaging ¡ENeuro-Imaging
   
VD05-1062 Machine Learning and Cognitive Science Applications in Cyber Security
  Muhammad Salman Khan/ 9781522581000/ Price:US$ 235.00
 
Book Cover In the past few years, with the evolution of advanced persistent threats and mutation techniques, sensitive and damaging information from a variety of sources have been exposed to possible corruption and hacking. Machine learning, artificial intelligence, predictive analytics, and similar disciplines of cognitive science applications have been found to have significant applications in the domain of cyber security. Machine Learning and Cognitive Science Applications in Cyber Security examines different applications of cognition that can be used to detect threats and analyze data to capture malware. Highlighting such topics as anomaly detection, intelligent platforms, and triangle scheme, this publication is designed for IT specialists, computer engineers, researchers, academicians, and industry professionals interested in the impact of machine learning in cyber security and the methodologies that can help improve the performance and reliability of machine learning applications. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAnomaly Detection ¡EAuthentication Processes ¡EAvatar-Based Management ¡EBat Algorithm ¡EBiometric Security ¡EIntelligent Platforms ¡EMalware Characterization ¡EThreat Detection ¡ETriangle Scheme ¡EVoice Recognition
   
VD05-1061 Multi-Criteria Decision-Making Models for Website Evaluation
  Kemal Vatansever/ 9781522582380/ Price:US$ 185.00
 
Book Cover With almost every business application process being linked with a web portal, the website has become an integral part of any organization. Satisfying the end user¡¦s needs is one of the key principles of designing an effective website. Because there are different users for any given website, there are different criteria that users want. Thus, evaluating a website is a multi-criteria decision-making problem in which the decision maker¡¦s opinion should be considered for ranking the website. Multi-Criteria Decision-Making Models for Website Evaluation is a critical scholarly resource that covers the strategies needed to evaluate the navigability and efficacy of websites as promotional platforms for their companies. Featuring a wide range of topics including linguistic modelling, e-services, and site quality, this book is ideal for managers, executives, website designers, graphic artists, specialists, consultants, educationalists, researchers, and students. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAnalytic Hierarchy Process (AHP) ¡EAnalytic Network Process (ANP) ¡EData Envelopment Analysis (DEA) ¡EE-Services ¡EFuzzy Set Theory ¡ELinguistic Modelling ¡EMathematical Programming ¡ESite Quality ¡EWeb Performance ¡EWeb Usability
   
VD05-1060 Handbook of Research on the IoT, Cloud Computing, and Wireless Network Optimization, 2-Vols/Set.
  Surjit Singh/ 9781522573357/ Price:US$ 425.00
 
Book Cover ICT technologies have contributed to the advances in wireless systems, which provide seamless connectivity for worldwide communication. The growth of interconnected devices and the need to store, manage, and process the data from them has led to increased research on the intersection of the internet of things and cloud computing. The Handbook of Research on the IoT, Cloud Computing, and Wireless Network Optimization is a pivotal reference source that provides the latest research findings and solutions for the design and augmentation of wireless systems and cloud computing. The content within this publication examines data mining, machine learning, and software engineering, and is designed for IT specialists, software engineers, researchers, academicians, industry professionals, and students. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EBig Data Analytics ¡ECloud Mobility ¡EComputational intelligence ¡EData Mining ¡EEdge Computing ¡EFog Computing ¡EIoT Security ¡EMachine Learning ¡EMobile Computing ¡ESensor Networks ¡ESoftware Engineering ¡ETactical Internet ¡EWireless Technologies
   
VD05-1059 Hidden Link Prediction in Stochastic Social Networks
  Babita Pandey/ 9781522590965/ Price:US$ 195.00
 
Book Cover Link prediction is required to understand the evolutionary theory of computing for different social networks. However, the stochastic growth of the social network leads to various challenges in identifying hidden links, such as representation of graph, distinction between spurious and missing links, selection of link prediction techniques comprised of network features, and identification of network types. Hidden Link Prediction in Stochastic Social Networks concentrates on the foremost techniques of hidden link predictions in stochastic social networks including methods and approaches that involve similarity index techniques, matrix factorization, reinforcement, models, and graph representations and community detections. The book also includes miscellaneous methods of different modalities in deep learning, agent-driven AI techniques, and automata-driven systems and will improve the understanding and development of automated machine learning systems for supervised, unsupervised, and recommendation-driven learning systems. It is intended for use by data scientists, technology developers, professionals, students, and researchers. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EArtificial Intelligence ¡EE-Business ¡EE-Commerce ¡EInformation Security ¡EMachine Learning ¡EMobile Technology ¡ENetwork Analysis ¡ESecure Systems ¡ESecurity Management ¡ESocial Media
   
VD05-1058 Online Survey Design and Data Analytics: Emerging Research and Opportunities
  Shalin Hai-Jew/ 9781522585633/ Price:US$ 215.00
 
Book Cover Online survey research suites offer a vast array of capabilities, supporting the presentation of virtually every type of digital data ¡V text, imagery, audio, video, and multimedia forms. With some researcher sophistication, these online survey research suites can enable a wide range of quantitative, qualitative, and mixed methods research. Online Survey Design and Data Analytics: Emerging Research and Opportunities is a critical scholarly resource that explores the utilization of online platforms for setting up surveys to achieve a specific result, eliciting data in in-depth ways and applying creative analytics methods to online survey data. Highlighting topics such as coding, education-based analysis, and online Delphi studies, this publication is ideal for researchers, professionals, academicians, data analysts, IT consultants, and students. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡ECoding ¡EComputational Text Analysis ¡EConjoint Analysis ¡ECross-Tabulation Analysis ¡EEducation-Based Analysis ¡EMatrices ¡EOnline Delphi Studies ¡EOnline Survey Platform ¡EOnline Surveys ¡EOpen Access
   
VD05-1057 Interdisciplinary Approaches to Information Systems and Software Engineering
  Alok Bhushan Mukherjee/ 9781522577843/ Price:US$ 215.00
 
Book Cover It is now more important than ever to implement approaches and methods that can be effective in extracting meaningful information from large data sets. Although data sets may be available for different aspects of society, we may not assess the intrinsic characteristics of their behavior effectively. Additionally, frameworks are needed that can store, process, and represent the data in such a manner that can be of practical significance. Interdisciplinary Approaches to Information Systems and Software Engineering is an essential reference publication that assesses the significance of robust information systems in characterizing events of varying nature and dimensions. Additionally, the book includes studies on the development and application of decision-making and prediction modeling frameworks using different approaches such as agent-based modeling, spatial decision support systems, and spatial data mining. Covering topics such as management information systems, knowledge discovery, and mathematical analysis, this book is ideal for professionals, researchers, and academicians in various disciplines including computer science, information technology, geographical information systems, remote sensing, and earth system sciences. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAgent-Based Simulation ¡EConceptual Study ¡EDecision-Making Models ¡EInformation Security ¡EKnowledge Creation ¡EKnowledge Discovery ¡EManagement Information Systems ¡EMathematical Analysis ¡ESpatial Decision ¡ESystem Design
   
VD05-1056 Cybersecurity Education for Awareness and Compliance
  Ismini Vasileiou/ 9781522578475/ Price:US$ 195.00
 
Book Cover Understanding cybersecurity principles and practices is vital to all users of IT systems and services, and is particularly relevant in an organizational setting where the lack of security awareness and compliance amongst staff is the root cause of many incidents and breaches. If these are to be addressed, there needs to be adequate support and provision for related training and education in order to ensure that staff know what is expected of them and have the necessary skills to follow through. Cybersecurity Education for Awareness and Compliance explores frameworks and models for teaching cybersecurity literacy in order to deliver effective training and compliance to organizational staff so that they have a clear understanding of what security education is, the elements required to achieve it, and the means by which to link it to the wider goal of good security behavior. Split across four thematic sections (considering the needs of users, organizations, academia, and the profession, respectively), the chapters will collectively identify and address the multiple perspectives from which action is required. This book is ideally designed for IT consultants and specialist staff including chief information security officers, managers, trainers, and organizations. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡ECurricula ¡ECurricular Guidelines ¡ECybersecurity Education ¡ECybersecurity Literacy ¡EEducation Program ¡EInsider Threats ¡EOrganizational Security ¡ESecurity Awareness ¡ESecurity Culture ¡ESecurity Specialists
   
VD05-1055 Smart Devices, Applications, and Protocols for the IoT
  Joel J. P. C. Rodrigues/ 9781522578116/ Price:US$ 225.00
 
Book Cover Advances in computing, communications, and control have bridged the physical components of reality and cyberspace leading to the smart internet of things (IoT). The notion of IoT has extraordinary significance for the future of several industrial domains. Hence, it is expected that the complexity in the design of IoT applications will continue to increase due to the integration of several cyber components with physical and industrial systems. As a result, several smart protocols and algorithms are needed to communicate and exchange data between IoT devices. Smart Devices, Applications, and Protocols for the IoT is a collection of innovative research that explores new methods and techniques for achieving reliable and efficient communication in recent applications including machine learning, network optimization, adaptive methods, and smart algorithms and protocols. While highlighting topics including artificial intelligence, sensor networks, and mobile network architectures, this book is ideally designed for IT specialists and consultants, software engineers, technology developers, academicians, researchers, and students seeking current research on up-to-date technologies in smart communications, protocols, and algorithms in IoT. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EArtificial Intelligence ¡EBig Data ¡EBlockchain Technology ¡ECloud Computing ¡ECrowdsensing ¡EDynamic Networks ¡EFuzzy Logic ¡EGenetic algorithms ¡EMobile Network Architectures ¡ENeural Networks ¡ESensor Networks ¡ESmart Cities ¡ESmart Contracts ¡ESmart Routing ¡EWearable Devices
   
VD05-1054 Developments in Information Security and Cybernetic Wars
  Muhammad Sarfraz/ 9781522583042/ Price:US$ 225.00
 
Book Cover As internet technologies continue to advance, new types and methods of data and security breaches threaten national security. These potential breaches allow for information theft and can provide footholds for terrorist and criminal organizations. Developments in Information Security and Cybernetic Wars is an essential research publication that covers cyberwarfare and terrorism globally through a wide range of security-related areas. Featuring topics such as crisis management, information security, and governance, this book is geared toward practitioners, academicians, government officials, military professionals, and industry professionals. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡ECensorship ¡ECrisis Management ¡ECrisis Response ¡EEthics ¡EGovernance ¡EHacktivism ¡EInformation Security ¡EInternet ¡ELaw Enforcement ¡ENational Security ¡EPrivacy ¡ESecurity ¡ESecurity Technologies ¡ETerrorism
   
VD05-1053 Handbook of Research on Cloud Computing and Big Data Applications in IoT
  B. B. Gupta/ 9781522584070/ Price:US$ 295.00
 
Book Cover Today, cloud computing, big data, and the internet of things (IoT) are becoming indubitable parts of modern information and communication systems. They cover not only information and communication technology but also all types of systems in society including within the realms of business, finance, industry, manufacturing, and management. Therefore, it is critical to remain up-to-date on the latest advancements and applications, as well as current issues and challenges. The Handbook of Research on Cloud Computing and Big Data Applications in IoT is a pivotal reference source that provides relevant theoretical frameworks and the latest empirical research findings on principles, challenges, and applications of cloud computing, big data, and IoT. While highlighting topics such as fog computing, language interaction, and scheduling algorithms, this publication is ideally designed for software developers, computer engineers, scientists, professionals, academicians, researchers, and students. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAdversarial Attacks ¡EBlockchain Security ¡EChaotic Systems ¡EDelay Tolerant Networks ¡EFog Computing ¡ELanguage Interaction ¡EMulti-Cloud Database ¡EScheduling Algorithms ¡ESecurity Domain ¡ESystem-Level Benchmarks
   
VD05-1052 Cases on Immersive Virtual Reality Techniques
  Kenneth C.C. Yang/ 9781522559122/ Price:US$ 215.00
 
Book Cover As virtual reality approaches mainstream consumer use, new research and innovations in the field have impacted how we view and can use this technology across a wide range of industries. Advancements in this technology have led to recent breakthroughs in sound, perception, and visual processing that take virtual reality to new dimensions. As such, research is needed to support the adoption of these new methods and applications. Cases on Immersive Virtual Reality Techniques is an essential reference source that discusses new applications of virtual reality and how they can be integrated with immersive techniques and computer resources. Featuring research on topics such as 3D modeling, cognitive load, and motion cueing, this book is ideally designed for educators, academicians, researchers, and students seeking coverage on the applications of collaborative virtual environments. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡E3D Modeling ¡ECognitive Load ¡EInteraction Systems ¡ELearning Support ¡EMotion Cueing ¡EMultiplatform Movements ¡ESplit Attention ¡ETechnology Integration ¡EVirtual Environments ¡EVirtual World
   
VD05-1051 Impacts of Mobile Use and Experience on Contemporary Society
  Xiaoge Xu/ 9781522578857/ Price:US$ 185.00
 
Book Cover As a popular and powerful medium, mobile use has increased significantly across the world. The effects of these communication devices have not only transformed how we communicate but also how we gather and distribute information in a variety of industries including healthcare, business, and education. Impacts of Mobile Use and Experience on Contemporary Society provides cross-disciplinary research that examines mobile use and its impact through 16 different stages of life, ranging from pre-birth through after-death. Featuring research on topics such as academic application, economic value, and mobile learning, scholars from different disciplines identify the crucial implications behind one of the leading communication tools from all over the world. Included amongst the targeted audience are educators, policymakers, healthcare professionals, managers, academicians, researchers, and practitioners. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAcademic Application ¡EE-Learning ¡EEconomic Value ¡EGratification Theory ¡EMobile Learning ¡EMobile Technologies ¡EPsychological Impacts ¡ESmart Devices ¡ESocio-Economic Impact ¡ETransnational Communication
   
VD05-1050 Managerial Perspectives on Intelligent Big Data Analytics
  Zhaohao Sun/ 9781522572770/ Price:US$ 225.00
 
Book Cover Big data, analytics, and artificial intelligence are revolutionizing work, management, and lifestyles and are becoming disruptive technologies for healthcare, e-commerce, and web services. However, many fundamental, technological, and managerial issues for developing and applying intelligent big data analytics in these fields have yet to be addressed. Managerial Perspectives on Intelligent Big Data Analytics is a collection of innovative research that discusses the integration and application of artificial intelligence, business intelligence, digital transformation, and intelligent big data analytics from a perspective of computing, service, and management. While highlighting topics including e-commerce, machine learning, and fuzzy logic, this book is ideally designed for students, government officials, data scientists, managers, consultants, analysts, IT specialists, academicians, researchers, and industry professionals in fields that include big data, artificial intelligence, computing, and commerce. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EBig Data Analytics ¡EBusiness Models ¡EData Mining ¡EE-Commerce ¡EFuzzy Logic ¡EMachine Learning ¡ENeural Networks ¡EOptimization Techniques ¡EStatistical Modelling ¡EWeb Technologies
   
VD05-1049 Computational Intelligence in the Internet of Things
  Hindriyanto Dwi Purnomo/ 9781522579557/ Price:US$ 225.00
 
Book Cover In recent years, the need for smart equipment has increased exponentially with the upsurge in technological advances. To work to their fullest capacity, these devices need to be able to communicate with other devices in their network to exchange information and receive instructions. Computational Intelligence in the Internet of Things is an essential reference source that provides relevant theoretical frameworks and the latest empirical research findings in the area of computational intelligence and the Internet of Things. Featuring research on topics such as data analytics, machine learning, and neural networks, this book is ideally designed for IT specialists, managers, professionals, researchers, and academicians. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡ECloud Computing ¡EData Analytics ¡EData Integration ¡EEvolutionary Computation ¡EFuzzy Systems ¡EIoT Infrastructure ¡EMachine Learning ¡EMobile Applications ¡ENetwork Security ¡ENeural Network
   
VD05-1048 Handbook of Research on Big Data and the IoT
  Gurjit Kaur/ 9781522574323/ Price:US$ 295.00
 
Book Cover The increase in connected devices in the internet of things (IoT) is leading to an exponential increase in the data that an organization is required to manage. To successfully utilize IoT in businesses, big data analytics are necessary in order to efficiently sort through the increased data. The combination of big data and IoT can thus enable new monitoring services and powerful processing of sensory data streams. The Handbook of Research on Big Data and the IoT is a pivotal reference source that provides vital research on emerging trends and recent innovative applications of big data and IoT, challenges facing organizations and the implications of these technologies on society, and best practices for their implementation. While highlighting topics such as bootstrapping, data fusion, and graph mining, this publication is ideally designed for IT specialists, managers, policymakers, analysts, software engineers, academicians, and researchers. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EBootstrapping ¡EData Fusion ¡EData Mining ¡EExperimentation Infrastructures ¡EGraph Mining ¡EGreen Systems ¡EIdentity Management ¡EMachine Learning ¡ENetwork Architecture ¡EPrivacy Protection
   
VD05-1047 Cyber-Physical Systems for Social Applications
  Maya Dimitrova/ 9781522578796/ Price:US$ 265.00
 
Book Cover Present day sophisticated, adaptive, and autonomous (to a certain degree) robotic technology is a radically new stimulus for the cognitive system of the human learner from the earliest to the oldest age. It deserves extensive, thorough, and systematic research based on novel frameworks for analysis, modelling, synthesis, and implementation of CPSs for social applications. Cyber-Physical Systems for Social Applications is a critical scholarly book that examines the latest empirical findings for designing cyber-physical systems for social applications and aims at forwarding the symbolic human-robot perspective in areas that include education, social communication, entertainment, and artistic performance. Highlighting topics such as evolinguistics, human-robot interaction, and neuroinformatics, this book is ideally designed for social network developers, cognitive scientists, education science experts, evolutionary linguists, researchers, and academicians. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAvatar Design ¡ECyber-Physical Systems ¡EEducation ¡EHealthcare ¡EHuman-Robot Interaction ¡EHumanoid Robotics ¡EMechatronics ¡ENeuroinformatics ¡EPsychology ¡EService Robotics ¡ESocial Robotics
   
VD05-1046 Cloud Security: Concepts, Methodologies, Tools, and Applications, 4-Vols/Set.
  Information Resources Management Association/ 9781522581765/ Price:US$ 2950.00
 
Book Cover Cloud computing has experienced explosive growth and is expected to continue to rise in popularity as new services and applications become available. As with any new technology, security issues continue to be a concern, and developing effective methods to protect sensitive information and data on the cloud is imperative. Cloud Security: Concepts, Methodologies, Tools, and Applications explores the difficulties and challenges of securing user data and information on cloud platforms. It also examines the current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field. Highlighting a range of topics such as cloud forensics, information privacy, and standardization and security in the cloud, this multi-volume book is ideally designed for IT specialists, web designers, computer engineers, software developers, academicians, researchers, and graduate-level students interested in cloud computing concepts and security. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EBig Data Security ¡ECloud Forensics ¡ECloud Intrusion Detection ¡ECloud Services ¡EGovernance and Risk Management in the Cloud ¡EInformation Privacy ¡ESecure Wiping Extensions ¡ESecurity Using Data Mining Techniques ¡EStandardization and Security in the Cloud
   
VD05-1045 Critical Issues Impacting Science, Technology, Society (STS), and Our Future
  Heather Christina Lum/ 9781522579496/ Price:US$ 185.00
 
Book Cover We are in an ever-changing and fast-paced world that is entrenched in technological innovation. But how is technology and science impacting our society? How does it affect our interactions with these products and ultimately with each other? How is society shaping the types of technologies we are advancing? Critical Issues Impacting Science, Technology, Society (STS), and Our Future compiles theory and research from the confluence of a variety of disciplines to discuss how scientific research and technological innovation is shaping society, politics, and culture, and predicts what can be expected in the future. While highlighting topics including political engagement, artificial intelligence, and wearable technology, this book is ideally designed for policymakers, government officials, business managers, computer engineers, IT specialists, scientists, and professionals and researchers in the science, technology, and humanities fields. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EArtificial Intelligence ¡EAutomated Vehicle ¡EBlockchain ¡EDigital Divide ¡EGame-Based Learning ¡EIndustry 4.0 ¡EPolitical Engagement ¡EProduct Management ¡ESocial Media ¡EThanatology ¡ETransportation ¡EWearable Technology
   
VD05-1044 Managing Screen Time in an Online Society
  Lidia Oliveira/ 9781522581635/ Price:US$ 185.00
 
Book Cover The number of hours individuals spend in front of screens, such as smartphones, televisions, computers, and tablets, is enormous in today¡¦s society because screen time plays a very important role in work contexts and an even more significant role in social interaction and cultural consumption. This almost compulsive relationship with screens is more evident in children and young people and can have a lasting impact on how a society approaches screen time. Managing Screen Time in an Online Society is a collection of innovative research on how screen time seduces the person to stay in the online interaction leaving her/him in a state of alienation from her/his face-to-face context. While highlighting the methods and applications of time management in the context of screen time, especially during leisure, social interaction, and cultural consumption, this book covers topics including media consumption, psychology, and social networks. This book is ideal for researchers, students, and professionals seeking emerging information on the relationship between online interaction and personal relationships. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EDigital Age ¡EEcology ¡EHigh-Speed Society ¡EInformation Technology ¡EMedia Consumption ¡EPsychology ¡EScreen Culture ¡ESocial Networks ¡ESociology ¡ETime Studies ¡EVideo Games
   
VD05-1043 Exploring Security in Software Architecture and Design
  Michael Felderer/ 9781522563136/ Price:US$ 215.00
 
Book Cover Cyber-attacks continue to rise as more individuals rely on storing personal information on networks. Even though these networks are continuously checked and secured, cybercriminals find new strategies to break through these protections. Thus, advanced security systems, rather than simple security patches, need to be designed and developed. Exploring Security in Software Architecture and Design is an essential reference source that discusses the development of security-aware software systems that are built into every phase of the software architecture. Featuring research on topics such as migration techniques, service-based software, and building security, this book is ideally designed for computer and software engineers, ICT specialists, researchers, academicians, and field experts. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EBuilding Security ¡EDependable systems ¡EEngineering Artifacts ¡EGlobal Systems ¡EMigration Techniques ¡EProgramming security ¡ESecurity Education ¡ESecurity Risk Analysis ¡EService-Based Software ¡ESoftware Architecture
   
VD05-1042 Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities
  T. Gunasekhar/ 9781522579243/ Price:US$ 165.00
 
Book Cover Businesses constantly face online hacking threats or security breaches in their online mainframe that expose sensitive information to the wrong audience. Companies look to store their data in a separate location, distancing the availability of the information and reducing the risk of data breaches. Modern organizations need to remain vigilant against insider attacks, cloud computing risks, and security flaws within their mainframe. Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities is an essential reference source that discusses maintaining a secure management of sensitive data, and intellectual property and provides a robust security algorithm on consumer data. Featuring research on topics such as public cryptography, security principles, and trustworthy computing, this book is ideally designed for IT professionals, business managers, researchers, students, and professionals seeking coverage on preventing and detecting the insider attacks using trusted cloud computing techniques. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡ECloud Infrastructure ¡EEmpirical Attacks ¡EEncoding Rules ¡EEncryption-Based Approaches ¡EHypervisor ¡EPublic Cryptography ¡EPublic Key Infrastructure ¡ERemote Attestation ¡ESecurity Principles ¡ETrusted Platform Module ¡ETrustworthy Computing ¡EVirtual Machine
   
VD05-1040 Multigenerational Online Behavior and Media Use: Concepts, Methodologies, Tools, and Applications, 3-Vols/Set.
  Information Resources Management Association/ 9781522579090/ Price:US$ 2250.00
 
Book Cover The rapid evolution of technology continuously changes the way people interact, work, and learn. By examining these advances from a sociological perspective, researchers can further understand the impact of cyberspace on human behavior, interaction, and cognition. Multigenerational Online Behavior and Media Use: Concepts, Methodologies, Tools, and Applications is a vital reference source covering the impact of social networking platforms on a variety of relationships, including those between individuals, governments, citizens, businesses, and consumers. The publication also highlights the negative behavioral, physical, and mental effects of increased online usage and screen time such as mental health issues, internet addiction, and body image. Showcasing a range of topics including online dating, smartphone dependency, and cyberbullying, this multi-volume book is ideally designed for sociologists, psychologists, computer scientists, engineers, communication specialists, academicians, researchers, and graduate-level students seeking current research on media usage and its behavioral effects. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡ECyber Effects ¡ECyber Reasoning ¡ECyberbullying ¡ECyberstalking ¡EDigital Divide ¡EMental Health ¡EOnline Dating ¡EOnline Social Networking ¡ESmartphone Dependency ¡ESocial Media ¡EStress and Internet Addiction ¡EVirtual Reality
   
VD05-1039 Cryptographic Security Solutions for the Internet of Things
  Mohammad Tariq Banday/ 9781522557425/ Price:US$ 195.00
 
Book Cover The Internet of Things is a technological revolution that represents the future of computing and communications. Even though efforts have been made to standardize Internet of Things devices and how they communicate with the web, a uniform architecture is not followed. This inconsistency directly impacts and limits security standards that need to be put in place to secure the data being exchanged across networks. Cryptographic Security Solutions for the Internet of Things is an essential reference source that discusses novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data in the Internet of Things. With discussions on cryptographic algorithms, encryption techniques, and authentication procedures, this book is ideally designed for managers, IT consultants, startup companies, ICT procurement managers, systems and network integrators, infrastructure service providers, students, researchers, and academic professionals. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EConstrained Application Protocol ¡EE-Healthcare System ¡EHardware Security ¡EHyper Text Transfer Protocol ¡EInformation Communication Technology ¡EOpen Source Software ¡ERadio Frequency Identification ¡ESecurity Protocols ¡ETrust Management
   
VD05-1038 Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems
  S. Geetha/ 9781522582410/ Price:US$ 225.00
 
Book Cover The rate of cybercrimes is increasing because of the fast-paced advancements in computer and internet technology. Crimes employing mobile devices, data embedding/mining systems, computers, network communications, or any malware impose a huge threat to data security. Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems addresses current problems and issues emerging in cyber forensics and investigations and proposes new solutions that can be adopted and implemented to counter security breaches within various organizations. The publication examines a variety of topics such as advanced techniques for forensic developments in computer and communication-link environments and legal perspectives including procedures for cyber investigations, standards, and policies. It is designed for policymakers, forensic analysts, technology developers, security administrators, academicians, researchers, and students. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAuthentication ¡ECivil Litigation ¡ECloud Forensics ¡ECriminal Psychology ¡ECriminology ¡ECyber Warfare ¡EDigital Evidence ¡EDigital Forensics ¡EEncryptions ¡EIncident Response ¡ELaw Enforcement ¡EMachine Learning ¡EMobile Forensics ¡ENational Security
   
VD05-1036 Cases on Modern Computer Systems in Aviation
  Tetiana Shmelova/ 9781522575887/ Price:US$ 225.00
 
Book Cover Because trainees need to learn about the underlying technologies to use automation safely and efficiently, the development of automated aviation systems training is a growing challenge. Task analysis has been singled out as the basis of the training, but it can be more time-consuming than traditional development techniques. Cases on Modern Computer Systems in Aviation is an essential reference source that covers new information technology use in aviation systems to streamline the cybersecurity, decision-making, planning, and design processes within the aviation industry. Featuring coverage on a broad range of topics such as computer systems in aviation, artificial intelligence, software-defined networking (SDN), air navigation systems, decision support systems (DSS), and more, this publication is ideally designed for aviation specialists and industry professionals, technicians, practitioners, researchers, and academicians seeking current research on modern modeling approaches to streamline management in aviation. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAir Navigation Systems ¡EArtificial Intelligence ¡EComputer Systems in Aviation ¡ECybersecurity ¡EDecision Support Systems (DSS) ¡EEye Tracking Technology ¡EMultiprocessor Computer Systems ¡EOperator Decision Making ¡ESoftware-Defined Networking (SDN) ¡ETask Analysis
   
VD05-1035 Harnessing the Internet of Everything (IoE) for Accelerated Innovation Opportunities
  Pedro J.S. Cardoso/ 9781522573326/ Price:US$ 225.00
 
Book Cover As innovators continue to explore and create new developments within the fields of artificial intelligence and computer science, subfields such as machine learning and the internet of things (IoT) have emerged. Now, the internet of everything (IoE), foreseen as a cohesive and intelligent connection of people, processes, data, and things, is theorized to make internet connections more valuable by converting information into wise actions that create unprecedented capabilities, richer experiences, and economic opportunities to all players in the market. Harnessing the Internet of Everything (IoE) for Accelerated Innovation Opportunities discusses the theoretical, design, evaluation, implementation, and use of innovative technologies within the fields of IoE, machine learning, and IoT. Featuring research on topics such as low-power electronics, mobile technology, and artificial intelligence, this book is ideally designed for computer engineers, software developers, investigators, advanced-level students, professors, and professionals seeking coverage on the various contemporary theories, technologies, and tools in IoE engineering. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAging Technologies ¡EArtificial Intelligence ¡EEmbed Computing ¡EHuman-Computer Interaction ¡ELow-Power Electronics ¡EMobile Technology ¡ENatural Language Processing ¡EReinforcement Learning ¡ESmart Appliances ¡ETechnology-Enhanced Learning
   
VD05-1034 Handbook of Research on Industrial Advancement in Scientific Knowledge
  Vicente Gonzalez-Prida Diaz/ 9781522571520/ Price:US$ 235.00
 
Book Cover In a society that praises and promotes technological advancement, it becomes increasingly essential to review the effects of such rapid technological growth. New high-tech advances need to be examined to determine what they mean to science, society, and industry along with the benefits and challenges they present. The Handbook of Research on Industrial Advancement in Scientific Knowledge addresses the intersection of technology and science where engineering considerations, mathematical approaches, and management tools provide a better understanding and awareness of Industry 4.0, while also taking into account the impact on current society. This publication identifies methodologies and applications related to decision making, risk and uncertainty, and design and development not only on scientific and industrial topics but also on social and ethical matters. It is designed for engineers, entrepreneurs, academicians, researchers, managers, and students. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EDecision Making ¡EDigital Swarm ¡EEnhancement Technologies ¡EEthics ¡EGame Theory ¡EHybrid Models ¡EKnowledge Production ¡ELegislation ¡EMicroblogging ¡EProject Development ¡ETechnodata ¡ETranshumanism
   
VD05-1033 Integrating the Internet of Things Into Software Engineering Practices
  D. Jeya Mala/ 9781522577904/ Price:US$ 215.00
 
Book Cover To provide the necessary security and quality assurance activities into Internet of Things (IoT)-based software development, innovative engineering practices are vital. They must be given an even higher level of importance than most other events in the field. Integrating the Internet of Things Into Software Engineering Practices provides research on the integration of IoT into the software development life cycle (SDLC) in terms of requirements management, analysis, design, coding, and testing, and provides security and quality assurance activities to IoT-based software development. The content within this publication covers agile software, language specification, and collaborative software and is designed for analysts, security experts, IoT software programmers, computer and software engineers, students, professionals, and researchers. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAgile Software ¡ECoding Standards ¡ECollaborative Software ¡ELanguage Specification ¡EMachine Learning ¡ERisk Assessment ¡ESecurity Assessment ¡ESoftware Architecture ¡ESystem Testing ¡EWeb-Based Development
   
VD05-1032 Big Data and Knowledge Sharing in Virtual Organizations
  Albert Gyamfi/ 9781522575191/ Price:US$ 215.00
 
Book Cover Knowledge in its pure state is tacit in nature¡Xdifficult to formalize and communicate¡Xbut can be converted into codified form and shared through both social interactions and the use of IT-based applications and systems. Even though there seems to be considerable synergies between the resulting huge data and the convertible knowledge, there is still a debate on how the increasing amount of data captured by corporations could improve decision making and foster innovation through effective knowledge-sharing practices. Big Data and Knowledge Sharing in Virtual Organizations provides innovative insights into the influence of big data analytics and artificial intelligence and the tools, methods, and techniques for knowledge-sharing processes in virtual organizations. The content within this publication examines cloud computing, machine learning, and knowledge sharing. It is designed for government officials and organizations, policymakers, academicians, researchers, technology developers, and students. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EArtificial Intelligence ¡ECloud Computing ¡ECollaborative Learning ¡EDecision Science ¡EDigitalization ¡EKnowledge Sharing ¡EMachine Learning ¡EMobile Platforms ¡EOrganizational Learning ¡ESocial Media ¡EVirtual Organizations
   
VD05-1031 Artificial Intelligence and Security Challenges in Emerging Networks
  Ryma Abassi/ 9781522573531/ Price:US$ 195.00
 
Book Cover The recent rise of emerging networking technologies such as social networks, content centric networks, Internet of Things networks, etc, have attracted significant attention from academia as well as industry professionals looking to utilize these technologies for efficiency purposes. However, the allure of such networks and resultant storage of high volumes of data leads to increased security risks, including threats to information privacy. Artificial Intelligence and Security Challenges in Emerging Networks is an essential reference source that discusses applications of artificial intelligence, machine learning, and data mining, as well as other tools and strategies to protect networks against security threats and solve security and privacy problems. Featuring research on topics such as encryption, neural networks, and system verification, this book is ideally designed for ITC procurement managers, IT consultants, systems and network integrators, infrastructure service providers, computer and software engineers, startup companies, academicians, researchers, managers, and students. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EEncryption ¡EFog Computing ¡EIoT Threats ¡EMachine Learning ¡ENetwork Manipulation ¡ENeural Networks ¡ERansomware ¡EScanning Techniques ¡ESecurity ¡ESystem Verification ¡EVehicle Detection
   
VD05-1030 Code Generation, Analysis Tools, and Testing for Quality
  Ricardo Alexandre Peixoto de Queiros/ 9781522574552/ Price:US$ 205.00
 
Book Cover Despite the advances that have been made in programming, there is still a lack of sufficient methods for quality control. While code standards try to force programmers to follow a specific set of rules, few tools exist that really deal with automatic refactoring of this code, and evaluation of the coverage of these tests is still a challenge. Code Generation, Analysis Tools, and Testing for Quality is an essential reference source that discusses the generation and writing of computer programming and methods of quality control such as analysis and testing. Featuring research on topics such as programming languages, quality assessment, and automated development, this book is ideally designed for academicians, practitioners, computer science teachers, enterprise developers, and researchers seeking coverage on code auditing strategies and methods. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAuditing Tools ¡EAutomated Development ¡ECode Editors ¡ECode Generation ¡ECompetitive Programming ¡EDeclarative Languages ¡EProgramming Languages ¡EQuality Assessment ¡EStatic Code Analysis ¡EUnit Testing
   
VD05-1029 Emerging Trends and Applications in Cognitive Computing
  Pradeep Kumar Mallick/ 9781522557937/ Price:US$ 215.00
 
Book Cover Though an individual can process a limitless amount of information, the human brain can only comprehend a small amount of data at a time. Using technology can improve the process and comprehension of information, but the technology must learn to behave more like a human brain to employ concepts like memory, learning, visualization ability, and decision making. Emerging Trends and Applications in Cognitive Computing is a fundamental scholarly source that provides empirical studies and theoretical analysis to show how learning methods can solve important application problems throughout various industries and explain how machine learning research is conducted. Including innovative research on topics such as deep neural networks, cyber-physical systems, and pattern recognition, this collection of research will benefit individuals such as IT professionals, academicians, students, researchers, and managers. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡ECardiac Diseases Detection ¡ECyber-Physical Systems ¡EDeep Neural Network ¡EInformation Retrieval ¡EPattern Mining ¡EPattern Recognition ¡ERisk Management ¡ESecurity Issues ¡ESoftware Quality Measurement ¡ESpeech Analysis
   
VD05-1027 Predictive Intelligence Using Big Data and the Internet of Things
  P.K. Gupta/ 9781522562108/ Price:US$ 245.00
 
Book Cover With the recent growth of big data and the internet of things (IoT), individuals can now upload, retrieve, store, and collect massive amounts of information to help drive decisions and optimize processes. Due to this, a new age of predictive computing is taking place, and data can now be harnessed to predict unknown occurrences or probabilities based on data collected in real time. Predictive Intelligence Using Big Data and the Internet of Things highlights state-of-the-art research on predictive intelligence using big data, the IoT, and related areas to ensure quality assurance and compatible IoT systems. Featuring coverage on predictive application scenarios to discuss these breakthroughs in real-world settings and various methods, frameworks, algorithms, and security concerns for predictive intelligence, this book is ideally designed for academicians, researchers, advanced-level students, and technology developers. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EBusiness Analytics ¡ECloud Computing Techniques ¡EData Analytic Framework ¡EData Analytic Models ¡EData Mining Techniques ¡EDevice-to-Device Communications ¡EPredictive Architecture ¡EQuality Assurance ¡EReal-Time Applications ¡ESecurity Aspects ¡ESupply Chain Management
   
VD05-1026 Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention
  Sunita Vikrant Dhavale/ 9781522576280/ Price:US$ 220.00
 
Book Cover In recent decades there has been incredible growth in the use of various internet applications by individuals and organizations who store sensitive information online on different servers. This greater reliance of organizations and individuals on internet technologies and applications increases the threat space and poses several challenges for implementing and maintaining cybersecurity practices. Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention provides innovative insights into how an ethical hacking knowledge base can be used for testing and improving the network and system security posture of an organization. It is critical for each individual and institute to learn hacking tools and techniques that are used by dangerous hackers in tandem with forming a team of ethical hacking professionals to test their systems effectively. Highlighting topics including cyber operations, server security, and network statistics, this publication is designed for technical experts, students, academicians, government officials, and industry professionals. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡ECommunication Protocols ¡EComputer Networking ¡ECyber Operations ¡ECybercrime ¡ENetwork Monitoring ¡ENetwork Statistics ¡EOperating Systems ¡EServer Security ¡EShell Scripting ¡EVirtual Machines ¡EWireless Hacking
   
VD05-1025 Cognitive Social Mining Applications in Data Analytics and Forensics
  Anandakumar Haldorai/ 9781522575221/ Price:US$ 195.00
 
Book Cover Recently, there has been a rapid increase in interest regarding social network analysis in the data mining community. Cognitive radios are expected to play a major role in meeting this exploding traffic demand on social networks due to their ability to sense the environment, analyze outdoor parameters, and then make decisions for dynamic time, frequency, space, resource allocation, and management to improve the utilization of mining the social data. Cognitive Social Mining Applications in Data Analytics and Forensics is an essential reference source that reviews cognitive radio concepts and examines their applications to social mining using a machine learning approach so that an adaptive and intelligent mining is achieved. Featuring research on topics such as data mining, real-time ubiquitous social mining services, and cognitive computing, this book is ideally designed for social network analysts, researchers, academicians, and industry professionals. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡ECloud Computing ¡ECognitive Computing ¡EData Mining ¡EHealthcare ¡EIndexing ¡EMachine Learning Techniques ¡EMedical Document Clustering ¡EReal-Time Ubiquitous Social Mining Services ¡ESecurity ¡ESocial Mining ¡ESocial network analysis ¡ESocial Platforms
   
VD05-1024 Web Services: Concepts, Methodologies, Tools, and Applications, 4-Vols/Set.
  Information Resources Management Association/ 9781522575016/ Price:US$ 2950.00
 
Book Cover Web service technologies are redefining the way that large and small companies are doing business and exchanging information. Due to the critical need for furthering automation, engagement, and efficiency, systems and workflows are becoming increasingly more web-based. Web Services: Concepts, Methodologies, Tools, and Applications is an innovative reference source that examines relevant theoretical frameworks, current practice guidelines, industry standards and standardization, and the latest empirical research findings in web services. Highlighting a range of topics such as cloud computing, quality of service, and semantic web, this multi-volume book is designed for computer engineers, IT specialists, software designers, professionals, researchers, and upper-level students interested in web services architecture, frameworks, and security. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EBig Data ¡ECloud Computing ¡ECyber-Physical System ¡EData Mining ¡EE-Services ¡EFog Computing ¡EQuality of Service ¡ESemantic Web ¡EService Modeling ¡ESocial Networks ¡EStandardization
   
VD05-1023 Advancing Consumer-Centric Fog Computing Architectures
  Kashif Munir/ 9781522571490/ Price:US$ 210.00
 
Book Cover Due to a rapidly growing number of devices and communications, cloud computing has begun to fall behind on its ability to adequately process today¡¦s technology. Additionally, companies have begun to look for solutions that would help reduce their infrastructure costs and improve profitability. Fog computing, a paradigm that extends cloud computing and services to the edge of the network, has presented itself as a viable solution and cost-saving method. However, before businesses can implement this new method, concerns regarding its security, privacy, availability, and data protection must be addressed. Advancing Consumer-Centric Fog Computing Architectures is a collection of innovative research on the methods and applications of fog computing in technological, business, and organizational dimensions. Thoroughly examining fog computing with respect to issues of management, trust and privacy, governance, and interoperability, this publication highlights a range of topics including access control mechanism, data confidentiality, and service-oriented architecture. This book is ideally designed for academicians, researchers, software developers, IT professionals, policymakers, technology designers, graduate-level students, managers, and business owners. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAccess Control Mechanism ¡EAuditing ¡EBusiness Models ¡ECloud Computing ¡ECognitive Computing ¡EData Analytics ¡EData Confidentiality ¡EPrivacy Management ¡EService Security ¡EService-Oriented Architecture
   
VD05-1022 Automatic Cyberbullying Detection: Emerging Research and Opportunities
  Michal E. Ptaszynski/ 9781522552499/ Price:US$ 165.00
 
Book Cover Due to the prevalence of social network service and social media, the problem of cyberbullying has risen to the forefront as a major social issue over the last decade. Internet hate, harassment, cyberstalking, cyberbullying¡Xthese terms, which were almost unknown 10 years ago¡Xare in the everyday lexicon of all internet users. Unfortunately, it is becoming increasingly difficult to undertake continuous surveillance of websites as new ones are appearing daily. Methods for automatic detection and mitigation for online bullying have become necessary in order to protect the online user experience. Automatic Cyberbullying Detection: Emerging Research and Opportunities provides innovative insights into online bullying and methods of early identification, mitigation, and prevention of harassing speech and activity. Explanations and reasoning for each of these applied methods are provided as well as their pros and cons when applied to the language of online bullying. Also included are some generalizations of cyberbullying as a phenomenon and how to approach the problem from a practical technology-backed point of view. The content within this publication represents the work of deep learning, language modeling, and web mining. It is designed for academicians, social media moderators, IT consultants, programmers, education administrators, researchers, and professionals and covers topics centered on identification methods and mitigation of internet hate and online harassment. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAnalysis System ¡EBlocker Test Application ¡EDeep Learning ¡EInternet Patrol ¡ELanguage Modeling ¡EPreprocessing ¡ESearch Methods ¡ETraditional Classifiers ¡EWeb Mining ¡EWord Similarity
   
VD05-1021 Mobile Network Forensics: Emerging Research and Opportunities
  Filipo Sharevski/ 9781522558552/ Price:US$ 185.00
 
Book Cover Modern communications are now more than ever heavily dependent on mobile networks, creating the potential for higher incidents of sophisticated crimes, terrorism acts, and high impact cyber security breaches. Disrupting these unlawful actions requires a number of digital forensic principles and a comprehensive investigation process. Mobile Network Forensics: Emerging Research and Opportunities is an essential reference source that discusses investigative trends in mobile devices and the internet of things, examining malicious mobile network traffic and traffic irregularities, as well as software-defined mobile network backbones. Featuring research on topics such as lawful interception, system architecture, and networking environments, this book is ideally designed for forensic practitioners, government officials, IT consultants, cybersecurity analysts, researchers, professionals, academicians, and students seeking coverage on the technical and legal aspects of conducting investigations in the mobile networking environment. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAnti-Forensics ¡EGlobal System for Mobile ¡EInvestigation Process ¡ELawful Interception ¡EMobile Users ¡ENetwork Security ¡ENetworking Environments ¡ESecurity Considerations ¡ESystem Architecture ¡ETechnical Requirements ¡EUniversal Mobile Terrestrial System
   
VD05-1020 Semantic Web Science and Real-World Applications
  Miltiadis D. Lytras/ 9781522571865/ Price:US$ 195.00
 
Book Cover Continual advancements in web technology have highlighted the need for formatted systems that computers can utilize to easily read and sift through the hundreds of thousands of data points across the internet. Therefore, having the most relevant data in the least amount of time to optimize the productivity of users becomes a priority. Semantic Web Science and Real-World Applications provides emerging research exploring the theoretical and practical aspects of semantic web science and real-world applications within the area of big data. Featuring coverage on a broad range of topics such as artificial intelligence, social media monitoring, and microblogging recommendation systems, this book is ideally designed for IT consultants, academics, professionals, and researchers of web science seeking the current developments, requirements and standards, and technology spaces presented across academia and industries. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAlgorithm Development ¡EAlgorithm Framework ¡EArtificial Intelligence ¡EContextual Data Mining ¡EExtraction Algorithm ¡EInternet of Things ¡ERecommendation System ¡ESemantic Information ¡ESensor Web Architecture ¡ESocial Media Monitoring ¡EWireless Sensor Networks
   
VD05-1019 Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics, 2-Vols/Set.
  Mehdi Khosrow-Pour, D.B.A./ 9781522575986/ Price:US$ 595.00
 
Book Cover From cloud computing to data analytics, society stores vast supplies of information through wireless networks and mobile computing. As organizations are becoming increasingly more wireless, ensuring the security and seamless function of electronic gadgets while creating a strong network is imperative. Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics highlights the challenges associated with creating a strong network architecture in a perpetually online society. Readers will learn various methods in building a seamless mobile computing option and the most effective means of analyzing big data. This book is an important resource for information technology professionals, software developers, data analysts, graduate-level students, researchers, computer engineers, and IT specialists seeking modern information on emerging methods in data mining, information technology, and wireless networks. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EBig Data ¡ECloud Computing ¡EData Mining ¡EHigh-Performance Computing ¡EMobility ¡ENetwork Analytics ¡ESoftware Engineering ¡ETelecommunications ¡ETheoretical Computer Science ¡EWireless Computing
   
VD05-1018 Big Data Processing With Hadoop
  T. Revathi/ 9781522537908/ Price:US$ 195.00
 
Book Cover Due to the increasing availability of affordable internet services, the number of users, and the need for a wider range of multimedia-based applications, internet usage is on the rise. With so many users and such a large amount of data, the requirements of analyzing large data sets leads to the need for further advancements to information processing. Big Data Processing With Hadoop is an essential reference source that discusses possible solutions for millions of users working with a variety of data applications, who expect fast turnaround responses, but encounter issues with processing data at the rate it comes in. Featuring research on topics such as market basket analytics, scheduler load simulator, and writing YARN applications, this book is ideally designed for IoT professionals, students, and engineers seeking coverage on many of the real-world challenges regarding big data. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAPI ¡EArchitecture Components ¡ECustomer Analytics ¡EHadoop Architecture ¡EHDFS ¡EMapReduce Programming ¡EMarket Basket Analytics ¡EPseudo-Distributed Operation ¡EScheduler Load Simulator ¡EWriting YARN Applications
   
VD05-1017 Integrating and Streamlining Event-Driven IoT Services
  Yang Zhang/ 9781522576228/ Price:US$ 205.00
 
Book Cover In IoT scenarios, ways in which large-scale and cross-domain service systems can be established are still unclear, and no systematic or in-depth theories and methods have yet been found. An effective, formal foundation to IoT application designs could serve as a knowledge base for a variety of virtual world applications. Integrating and Streamlining Event-Driven IoT Services discusses how to observe isolated services running by different observation sources, how to fuse different observations to deal with observation conflict and incompleteness, and how to deal with adversaries and physical system features for real-time property enforcement over the fused knowledge. Overall, presenting an exploration of systematic theories and methods for the design of IoT services based on the principles of streamlining and integration, this book features research on topics such as CEP service, virtual machine technologies, and hybrid EPC. It is ideally designed for engineers, researchers, and university students seeking coverage on applications for smart cities, smart grids, and Industry 4.0. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡ECEP Service ¡ECross-Layers Security Design ¡EDistributed Events ¡EEvent-Driven SOA ¡EHybrid EPC ¡EModeling Sensors ¡EResource Lifecycle Management ¡ESecurity and Reliability Solutions ¡EVirtual Machine Technologies ¡EWeak Data Consistency
   
VD05-1016 Advanced Metaheuristic Methods in Big Data Retrieval and Analytics
  Hadj Ahmed Bouarara/ 9781522573388/ Price:US$ 205.00
 
Book Cover The amount of data shared and stored on the web and other document repositories is steadily on the rise. Unfortunately, this growth increases inefficiencies and difficulties when trying to find the most relevant and up-to-date information due to unstructured data. Advanced Metaheuristic Methods in Big Data Retrieval and Analytics examines metaheuristic techniques as an important alternative model for solving complex problems that are not treatable by deterministic methods. Recent studies suggest that IR and biomimicry can be used together for several application problems in big data and internet of things, especially when conventional methods would be too expensive or difficult to implement. Featuring coverage on a broad range of topics such as ontology, plagiarism detection, and machine learning, this book is ideally designed for engineers, graduate students, IT professionals, and academicians seeking an overview of new trends in information retrieval in big data. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAd Hoc Retrieval Models ¡EData Mining ¡EEcological Data ¡EFace Recognition ¡EMachine Learning ¡EOntology ¡EPlagiarism Detection ¡ESocial Networks ¡ESpam Filtering ¡EWireless Sensor Networks
   
VD05-1014 Innovative Solutions and Applications of Web Services Technology
  Liang-Jie Zhang/ 9781522572688/ Price:US$ 215.00
 
Book Cover With the development of Web 2.0 technologies, the internet has become a huge platform for information and data sharing. As such, web services provide an important foundation for branching technologies in end-user computing and applications. To make online technology more accessible for users, it is important to optimize web services to function properly or offer a personalized experience. Innovative Solutions and Applications of Web Services Technology is a collection of innovative research on the methods and applications of existing technologies for web service usability and accessibility. Highlighting a range of topics including business processes, cyber-physical systems, and recommendation accuracy, this book is ideally designed for IT professionals, researchers, graduate-level students, software developers, academicians, and computer engineers seeking current research on adapting online information and services to user needs. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAnswer Set Programming ¡EBlockchain ¡EBusiness Processes ¡ECyber-Physical Systems ¡EMachine Learning ¡EModel-Based Development ¡EPrivacy Policy ¡ERecommendation Accuracy ¡ESemantic Service Composition ¡EWeb Service Clustering
   
VD05-1013 Emerging Automation Techniques for the Future Internet
  Mohamed Boucadair/ 9781522571469/ Price:US$ 195.00
 
Book Cover Automation techniques are meant to facilitate the delivery of flexible, agile, customized connectivity services regardless of the nature of the networking environment. New architectures combine advanced forwarding and routing schemes, mobility features, and customer-adapted resource facilities used for operation and delivery of services. Emerging Automation Techniques for the Future Internet is a collection of innovative research on the methods and applications of new architectures for the planning, dynamic delivery, and operation of services. While highlighting topics including policy enforcement, self-architectures, and automated networks, this book is ideally designed for engineers, IT consultants, professionals, researchers, academicians, and students seeking current research on techniques and structures used to enhance experience and services rendered. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAutomated Network ¡EEnterprise Network ¡EInformation Models ¡EInternet of Things ¡EPerformance Assessment ¡EPolicy Enforcement ¡ESelf-Architectures ¡EService Assurance
   
VD05-1012 Mobile Devices and Smart Gadgets in Human Rights
  Sajid Umair/ 9781522569398/ Price:US$ 195.00
 
Book Cover In recent years, technology has permeated every aspect of daily life and has drastically increased accessibility and empowerment for all demographics. Smart technologies and mobile applications now have the ability to promote and protect the basic rights of children, women, and men alike. A child¡¦s right to education and mental growth or a woman¡¦s socio-economic stability and protection from physical, sexual, and emotional abuse can all be attributed to these advancements. Mobile Devices and Smart Gadgets in Human Rights provides emerging research exploring the theoretical and practical applications of technology in relation to human ethical treatment and interactions. Featuring coverage on a broad range of topics such as public safety, augmented reality, and safety apps, this book is ideally designed for researchers, students, activists, academicians, policymakers, and government officials seeking current research on the influence of portable technologies in human rights and ethics. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAugmented Reality ¡EChildren¡¦s Rights ¡EHuman Detection ¡EHuman Rights ¡EMobile Devices ¡EPIR Sensor ¡EPublic Safety ¡ERemote Patients ¡ESafety Apps ¡ESmart Technology ¡EStudents With Disabilities ¡ETechnology Accessibility ¡EWomen Empowerment
   
VD05-1011 Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics
  Mehdi Khosrow-Pour, D.B.A./ 9781522574927/ Price:US$ 285.00
 
Book Cover Cyber-attacks are rapidly becoming one of the most prevalent issues globally, and as they continue to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community. Beyond cyber-attacks, personal information is now routinely and exclusively housed in cloud-based systems. The rising use of information technologies requires stronger information security and system procedures to reduce the risk of information breaches. Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics presents emerging research and methods on preventing information breaches and further securing system networks. While highlighting the rising concerns in information privacy and system security, this book explores the cutting-edge methods combatting digital risks and cyber threats. This book is an important resource for information technology professionals, cybercrime researchers, network analysts, government agencies, business professionals, academicians, and practitioners seeking the most up-to-date information and methodologies on cybercrime, digital terrorism, network security, and information technology ethics. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡ECloud-Based Systems ¡ECyber Bullying ¡ECyber Security ¡ECybercrime ¡EDigital Terrorism ¡EForensic Science ¡EInformation Privacy ¡EIT Ethics ¡ENetwork Security
   
VD05-1010 Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications, 4-Vols/Set.
  Information Resources Management Association/ 9781522571131/ Price:US$ 2400.00
 
Book Cover The censorship and surveillance of individuals, societies, and countries have been a long-debated ethical and moral issue. In consequence, it is vital to explore this controversial topic from all angles. Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications is a vital reference source on the social, moral, religious, and political aspects of censorship and surveillance. It also explores the techniques of technologically supported censorship and surveillance. Highlighting a range of topics such as political censorship, propaganda, and information privacy, this multi-volume book is geared towards government officials, leaders, professionals, policymakers, media specialists, academicians, and researchers interested in the various facets of censorship and surveillance. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EDigital Surveillance ¡EInformation Access ¡EInformation Privacy ¡EIntellectual Freedom ¡EMass Media ¡EMoral Censorship ¡EPolitical Censorship ¡EPropaganda ¡EReligious Censorship ¡ERemote Monitoring System
   
VD05-1009 Interface Support for Creativity, Productivity, and Expression in Computer Graphics
  Anna Ursyn/ 9781522573715/ Price:US$ 195.00
 
Book Cover Interfaces within computers, computing, and programming are consistently evolving and continue to be relevant to computer science as it progresses. Advancements in human-computer interactions, their aesthetic appeal, ease of use, and learnability are made possible due to the creation of user interfaces and result in further growth in science, aesthetics, and practical applications. Interface Support for Creativity, Productivity, and Expression in Computer Graphics is a collection of innovative research on usability, the apps humans use, and their sensory environment. While highlighting topics such as image datasets, augmented reality, and visual storytelling, this book is ideally designed for researchers, academicians, graphic designers, programmers, software developers, educators, multimedia specialists, and students seeking current research on uniting digital content with the physicality of the device through applications, thus addressing sensory perception. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAesthetic Composition Indicator ¡EAugmented Reality ¡EEnd-User Computing ¡EHuman-Computer Interaction ¡EImage Datasets ¡EKnowledge Visualization ¡EPsychological Intervention ¡ESocio-Spatial Engagement ¡EVarious Interfaces ¡EVirtual Driving Environments ¡EVisual Storytelling
   
VD05-1008 Advanced Methodologies and Technologies in Artificial Intelligence, Computer Simulation, and Human-Computer Interaction, 2-Vols/Set.
  Mehdi Khosrow-Pour, D.B.A./ 9781522573685/ Price:US$ 545.00
 
Book Cover As modern technologies continue to develop and evolve, the ability of users to adapt with new systems becomes a paramount concern. Research into new ways for humans to make use of advanced computers and other such technologies through artificial intelligence and computer simulation is necessary to fully realize the potential of tools in the 21st century. Advanced Methodologies and Technologies in Artificial Intelligence, Computer Simulation, and Human-Computer Interaction provides emerging research in advanced trends in robotics, AI, simulation, and human-computer interaction. Readers will learn about the positive applications of artificial intelligence and human-computer interaction in various disciples such as business and medicine. This book is a valuable resource for IT professionals, researchers, computer scientists, and researchers invested in assistive technologies, artificial intelligence, robotics, and computer simulation. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EArtificial Intelligence ¡EAssistive Technologies ¡EComputer Simulation ¡EHuman-Computer Interaction ¡EIntelligent Information Systems ¡ERobotics ¡ESoftware Engineering ¡EUser Interface Design
   
VD05-1007 Nature-Inspired Algorithms for Big Data Frameworks
  Hema Banati/ 9781522558521/ Price:US$ 225.00
 
Book Cover As technology continues to become more sophisticated, mimicking natural processes and phenomena becomes more of a reality. Continued research in the field of natural computing enables an understanding of the world around us, in addition to opportunities for manmade computing to mirror the natural processes and systems that have existed for centuries. Nature-Inspired Algorithms for Big Data Frameworks is a collection of innovative research on the methods and applications of extracting meaningful information from data using algorithms that are capable of handling the constraints of processing time, memory usage, and the dynamic and unstructured nature of data. Highlighting a range of topics including genetic algorithms, data classification, and wireless sensor networks, this book is ideally designed for computer engineers, software developers, IT professionals, academicians, researchers, and upper-level students seeking current research on the application of nature and biologically inspired algorithms for handling challenges posed by big data in diverse environments. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAntenna Pattern Synthesis ¡EData Classification ¡EDeep Learning ¡EError Optimization ¡EGene Classification ¡EGenetic Algorithms ¡ESecure Data Communications ¡ESocial Network ¡EWeb Analytics ¡EWireless Sensor Networks
   
VD05-1006 Intelligent Innovations in Multimedia Data Engineering and Management
  Siddhartha Bhattacharyya/ 9781522571070/ Price:US$ 225.00
 
Book Cover With the ever-increasing volume of data, proper management of data is a challenging proposition to scientists and researchers, and given the vast storage space required, multimedia data is no exception in this regard. Scientists and researchers are investing great effort to discover new space-efficient methods for storage and archiving of this data. Intelligent Innovations in Multimedia Data Engineering and Management provides emerging research exploring the theoretical and practical aspects of storage systems and computing methods for large forms of data. Featuring coverage on a broad range of topics such as binary image, fuzzy logic, and metaheuristic algorithms, this book is ideally designed for computer engineers, IT professionals, technology developers, academicians, and researchers seeking current research on advancing strategies and computing techniques for various types of data. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EBinary Image ¡EData Privacy ¡EData Security ¡EFuzzy Logic ¡EMetaheuristic Algorithms ¡EReversible Data Hiding ¡ESteganography ¡EWatermarking Techniques
   
VD05-1005 Big Data Analytics for Smart and Connected Cities
  Nilanjan Dey/ 9781522562078/ Price:US$ 225.00
 
Book Cover To continue providing people with safe, comfortable, and affordable places to live, cities must incorporate techniques and technologies to bring them into the future. The integration of big data and interconnected technology, along with the increasing population, will lead to the necessary creation of smart cities. Big Data Analytics for Smart and Connected Cities is a pivotal reference source that provides vital research on the application of the integration of interconnected technologies and big data analytics into the creation of smart cities. While highlighting topics such as energy conservation, public transit planning, and performance measurement, this publication explores technology integration in urban environments as well as the methods of planning cities to implement these new technologies. This book is ideally designed for engineers, professionals, researchers, and technology developers seeking current research on technology implementation in urban settings. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAir Pollution Modelling ¡ECloud Computing ¡EData Clustering ¡EDatabase Security ¡EEnergy Conversation ¡EInternet of Things ¡EPerformance Measurement ¡EPublic Transit Planning ¡ESmart Waste Management System ¡ETechnology Integration ¡EVehicle Control Systems
   
VD05-1004 Handbook of Research on the Evolution of IT and the Rise of E-Society
  Maki Habib/ 9781522572145/ Price:US$ 245.00
 
Book Cover Rapid advancement in information and communication technologies have led to interconnected and predominately online interactions in the current era. It is crucial for current organizations to adapt and integrate internet technologies to increase flexibility, effective services, and competitiveness. The Handbook of Research on the Evolution of IT and the Rise of E-Society is a pivotal reference source that provides vital research on the application of embedded and connected technology and its role in modern society. While highlighting topics such as information privacy, knowledge management, and social media, this publication explores the development and cultivation of e-community in organizations, as well as the methods of addressing interpersonal facilitation, user-friendly design, and mobile accessibility. This book is ideally designed for program developers, computer engineers, managers, business professionals, researchers, and graduate-level students seeking current research on the adoption and efficient usage, formation, and maintenance of internet and communication technology interaction. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EBig Data ¡EBrand Image ¡EBusiness Intelligence ¡EConsumer Value ¡EE-Community ¡EInformation Privacy ¡EIT Competence ¡EKnowledge Management ¡EOrganizational Image ¡EPublic Relations Communication ¡ESocial Media
   
VD05-1003 Extracting Knowledge From Opinion Mining
  Rashmi Agrawal/ 9781522561170/ Price:US$ 225.00
 
Book Cover Data mining techniques are commonly used to extract meaningful information from the web, such as data from web documents, website usage logs, and hyperlinks. Building on this, modern organizations are focusing on running and improving their business methods and returns by using opinion mining. Extracting Knowledge From Opinion Mining is an essential resource that presents detailed information on web mining, business intelligence through opinion mining, and how to effectively use knowledge retrieved through mining operations. While highlighting relevant topics, including the differences between ontology-based opinion mining and feature-based opinion mining, this book is an ideal reference source for information technology professionals within research or business settings, graduate and post-graduate students, as well as scholars. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EBusiness Intelligence ¡EFeature-Based Opinion Mining ¡EMachine Learning ¡ENatural Language Processing ¡EOntology-Based Mining ¡EOpinion Mining ¡ERule Mining ¡ESentimental Analysis ¡ESpam Detection ¡EWeb Mining
   
VD05-1002 Analyzing Human Behavior in Cyberspace
  Zheng Yan/ 9781522571285/ Price:US$ 175.00
 
Book Cover The rapid evolution of technology continuously changes the way people interact, work, and learn. By examining these advances from a sociological perspective, researchers can further understand the impact of cyberspace on human behavior, interaction, and cognition. Analyzing Human Behavior in Cyberspace provides emerging research exploring the four types of cyber behavior, expanding the scientific knowledge about the subject matter and revealing its extreme complexity. Featuring coverage on a broad range of topics such as cyber effects, emotion recognition, and cyber victimization, this book is ideally designed for sociologists, psychologists, academicians, researchers, and graduate-level students seeking current research on how people behave online. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡ECyber Aggression ¡ECyber Effects ¡ECyber Reasoning ¡ECyber Victimization ¡ECyberbullying ¡EDigital Behavior ¡EEmotion Recognition
   
VD05-1001 Trends, Experiences, and Perspectives in Immersive Multimedia and Augmented Reality
  Emilia Simao/ 9781522556961/ Price:US$ 185.00
 
Book Cover The concept of immersive multimedia, which is closely related to concepts of augmented reality, brings opportunities in art, education, entertainment, and technology. As such, it is vital to explore the connections between consumers of media content and information parts that come from multimedia platforms. Trends, Experiences, and Perspectives in Immersive Multimedia and Augmented Reality is a critical scholarly resource that offers solutions to the problems that appear in both theoretical and practical dimensions of immersive multimedia experiences on an interdisciplinary platform. Featuring coverage on a broad range of topics such as cyber behavior, human-computer interaction, and transmedia, this book is geared towards digital artists, media professionals, developers, academicians, researchers, and upper-level graduate students seeking current research on the exploration of immersive multimedia through the perspectives of technology, communications, and art. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EComputer Aesthetics ¡ECyber Behavior ¡EDigital Media Art ¡EDigital Storytelling ¡EHuman-Computer Interaction ¡EMedia Aesthetics ¡ESocial Networks ¡ETransmedia ¡EVirtual Reality
   
VD05-1000 The Rise of Fog Computing in the Digital Era
  K.G. Srinivasa/ 9781522560708/ Price:US$ 215.00
 
Book Cover With the immense growth of information, the prevalence of ubiquitously connected smart devices is rapidly increasing. Providing platforms that support computation, storage, and networking services between end devices is an essential aspect of an expanding digital society. The Rise of Fog Computing in the Digital Era provides innovative insights into the present generation of computing devices, as well as new approaches to computational platforms through fog computing. The content within this publication presents concepts and theories on data analytics, management systems, networking architectures, and many more. It is a vital reference source for IT professionals, computer programmers, software developers, computer engineers, researchers, and upper-level students seeking topics centered on the challenges and benefits of fog computing in mobile environments. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EConfidentiality ¡EData Analytics ¡EDevelopment Techniques ¡EEnergy Efficiency ¡EInformation Security ¡EManagement Systems ¡ENetworking Architectures ¡ESmart Agriculture ¡ESoftware Engineering
   
SD05-483 Implementing Digital Forensic Readiness: From Reactive to Proactive Process
  Jason Sachowski/ 9781138338951/ Price:¢G 59.99
 
   
SD05-483 Designing Audio Power Amplifiers
  Bob Cordell/ 9781138555440/ Price:¢G 72.99
 
   
SD05-483 Privacy and Identity in a Networked Society: Refining Privacy Impact Assessment
  Stefan StrausB/ 9781138323537/ Price:¢G 115.00
 
   
SD05-482 Authentication Technologies for Cloud Technology, IoT, and Big Data
  Yasser M. Alginahi/ 9781785615566/ Price:¢G 125.00
 
   
SD05-481 Security, Privacy and Digital Forensics in the Cloud
  Lei Chen/ 9781119053286/ Price:US$ 110.00
 
   
SD05-481 Social Media Data Mining and Analytics
  Gabor Szabo/ 9781118824856/ Price:US$ 44.95
 
   
SD05-481 Producing Music
  Russ Hepworth-Sawyer/ 9780415789226/ Price:¢G 37.99
 
   
SD05-481 The Sound System Design Primer
  Josh Loar/ 9781138716889/ Price:¢G 49.99
 
   
SD05-481 Multi-resolution Image Fusion in Remote Sensing
  Manjunath V. Joshi/ 9781108475129/ Price:¢G 64.99
 
   
SD05-480 Quantum Information Science: The new frontier in quantum computation, secure communication, and sensing
  Klaus Petritsch/ 9781773615448/ Price:US$ 170.00
 
Book Cover Quantum Information Science: The New Frontier in Quantum Computation, Secure Communication, and Sensing examines various aspects of quantum information science with various computing components. It includes the meaning and current status of Quantum-Computing Algorithms, machine learning, Secure communication and Sensing. Provide the reader with the insights into the new frontier in the field of quantum communication, so as to understand the theoretical framework of the complexities faced during this kind of communication along with its entanglement.
   
SD05-480 Soft Computing and Machine Learning with Python
  Zoran Gacovski/ 9781773615004/ Price:US$ 160.00
 
Book Cover Soft Computing and Machine Learning with Python examines various aspects of machine learning with python with a detailed information on soft computing. It includes four different sections, where section 1 and 2 are dedicated towards soft computing theory and machine learning techniques and on the other hand section 3 and 4 are dedicated to the details of python language and machine learning with python. Provides the reader with the insights into the development of python and machine learning, so as to understand the classification multigraph models of secondary RNA structure using graph-theoretic descriptors.
   
SD05-480 Internet of Things
  Zoran Gacovski/ 9781773615011/ Price:US$ 160.00
 
Book Cover Internet of Things considers various aspects of Internet Systems including an extensive overview of internet, distributed systems and related issues. The text has been divided into four categories, hardware and Networking aspects, Architectures and Methods, Security Aspects and Application scenarios. Provides the reader with insights into the development of its history, so as to understand the Application of Internet of Things in Urban Waterlogging Prevention Management System, Internet of Things Business Models, Supply and Demand Oriented Energy Management in the Internet of Things, Hybrid Security Techniques for Internet of Things Healthcare Applications.
   
SD05-480 Computing and Random Numbers
  Zoran Gacovski/ 9781773615028/ Price:US$ 160.00
 
Book Cover Computing and random numbers examines various aspects of random numbers and variables including an extensive overview of Computing and random numbers. It includes Implementation of Hardware-Accelerated Scalable Parallel Random Number Generators, True-Randomness and Pseudo-Randomness in Ring Oscillator-Based True Random Number Generators, Random Route and Quota Sampling: Do They Offer Any Advantage over Probably Sampling Method and Fuzzy -Means and Cluster Ensemble with Random Projection for Big Data Clustering. Provides the reader with insights into the development of its history, so as to understand the social emotional optimization algorithm with random emotional selection strategy, lymph diseases prediction using random forest and particle swarm optimization, challenges of internal and external variables of consumer behaviour towards mobile.
   
SD05-480 Parallel and Distributed Computing Applications
  Zoran Gacovski/ 9781773615035/ Price:US$ 160.00
 
Book Cover Parallel and Distributed Computing Applications examines various dimensions of parallel and distributed computing applications along with various computing algorithms required for programming designs. It includes 4 sections, where section 1 and 2 are dedicated towards parallel computing models and algorithms and various distributed computing systems and 3 and 4 sections talk about Software in Parallel and Distributed Systems and Applications of Distributed Computing. Provide the reader with the insights into the development of various computing applications, so as to understand fault tolerance mechanisms in distributed systems.
   
SD05-480 Big Data Analytics: Methods and Applications
  Jovan Pehcevski/ 9781773615042/ Price:US$ 160.00
 
Book Cover Big Data Analytics - Methods and Applications is a comprehensive book that examines various big data modelling and analytics approaches, infrastructure and security issues in analysis of big data, applications of big data in business, finance and management. Provides the readers with insights on methodology and applications of Big Data Analytics so as to understand the practical use of big data analytics along with the opportunities and challenges faced during the course.
   
SD05-480 Systems and Software Testing Techniques and Frameworks
  Jovan Pehcevski/ 9781773615059/ Price:US$ 160.00
 
Book Cover Systems and Software Testing Techniques and Framework is a book which aims at providing a brief description of various methods and approaches required for software testing. The book is a treat for all the upcoming software engineers as it will help them in various parts of systems and software testing, and to make it easy for them to study, the book is divided into four sections. Provides reader with an insight into the development of several systems and software testing techniques where the design patterns would be detected in object-oriented program.
   
SD05-480 Performance Evaluation of Cloud Services
  Jovan Pehcevski/ 9781773615066/ Price:US$ 160.00
 
Book Cover Performance Evaluation of Cloud Services evaluates various aspects of cloud services and its computing measures for various multi-tier cloud applications. It includes Cloud computing Performance measures, and cloud computing management and evaluation along with Cloud Optimization and Tuning. Provide the reader with the insights into the development of various cloud services for performance enhancement, so as to understand the requirement related to semantic-based content management.
   
SD05-480 Computer Literacy
  / 9781984624963/ Price:US$ 90.00
 
Book Cover This book is an attempt to fill a gap in current understanding of how we become computer literate and proposes a theory of how computer literacy skills emerge in computer users. Provides a state of the art introduction to computer concepts and software applications, designed in an easy to read style.
   
SD05-480 3G Handy Guide: Digital Production and Editing
  / 9781680948936/ Price:US$ 70.00
 
Book Cover This innovative, practical guide is specifically designed to cater to these training demands, covering the entire spectrum of modern print media production. This is the source for everything you need to bring your ideas from the page to the screen. This handy guide covers all aspects of movie making. Techniques for making dramatic features, documentaries, corporate, broadcast, and experimental videos and films are illustrated.
   
SD05-480 3G Handy Guide: Graphic Designing
  / 9781984623843/ Price:US$ 70.00
 
Book Cover Completely updates the information on the production process, highlighting new techniques and expanding its coverage on digital technologies. This book offers learners, novice designers, and battle-toughened professionals alike an insider's guide to the complexities of current graphic design practice and thinking.
   
SD05-480 Basic Computer Coding: Responsive Design
  / 9781984622877/ Price:US$ 75.00
 
Book Cover In the field of Web design and development, we are swiftly receiving to the point of being unable to keep up with the endless new resolutions and devices. This book is intended to show real-world examination of how this fundamental shift affects the way we design and build our sites. Design workflow hasn¡¦t actually changed, but best practices have. This book will give an overview about responsive Web design, showing many situations and techniques in which this approach can be applied to.
   
SD05-480 Illustrated Handbook of Network Analysis & Synthesis
  / 9781680949766/ Price:US$ 180.00
 
Book Cover Provides a comprehensive coverage of the important topics in electrical circuit analysis, offers an excellent and practically oriented introduction to the basic concepts of modern circuit theory. This handbook is intended to be suitable for students in the specialized branches of electrical and radio engineering, and engineers extending their theoretical knowledge.
   
SD05-480 Illustrated Handbook of Particle Swarm Optimisation
  / 9781680944884/ Price:US$ 180.00
 
Book Cover Presents information on particle swarm optimization such as using mono-objective and multi-objective particle swarm optimization for the tuning of process control laws; convergence issues in particle swarm optimization. Explores multidimensional particle swarm optimization, a technique developed by the authors that addresses these requirements in a well-defined algorithmic approach.
   
SD05-480 Developing Creative Content for Games
  Greg Johnson/ 9781498777667/ Price:¢G 38.99
 
   
SD05-480 The Pyramid of Game Design: Designing, Producing and Launching Service Games
  Nicholas Lovell/ 9781138298897/ Price:¢G 38.99
 
   
SD05-480 Software Engineering for Variability Intensive Systems: Foundations and Applications
  Ivan Mistrik/ 9780815348054/ Price:¢G 100.00
 
   
SD05-480 GPU Pro 360 Guide to Lighting
  Wolfgang Engel/ 9780815385523/ Price:¢G 38.99
 
   
SD05-479 Data as Infrastructure for Smart Cities
  Larissa Suzuki/ 9781785615993/ Price:¢G 115.00
 
   
SD05-479 Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives
  Brij B. Gupta/ 9780815371335/ Price:¢G 92.00
 
   
SD05-479 GPU Pro 360 Guide to 3D Engine Design
  Wolfgang Engel/ 9780815390756/ Price:¢G 38.99
 
   
SD05-479 GPU Pro 360 Guide to Image Space
  Wolfgang Engel/ 9781138484320/ Price:¢G 38.99
 
   
SD05-479 Systems Analysis and Design
  Alan Dennis/ 9781119496489/ Price:US$ 120.95
 
   
SD05-479 Basic Computer Coding: CSS
  / 9781984622822/ Price:US$ 75.00
 
Book Cover This book provides the most modern and effective tips, tricks, and instructions on CSS available today. Provides the most handy and up-to-date listing available on CSS compatibility across browsers and operating systems so Webmasters can finally know which CSS properties are safe to use.
   
SD05-479 Basic Computer Coding: Java Script
  / 9781984622839/ Price:US$ 75.00
 
Book Cover Provides information on using JavaScript, jQuery, and HTML5 Canvas to create Web applications for desktop and mobile devices. A valuable resource for Webmasters presents a number of readytogo JavaScript applications, along with thorough documentation, to help provide additional functionality to Web sites of all kinds.
   
SD05-479 Basic Computer Coding: Python
  / 9781984622846/ Price:US$ 75.00
 
Book Cover A comprehensive, in-depth discussion to the core Python language with this hands-on book. This book contains cross-platform coverage for the Mac, Windows, and Unix environments as it teaches techniques for cookies, session management, and integration with XML.
   
SD05-479 Basic Computer Coding: Ruby
  / 9781984622853/ Price:US$ 75.00
 
Book Cover This book will excite students on the capabilities of computer programming and inspire them to delve deeper into the computer science discipline with an introduction to a time-saving programming language-Ruby. The book focuses on the features of Ruby, including such topics as strings, class hierarchies, arrays and hashes, loops, methods, exception handling, symbols, YAML, and debugging.
   
SD05-479 Illustrated Handbook of Distributed and Embedded Systems
  / 9781680949742/ Price:US$ 180.00
 
Book Cover Indispensable tool for embedded systems and security professionals, new and experienced. An important contribution to the understanding of the security of embedded systems. A perfect tool for those starting out as technical professionals such as engineers, programmers and designers of embedded systems; and also for students of computer science, computer engineering and electrical engineering.
   
SD05-479 Illustrated Handbook of Digital Image Processing
  / 9781680949674/ Price:US$ 180.00
 
Book Cover Provides a clear, comprehensive and up-to-date introduction to Digital Image Processing in a pragmatic style. Presents coverage of the latest methods and applications of digital image processing describing various computer architectures ideal for satisfying specific image processing demands.
   
SD05-479 Cryptology: Classical and Modern
  Richard Klima/ 9781138047624/ Price:¢G 92.00
 
   
SD05-479 Information and Communication Technology for Sustainable Development
  Cesar Marolla/ 9781138486539/ Price:¢G 115.00
 
   
SD05-479 Industrial Applications of Machine Learning
  Pedro Larranaga/ 9780815356226/ Price:¢G 100.00
 
   
SD05-479 3GE Collection on Computer Science: Artificial Intelligence and Applications
  / 9781984623492/ Price:US$ 160.00
 
Book Cover The purpose of this book is to provide insights on how today?s computer engineers can implement AI in real world applications. The purpose of this book is to elucidate the techniques associated with the field of artificial intelligence. How artificial intelligence can be applied in business. Existing applications & future prospects; for those interested in practical applications.
   
SD05-479 Core Concepts in Computer Science: Multimedia Systems (Book with DVD)
  / 9781984620750/ Price:US$ 75.00
 
Book Cover Presents fundamental characteristics and properties of multimedia operating and communication systems. Explores the design of advanced multimedia systems in depth-the characteristics of multimedia systems, the design challenges, the emerging technologies that support advanced multimedia systems.
   
SD05-479 Basic Computer Coding: HTML
  / 9781984622815/ Price:US$ 75.00
 
Book Cover Demonstrates the basics of HTML while explaining how to design Web sites, format text, add multimedia effects, and create forms, tables, lists, and style sheets. This book is intended for Web designers and programmers¡¦ online editors and content editors marketing & e-commerce managers Bloggers and hobbyists.
   
SD05-479 Software Adaptation in an Open Environment
  Gerard Prudhomme/ 9781773613734/ Price:US$ 160.00
 
Book Cover Software Adaptation in an Open Environment examines various dimensions of software adaptation with a brief description on four different freedoms and benefits of using free software. It includes the meaning of free and open source, GPL, describing basic points of distinction between the two. It provided a detailed description about the history of free software community. Provides the reader with the insights into the development of software world and free software community, so as to understand the actual meaning of free software and how it opposes proprietary software.
   
SD05-479 Hybrid Algorithms, Techniques and Implementations of Fuzzy Logic
  Ivan Stanimirovic/ 9781773613796/ Price:US$ 160.00
 
Book Cover Hybrid Algorithms, Techniques and Implementations of Fuzzy Logic studies various aspects of Fuzzy logic including an extensive overview of hybrid algorithms, techniques and implementations. It includes definitions of evolutionary computation and fuzzy systems, ideologies and strategies. Provides the reader with insights into the development of its knowledge, so as to understand the applications and implementations of fuzzy logic using hybrid algorithms.
   
SD05-479 Software and Systems Modeling: Theoretical and Practical Issues
  Gerard Prudhomme/ 9781773613802/ Price:US$ 160.00
 
Book Cover Software and Systems Modeling: Theoretical and Practical Issues examines various aspects of software and system modeling providing an extensive information on the development of various prototype. It includes the meaning of weighted semantic networks, scientific computation, computer design, structured programming and agent analysis. Provide the reader with the insights into the evaluation of the Human-Computer Interaction and Commercial Customization Systems, so as to understand the relationship between the people and computers.
   
SD05-479 Computer Networks and Communications
  Jocelyn O. Padallan/ 9781773613840/ Price:US$ 160.00
 
Book Cover Computer networks and communications examines various aspects of Computer networks and communications including an extensive overview of and related topics of importance. It includes principles and protocols in computer networks, networking types, topologies, security, digital and analog transmission, transmission media and switching. Provides the reader with insights into the development, so as to understand the computer networks and communication. A detailed case study has also been discussed in order to give readers a practical example.
   
SD05-479 Applied Neural Networks and Soft Computing
  Ivan Stanimirovic/ 9781773613864/ Price:US$ 160.00
 
Book Cover Applied Neural Networks and Soft Computing examines the relation between neural networks and soft computing. Neural network is a system of hardware and software designed after the operations of neurons. Applied neural networks has a plethora of applications and the text tries to touch every aspect to give readers a wider perspective. Further, artificial neural networks (vaguely inspired by biological neural network) are also discussed to keep readers up to date regarding the latest innovations taking place.
   
SD05-479 Internet & Distributed Systems
  Jocelyn O. Padallan/ 9781773613901/ Price:US$ 160.00
 
Book Cover Internet & Distributed Systems considers various aspects of Internet & Distributed Systems including an extensive historical overview of internet, distributed systems and related issues. It includes definitions of introduction to internet, fundamental concepts of distributed systems, time and global states, coordination. Provides the reader with insights into the development of its history, so as to understand the Distributed Programming Systems and Environment, Wireless Sensor Networks.
   
SD05-479 Programming & Software Development
  Valmir Doniku/ 9781773614489/ Price:US$ 160.00
 
Book Cover Programming & Software Development examines various aspects of programming and software development along with the importance of identifying the right kind of project for the programming. It includes the meaning of programming and system designs and development. Provide the reader with the insights into the development of software testing and activities required to conduct programming so as to understand the importance of system documentation and data security with the current trends in system development.
   
SD05-479 Introduction to Assembly Language Programming
  Gerard Prudhomme/ 9781773614700/ Price:US$ 160.00
 
Book Cover Introduction to Assembly Language Programming considers various aspects of Assembly Language Programming including an extensive overview of Assembly Language Programming and related terms. It includes introduction and the fundamentals to Signed Numbers, Sign-Magnitude Representation, Signed Arithmetic, The Assembly Language5. Intel x866. One¡¦s Complement, Two¡¦s Complement, Hexadecimal, Horner's Method, RISC Computer architectures. Provides the reader with insights into the development of its history, so as to understand the Assembly Language Programs and 8-Bit Amounts, Assembly Language Programs and the Compiler, Assembly Language Programs and the Arithmetic Logic Unit (ALU), Practices in Assembly Language Programming.
   
SD05-479 Basic Computer Coding: SQL
  / 9781984622860/ Price:US$ 75.00
 
Book Cover In this book, you'll quickly learn how to put the power and flexibility of this language to work. Providing an overview of the SQL language and surveys how it is integral for the storage and retrieval of database information, this book guides the readers through the most important aspects of declarative and procedural SQL.
   
SD05-479 Basic Computer Coding: C++
  / 9781984622884/ Price:US$ 75.00
 
Book Cover Focusing on C++, the text also incorporates material on the C programming language. Covers the programming language, covering topics including syntax, coding standards, object classes, templates, debugging, and the C++ preprocessor.
   
SD05-479 Basic Computer Coding: PHP
  / 9781984622891/ Price:US$ 75.00
 
Book Cover A guide to PHP essentials and the basics of object-oriented programming, this book explains how to develop dynamic Web applications, such as guest books, chat rooms, and shopping carts. This book portrays how PHP, MySQL, JavaScript, and HTML5 are vital tools for creating dynamic, database-driven websites and are especially important for e-commerce sites Serves as essential reading for web designers who are new to these technologies.
   
SD05-479 Basic Computer Coding: Visual Basic
  / 9781984622907/ Price:US$ 75.00
 
Book Cover This book is an essential guide for VB programmers looking to make the change to the . NET programming environment. This book will guide you from your very first steps through to complete mastery of Visual Basic . NET.
   
SD05-479 3GE Collection on Computer Science: Intelligent Information Management
  / 9781984623508/ Price:US$ 160.00
 
Book Cover Portrays the latest methodologies, frameworks, and advances in the field of intelligent information technologies. Provides various aspects of intelligent information technologies as they are applied to organizations to assist in improving productivity through the use of autonomous decision-making systems.
   
SD05-479 3GE Collection on Computer Science: Deep Learning Technologies
  / 9781984623515/ Price:US$ 160.00
 
Book Cover Provides an overview of general deep learning methodology and its applications to a variety of signal and information processing tasks. This book covers topics in deep learning, namely convolutional neural networks, deep belief network and stacked autoencoders.
   
SD05-479 3GE Collection on Computer Science: Continuous Software Engineering
  / 9781984623522/ Price:US$ 160.00
 
Book Cover Provides information on the essential approaches of continuous software engineering in which equipment maintains the production of software in short cycles of time, ensuring that the product can be released reliably and in real. Provides essential insights on the adoption of modern software engineering practices at large companies producing software-intensive systems, where hundreds or even thousands of engineers collaborate to deliver on new systems.
   
SD05-479 Core Concepts in Computer Science: Object Oriented Programming (Book with DVD)
  / 9781984620620/ Price:US$ 75.00
 
Book Cover This book covers fundamentals of Object Oriented Programming at basic levels. The book describes fundamental object-oriented programming methods and explains how readers may apply them.
   
SD05-479 Core Concepts in Computer Science: Operating Systems (Book with DVD)
  / 9781984620637/ Price:US$ 75.00
 
Book Cover Provides the readers with the basic under-standing of the theoretical and practical aspects of operating systems. Intends to provide a proper understanding of the theoretical and practical concepts of Operating system.
   
SD05-479 Core Concepts in Computer Science: Database Management Systems (Book with DVD)
  / 9781984620644/ Price:US$ 75.00
 
Book Cover Intended to provide an insight into the DBMS concepts. This book addresses issues related to managing data across a distributed database system. A perfect blend of theoretical and practical aspects.
   
SD05-479 Core Concepts in Computer Science: Java Programming (Book with DVD)
  / 9781984620651/ Price:US$ 75.00
 
Book Cover Explains programming concepts and software development practices for solving problems in a clear and precise manner. An introductory level text that instills an understanding of basic concepts before gradually moving to advanced topics like swing, socket programming, JAVA native interface, remote method invocation and serialization.
   
SD05-479 Core Concepts in Computer Science: Computer Networks (Book with DVD)
  / 9781984620668/ Price:US$ 75.00
 
Book Cover Provides an introduction to the immensely important area of computer networking. Focused on fundamental concepts and practical applications, this book provides a strong foundation in the principles and terminology of computer networking and internet technology. The organized and accessible format of this book allows students to learn the important concepts in an easy-to-understand.
   
SD05-479 Core Concepts in Computer Science: Software Engineering (Book with DVD)
  / 9781984620675/ Price:US$ 75.00
 
Book Cover The book is structured to cover the key aspects of the subject Software Engineering. Provides logical method of explaining various complicated concepts and stepwise methods to explain the important topics. Designed for use as an introductory software engineering course for programmers.
   
SD05-479 Core Concepts in Computer Science: Cloud Computing (Book with DVD)
  / 9781984620682/ Price:US$ 75.00
 
Book Cover This book lays a good foundation to the core concepts and principles of cloud computing. Explains what cloud computing is and how this new technology is being used to make lives easier. Provides state-of-the-art cloud computing design and implementation techniques.
   
SD05-479 Core Concepts in Computer Science: Data Mining (Book with DVD)
  / 9781984620699/ Price:US$ 75.00
 
Book Cover Explains data mining and the tools used in discovering knowledge from the collected data. Presents various theories, methodologies, and algorithms, using both classical approaches and hybrid paradigms.
   
SD05-479 Core Concepts in Computer Science: Cryptography (Book with DVD)
  / 9781984620705/ Price:US$ 75.00
 
Book Cover Aims to develop a deep understanding of cryptography, and provide a way of understanding how privacy, identity provision and integrity can be enhanced with the usage of encryption. Gives a broad overview of public-key cryptography - its essence and advantages, various public-key cryptosystems, and protocols - as well as a comprehensive introduction to classical cryptography and cryptoanalysis.
   
SD05-479 Core Concepts in Computer Science: Artificial Intelligence (Book with DVD)
  / 9781984620712/ Price:US$ 75.00
 
Book Cover Presents a practical guide to artificial intelligence (AI), including agents, machine learning and problem-solving simple and complex domains. Introduces artificial intelligence, what it can do, myths about it, and ways it may expand in the future.
   
SD05-479 Core Concepts in Computer Science: Web Technology & Design (Book with DVD)
  / 9781984620729/ Price:US$ 75.00
 
Book Cover Deals with all the technologies used in the design of services over the web. Details a variety of front-end technologies and techniques and reviews Web design fundamentals while explaining how to work with HTML, graphics, and multimedia and interactive applications.
   
SD05-479 Core Concepts in Computer Science: Data Structures (Book with DVD)
  / 9781984620736/ Price:US$ 75.00
 
Book Cover A comprehensive treatment focuses on the creation of efficient data structures and algorithms. You will learn how to implement data structures to store and modify sets of objects and mappings from one type of objects to another one.
   
SD05-479 Core Concepts in Computer Science: Computer Graphics (Book with DVD)
  / 9781984620743/ Price:US$ 75.00
 
Book Cover This book presents a broad overview of computer graphics (CG), its history, and the hardware tools it employs. Reflects the several changes that computer graphics technology has under gone; equips the readers with all the basic and advanced concepts of computer graphics and multimedia.
   
SD05-479 Fundamentals of IT & Programming
  / 9781984624031/ Price:US$ 90.00
 
Book Cover This book introduces students to the basics of computers, software and internet along with how to program computers using the language. The edition is revised and updated with the latest information and new chapters are added. This updated edition offers students real advice in navigating the ever-changing academic landscape.
   
SD05-479 Data Structures with C Programming
  Anil Kumar Yadav/ 9781773613376/ Price:US$ 160.00
 
Book Cover Data Structures with C Programming examines various concepts related to structuring of data giving brief overview about them. It starts with explanation data structures that are utilized to store data in a computer in an organized form. It includes different types of data structure using C language. Provides the reader with insights into the data structuring and C programming to enable efficient access and modification of data.
   
SD05-479 Advances in Metasearch Engine Technology
  Fidel N. Martin/ 9781682514955/ Price:US$ 155.00
 
Book Cover Search engines have become a useful part of a daily routine when it comes to searching for information on the Internet. This book is intended to give an overview of information retrieval and show how different types of search tools work as the Metasearch engine has changed from being a simple collection of search results into formatting them into new and innovative ways. This book covers innovative and up-to-date studies in large-scale Metasearch engine technology, which has the potential to overcome the limitations of the major search engines.
   
SD05-479 Handbook of Statistical Analysis and Data Mining Applications
  I N Harris/ 9781682514962/ Price:US$ 165.00
 
Book Cover Statistical methods are invariably needed, however, in order to extract meaningful information from experimental data. This book provides recent research results in data analysis, classification and multivariate statistics and highlights perspectives for new scientific developments within these areas. An ideal reference for users who want to address massive and complex datasets with novel statistical approaches and be able to objectively evaluate analyses and solutions.
   
SD05-479 Information Security and Computer Fraud
  Kati Holbrooke/ 9781682514979/ Price:US$ 150.00
 
Book Cover In this age living without access to the information of interest at any time, any place through countless types of devices has become unimaginable. However, its security has become more important than information access itself. Therefore, this book aims to present a number of innovative security enhanced applications. This book is a quality guide for students as well as for young researchers since it presents leading innovative contributions on security enhanced applications on various Information Systems.
   
SD05-479 Foundations of Deductive Databases and Logic Programming
  Adrian Lily/ 9781682514986/ Price:US$ 155.00
 
Book Cover The area of deductive databases has matured in recent years, and it now seems appropriate to reject upon what has been achieved and what the future holds. This book covers the up-to-date information in areas such as theoretical foundations, constraints, concurrency and parallelism, deductive databases, language design and implementation, non-monotonic reasoning, and logic programming and the Internet. This book offers an approach to coping with large amounts of intelligent data by combining the techniques of database researchers, who are concerned with the efficient processing of large amounts of data, and of artificial intelligence researchers.
   
SD05-479 Information Modeling and Relational Databases
  Bouslama Walczak/ 9781682514993/ Price:US$ 150.00
 
Book Cover Moreover, databases are an important step in this process. For this reason, this book deals with object-relational databases implementation as part of informatics systems development. Therefore, this book aims to introduce readers to a number of innovative Information modeling techniques. This book is intended for anyone with a stake in the accuracy and efficacy of databases: systems analysts, information modelers, database designers and administrators, and programmers, and practitioners/managers in data management.
   
SD05-479 Advances in Security in Computing and Communications
  Le Verche K/ 9781682515006/ Price:US$ 155.00
 
Book Cover The last years have seen an increase in the tension between privacy and accountability. This book reviews these models along with their limitations and review the past techniques used to mitigate these threats. This book will appeal to researchers, engineers, practitioners, graduates, and doctoral students who are working in the field of cryptography, network security, and security and privacy issues in the Internet of Things (IoT). This book investigates the core mechanism in the security of WSNs, which is managing the security keys in the network.
   
SD05-479 Holographic Materials and Optical Systems
  L. K. Gulliver/ 9781682515013/ Price:US$ 155.00
 
Portraying the basic principles of holography and some recent innovative developments in the field, the book focuses on current innovative research achievements in the areas of volume holographic optical elements and systems, development of functionalized holographic recording materials, and applications in holographic imaging and metrology. Innovative holographic devices, as well as application of holograms in security and signal processing are covered.
   
SD05-479 Current Trends in Image and Video Coding
  Zivile Christopher/ 9781682515020/ Price:US$ 155.00
 
Book Cover Image and video standards have played a significant aspect in this deployment. Video coding techniques portrays effective resolutions to show video data in a more compressed and vigorous way so that the storage and transmission of video can be realized in less cost with respect to size, bandwidth and power consumption. Aimed to bring together recent advances and applications of video coding, this book will appeal to researchers, engineers, graduate and postgraduate students, experts in this area, and hopefully also for people who are generally interested in video coding.
   
SD05-479 Big Data and Computational Intelligence in Networking
  Riley N. Jonathon/ 9781682515044/ Price:US$ 155.00
 
Book Cover Big data analytics has shown great potential in optimizing operations, making decisions, spotting business trends, preventing threats, and capitalizing on new sources of revenues in various fields such as manufacturing, healthcare, finance, insurance, and retail. This book presents state-of-the-art solutions to the theoretical and practical challenges stemming from the leverage of big data and its computational intelligence in supporting smart network operation, management, and optimization. The work presented in this book is a combination of theoretical and practical advancements of big data analysis, cloud computing, and their potential applications in scientific computing.
   
SD05-479 Wavelet Transform with Real-World Applications
  P Caleb/ 9781682515068/ Price:US$ 155.00
 
Book Cover The Wavelet transform is such one efficient and important mathematical tool used to explore a signal in a time-frequency representation to allow analyzing the parts of interest separately. The book covers state of the art advances in wavelet theory and their applications in engineering, physics and technology. The wavelet transforms (WT) and the fractional Fourier transform (FRFT) are powerful tools for many applications in the field of signal processing. This book will be of valued tool for students and researchers from various branches of science and engineering.
   
SD05-479 Algorithm Design Practice for Collegiate Programming Contests and Education
  Yonghui Wu/ 9781498776639/ Price:¢G 77.00
 
   
SD05-479 R Graphics
  Paul Murrell/ 9781498789059/ Price:¢G 74.00
 
   
SD05-479 Data Mining in Engineering, Management and Medicine
  Neha Kaul/ 9781773612508/ Price:US$ 160.00
 
Book Cover Offering a rich blend of theory and practice as well as examining the technology from a practical point of view. A premier resource for those involved in data mining and medical knowledge management, this book tackles ethical issues related to cost-sensitive learning in medicine and produces theoretical contributions concerning general problems of engineering and management. This book is also suitable for professionals in fields such as computing applications, information systems management, and strategic research management.
   
SD05-479 Logging Frameworks in Java
  Neha Kaul/ 9781773612881/ Price:US$ 160.00
 
Book Cover This is an essential resource for logging-related information and techniques needed for developing applications in the Java language. The rotating and archiving of log files; old log files can be archived. Every now and then, a new logging framework pops up, so the logging problem domain seems far from exhausted even to this day. This work presents the architecture and the implementation of Logging frameworks, an extensible and a practical tool for Java programmers.
   
SD05-478 Narrative Tactics for Mobile and Social Games: Pocket-Sized Storytelling
  Toiya Kristen Finley/ 9781138613935/ Price:¢G 115.00
 
   
SD05-478 Advances of DNA Computing in Cryptography
  Suyel Namasudra/ 9780815385325/ Price:¢G 110.00
 
   
SD05-477 Opportunistic Networks: Mobility Models, Protocols, Security, and Privacy
  Khaleel Ahmad/ 9781138093188/ Price:¢G 140.00
 
   
SD05-475 Interactions in Multiagent Systems
  Jianye Hao/ 9789813208735/ Price:US$ 138.00
 
   
SD05-475 The Essentials of Computer Organization and Architecture (Includes Navigate 2 Advantage Access)
  Linda Null/ 9781284123036/ Price:NT$ 1950.00
 
Book Cover Bestselling text, The Essentials of Computer Organization and Architecture, Fifth Edition, is comprehensive enough to address all necessary organization and architecture topics, but concise enough to be appropriate for a single-term course. Its focus on real-world examples and practical applications encourages students to develop a ¡§big-picture¡¨ understanding of how essential organization and architecture concepts are applied in the computing world. In addition to direct correlation with the ACM/IEEE guidelines for computer organization and architecture, the text exposes readers to the inner workings of a modern digital computer through an integrated presentation of fundamental concepts and principles.
   
SD05-475 System Forensics, Investigation, and Response.
  Chuck Easttom/ 9781284121841/ Price:NT$ 1920.00
 
Book Cover Revised and updated to address current issues and technology, System Forensics, Investigation, and Response, Third Edition provides a solid, broad grounding in digital forensics. The text begins by examining the fundamentals of system forensics: what forensics is, the role of computer forensics specialists, computer forensic evidence, and application of forensic analysis skills. It also gives an overview of computer crimes, forensic methods, and laboratories. Part II addresses the tools, techniques, and methods used to perform computer forensics and investigation. Finally, Part III explores emerging technologies as well as future directions of this interesting and cutting-edge field.
   
SD05-475 Web Programming with HTML5, CSS, and Javascript. (Includes Navigate 2 Advantage Access)
  John Dean/ 9781284091793/ Price:NT$ 1850.00
 
Book Cover Web Programming with HTML5, CSS, and JavaScript is written for the undergraduate, client-side web programming course. It covers the three client-side technologies (HTML5, CSS, and JavaScript) in depth, with no dependence on server-side technologies. One of the distinguishing features of this new text is its coverage of canvas, one of the most important new features of HTML5. Topics are presented in a logical, comprehensive manner and code is presented in both short code fragments and complete web pages, allowing readers to grasp concepts quickly and then apply the concepts in the context of a complete web page. Each chapter concludes with an optional case study, which builds upon itself to create a sophisticated website. The case studies allow students to apply what they have learned and gives them a feel for the real-world design process.
   
Cryptocurrency and Blockchains
  William J. Buchanan/ 9788793609327/ Price:EUR 60.00
 
Book Cover Cryptocurrency and Blockchains outlines many of the key developments in building a more trustworthy world. It includes a background within the main methods used within creating data infrastructure which use Blockchain methods, and how these will change existing methods of authentication and identity provision. This will include a discussion of a range of application areas including with health care, law, finance and government services, and how smart contracts can be used to make transactions more trustworthy. Within the cryptocurrency part, the book outlines the trust infrastructure within the main cryptocurrency methods and around the usage of electronic tokens to transfer credits.
   
Java Illuminated Includes Navigate 2 Advantage Access
  Julie Anderson/ 9781284140996/ Price:NT$ 1490.00
 
Book Cover Written for the one- to three-term introductory programming course, the fifth edition of Java Illuminated provides learners with an interactive, user-friendly approach to learning the Java programming language. Comprehensive but accessible, the text takes a progressive approach to object-oriented programming, allowing students to build on established skills to develop new and increasingly complex classes. Java Illuminated follows an activity-based active learning approach that ensures student engagement and interest.
   
Career Guide: Information Technology
  / 9781984624383/ Price:US$ 65.00
 
Book Cover Offers information on computers and computer peripherals and applications. It will however teach you the important concepts behind the impact that Information Technology has on businesses of today, and the responsibility of management to understand IT. With new and updated content, our Career Guide shows middle-school and high-school students how they can make the world a better place through a career in IT.
   
Career Guide: Hardware Engineering
  / 9781984624420/ Price:US$ 65.00
 
Book Cover This guide is an essential read for anyone who wants to enter the field of engineering. This guide is designed to help the young engineer make the transition from student to practicing professional. With new and updated content, our Career Guide shows middle-school and high-school students how they can make the world a better place through a career as Hardware Engineer.
   
Career Guide: Software Designer
  / 9781984624437/ Price:US$ 65.00
 
Book Cover This guide provides practical advice for improving your programming career; illustrates how those in the IT field can set the direction of their careers, leading to a more fulfilling and remarkable professional life. With new and updated content, our Career Guide shows middle-school and high-school students how they can make the world a better place through a career as Software Engineer.
   
The Humanized Internet: Dignity, Digital Identity and Democracy
  Akram Alfawakheeri/ 9788770220323/ Price:EUR 40.00
 
Book Cover In reading this book, there are key themes that are constant such as the notion of identity and identity sets; e-sovereignty and privacy and most importantly the function of an Internet that is inclusive, not "controlled" by a few organizations for their own profitability. Certainly, "enterprising" the Internet has been a process over these past years and there is no intent to set judgement here but rather pause for a moment and reflect on the impact of these technologies to individuals.
   
Computer Systems and Networking Technology
  / 9781984625748/ Price:US$ 70.00
 
Book Cover Today, networking is an integral part of the computer and so the book introduces basic networking techniques and communications principles. Provides the skills required to configure, install, manage, and administer computer systems and basic network infrastructures.
   
Creative Multimedia: Animation
  / 9781984625755/ Price:US$ 70.00
 
Book Cover A guide to the fundamental principles of animation covers figurative animation, timing, acting, design, animals in motion, sound synchronization, and technical issues. This classic book familiarizes students with overall process of producing digital work art, particularly in 2D and 3D.
   
Getting Started for Internet of Things with Launch Pad and ESP8266
  / 9788770220682/ Price:EUR 95.00
 
Book Cover The book comprises of twenty-seven chapters, which are divided into four sections and which focus on the design of various independent prototypes. Section-A gives a brief introduction to Ti launch pad (MSP430) and Internet of Things platforms like GPRS, NodeMCU and NuttyFi (ESP8266 customized board), and it shows steps to program these boards. Examples on how to interface these boards with display units, analog sensors, digital sensors and actuators are also included, this to make reader comfortable with the platforms. Section-B discusses the communication modes to relay the data like serial out, PWM and I2C. Section-C explores the IoT data loggers and shows certain steps to design and interact with the servers. Section-D includes few IoT based case studies in various fields.
   
Blockchain Technology and Applications
  Ahmed Banafa/ 9788770221061/ Price:EUR 90.00
 
Book Cover Blockchain is an emerging technology that can radically improve security in transaction networks, it provides the basis for a dynamic distributed ledger that can be applied to save time when recording transactions between parties, remove costs associated with intermediaries, and reduce risks of fraud and tampering. This book explores the fundamentals and applications of Blockchain technology; the transparent, secure, immutable and distributed database used currently as the underlying technology for Cryptocurrency. Decentralized peer-to-peer network, distributed ledger and the trust model that defines Blockchain technology will be explained. Components of Blockchain, its operations, underlying algorithms, and essentials of trust will be defined. Types of Blockchain networks including private and public Blockchain networks will be introduced. Concepts of smart contracts, proof of work and proof of stack will be clarified. The relationship between Blockchain technology, Internet of Things (IoT), Artificial Intelligence (AI), Cybersecurity and Digital Transformation will be explored in this book. Myths about Blockchain will be exposed and a look at the future of Blockchain will be presented. Topics will be covered in this book: Blockchain technology, Smart contracts, Hashing, SHA-256 Hash, Verification, Validation, Consensus models, Digital Mining, Hard fork, Soft fork, Bitcoin, Ethereum, Proof of work, Proof of stack, Myths about Blockchain, Decentralized peer-to-peer network, Types of Blockchain networks, Hot and Cold Wallets, Double Spend, Decentralized Applications, Transaction networks, Sidechains, 51% attack, Cryptocurrency, Digital transformation, Internet of Things (IoT), Artificial Intelligence (AI), Cybersecurity and the Future of Blockchain.
   
Visual Communication for Cybersecurity: Beyond Awareness to Advocacy
  Nicole van Deursen/ 9788770220903/ Price:EUR 75.00
 
Book Cover Cybersecurity needs a change in communication. It is time to show the world that cybersecurity is an exciting and diverse field to work in. Cybersecurity is not only about hackers and technical gobbledygook. It is a diverse field of work with a lot of collaboration with other disciplines. Over the years, security professionals have tried different awareness strategies to promote their work and to improve the knowledge of their audience but without much success. Communication problems are holding back advances in in the field. The book is divided into different parts for readers with different interests. There is no need to read the book from cover to cover; the chapters are organized thematically. Readers that are interested in how to apply communication theory to cybersecurity will enjoy the chapters about learning, the context in which communication takes place, and how people are persuaded. Readers that are looking for inspiration and examples of how to use visuals in their daily tasks go straight to the third section of the book. The last section is a workbook that will help the reader to take the first steps towards using visual communication at work.
   
Defense against Terrorism: Enhancing Resilience of Democratic Institutions and Rule of Law
  Coen, M./ 9781614999522/ Price:EUR 110.00
 
Global terrorism is a double-edged threat to democracies. Physically, because of the number of people killed and wounded, structurally, because it threatens social peace and over-reaction tends to undermine our basic values. The authors of the chapters in this book are multinational and interdisciplinary. Their papers were presented for discussion at the Advanced Research Workshop (ARW) held in Skopje (FYROM) 11¡V14 April 2018 on ¡§Defence Against Terrorism, Enhancing Resilience of Democratic Institutions and Rule of Law¡¨, organized within the NATO Science for Peace and Security Programme. Results can be summarized as follows. Counter-terrorist strategy must aim to achieve less, not more, terrorism. The countries with best results are the ones that cultivate human intelligence, confidence between security services and the local population, together with a tradition of effective respect of the Rule of Law. Militarization of internal security, and intelligence systems mainly based on databases (¡§big data¡¨) and artificial intelligence, though popular, are showing serious limits. More effective democracy, not less, is the key to the resilience of our societies against the ¡§new threats¡¨, particularly for confronting the criminal violence of terror. In discussion, some core necessities were identified: to recognize that it is the method used, not the aims, that define criminal organizations as terrorist; that there is a structural link with organized crime for financing and operative support, and that corruption facilitates and protects any illegal activity; social capital must be developed as a fundamental basic tool for enhancing resilience.
   
Black Swan Events on NATO's Eastern Flank
  Ducaru, S./ 9781614999447/ Price:EUR 104.00
 
Book Cover This book presents material from the NATO Advanced Research Workshop Black Swans on the Eastern Flank, held in Bucharest, Romania, on 18 and 19 April 2018. The workshop was designed as a response to the need to develop agile situational awareness and analysis capabilities and skills, correlated with horizon-scanning and strategic anticipation initiatives, and was conducted with particular reference to the Balkan and Black Sea regions and in the context of the broader destabilization and destructuring trends of the international security order, the challenges posed by increasing terrorism, the escalating dynamic of cyber-attack and information manipulation, and so called hybrid tactics, together with the broader impact of new technologies on security. Two situations were presented by each participating country to generate an analysis framework for the unexpected and challenging events for each state in the region; the situations likely to become their ¡¥Black Swans¡¦ between 2018-2020. The discussions during this Advanced Research Workshop highlighted the nature of the scenarios, their probability, impact and the means to tackle each situation, and the book aims to provide an instrument to better prepare the systemic prevention and response, and will be essential reading for anyone interested in potential future crises in this vulnerable part of Europe.
   
Challenges in Strategic Communication and Fighting Propaganda in Eastern Europe: Solutions for a Future Common Project
  Sultanescu, D./ 9781614999423/ Price:EUR 104.00
 
Book Cover This book presents papers from the NATO Advanced Research Workshop ¡§Challenges in strategic communication and ?ghting propaganda in Eastern Europe. Solutions for a future common project¡¨ held in Chisinau, Moldova, on 25-27 April 2018. The workshop brought together institutional, academic and civic experts from the social sciences, journalism, computer science, and international relations to share insights into security and strategic communication, as well as research results and expertise on the impact of social media and technological innovation, with the aim of shaping a new project with a common methodology to monitor, collect, process and interpret data on strategic communication and devise efficient tools to counteract anti-Western propaganda. With contributions about Romania, Moldova, Ukraine, the Western Balkans and the USA highlighting challenges such as detecting propaganda, identifying the groups most vulnerable to its in?uence and building mechanisms to strengthen trust, the book will be of value to all those with an interest in defending the Western democratic model.
   
Enhancing Women's Roles in Preventing and Countering Violent Extremism (P/CVE)
  Zeiger, S./ 9781614999461/ Price:EUR 104.00
 
Book Cover This book presents edited contributions presented at the NATO Advanced Research Workshop (ARW) Enhancing Women¡¦s Roles in International Preventing and Countering Violent Extremism Efforts, held in Madrid, Spain, from 19¡V21 March 2018, organized by Hedayah and the Fundacion para el Analisis y los Estudios Sociales (FAES). The workshop was aimed at building on existing good practice and recommendations from the fields of countering violent extremism (CVE) and women, peace and security (WPS), recognizing that while many women facilitate acts of terrorism, willingly support terrorist groups and perform terrorist acts, they can also play a key role in preventing the violent extremism. The fight against terrorism requires a whole-society approach in which women¡¦s participation is essential. Contributors to this volume explore the extent to which terrorism and violent extremism are gendered activities. They also discuss the importance of women¡¦s social and political participation in helping to counter acts of terror and violence. Evidence-based research is used to identify how women can be empowered to enhance the fight against terrorism, and to identify opportunities for substantive, meaningful roles across a wide spectrum of counter terrorism activities. Given current and emerging threats, the book focuses in particular on NATO countries & partners in the Middle East and North Africa, and will be of particular interest to all those involved with security and gender issues.
   
VSD05-003 Handbook of Approximation Algorithms and Metaheuristics, 2-Vols/Set.
  Teofilo F. Gonzalez/ 9781498770156/ Price:¢G 345.00
 
Book Cover Handbook of Approximation Algorithms and Metaheuristics, Second Edition reflects the tremendous growth in the field, over the past two decades. Through contributions from leading experts, this handbook provides a comprehensive introduction to the underlying theory and methodologies, as well as the various applications of approximation algorithms and metaheuristics. Volume 1 of this two-volume set deals primarily with methodologies and traditional applications. It includes restriction, relaxation, local ratio, approximation schemes, randomization, tabu search, evolutionary computation, local search, neural networks, and other metaheuristics. It also explores multi-objective optimization, reoptimization, sensitivity analysis, and stability. Traditional applications covered include: bin packing, multi-dimensional packing, Steiner trees, traveling salesperson, scheduling, and related problems. Volume 2 focuses on the contemporary and emerging applications of methodologies to problems in combinatorial optimization, computational geometry and graphs problems, as well as in large-scale and emerging application areas. It includes approximation algorithms and heuristics for clustering, networks (sensor and wireless), communication, bioinformatics search, streams, virtual communities, and more.
   
VSD05-003 Handbook of Data Structures and Applications.
  Dinesh P. Mehta/ 9781498701853/ Price:¢G 160.00
 
Book Cover The Handbook of Data Structures and Applications was first published over a decade ago. This second edition aims to update the first by focusing on areas of research in data structures that have seen significant progress. While the discipline of data structures has not matured as rapidly as other areas of computer science, the book aims to update those areas that have seen advances. Retaining the seven-part structure of the first edition, the handbook begins with a review of introductory material, followed by a discussion of well-known classes of data structures, Priority Queues, Dictionary Structures, and Multidimensional structures. The editors next analyze miscellaneous data structures, which are well-known structures that elude easy classification. The book then addresses mechanisms and tools that were developed to facilitate the use of data structures in real programs. It concludes with an examination of the applications of data structures. Four new chapters have been added on Bloom Filters, Binary Decision Diagrams, Data Structures for Cheminformatics, and Data Structures for Big Data Stores, and updates have been made to other chapters that appeared in the first edition. The Handbook is invaluable for suggesting new ideas for research in data structures, and for revealing application contexts in which they can be deployed. Practitioners devising algorithms will gain insight into organizing data, allowing them to solve algorithmic problems more efficiently.
   
VD05-998 Smart Grid Analytics for Sustainability and Urbanization
  Zbigniew H. Gontar/ 9781522539964/ Price:US$ 215.00
 
Book Cover Information and communication technologies play an essential role in the effectiveness and efficiency of smart city processes. Recognizing the role of process analysis in energy usage and how it can be enhanced is essential to improving city sustainability. Smart Grid Analytics for Sustainability and Urbanization provides emerging research on the development of information technology and communication systems in smart cities and smart grids. While highlighting topics such as process mining, innovation management, and sustainability optimization, this publication explores technology development and the mobilization of different environments in smart cities. This book is an important resource for graduate students, researchers, academics, engineers, and government officials seeking current research on how process analysis in energy usage is manifested and how it can be enhanced. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EInnovation Management ¡ELoad Forecast and Analysis ¡EProcess Mining ¡EProject Management ¡ESmart City ¡EStrategy Maps ¡ESustainability Analytics ¡ESustainability Optimization ¡ESustainable Strategy
   
VD05-993 Intelligent Multidimensional Data and Image Processing
  Sourav De/ 9781522552468/ Price:US$ 235.00
 
Book Cover As the most natural and convenient means of conveying or transmitting information, images play a vital role in our daily lives. Image processing is now of paramount importance in the computer vision research community, and proper processing of two-dimensional (2D) real-life images plays a key role in many real-life applications as well as commercial developments. Intelligent Multidimensional Data and Image Processing is a vital research publication that contains an in-depth exploration of image processing techniques used in various applications, including how to handle noise removal, object segmentation, object extraction, and the determination of the nearest object classification and its associated confidence level. Featuring coverage on a broad range of topics such as object detection, machine vision, and image conversion, this book provides critical research for scientists, computer engineers, professionals, researchers, and academicians seeking current research on solutions for new challenges in 2D and 3D image processing. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡E2D Modeling ¡E3D Image Enhancement ¡EData Clustering ¡EData Processing ¡EImage Conversion ¡EImage Processing ¡EMachine Vision ¡EModeling and Rendering ¡EMulti-Dimensional Data ¡EObject Detection
   
VD05-991 Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution
  Ziska Fields/ 9781522547631/ Price:US$ 345.00
 
Book Cover The prominence and growing dependency on information communication technologies in nearly every aspect of life has opened the door to threats in cyberspace. Criminal elements inside and outside organizations gain access to information that can cause financial and reputational damage. Criminals also target individuals daily with personal devices like smartphones and home security systems who are often unaware of the dangers and the privacy threats around them. The Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution is a critical scholarly resource that creates awareness of the severity of cyber information threats on personal, business, governmental, and societal levels. The book explores topics such as social engineering in information security, threats to cloud computing, and cybersecurity resilience during the time of the Fourth Industrial Revolution. As a source that builds on available literature and expertise in the field of information technology and security, this publication proves useful for academicians, educationalists, policy makers, government officials, students, researchers, and business leaders and managers. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EBotnets ¡ECloud Security ¡ECyber Resilience ¡ECyber-Criminal Activities ¡ECyberspace ¡ECyberwar ¡EDigital Forensics ¡EInformation Security Education ¡ERansomware ¡ERisk Assessment ¡ESecurity Frameworks ¡ESocial engineering ¡ETerrorism
   
VD05-990 Feature Dimension Reduction for Content-Based Image Identification
  Rik Das/ 9781522557753/ Price:US$ 215.00
 
Book Cover Image data has portrayed immense potential as a foundation of information for numerous applications. Recent trends in multimedia computing have witnessed a rapid growth in digital image collections, resulting in a need for increased image data management. Feature Dimension Reduction for Content-Based Image Identification is a pivotal reference source that explores the contemporary trends and techniques of content-based image recognition. Including research covering topics such as feature extraction, fusion techniques, and image segmentation, this book explores different theories to facilitate timely identification of image data and managing, archiving, maintaining, and extracting information. This book is ideally designed for engineers, IT specialists, researchers, academicians, and graduate-level students seeking interdisciplinary research on image processing and analysis. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EClustering Techniques ¡EComputer Vision ¡EFeature Extraction ¡EFusion Techniques ¡EImage Classification ¡EImage Retrieval ¡EImage Segmentation ¡EInformation Identification ¡ELogo Matching ¡EPlagiarism Detection ¡ESupervised Learning ¡EVisual Databases
   
VD05-989 Optimization Techniques for Problem Solving in Uncertainty
  Surafel Luleseged Tilahun/ 9781522550914/ Price:US$ 195.00
 
Book Cover When it comes to optimization techniques, in some cases, the available information from real models may not be enough to construct either a probability distribution or a membership function for problem solving. In such cases, there are various theories that can be used to quantify the uncertain aspects. Optimization Techniques for Problem Solving in Uncertainty is a scholarly reference resource that looks at uncertain aspects involved in different disciplines and applications. Featuring coverage on a wide range of topics including uncertain preference, fuzzy multilevel programming, and metaheuristic applications, this book is geared towards engineers, managers, researchers, and post-graduate students seeking emerging research in the field of optimization. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EFuzzy Multilevel Programming ¡EFuzzy Optimization ¡EGrey Multi-Objective Optimization ¡EGrey Multilevel Programming ¡EMetaheuristic Applications ¡EStochastic Optimization ¡EUncertain Preference
   
VD05-987 Applications of Security, Mobile, Analytic, and Cloud (SMAC) Technologies for Effective Information Processing and Management
  P. Karthikeyan/ 9781522540441/ Price:US$ 215.00
 
Book Cover From cloud computing to big data to mobile technologies, there is a vast supply of information being mined and collected. With an abundant amount of information being accessed, stored, and saved, basic controls are needed to protect and prevent security incidents as well as ensure business continuity. Applications of Security, Mobile, Analytic, and Cloud (SMAC) Technologies for Effective Information Processing and Management is a vital resource that discusses various research findings and innovations in the areas of big data analytics, mobile communication and mobile applications, distributed systems, and information security. With a focus on big data, the internet of things (IoT), mobile technologies, cloud computing, and information security, this book proves a vital resource for computer engineers, IT specialists, software developers, researchers, and graduate-level students seeking current research on SMAC technologies and information security management systems. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡ECloud Computing ¡EData Mining ¡EEnergy Optimization ¡EHigh-Dimensional Features ¡EImage Steganography ¡EInformation Security ¡ELocation-Based Services ¡EMobile Cloud Computing ¡EWireless Sensor Networks
   
VD05-986 Security and Privacy Management, Techniques, and Protocols
  Yassine Maleh/ 9781522555834/ Price:US$ 205.00
 
Book Cover The security of information and communication technology is a high priority for any organization. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. Security and Privacy Management, Techniques, and Protocols is a critical scholarly resource that examines emerging protocols and methods for effective management of information security at organizations. Featuring coverage on a broad range of topics such as cryptography, secure routing protocols, and wireless security, this book is geared towards academicians, engineers, IT specialists, researchers, and students seeking current research on security and privacy management. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡ECryptography ¡EData Mining ¡EIntrusion Detection System ¡ERisk Monitoring ¡ESecure Routing Protocols ¡ESecurity Visualization ¡EWireless Security
   
VD05-985 The Changing Scope of Technoethics in Contemporary Society
  Rocci Luppicini/ 9781522550945/ Price:US$ 225.00
 
Book Cover In the modern era each new innovation poses its own special ethical dilemma. How can human society adapt to these new forms of expression, commerce, government, citizenship, and learning while holding onto its ethical and moral principles? The Changing Scope of Technoethics in Contemporary Society is a critical scholarly resource that examines the existing intellectual platform within the field of technoethics. Featuring coverage on a broad range of topics such as ethical perspectives on internet safety, technoscience, and ethical hacking communication, this book is geared towards academicians, researchers, and students seeking current research on domains of technoethics. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EBioethics ¡ECyberbullying ¡EDigital Ethics ¡EEthical Hacking Communication ¡EHuman Enhancement Technology ¡EInternet Safety ¡ERobotic Ethics ¡ESocio-Ethics ¡ETechnoscience
   
VD05-983 Advanced Synchronization Control and Bifurcation of Chaotic Fractional-Order Systems
  Abdesselem Boulkroune/ 9781522554189/ Price:US$ 215.00
 
Book Cover In the recent years, fractional-order systems have been studied by many researchers in the engineering field. It was found that many systems can be described more accurately by fractional differential equations than by integer-order models. Advanced Synchronization Control and Bifurcation of Chaotic Fractional-Order Systems is a scholarly publication that explores new developments related to novel chaotic fractional-order systems, control schemes, and their applications. Featuring coverage on a wide range of topics including chaos synchronization, nonlinear control, and cryptography, this publication is geared toward engineers, IT professionals, researchers, and upper-level graduate students seeking current research on chaotic fractional-order systems and their applications in engineering and computer science. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAdomian Decomposition Method ¡EChaos Synchronization ¡ECryptography ¡EHyperchaotic Systems ¡EInformation Processing ¡ENonlinear Control ¡EOptimal Control ¡ESliding Model Control
   
VD05-982 Analyzing the Role of Risk Mitigation and Monitoring in Software Development
  Kumar, Rohit/ 9781522560296/ Price:US$ 225.00
 
Book Cover The biggest challenges faced by the software industry are cost control and schedule control. As such, effective strategies for process improvement must be researched and implemented. Analyzing the Role of Risk Mitigation and Monitoring in Software Development is a critical scholarly resource that explores software risk and development as organizations continue to implement more applications across multiple technologies and a multi-tiered environment. Featuring coverage on a broad range of topics such as quantitative risk assessment, threat analysis, and software vulnerability management, this book is a vital resource for engineers, academicians, professionals, and researchers seeking current research on the importance of risk management in software development. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡ECyber Security ¡EExtended Enterprise Systems ¡EOperational Risk ¡EQuantitative Risk Assessment ¡ESoftware Vulnerability Management ¡EThreat Analysis ¡EWeb Development
   
VD05-981 Mobile Applications and Solutions for Social Inclusion
  Sara Paiva/ 9781522552703/ Price:US$ 195.00
 
Book Cover Advancements in technology have allowed the creation of new tools and innovations that can improve different aspects of life. Mobile technologies are an ever-expanding area of research that can benefit users. Mobile Applications and Solutions for Social Inclusion provides emerging research on the use of mobile technology to assist in improving social inclusion in several domains and for users in their daily lives. While highlighting topics such as alert systems, indoor navigation, and tracking and monitoring, this publication explores the various applications and techniques of mobile solutions in assistive technology. This book is an important resource for researchers, academics, professionals, and students seeking current research on the benefits and uses of mobile devices for end users and community acceptance. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAlert Systems ¡EAssistive Technologies ¡EIndoor Navigation ¡EMobile Development ¡EMobile Payments ¡ETracking and Monitoring ¡ETransport Solutions
   
VD05-980 Cyber-Physical Systems for Next-Generation Networks
  Joel J.P.C. Rodrigues/ 9781522555100/ Price:US$ 210.00
 
Book Cover The use of cyber-physical systems in recent computing, communication, and control methods to design and operate intelligent and autonomous systems using cutting-edge technologies has led to many advances. By studying emerging trends in these systems, programming techniques can be optimized and strengthened to create a higher level of effectiveness. Cyber-Physical Systems for Next-Generation Networks provides emerging research on using cyber-physical systems (CPS) as a method to control design and operation of intelligent systems through next-generation networks. While highlighting issues such as increasing CPS complexity due to components within physical and industrial systems, this publication explores information on real-time sensing, reasoning, and adaptation for cyber-physical systems while gaining an understanding of evolutionary computing for it. This book is a valuable resource for engineers, academicians, researchers, and graduate-level students seeking current research on CPS in cutting-edge technologies. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAutonomous Systems ¡ECommunication and Networking for Cyber-Physical Systems ¡EDesign Theory ¡EDistributed Computing ¡EMobile Sensors ¡ESmart Grid Security ¡EWireless Sensor Networks
   
VD05-979 Security and Privacy in Smart Sensor Networks
  Yassine Maleh/ 9781522557364/ Price:US$ 215.00
 
Book Cover Security and privacy protection within computer networks can be a challenge. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. Security and Privacy in Smart Sensor Networks is a critical scholarly resource that examines recent developments and emerging trends in smart sensor security and privacy by providing new models, practical solutions, and technological advances related to security. Featuring coverage on a broad range of topics such as cloud security, encryption, and intrusion detection systems, this book is geared towards academicians, engineers, IT specialists, researchers, and students seeking current research on authentication and intrusion detection. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡ECloud Security ¡EContent Centric Networking ¡ECryptography ¡ECyber Security ¡EEncryption ¡EHybrid Based Detection ¡EInternet of Things ¡EIntrusion Detection Systems
   
VD05-978 Innovative Methods, User-Friendly Tools, Coding, and Design Approaches in People-Oriented Programming
  Steve Goschnick/ 9781522559696/ Price:US$ 215.00
 
Book Cover As modern technologies continue to develop and evolve, the ability of users to interface with new systems becomes a paramount concern. Research into new ways for humans to make use of advanced computers and other such technologies is necessary to fully realize the potential of twenty-first-century tools. Innovative Methods, User-Friendly Tools, Coding, and Design Approaches in People-Oriented Programming is a critical scholarly resource that examines development and customization user interfaces for advanced technologies and how these interfaces can facilitate new developments in various fields. Featuring coverage on a broad range of topics such as role-based modeling, end-user composition, and wearable computing, this book is a vital reference source for programmers, developers, students, and educators seeking current research on the enhancement of user-centric information system development. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAugmented Reality ¡EEnd-User Composition ¡EHuman-Computer Interaction ¡EPersonalized Learning ¡ERole-Based Modeling ¡ESoftware Process Modeling ¡EWearable Computing
   
VD05-977 Handbook of Research on Cloud and Fog Computing Infrastructures for Data Science
  Pethuru Raj/ 9781522559726/ Price:US$ 245.00
 
Book Cover Fog computing is quickly increasing its applications and uses to the next level. As it continues to grow, different types of virtualization technologies can thrust this branch of computing further into mainstream use. The Handbook of Research on Cloud and Fog Computing Infrastructures for Data Science is a key reference volume on the latest research on the role of next-generation systems and devices that are capable of self-learning and how those devices will impact society. Featuring wide-ranging coverage across a variety of relevant views and themes such as cognitive analytics, data mining algorithms, and the internet of things, this publication is ideally designed for programmers, IT professionals, students, researchers, and engineers looking for innovative research on software-defined cloud infrastructures and domain-specific analytics. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EArtificial Intelligence ¡ECognitive Analytics ¡EData Mining Algorithms ¡EDeep Learning Algorithms ¡EFog Infrastructures ¡EInternet of Things ¡EMachine Learning Algorithms ¡ENatural Language Processing ¡ENeural Networks ¡EPredictive Analytics
   
VD05-976 Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications, 3-Vols/Set.
  Information Resources Management Association/ 9781522556343/ Price:US$ 2350.00
 
Book Cover Cyber security has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications contains a compendium of the latest academic material on new methodologies and applications in the areas of digital security and threats. Including innovative studies on cloud security, online threat protection, and cryptography, this multi-volume book is an ideal source for IT specialists, administrators, researchers, and students interested in uncovering new ways to thwart cyber breaches and protect sensitive digital information. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡ECloud Security ¡ECryptography ¡ECyber Warfare ¡ECyber-Criminal Profiling ¡EData Breaches ¡EMobile Security ¡EOnline Threat Protection
   
VD05-975 Quantum-Inspired Intelligent Systems for Multimedia Data Analysis
  Bhattacharyya, Siddhartha/ 9781522552192/ Price:US$ 185.00
 
Book Cover As multimedia data advances in technology and becomes more complex, the hybridization of soft computing tools allows for more robust and safe solutions in data processing and analysis. Quantum-Inspired Intelligent Systems for Multimedia Data Analysis provides emerging research on techniques used in multimedia information processing using intelligent paradigms including swarm intelligence, neural networks, and deep learning. While highlighting topics such as clustering techniques, neural network architecture, and text data processing, this publication explores the methods and applications of computational intelligent tools. This book is an important resource for academics, computer engineers, IT professionals, students, and researchers seeking current research in the field of multimedia data processing and quantum intelligent systems. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EClustering Technique ¡EComputing Algorithms ¡EImage Processing ¡ELearning Management Systems ¡EMultimedia Database ¡ENeural Network Architecture ¡EReversible Methodology ¡EText Data Processing ¡EUsability Evaluation ¡EVideo Indexing
   
VD05-974 Handbook of Research on Pattern Engineering System Development for Big Data Analytics
  Tiwari, Vivek/ 9781522538707/ Price:US$ 320.00
 
Book Cover Due to the growing use of web applications and communication devices, the use of data has increased throughout various industries. It is necessary to develop new techniques for managing data in order to ensure adequate usage. The Handbook of Research on Pattern Engineering System Development for Big Data Analytics is a critical scholarly resource that examines the incorporation of pattern management in business technologies as well as decision making and prediction process through the use of data management and analysis. Featuring coverage on a broad range of topics such as business intelligence, feature extraction, and data collection, this publication is geared towards professionals, academicians, practitioners, and researchers seeking current research on the development of pattern management systems for business applications. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EBusiness Intelligence ¡ECrowdsourcing ¡EData Collection ¡EFeature Extraction ¡EImage Segmentation ¡EMachine Learning ¡ESocial Computing ¡EWeb Mining
   
VD05-973 Handbook of Research on Contemporary Perspectives on Web-Based Systems
  Atilla Elci/ 9781522553847/ Price:US$ 295.00
 
Book Cover Information systems development underwent many changes as systems transitioned onto web-based forums. Complemented by advancements in security and technology, internet-based systems have become an information mainstay. The Handbook of Research on Contemporary Perspectives on Web-Based Systems is a critical scholarly resource that examines relevant theoretical frameworks, current practice guidelines, industry standards, and the latest empirical research findings in web-based systems. Featuring coverage on a wide range of topics such as data integration, mobile applications, and semantic web, this publication is geared toward computer engineers, IT specialists, software designers, professionals, researchers, and upper-level students seeking current and relevant research on the prevalence of these systems and advancements made to them. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡ECloud Computing ¡EData Integration ¡EInformation Retrieval ¡EInformation Systems ¡EMobile Applications ¡EQuery Management ¡ESemantic Web ¡EWeb Platforms
   
VD05-972 Handbook of Research on Network Forensics and Analysis Techniques
  Shrivastava, Gulshan/ 9781522541004/ Price:US$ 335.00
 
Book Cover With the rapid advancement in technology, myriad new threats have emerged in online environments. The broad spectrum of these digital risks requires new and innovative methods for protection against cybercrimes. The Handbook of Research on Network Forensics and Analysis Techniques is a current research publication that examines the advancements and growth of forensic research from a relatively obscure tradecraft to an important part of many investigations. Featuring coverage on a broad range of topics including cryptocurrency, hand-based biometrics, and cyberterrorism, this publication is geared toward professionals, computer forensics practitioners, engineers, researchers, and academics seeking relevant research on the development of forensic tools. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EArtificial Neural Network ¡ECryptocurrency ¡ECybercrime Toolkit Development ¡ECyberterrorism ¡EHacking ¡EHand-Based Biometrics ¡EIntrusion Detection System ¡EWeb Security ¡EWireless Sensor Networks
   
VD05-971 Wearable Technologies: Concepts, Methodologies, Tools, and Applications, 3-Vols/Set.
  Information Resources Management Association/ 9781522554844/ Price:US$ 2450.00
 
Book Cover Advances in technology continue to alter the ways in which we conduct our lives, from the private sphere to how we interact with others in public. As these innovations become more integrated into modern society, their applications become increasingly relevant in various facets of life. Wearable Technologies: Concepts, Methodologies, Tools, and Applications is a comprehensive reference source for the latest scholarly material on the development and implementation of wearables within various environments, emphasizing the valuable resources offered by these advances. Highlighting a range of pertinent topics, such as assistive technologies, data storage, and health and fitness applications, this multi-volume book is ideally designed for researchers, academics, professionals, students, and practitioners interested in the emerging applications of wearable technologies. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAssistive Technologies ¡EAugmented Reality ¡EData Storage ¡EEducational Technologies ¡EHealth and Fitness Applications ¡ESmartwatches ¡ESoftware Applications
   
VD05-970 Incorporating Nature-Inspired Paradigms in Computational Applications
  Khosrow-Pour, Mehdi/ 9781522550204/ Price:US$ 195.00
 
Book Cover Many techniques have been developed to control the variety of dynamic systems. To develop those control techniques, it is fundamental to know the mathematical relations between the system inputs and outputs. Incorporating Nature-Inspired Paradigms in Computational Applications is a critical scholarly resource that examines the application of nature-inspired paradigms on system identification. Featuring coverage on a broad range of topics such as biogeographic computation, evolutionary control systems, and natural computing, this book is geared towards IT professionals, engineers, computer scientists, academicians, researchers, and graduate-level students seeking current research on the application of nature-inspired paradigms. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EBiogeographic Computation ¡EEvolutionary Control Systems ¡EMetaheuristic Algorithms ¡EMulti-Threshold Histogram Equalization ¡ENatural Computing ¡EOptimal Input Values ¡EParticle Swarm Optimization ¡ESystem Identification
   
VD05-969 Mobile Technologies and Socio-Economic Development in Emerging Nations
  Mtenzi, Fredrick Japhet/ 9781522540298/ Price:US$ 195.00
 
Book Cover As technology advances, mobile devices have become more affordable and useful to countries around the world. As a result, mobile evolution has become an essential part of economic and social advancement. Mobile Technologies and Socio-Economic Development in Emerging Nations provides emerging research on the role of mobile devices as an important aspect of social and economic growth in developing countries. While highlighting topics, such as device authentication, mobile data management, and sensor services, this book explores how mobile devices have evolved to become an extremely useful tool. This book is a vital resource for academicians, researchers, students, practitioners, politicians, and professionals seeking current research on the uses, applications, and advantages of mobile services in increasing economic growth. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡ECloud Computing ¡EDevice Authentication ¡EMobile Architecture ¡EMobile Data Management ¡EMobile Payment ¡EMobile Privacy ¡EPhone Applications ¡ESensor Services ¡ESocial Networks ¡EWearable Devices
   
VD05-968 Information Visualization Techniques in the Social Sciences and Humanities
  Osinska,Veslava/ 9781522549901/ Price:US$ 195.00
 
Book Cover The representation of abstract data and ideas can be a difficult and tedious task to handle when learning new concepts; however, the advances in emerging technology have allowed for new methods of representing such conceptual data. Information Visualization Techniques in the Social Sciences and Humanities is a critical scholarly resource that examines the application of information visualization in the social sciences and humanities. Featuring coverage on a broad range of topics such as social network analysis, complex systems, and visualization aesthetics, this book is geared towards professionals, students, and researchers seeking current research on information visualization. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAgent-Based Modeling ¡EComplex Systems ¡EGenerative Systems ¡ESocial Network Analysis ¡ESound Visualization ¡EText Processing ¡EVisualization Aesthetics
   
VD05-967 Cyber Harassment and Policy Reform in the Digital Age: Emerging Research and Opportunities
  McNeal, Ramona S./ 9781522552857/ Price:US$ 145.00
 
Book Cover As the digital world assumes an ever-increasing role in the daily life of the public, opportunities to engage in crimes increase as well. The consequences of cyber aggression can range from emotional and psychological distress to death by suicide or homicide. Cyber Harassment and Policy Reform in the Digital Age: Emerging Research and Opportunities is a critical scholarly resource that examines cyber aggression and bullying and policy changes to combat this new form of crime. Featuring coverage on a broad range of topics such as anti-bullying programs, cyberstalking, and social exclusion, this book is geared towards academicians, researchers, policy makers, and students seeking current research on cyberstalking, harassment, and bullying. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAggressive Behavior ¡EAnti-Bullying Programs ¡ECyber Bullying ¡ECyberstalking ¡EOnline Activities ¡EOnline Aggression ¡ESocial Exclusion
   
VD05-966 Psychological and Behavioral Examinations in Cyber Security
  McAlaney, John/ 9781522540533/ Price:US$ 225.00
 
Book Cover Cyber security has become a topic of concern over the past decade. As many individual and organizational activities continue to evolve digitally, it is important to examine the psychological and behavioral aspects of cyber security. Psychological and Behavioral Examinations in Cyber Security is a critical scholarly resource that examines the relationship between human behavior and interaction and cyber security. Featuring coverage on a broad range of topics, such as behavioral analysis, cyberpsychology, and online privacy, this book is geared towards IT specialists, administrators, business managers, researchers, and students interested in online decision making in cybersecurity. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EBehavioral Analysis ¡ECyber Cognition ¡ECybercrime ¡ECyberpsychology ¡EInformation Security ¡EOnline Interaction ¡EOnline Privacy ¡EPhishing ¡ESocial Identity
   
VD05-965 Dynamic Knowledge Representation in Scientific Domains
  Pshenichny, Cyril/ 9781522552611/ Price:US$ 205.00
 
Book Cover The main approach to understanding and creating knowledge engineering concepts is static knowledge. Currently, there is a need to approach knowledge through a dynamic lens and address changing relations on an elaborated syntactic and semantic basis. Dynamic Knowledge Representation in Scientific Domains provides emerging research on the internal and external changes in knowledge within various subject areas and their visual representations. While highlighting topics such as behavior diagrams, distribution analysis, and qualitative modeling, this publication explores the structural development and assessment of knowledge models. This book is an important resource for academicians, researchers, students, and practitioners seeking current research on information visualization in order to foster research and collaboration. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EBehavior Diagrams ¡ECollaborative Research ¡EDecisions Support ¡EDistribution Analysis ¡EEvent Bushes ¡EGraph Visualization ¡EPetri Nets ¡EQualitative Bayesian Reasoning ¡EQualitative Modeling
   
VD05-964 Handbook of Research on Big Data Storage and Visualization Techniques, 2-Vols/Set.
  Segall, Richard S./ 9781522531425/ Price:US$ 565.00
 
Book Cover The digital age has presented an exponential growth in the amount of data available to individuals looking to draw conclusions based on given or collected information across industries. Challenges associated with the analysis, security, sharing, storage, and visualization of large and complex data sets continue to plague data scientists and analysts alike as traditional data processing applications struggle to adequately manage big data. The Handbook of Research on Big Data Storage and Visualization Techniques is a critical scholarly resource that explores big data analytics and technologies and their role in developing a broad understanding of issues pertaining to the use of big data in multidisciplinary fields. Featuring coverage on a broad range of topics, such as architecture patterns, programing systems, and computational energy, this publication is geared towards professionals, researchers, and students seeking current research and application topics on the subject. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAnalytics ¡EArchitecture Patterns ¡EClouds and Clusters ¡EComputational Business Intelligence ¡EComputational Energy ¡EProgramming Systems ¡ETechnologies
   
VD05-963 Critical Developments and Applications of Swarm Intelligence
  Shi, Yuhui/ 9781522551348/ Price:US$ 235.00
 
Book Cover Artificial intelligence is a constantly advancing field that requires models in order to accurately create functional systems. The use of natural acumen to create artificial intelligence creates a field of research in which the natural and the artificial meet in a new and innovative way. Critical Developments and Applications of Swarm Intelligence is a critical academic publication that examines developing research, technologies, and function regarding natural and artificial acumen specifically, in regards to self-organized systems. Featuring coverage on a broad range of topics such as evolutionary algorithms, optimization techniques, and computational comparison, this book is geared toward academicians, students, researchers, and engineers seeking relevant and current research on the progressive research based on the implementation of swarm intelligence in self-organized systems. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAgent-Based Approaches ¡EAlgorithm Based Model ¡EComputational Comparison ¡EEvolutionary Algorithms ¡EImage Perturbation ¡EMethod Based PSO ¡EOptimization Techniques
   
VD05-962 Virtual and Augmented Reality: Concepts, Methodologies, Tools, and Applications, 3-Vols/Set.
  Information Resources Management Association./ 9781522554691/ Price:US$ 2750.00
 
Book Cover Virtual and augmented reality is the next frontier of technological innovation. As technology exponentially evolves, so do the ways in which humans interact and depend upon it. Virtual and Augmented Reality: Concepts, Methodologies, Tools, and Applications is a comprehensive reference source for the latest scholarly material on the trends, techniques, and uses of virtual and augmented reality in various fields, and examines the benefits and challenges of these developments. Highlighting a range of pertinent topics, such as human-computer interaction, digital self-identity, and virtual reconstruction, this multi-volume book is ideally designed for researchers, academics, professionals, theorists, students, and practitioners interested in emerging technology applications across the digital plane. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EDigital Self-Identity ¡EDigital Storytelling ¡EEthics in Virtual Reality ¡EHuman-Computer Interaction ¡EMulti-Sensory Stimulation ¡EVideo Processing Technologies ¡EVirtual 3-D Learning ¡EVirtual Reality Enhanced Robotic Systems ¡EVirtual Reconstruction
   
VD05-961 Security, Privacy, and Anonymization in Social Networks: Emerging Research and Opportunities
  Tripathy, B. K./ 9781522551584/ Price:US$ 155.00
 
Book Cover Technology has become profoundly integrated into modern society; however, this increases the risk of vulnerabilities, such as hacking and other system errors, along with other online threats. Security, Privacy, and Anonymization in Social Networks: Emerging Research and Opportunities is a pivotal reference source for the most up-to-date research on edge clustering models and weighted social networks. Presenting widespread coverage across a range of applicable perspectives and topics, such as neighborhood attacks, fast k-degree anonymization (FKDA), and vertex-clustering algorithms, this book is ideally designed for academics, researchers, post-graduates, and practitioners seeking current research on undirected networks and greedy algorithms for social network anonymization. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EEdge Clustering Models ¡EFast K-Degree Anonymization (FKDA) ¡EGreedy Algorithms for Social Network Anonymization (GASNA) ¡ENeighborhood Attacks ¡ESequential Clustering Algorithms ¡EUndirected Networks ¡EVertex-Clustering Algorithms ¡EWeighted Social Networks
   
VD05-960 Multidisciplinary Perspectives on Human Capital and Information Technology Professionals
  Ahuja, Vandana/ 9781522552970/ Price:US$ 215.00
 
Book Cover In this technological age, the information technology (IT) industry is an important facet of society and business. The IT industry is able to become more efficient and successful through the examination of its structure and a larger understanding of the individuals that work in the field. Multidisciplinary Perspectives on Human Capital and Information Technology Professionals is a critical scholarly resource that focuses on IT as an industry and examines it from an array of academic viewpoints. Featuring coverage on a wide range of topics, such as employee online communities, role stress, and competence frameworks, this book is targeted toward academicians, students, and researchers seeking relevant research on IT as an industry. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EBusiness Process Models ¡ECompetence Frameworks ¡EE-Assessment ¡EEmployee Online Communities ¡ERecruitment Trends ¡ERole Stress ¡ESecure-Access and Privacy
   
VD05-958 Corporate and Global Standardization Initiatives in Contemporary Society
  Jakobs, Kai/ 9781522553205/ Price:US$ 205.00
 
Book Cover In fields as diverse as research and development, governance, and international trade, success depends on effective communication and processes. However, limited research exists on how professionals can utilize procedures and express themselves consistently across disciplines. Corporate and Global Standardization Initiatives in Contemporary Society is a critical scholarly resource that examines standardization in organizations. Featuring coverage on a broad range of topics, such as business standards, information technology standards, and mobile communications, this book is geared towards professionals, students, and researchers seeking current research on standardization for diverse settings and applications. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EBusiness Standards ¡EEconomics of Standardization ¡EFormal Standard ¡EInformal Standard ¡EIT Standards ¡EMobile Communications ¡ETechnology Development
   
VD05-956 Handbook of Research on Biomimicry in Information Retrieval and Knowledge Management
  Hamou, Reda Mohamed/ 9781522530046/ Price:US$ 325.00
 
Book Cover In the digital age, modern society is exposed to high volumes of multimedia information. In efforts to optimize this information, there are new and emerging methods of information retrieval and knowledge management leading to higher efficiency and a deeper understanding of this data. The Handbook of Research on Biomimicry in Information Retrieval and Knowledge Management is a critical scholarly resource that examines bio-inspired classes that solve computer problems. Featuring coverage on a broad range of topics such as big data analytics, bioinformatics, and black hole optimization, this book is geared towards academicians, practitioners, and researchers seeking current research on the use of biomimicry in information and knowledge management. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EBig Data Analytics ¡EBioinformatics ¡EBlack Hole Optimization ¡EBrain Machine Interfaces ¡ESpam Filtering ¡ESwarm Intelligence
   
VD05-955 Optimizing Contemporary Application and Processes in Open Source Software
  Khosrow-Pour, Mehdi/ 9781522553144/ Price:US$ 215.00
 
Book Cover As is true of most technological fields, the software industry is constantly advancing and becoming more accessible to a wider range of people. The advancement and accessibility of these systems creates a need for understanding and research into their development. Optimizing Contemporary Application and Processes in Open Source Software is a critical scholarly resource that examines the prevalence of open source software systems as well as the advancement and development of these systems. Featuring coverage on a wide range of topics such as machine learning, empirical software engineering and management, and open source, this book is geared toward academicians, practitioners, and researchers seeking current and relevant research on the advancement and prevalence of open source software systems. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EE-Learning Software ¡EEmpirical Software Engineering and Management ¡EFault Prediction ¡EMachine Learning ¡EOpen Source ¡ESoftware Cybernetics ¡ESource Code Analysis
   
VD05-954 Computer Vision: Concepts, Methodologies, Tools, and Applications, 4-Vols/Set.
  Information Resources Management Association/ 9781522552048/ Price:US$ 2950.00
 
Book Cover The fields of computer vision and image processing are constantly evolving as new research and applications in these areas emerge. Staying abreast of the most up-to-date developments in this field is necessary in order to promote further research and apply these developments in real-world settings. Computer Vision: Concepts, Methodologies, Tools, and Applications is an innovative reference source for the latest academic material on development of computers for gaining understanding about videos and digital images. Highlighting a range of topics, such as computational models, machine learning, and image processing, this multi-volume book is ideally designed for academicians, technology professionals, students, and researchers interested in uncovering the latest innovations in the field. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EComputational Models ¡EImage Processing ¡EImage Synthesis ¡EMachine Intelligence ¡EMachine Learning ¡EMotion Detection ¡EPattern Recognition ¡ESystem Development
   
VD05-953 Technology Adoption and Social Issues: Concepts, Methodologies, Tools, and Applications, 3-Vols/Set.
  Information Resources Management Association/ 9781522552017/ Price:US$ 2250.00
 
Book Cover As society continues to experience increases in technological innovations, various industries must rapidly adapt and learn to incorporate these advances. While there are benefits to implementing these technologies, the sociological aspects still need to be considered. Technology Adoption and Social Issues: Concepts, Methodologies, Tools, and Applications is an innovative reference source for the latest academic material on the various effects of technology adoption, implementation, and acceptance. Highlighting a range of topics, such as educational technology, globalization, and social structure, this multi-volume book is ideally designed for academicians, professionals, and researchers who are interested in the latest insights into technology adoption. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EEducational Technology ¡EElectronic Commerce ¡EGlobalization ¡EInformation and Communication Technologies ¡ESocial Structure ¡ESocio-Technical Compatibility ¡ETechnology Acceptance Model ¡ETechnology Diffusion ¡EWireless Technology
   
VD05-952 Enhancing Knowledge Discovery and Innovation in the Digital Era
  Lytras, Miltiadis D./ 9781522541912/ Price:US$ 215.00
 
Book Cover With the dawn of electronic databases, information technologies, and the Internet, organizations, now more than ever, have easy access to all the knowledge they need to conduct their business. However, utilizing and detecting the beneficial information can pose as a challenge. Enhancing Knowledge Discovery and Innovation in the Digital Era is a vibrant reference source on the latest research on student education, open information, technology enhanced learning (TEL), and student outcomes. Featuring widespread coverage across a range of applicable perspectives and topics, such as engineering education, data mining, and 3D printing, this book is ideally designed for professionals, upper-level students, and academics seeking current research on knowledge management and innovation networks. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EData Mining ¡EDigital Electronics Education and Design Suite (DEEDS) ¡EInnovation Networks ¡EKnowledge Management ¡ELearning Analytics ¡EOpen Information ¡ESmart Education ¡EStudent Outcomes ¡ETechnology Enhanced Learning (TEL)
   
VD05-951 Predictive Analysis on Large Data for Actionable Knowledge: Emerging Research and Opportunities
  Usman, Muhammad/ 9781522550297/ Price:US$ 135.00
 
Book Cover Data analysis forms the basis of many modes of research ranging from scientific discoveries to governmental findings. With the advent of machine intelligence and neural networks, extracting and modeling, approaching data has been unimpeachably altered. These changes, seemingly small, affect the way societies organize themselves, deliver services, or interact with each other. Predictive Analysis on Large Data for Actionable Knowledge: Emerging Research and Opportunities provides emerging information on extraction and prediction patterns in data mining along with knowledge discovery. While highlighting the current issues in data extraction, readers will learn new methodologies comprising of different algorithms that automate the multidimensional schema that remove the manual processes. This book is a vital resource for researchers, academics, and those seeking new information on data mining techniques and trends. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAssociation Rule Mining ¡EData Mining ¡EExploratory Pattern Recognition ¡EGeneral Hierarchical Clusters ¡EHybrid Techniques ¡EKnowledge Discovery ¡EMachine Learning ¡EPattern Extraction ¡EPrediction Algorithms ¡EPrinciple Component Analysis ¡EVisualization Techniques
   
VD05-950 Ensuring Research Integrity and the Ethical Management of Data
  Cees Th. Smit Sibinga/ 9781522527305/ Price:US$ 275.00
 
Book Cover Data management technology is rapidly progressing, and with it comes the need for stricter rules that ensure the information being collected is handled appropriately. Ensuring Research Integrity and the Ethical Management of Data is an essential resource that examines the best approaches for providing quality research, as well as how to effectively manage that information in a reputable way. Featuring extensive research on relevant topics such as qualitative data collection, data sharing, data misinterpretation, and intellectual property, this scholarly publication is an ideal reference source for academicians, students, and researchers interested in current trends and techniques in ethical research and data management. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EData Misinterpretation ¡EData Privacy ¡EData Reporting ¡EData Sharing ¡EIntellectual Property ¡EPeer Review Process ¡EQualitative Data Collection ¡EQuantitative Data Processing
   
VD05-949 Innovations, Developments, and Applications of Semantic Web and Information Systems
  Lytras, Miltiadis D./ 9781522550426/ Price:US$ 245.00
 
Book Cover In the last few years, there has been an increased advancement and evolution in semantic web and information systems in a variety of fields. The integration of these approaches to ontology engineering, sophisticated methods and algorithms for open linked data extraction, and advanced decision-making creates new opportunities for a bright future. Innovations, Developments, and Applications of Semantic Web and Information Systems is a critical scholarly resource that discusses integrated methods of research and analytics in information technology. Featuring coverage on a broad range of topics, such as cognitive computing, artificial intelligence, machine learning, data analysis, and algorithms, this book is geared towards researchers, academicians, and professionals seeking current information on semantic web and information systems. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAlgorithmic Analysis ¡EArtificial Intelligence ¡ECognitive Computing ¡EData Analysis ¡EDecision Making ¡EMachine Learning ¡EOntology Engineering ¡ESemantic Web and Information Systems
   
VD05-947 The SAGE Encyclopedia of the Internet, 3-Vols/Set.
  Barney Warf/ 9781473926615/ Price:¢G 315.00
 
Book Cover The Internet needs no introduction, and its significance today can hardly be exaggerated. Today, more people are more connected technologically to one another than at any other time in human existence. For a large share of the world¡¦s people, the Internet, text messaging, and various other forms of digital social media such as Facebook have become thoroughly woven into the routines and rhythms of daily life. The Internet has transformed how we seek information, communicate, entertain ourselves, find partners, and, increasingly, it shapes our notions of identity and community. The SAGE Encyclopedia of the Internet addresses the many related topics pertaining to cyberspace, email, the World Wide Web, and social media. Entries will range from popular topics such as Alibaba and YouTube to important current controversies such as Net neutrality and cyberterrorism. The goal of the encyclopedia is to provide the most comprehensive collection of authoritative entries on the Internet available, written in a style accessible to academic and non-academic audiences alike.
   
VD05-946 Global Implications of Emerging Technology Trends
  Garcia-Penalvo, Francisco Jose/ 9781522549444/ Price:US$ 185.00
 
Book Cover The advent of new technologies has been an impetus for rapid development in several industries. These recent advances push industry leaders to infuse new innovations into their various systems and processes. Global Implications of Emerging Technology Trends is a critical scholarly resource that examines major breakthroughs within technological areas on a global level. Featuring coverage on a broad range of topics, such as biometrics, nanotechnology, and wireless technologies, this book is geared towards academicians, practitioners, and researchers seeking current research manuscripts of the evolution of information science and technology. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EBiometrics ¡EChemoinformatic ¡ECloud Computing ¡EDigital Forensics ¡ENanotechnology ¡ESensor Technologies ¡EVirtualization ¡EWireless Technologies
   
VD05-945 Critical Research on Scalability and Security Issues in Virtual Cloud Environments
  Aljawarneh, Shadi/ 9781522530299/ Price:US$ 225.00
 
Book Cover Individual users and business organizations are shifting their data storage and utilizing cloud computing because of its easy availability and reduced costs. Although, this technology is creating an easy way to store, share, and access data, serious security concerns have been generated. Critical Research on Scalability and Security Issues in Virtual Cloud Environments is a critical scholarly resource that examines the concept of cloud computing and explores the various shortcomings of using the cloud. Featuring coverage on a broad range of topics such as cloud architecture for scalability, data vulnerability, and server virtualization management, this book is geared towards academicians, practitioners, and researchers seeking current research on developing effective security measures for cloud paradigm. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡ECloud Architecture for Scalability ¡EData Vulnerability ¡EDesigns of Scalability Services ¡EElasticity ¡EMeasure of Scalability ¡ESecurity Architecture ¡EServer Virtualization Management
   
VD05-944 Image Retrieval and Analysis Using Text and Fuzzy Shape Features: Emerging Research and Opportunities
  Sumathy, P./ 9781522537960/ Price:US$ 145.00
 
Book Cover Multimedia information retrieval focuses on the tools of processing and searching that are applicable to the content-based management of new multimedia documents. It has recently expanded to encompass newly devised techniques that will further its performance and growing importance. Image Retrieval and Analysis Using Text and Fuzzy Shape Features: Emerging Research and Opportunities is a critical scholarly resource that explores methods and strategies related to multimedia information retrieval systems. Featuring coverage on a broad range of topics including content-based image retrieval, text-based image retrieval, fuzzy object shape features, encoding, and indexing, this book is geared towards library science specialists, information technology specialists, and researchers seeking current information on the integration of new information retrieval technologies. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EContent-Based Image Retrieval ¡EEncoding and Indexing ¡EFuzzy Object Shape Features ¡EMultimedia Information Retrieval ¡EText-Based Image Retrieval
   
VD05-942 Psychological, Social, and Cultural Aspects of Internet Addiction
  Bozoglan, Bahadir/ 9781522534778/ Price:US$ 200.00
 
Book Cover Addiction is a powerful and destructive condition impacting large portions of the population around the world. While typically associated with substances, such as drugs and alcohol, technology and internet addiction have become a concern in recent years as technology use has become ubiquitous. Psychological, Social, and Cultural Aspects of Internet Addiction is a critical scholarly resource that sheds light on the relationship between psycho-social variables and internet addiction. Featuring coverage on a broad range of topics such as human-computer interaction, academic performance, and online behavior, this book is geared towards psychologists, counselors, graduate-level students, and researchers studying psychology and technology use. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAcademic Performance ¡EAttention Deficit Disorder ¡EHuman-Computer Interaction ¡ELow Family Factors ¡EOnline Behavior ¡EPsycho-Social Variables ¡EStress and Internet Addiction
   
VD05-941 Free and Open Source Software in Modern Data Science and Business Intelligence: Emerging Research and Opportunities
  Srinivasa, K.G./ 9781522537076/ Price:US$ 190.00
 
Book Cover Computer software and technologies are advancing at an amazing rate. The accessibility of these software sources allows for a wider power among common users as well as rapid advancement in program development and operating information. Free and Open Source Software in Modern Data Science and Business Intelligence: Emerging Research and Opportunities is a critical scholarly resource that examines the differences between the two types of software, integral in the FOSS movement, and their effect on the distribution and use of software. Featuring coverage on a wide range of topics, such as FOSS Ecology, graph mining, and project tasks, this book is geared towards academicians, researchers, and students interested in current research on the growing importance of FOSS and its expanding reach in IT infrastructure. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EEvolution of Developers and Projects ¡EFOSS Ecology ¡EGraph Mining ¡EInfluential Nodes ¡EIntegration into Engineering Education ¡EProject Tasks ¡ESocial Network Analysis
   
VD05-940 Computer Systems and Software Engineering: Concepts, Methodologies, Tools, and Applications, 4-Vols/Set.
  Information Resources Management Association/ 9781522539230/ Price:US$ 2950.00
 
Book Cover Professionals in the interdisciplinary field of computer science focus on the design, operation, and maintenance of computational systems and software. Methodologies and tools of engineering are utilized alongside computer applications to develop efficient and precise information databases. Computer Systems and Software Engineering: Concepts, Methodologies, Tools, and Applications is a comprehensive reference source for the latest scholarly material on trends, techniques, and uses of various technology applications and examines the benefits and challenges of these computational developments. Highlighting a range of pertinent topics such as utility computing, computer security, and information systems applications, this multi-volume book is ideally designed for academicians, researchers, students, web designers, software developers, and practitioners interested in computer systems and software engineering. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡ECloud Computing ¡EComputer Security ¡EComputer Systems Development ¡EDatabase Management ¡EInformation Systems Applications ¡ESystems Management
   
VD05-939 N-ary Relations for Logical Analysis of Data and Knowledge
  Kulik, Boris/ 9781522527824/ Price:US$ 225.00
 
Book Cover Mathematics has been used as a tool in logistical reasoning for centuries. Examining how specific mathematic structures can aid in data and knowledge management helps determine how to efficiently and effectively process more information in these fields. N-ary Relations for Logical Analysis of Data and Knowledge is a critical scholarly reference source that provides a detailed study of the mathematical techniques currently involved in the progression of information technology fields. Featuring relevant topics that include algebraic sets, deductive analysis, defeasible reasoning, and probabilistic modeling, this publication is ideal for academicians, students, and researchers who are interested in staying apprised of the latest research in the information technology field. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAlgebraic Sets ¡EArtificial Intelligence Systems ¡EData Management ¡EDeductive Analysis ¡EDefeasible Reasoning ¡ELogical Inference Systems ¡EProbabilistic Logic ¡EProbabilistic Modeling
   
VD05-938 Examining Cloud Computing Technologies Through the Internet of Things
  Tomar, Pradeep/ 9781522534457/ Price:US$ 215.00
 
Book Cover The progressive combination of cloud computing and Internet of Things (IoT) will enable new monitoring services, create powerful processing of sensory data streams, and provide a new method for intelligent perception and connection. Examining Cloud Computing Technologies Through the Internet of Things is a pivotal reference source for scholarly research on the latest and innovative facets of cloud-based Internet of Things systems including technical evaluations and comparisons of existing concepts. Featuring coverage on a broad range of topics such as fog computing, network programming, and data security, this book is geared towards advanced-level students, researchers, and professionals interested in exploring and implementing the IoT and related technologies. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EData Security ¡EFog Computing ¡ENetwork Programming ¡ESmart Grids ¡ESmart Society ¡ESustainability ¡EVirtualization
   
VD05-937 Advancements in Applied Metaheuristic Computing
  Dey, Nilanjan/ 9781522541516/ Price:US$ 225.00
 
Book Cover Metaheuristic algorithms are present in various applications for different domains. Recently, researchers have conducted studies on the effectiveness of these algorithms in providing optimal solutions to complicated problems. Advancements in Applied Metaheuristic Computing is a crucial reference source for the latest empirical research on methods and approaches that include metaheuristics for further system improvements, and it offers outcomes of employing optimization algorithms. Featuring coverage on a broad range of topics such as manufacturing, genetic programming, and medical imaging, this publication is ideal for researchers, academicians, advanced-level students, and technology developers seeking current research on the use of optimization algorithms in several applications. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EFuzzy Contrast ¡EGeneral Routing ¡EGenetic Programming ¡EManufacturing ¡EMedical Imaging ¡EThermal Power System ¡EWater Quality Classification
   
VD05-936 Bridging Relational and NoSQL Databases
  Gaspar, Drazena/ 9781522533856/ Price:US$ 185.00
 
Book Cover Relational databases have been predominant for many years and are used throughout various industries. The current system faces challenges related to size and variety of data thus the NoSQL databases emerged. By joining these two database models, there is room for crucial developments in the field of computer science. Bridging Relational and NoSQL Databases is an innovative source of academic content on the convergence process between databases and describes key features of the next database generation. Featuring coverage on a wide variety of topics and perspectives such as BASE approach, CAP theorem, and hybrid and native solutions, this publication is ideally designed for professionals and researchers interested in the features and collaboration of relational and NoSQL databases. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EBASE Approach ¡ECAP Theorem ¡EComplex Event Processing ¡EHandling Keys ¡EHybrid Solutions ¡ENative Solutions ¡EQuery Languages ¡EQuery Optimization
   
VD05-934 Technology-Enhanced Human Interaction in Modern Society
  Francisco Vicente Cipolla-Ficarra/ 9781522534372/ Price:US$ 205.00
 
Book Cover Technology has changed the way people carry out their daily lives and communicate with one another. Society has become dependent on technology and with that comes the need to understand the advantages and disadvantages that come along with it. Technology-Enhanced Human Interaction in Modern Society is an essential reference source for the latest scholarly research on the technological advances of applied aspects of life such as training, health, information gathering, and social communication. Featuring coverage on subjects including biomedical test instruments, computer animation, and mobile phones, this publication is ideally designed for researchers and academicians seeking current material on technology-based communication. Topics Covered ¡EArchitectural Graphic Expression ¡EBiomedical Test Instruments ¡EComputer Animation ¡EDigital Television ¡EInteractive Systems ¡EMobile Phones ¡ESocial networks
   
VD05-933 Experience-Based Human-Computer Interactions: Emerging Research and Opportunities
  Sosnin, Petr/ 9781522529873/ Price:US$ 165.00
 
Book Cover Human computer interaction is constantly evolving in many areas and facets of modern society. Analyzing these interactions can provide a more balanced understanding of these technological advances as they pertain to people¡¦s lives. Experience-Based Human-Computer Interactions: Emerging Research and Opportunities is a pivotal reference source that provides in-depth discussions on the progression and contemporary applications of human computer interaction. Highlighting relevant topic areas such as semantic support, software intensive systems, ontology applications, and conceptual objects, this publication is ideal for engineers, academicians, students, and researchers that would like to attain more information on recent advances being made to bridge the gap between human and computer interactions. Topics Covered ¡EConceptual Objects ¡EOntology Applications ¡EOperational Space ¡EPrecedent-Oriented Model ¡EQuestion-Answer Analysis ¡ESemantic Memory ¡ESemantic Support ¡ESoftware Intensive Systems
   
VD05-932 Formation Methods, Models, and Hardware Implementation of Pseudorandom Number Generators: Emerging Research and Opportunities
  Bilan, Stepan/ 9781522527732/ Price:US$ 180.00
 
Book Cover Modern computing systems preserve all information in intricate binary codes. The evolution of systems and technologies that aid in this preservation process must be continually assessed to ensure that they are keeping up with the demands of society. Formation Methods, Models, and Hardware Implementation of Pseudorandom Number Generators: Emerging Research and Opportunities is a crucial scholarly resource that examines the current methodologies used in number generator construction, and how they pertain to the overall advancement of contemporary computer systems. Featuring coverage on relevant topics such as cellular automata theory, inhomogeneous cells, and sequence generators, this publication is ideal for software engineers, computer programmers, academicians, students, and researchers that are interested in staying abreast of innovative trends within the computer engineering field. Topics Covered ¡EAsynchronous Cellular Automata ¡ECellular Automata Theory ¡EENT Quality Analyzing Tests ¡EGraphical Tests ¡EHexagonal Coverage ¡EInhomogeneous Cells ¡ENIST Quality Analyzing Tests ¡ESequence Generators
   
VD05-931 Handbook of Research on Emergent Applications of Optimization Algorithms, 2-Vols/Set.
  Vasant, Pandian/ 9781522529903/ Price:US$ 445.00
 
Book Cover Modern optimization approaches have attracted an increasing number of scientists, decision makers, and researchers. As new issues in this field emerge, different optimization methodologies must be developed and implemented. The Handbook of Research on Emergent Applications of Optimization Algorithms is an authoritative reference source for the latest scholarly research on modern optimization techniques for solving complex problems of global optimization and their applications in economics and engineering. Featuring coverage on a broad range of topics and perspectives such as hybrid systems, non-cooperative games, and cryptography, this publication is ideally designed for students, researchers, and engineers interested in emerging developments in optimization algorithms. Topics Covered ¡ECombinatorial Optimization ¡ECooperative Games ¡ECryptography ¡EGame Theory ¡EHybrid Systems ¡ELinear Programming ¡ENon-Cooperative Games ¡EOperations Research Games
   
VD05-930 Digital Multimedia: Concepts, Methodologies, Tools, and Applications, 3-Vols/Set.
  Information Resources Management Association/ 9781522538226/ Price:US$ 2250.00
 
Book Cover Contemporary society resides in an age of ubiquitous technology. With the consistent creation and wide availability of multimedia content, it has become imperative to remain updated on the latest trends and applications in this field. Digital Multimedia: Concepts, Methodologies, Tools, and Applications is an innovative source of scholarly content on the latest trends, perspectives, techniques, and implementations of multimedia technologies. Including a comprehensive range of topics such as interactive media, mobile technology, and data management, this multi-volume book is an ideal reference source for engineers, professionals, students, academics, and researchers seeking emerging information on digital multimedia. Topics Covered ¡EBusiness Applications ¡EData Management ¡EEducational Technology ¡EInteractive Media ¡EMobile Technology ¡EMultimedia Learning ¡ESecurity and Privacy
   
VD05-929 Developments and Trends in Intelligent Technologies and Smart Systems
  Sugumaran, Vijayan/ 9781522536864/ Price:US$ 215.00
 
Book Cover Due to the exponential rise of emerging technology, there have been significant developments in intelligent systems. This has facilitated increasing opportunities for new applications and improvements. Developments and Trends in Intelligent Technologies and Smart Systems is a critical source of scholarly material on the design, implementation, and integration of intelligent applications across numerous industries. Highlighting a range of innovative topics such as enterprise modeling, remote patient monitoring, and service-oriented architecture, this book is ideally designed for researchers, engineers, computer scientists, academics, students, and professionals interested in the latest applications of intelligent technologies. Topics Covered ¡EEnterprise Engineering ¡EEnterprise Modeling ¡EImage Annotation ¡EInternet of Things ¡EMulti-Agent Systems ¡ERemote Patient Monitoring ¡ESelf-Service Banking Technology ¡EService-oriented architecture
   
VD05-928 Enhancing Software Fault Prediction With Machine Learning: Emerging Research and Opportunities
  Rashid, Ekbal/ 9781522531852/ Price:US$ 165.00
 
Book Cover Software development and design is an intricate and complex process that requires a multitude of steps to ultimately create a quality product. One crucial aspect of this process is minimizing potential errors through software fault prediction. Enhancing Software Fault Prediction With Machine Learning: Emerging Research and Opportunities is an innovative source of material on the latest advances and strategies for software quality prediction. Including a range of pivotal topics such as case-based reasoning, rate of improvement, and expert systems, this book is an ideal reference source for engineers, researchers, academics, students, professionals, and practitioners interested in novel developments in software design and analysis. Topics Covered ¡ECase-Based Reasoning ¡EExpert systems ¡EQuality Gap ¡ERate of Improvement ¡ESoftware Development ¡ETime Gap
   
VD05-927 Androids, Cyborgs, and Robots in Contemporary Culture and Society
  Thompson, Steven John/ 9781522529736/ Price:US$ 205.00
 
Book Cover Mankind¡¦s dependence on artificial intelligence and robotics is increasing rapidly as technology becomes more advanced. Finding a way to seamlessly intertwine these two worlds will help boost productivity in society and aid in a variety of ways in modern civilization. Androids, Cyborgs, and Robots in Contemporary Culture and Society is an essential scholarly resource that delves into the current issues, methodologies, and trends relating to advanced robotic technology in the modern world. Featuring relevant topics that include STEM technologies, brain-controlled androids, biped robots, and media perception, this publication is ideal for engineers, academicians, students, and researchers that would like to stay current with the latest developments in the world of evolving robotics. Topics Covered ¡EAnimation ¡EBiped Robots ¡EBrain-Controlled Androids ¡EGender Equality ¡ELaw ¡EMechanology ¡EMedia Perception ¡EMedia Program ¡ESTEM Technologies
   
VD05-926 Aligning Perceptual and Conceptual Information for Cognitive Contextual System Development: Emerging Research and Opportunities
  Kuvich, Gary/ 9781522524311/ Price:US$ 165.00
 
Book Cover The rise of technology has led to rapid developments in robotic intelligence and its various applications. The success or failure of these systems is linked closely with effective perception and cognition models. Aligning Perceptual and Conceptual Information for Cognitive Contextual System Development: Emerging Research and Opportunities is an innovative source of academic content on approaches to cognitive and perceptual systems development in artificial intelligence. Including a range of relevant topics such as object processing, implicit symbols, and knowledge representation, this book is ideally designed for engineers, academics, practitioners, and students interested in perceptual and conceptual interpretation in artificial intelligence. Topics Covered ¡ECognitive Semiotics ¡EImplicit Symbols ¡EKnowledge Representation ¡EObject Processing ¡EPattern Recognition ¡EVisual Information
   
VD05-925 Application Development and Design: Concepts, Methodologies, Tools, and Applications, 3-Vols/set.
  Information Resources Management Association/ 9781522534228/ Price:US$ 2695.00
 
Book Cover Advancements in technology have allowed for the creation of new tools and innovations that can improve different aspects of life. These applications can be utilized across different technological platforms. Application Development and Design: Concepts, Methodologies, Tools, and Applications is a comprehensive reference source for the latest scholarly material on trends, techniques, and uses of various technology applications and examines the benefits and challenges of these computational developments. Highlighting a range of pertinent topics such as software design, mobile applications, and web applications, this multi-volume book is ideally designed for researchers, academics, engineers, professionals, students, and practitioners interested in emerging technology applications. Topics Covered ¡EApplication Testing ¡EBusiness Technologies ¡EEnd User Considerations ¡ELearning Technologies ¡EMobile applications ¡ESoftware design ¡EWeb Applications
   
VD05-924 Information and Technology Literacy: Concepts, Methodologies, Tools, and Applications, 4-Vols/Set.
  Information Resources Management Association (USA)/ 9781522534174/ Price:US$ 2495.00
 
Book Cover People currently live in a digital age in which technology is now a ubiquitous part of society. It has become imperative to develop and maintain a comprehensive understanding of emerging innovations and technologies. Information and Technology Literacy: Concepts, Methodologies, Tools, and Applications is an authoritative reference source for the latest scholarly research on techniques, trends, and opportunities within the areas of digital literacy. Highlighting a wide range of topics and concepts such as social media, professional development, and educational applications, this multi-volume book is ideally designed for academics, technology developers, researchers, students, practitioners, and professionals interested in the importance of understanding technological innovations. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EEducational Applications ¡EGaming ¡EKnowledge Management ¡ELibrary Science ¡EMobile Technologies ¡EProfessional Development ¡ESocial Media
   
VD05-923 Advanced Mobile Technologies for Secure Transaction Processing: Emerging Research and Opportunities
  Kumar, Raghvendra/ 9781522527596/ Price:US$ 130.00
 
Book Cover The development of mobile applications has created numerous opportunities across different industries. With these advances, the management of data has been optimized to allow a broader scope of potential uses. Advanced Mobile Technologies for Secure Transaction Processing: Emerging Research and Opportunities is an innovative reference source for the latest academic material on the application of mobile computing for secure payment transactions. Highlighting a range of relevant topics such as information security, electronic money, and online banking, this book is ideally designed for professionals, researchers, practitioners, students, and professionals interested in novel perspectives on mobile technologies and data management. Topics Covered ¡EAuthentication ¡EElectronic Money ¡EInformation Security ¡EMobile Banking ¡EMobile Databases ¡EOnline Banking
   
VD05-922 HCI Challenges and Privacy Preservation in Big Data Security
  Lopez, Daphne/ 9781522528630/ Price:US$ 215.00
 
Book Cover Privacy protection within large databases can be a challenge. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. HCI Challenges and Privacy Preservation in Big Data Security is an informative scholarly publication that discusses how human-computer interaction impacts privacy and security in almost all sectors of modern life. Featuring relevant topics such as large scale security data, threat detection, big data encryption, and identity management, this reference source is ideal for academicians, researchers, advanced-level students, and engineers that are interested in staying current on the advancements and drawbacks of human-computer interaction within the world of big data. Topics Covered ¡EBig Data Encryption ¡EBrain-Computer Interfaces ¡ECryptography ¡EIdentity Management ¡ELarge Scale Security Data ¡ENatural Language Processing ¡EPrivacy Protection ¡EQuery Optimization ¡ESpoken Dialogue Systems ¡EThreat Detection
   
VD05-921 Algorithmic Strategies for Solving Complex Problems in Cryptography
  Balasubramanian, Kannan/ 9781522529156/ Price:US$ 245.00
 
Book Cover Cryptography is a field that is constantly advancing, due to exponential growth in new technologies within the past few decades. Applying strategic algorithms to cryptic issues can help save time and energy in solving the expanding problems within this field. Algorithmic Strategies for Solving Complex Problems in Cryptography is an essential reference source that discusses the evolution and current trends in cryptology, and it offers new insight into how to use strategic algorithms to aid in solving intricate difficulties within this domain. Featuring relevant topics such as hash functions, homomorphic encryption schemes, two party computation, and integer factoring, this publication is ideal for academicians, graduate students, engineers, professionals, and researchers interested in expanding their knowledge of current trends and techniques within the cryptology field. Topics Covered ¡EDigital Signature Algorithms ¡EHash Functions ¡EHomomorphic Encryption Schemes ¡EInteger Factoring ¡EMultiparty Computation ¡EMultiprecision Algorithms ¡EPublic Key Encryption ¡EQuadratic Sieve Algorithm ¡ETwo Party Computation
   
VD05-920 Examining Developments and Applications of Wearable Devices in Modern Society
  Silva, Saul Emanuel Delabrida/ 9781522532903/ Price:US$ 195.00
 
Book Cover Wearable technology can range anywhere between activity trackers to prosthetics. These new advancements are continuously progressing and becoming a part of daily life. Examining Developments and Applications of Wearable Devices in Modern Society is a pivotal reference source for the most innovative research on the expansion of wearable computing and technology. Featuring coverage on a broad range of topics such as stroke monitoring, augmented reality, and cancer detection, this publication is ideally designed for academicians, researchers, and students seeking current research on the challenges and benefits of the latest wearable devices. Topics Covered ¡EAugmented reality ¡ECancer Detection ¡EInternet of things (IoT) ¡EKinetic Energy ¡ESmart Cities ¡EStroke Monitoring ¡EThermophysiological Comfort
   
VD05-919 Techniques for Coding Imagery and Multimedia: Emerging Research and Opportunities
  Hai-Jew, Shalin/ 9781522526797/ Price:US$ 235.00
 
Book Cover A variety of applications have been developed in order to engage with society. These tools have enabled computer scientists to captured large sets of unstructured data for machine learning and make the information widely available in academia. Techniques for Coding Imagery and Multimedia: Emerging Research and Opportunities is a pivotal reference source featuring the latest scholarly research on ways researchers code imagery and multimedia for research purposes, as well as describe some of the applied methods for research value. Including coverage on a wide variety of topics such as linguistic analysis, gender communication, and mass surveillance, this book is an important resource for researchers, academics, graduate students, and professionals seeking current research on best ways to globally expand multimedia research and imagery. Topics Covered ¡EDigital Learning Objects ¡EGender Communication ¡EHumor Online ¡ELinguistic Analysis ¡EMass Surveillance ¡EMultimedia ¡ERacial Communication ¡ESocial Media
   
VD05-918 Handbook of Research on Modeling, Analysis, and Application of Nature-Inspired Metaheuristic Algorithms
  Dash, Sujata/ 9781522528579/ Price:US$ 265.00
 
Book Cover The digital age is ripe with emerging advances and applications in technological innovations. Mimicking the structure of complex systems in nature can provide new ideas on how to organize mechanical and personal systems. The Handbook of Research on Modeling, Analysis, and Application of Nature-Inspired Metaheuristic Algorithms is an essential scholarly resource on current algorithms that have been inspired by the natural world. Featuring coverage on diverse topics such as cellular automata, simulated annealing, genetic programming, and differential evolution, this reference publication is ideal for scientists, biological engineers, academics, students, and researchers that are interested in discovering what models from nature influence the current technology-centric world. Topics Covered ¡EArtificial Immune Systems ¡ECellular Automata ¡EDifferential evolution ¡EEvolutionary Algorithm ¡EGenetic Programming ¡EMemetic algorithms ¡EParticle swarm optimization ¡ESimulated annealing ¡ESupport vector machines
   
VD05-917 Exploring the Convergence of Big Data and the Internet of Things
  Prasad, A.V. Krishna/ 9781522529477/ Price:US$ 245.00
 
Book Cover The growth of Internet use and technologies has increased exponentially within the business sector. When utilized properly, these applications can enhance business functions and make them easier to perform. Exploring the Convergence of Big Data and the Internet of Things is a pivotal reference source featuring the latest empirical research on the business use of computing devices to send and receive data in conjunction with analytic applications to reduce maintenance costs, avoid equipment failures, and improve business operations. Including research on a broad range of topics such as supply chain, aquaculture, and speech recognition systems, this book is ideally designed for researchers, academicians, and practitioners seeking current research on various technology uses in business. Topics Covered ¡EAquaculture ¡ECloud Computing ¡ECustomer Relationship Management ¡EFog Computing ¡EMobile Commerce ¡ESmart Cities ¡ESpeech Recognition Systems ¡ESupply Chain
   
VD05-916 Design and Use of Virtualization Technology in Cloud Computing
  Das, Prashanta Kumar/ 9781522527855/ Price:US$ 235.00
 
Book Cover Cloud computing is rapidly expanding in its applications and capabilities through various parts of society. Utilizing different types of virtualization technologies can push this branch of computing to even greater heights. Design and Use of Virtualization Technology in Cloud Computing is a crucial resource that provides in-depth discussions on the background of virtualization, and the ways it can help shape the future of cloud computing technologies. Highlighting relevant topics including grid computing, mobile computing, open source virtualization, and virtualization in education, this scholarly reference source is ideal for computer engineers, academicians, students, and researchers that are interested in learning more about how to infuse current cloud computing technologies with virtualization advancements. Topics Covered ¡ECommercial Virtualization ¡EGrid computing ¡EHypervisor Design ¡EMobile Computing ¡EOpen Source Virtualization ¡EVirtualization Costing Analysis ¡EVirtualization in Education ¡EVirtualization in IT Industries
   
VD05-915 Handbook of Research on Human Development in the Digital Age
  Bryan, Valerie C./ 9781522528388/ Price:US$ 275.00
 
Book Cover The rapid evolution of technology continuously changes the way people interact, work, and learn. By examining these advances, researchers can further optimize the various opportunities that technology provides. The Handbook of Research on Human Development in the Digital Age is a pivotal reference source presenting the latest scholarly research on the impact of technology on the population through different theories and perspectives. Featuring extensive coverage on a broad range of topics such as cyberbullying, mobile technology, and social skills development, this publication is ideally designed for academicians, researchers, and practitioners seeking current research on new trends in technology that impact society. Topics Covered ¡ECyberbullying ¡EDigital Storytelling ¡EDistributed Workforce ¡EMobile Technology ¡EOnline Learning ¡EProfessional Development ¡ESocial Skills Development ¡EStress Management
   
VD05-914 Handbook of Research on Advanced Concepts in Real-Time Image and Video Processing
  Anwar, Md. Imtiyaz/ 9781522528487/ Price:US$ 265.00
 
Book Cover Technological advancements have created novel applications for image and video processing. With these developments, real-world processing problems can be solved more easily. The Handbook of Research on Advanced Concepts in Real-Time Image and Video Processing is a pivotal reference source for the latest research findings on the design, realization, and deployment of image and video processing systems meant for real-time environments. Featuring extensive coverage on relevant areas such as feature detection, reconfigurable computing, and stream processing, this publication is an ideal resource for academics, researchers, graduate students, and technology developers. Topics Covered ¡EDefogging Algorithms ¡EEdge Detection ¡EFeature Detection ¡EImage Reconstruction ¡EObject Classification ¡EReconfigurable Computing ¡EStream Processing ¡EThermal Imagery
   
VD05-913 Graph Theoretic Approaches for Analyzing Large-Scale Social Networks
  Meghanathan, Natarajan/ 9781522528142/ Price:US$ 225.00
 
Book Cover Social network analysis has created novel opportunities within the field of data science. The complexity of these networks requires new techniques to optimize the extraction of useful information. Graph Theoretic Approaches for Analyzing Large-Scale Social Networks is a pivotal reference source for the latest academic research on emerging algorithms and methods for the analysis of social networks. Highlighting a range of pertinent topics such as influence maximization, probabilistic exploration, and distributed memory, this book is ideally designed for academics, graduate students, professionals, and practitioners actively involved in the field of data science. Topics Covered ¡EContent Specific Modeling ¡EDistributed Memory ¡EGraph Mining ¡EInfluence Maximization ¡EInformation Spread Control ¡ELink Prediction ¡EProbabilistic Exploration
   
VD05-911 Concept Parsing Algorithms (CPA) for Textual Analysis and Discovery: Emerging Research and Opportunities
  Shafrir, Uri/ 9781522521761/ Price:US$ 130.00
 
Book Cover Text analysis tools aid in extracting meaning from digital content. As digital text becomes more and more complex, new techniques are needed to understand conceptual structure. Concept Parsing Algorithms (CPA) for Textual Analysis and Discovery: Emerging Research and Opportunities provides an innovative perspective on the application of algorithmic tools to study unstructured digital content. Highlighting pertinent topics such as semantic tools, semiotic systems, and pattern detection, this book is ideally designed for researchers, academics, students, professionals, and practitioners interested in developing a better understanding of digital text analysis. Topics Covered ¡EInteractive Concept Discovery ¡ENatural Languages ¡EPattern Detection ¡ESemantic Tools ¡ESemiotic systems ¡ESub-Languages
   
VD05-910 Deep Learning Innovations and Their Convergence With Big Data
  Karthik, S./ 9781522530152/ Price:US$ 205.00
 
Book Cover The expansion of digital data has transformed various sectors of business such as healthcare, industrial manufacturing, and transportation. A new way of solving business problems has emerged through the use of machine learning techniques in conjunction with big data analytics. Deep Learning Innovations and Their Convergence With Big Data is a pivotal reference for the latest scholarly research on upcoming trends in data analytics and potential technologies that will facilitate insight in various domains of science, industry, business, and consumer applications. Featuring extensive coverage on a broad range of topics and perspectives such as deep neural network, domain adaptation modeling, and threat detection, this book is ideally designed for researchers, professionals, and students seeking current research on the latest trends in the field of deep learning techniques in big data analytics. Topics Covered ¡EDeep Auto-Encoders ¡EDeep Neural Network ¡EDomain Adaptation Modeling ¡EMultilayer Perceptron (MLP) ¡ENatural Language Processing (NLP) ¡ERestricted Boltzmann Machines (RBM) ¡EThreat Detection
   
VD05-909 Modern Technologies for Big Data Classification and Clustering
  Seetha, Hari/ 9781522528050/ Price:US$ 215.00
 
Book Cover Data has increased due to the growing use of web applications and communication devices. It is necessary to develop new techniques of managing data in order to ensure adequate usage. Modern Technologies for Big Data Classification and Clustering is an essential reference source for the latest scholarly research on handling large data sets with conventional data mining and provide information about the new technologies developed for the management of large data. Featuring coverage on a broad range of topics such as text and web data analytics, risk analysis, and opinion mining, this publication is ideally designed for professionals, researchers, and students seeking current research on various concepts of big data analytics. Topics Covered ¡EData visualization ¡EDistributed Computing Systems ¡EOpinion Mining ¡EPrivacy and security ¡ERisk analysis ¡ESocial Network Analysis ¡EText Data Analytics ¡EWeb Data Analytics
   
VD05-908 The Dark Web: Breakthroughs in Research and Practice
  Information Resources Management Association/ 9781522531630/ Price:US$ 395.00
 
Book Cover In the digital era, the Internet has evolved into a ubiquitous aspect of modern society. With the prominence of the Dark Web, understanding the components of the Internet and its available content has become increasingly imperative. The Dark Web: Breakthroughs in Research and Practice is an innovative reference source for the latest scholarly material on the capabilities, trends, and developments surrounding the secrecy of the Dark Web. Highlighting a broad range of perspectives on topics such as cyber crime, online behavior, and hacking, this book is an ideal resource for researchers, academics, graduate students, and professionals interested in the Dark Web. Topics Covered ¡ECyber Crime ¡EHacking ¡EMobile Technology ¡EOnline Activism ¡EOnline Behavior ¡ESecurity and Privacy ¡ETerrorism and Counterterrorism
   
VD05-907 Solutions for Cyber-Physical Systems Ubiquity
  Druml, Norbert/ 9781522528456/ Price:US$ 225.00
 
Book Cover Cyber-physical systems play a crucial role in connecting aspects of online life to physical life. By studying emerging trends in these systems, programming techniques can be optimized and strengthened to create a higher level of effectiveness. Solutions for Cyber-Physical Systems Ubiquity is a critical reference source that discusses the issues and challenges facing the implementation, usage, and challenges of cyber-physical systems. Highlighting relevant topics such as the Internet of Things, smart-card security, multi-core environments, and wireless sensor nodes, this scholarly publication is ideal for engineers, academicians, computer science students, and researchers that would like to stay abreast of current methodologies and trends involving cyber-physical system progression. Topics Covered ¡EAutomotive Domain ¡EInternet of things ¡EMulti-Core Environments ¡ESafety Concerns ¡ESecurity strategies ¡ESmart Card Security ¡ESystem Verification ¡EWireless Sensor Nodes
   
VD05-906 Game Theory: Breakthroughs in Research and Practice
  Information Resources Management Association/ 9781522525943/ Price:US$ 335.00
 
Book Cover Developments in the use of game theory have impacted multiple fields and created opportunities for new applications. With the ubiquity of these developments, there is an increase in the overall utilization of this approach. Game Theory: Breakthroughs in Research and Practice contains a compendium of the latest academic material on the usage, strategies, and applications for implementing game theory across a variety of industries and fields. Including innovative studies on economics, military strategy, and political science, this multi-volume book is an ideal source for professionals, practitioners, graduate students, academics, and researchers interested in the applications of game theory. Topics Covered ¡EAccounting ¡EEconomics ¡EMathematical Models ¡EMathematics ¡EMilitary Strategy ¡EPolitical science ¡ESocial Psychology
   
VD05-905 Optimizing Human-Computer Interaction With Emerging Technologies
  Cipolla-Ficarra, Francisco/ 9781522526162/ Price:US$ 345.00
 
Book Cover The ways in which humans communicate with one another is constantly evolving. Technology plays a large role in this evolution via new methods and avenues of social and business interaction. Optimizing Human-Computer Interaction With Emerging Technologies is a primary reference source featuring the latest scholarly perspectives on technological breakthroughs in user operation and the processes of communication in the digital era. Including a number of topics such as health information technology, multimedia, and social media, this publication is ideally designed for professionals, technology developers, and researchers seeking current research on technology¡¦s role in communication. Topics Covered ¡EBiomedical Test Instruments ¡EComputer Animation ¡ECyberbullying ¡EHealth information technology ¡EMobile Phones ¡EMultimedia ¡ESocial Media ¡EVideo games
   
VD05-904 Novel Design and the Applications of Smart-M3 Platform in the Internet of Things: Emerging Research and Opportunities
  Korzun, Dmitry/ 9781522526537/ Price:US$ 145.00
 
Book Cover The Internet of Things has become a major influence on the development of new technologies and innovations. When combined with smart services, the end-user experience can be significantly enhanced. Novel Design and the Applications of Smart-M3 Platform in the Internet of Things: Emerging Research and Opportunities provides an innovative outlook on the development of open source technology for the creation of smart spaces and services. Including a range of relevant topics such as interoperability, system architecture, and information processing, this book is an ideal reference source for academics, researchers, graduate students, and practitioners interested in the latest advancements in the Internet of Things. Topics Covered ¡ECollaborative Work Environments ¡EInformation Processing ¡EInteroperability ¡ESecurity and Privacy ¡ESocial networking ¡ESystem Architecture
   
VD05-903 Smart Technologies: Breakthroughs in Research and Practice
  Information Resources Management Association/ 9781522525899/ Price:US$ 345.00
 
Book Cover Ongoing advancements in modern technology have led to significant developments with smart technologies. With the numerous applications available, it becomes imperative to conduct research and make further progress in this field. Smart Technologies: Breakthroughs in Research and Practice provides comprehensive and interdisciplinary research on the most emerging areas of information science and technology. Including innovative studies on image and speech recognition, human-computer interface, and wireless technologies, this multi-volume book is an ideal source for researchers, academicians, practitioners, and students interested in advanced technological applications and developments. Topics Covered ¡EHuman-Computer Interface ¡EImage and Speech Recognition ¡EInternet of things ¡ENatural computing ¡EWearable computing ¡EWireless Networks ¡EWireless Technologies
   
VD05-63-4 Encyclopedia of Information Science and Technology, 10-Vols/Set.
  Khosrow-Pour, Mehdi/ 9781522522553/ Price:US$ 5695.00
 
Book Cover In recent years, our world has experienced a profound shift and progression in available computing and knowledge sharing innovations. These emerging advancements have developed at a rapid pace, disseminating into and affecting numerous aspects of contemporary society. This has created a pivotal need for an innovative compendium encompassing the latest trends, concepts, and issues surrounding this relevant discipline area. During the past 15 years, the Encyclopedia of Information Science and Technology has become recognized as one of the landmark sources of the latest knowledge and discoveries in this discipline. The Encyclopedia of Information Science and Technology, Fourth Edition is a 10-volume set which includes 705 original and previously unpublished research articles covering a full range of perspectives, applications, and techniques contributed by thousands of experts and researchers from around the globe. This authoritative encyclopedia is an all-encompassing, well-established reference source that is ideally designed to disseminate the most forward-thinking and diverse research findings. With critical perspectives on the impact of information science management and new technologies in modern settings, including but not limited to computer science, education, healthcare, government, engineering, business, and natural and physical sciences, it is a pivotal and relevant source of knowledge that will benefit every professional within the field of information science and technology and is an invaluable addition to every academic and corporate library.
   
SD05-481 Virtual Reality and Augmented Reality: Myths and Realities.
  Bruno Arnaldi/ 9781786301055/ Price:US$ 164.95
 
   
SD05-481 Cloud Computing and Virtualization
  Dac-Nhuong Le/ 9781119487906/ Price:US$ 194.95
 
   
SD05-481 Digital Organizations Manufacturing: Scripts, Performativity and Semiopolitics
  Maryse Carmes/ 9781848219076/ Price:US$ 144.95
 
   
SD05-481 The Digital Era 1: Big Data Stakes
  Jean-Pierre Chamoux/ 9781848217362/ Price:US$ 144.95
 
   
SD05-481 Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
  Nick Furneaux/ 9781119480587/ Price:US$ 59.95
 
   
SD05-480 Illustrated Handbook of Wireless Network Security
  / 9781680949773/ Price:US$ 180.00
 
Book Cover Presents mobile and wireless network security and privacy. A comprehensive source of information on basic concepts, major issues, design approaches, current trends, and the interaction between these components. Suitable for graduate-level students in computer science and electrical engineering.
   
SD05-479 Practical LTE Based Security Forces PMR Networks
  Arnaud Henry-Labordere/ 9788793609792/ Price:EUR 90.00
 
Book Cover Security forces PMR networks are moving from proprietary technologies for their "Mission Critical Push-To-Talk" basic service, and their data services which must provide large bandwidth real-time access, to the databases. LTE Based is adopted with backup access to public MNOs to complement their own radio coverage. Specific technologies such as multicasting of visio are required so the MCPTT works within a restricted bandwidth. The need to be able to change the main MNOs to provide resilient coverage requires specific choices of SIM cards, with OTAble security domains. Practical LTE Based Security Forces PMR Networks assumes that the reader has a basic knowledge of the 4G network architecture and services, and the book focusses on the specific features and choices required to fulfill the need of security forces PMR networks. These include tactical and centralized, including LTE based voice services VoLTE and IMS. It can be used as a reference or textbook, with many detailed call flows and traces being included.
   
SD05-479 SysML for Systems Engineering: A Model-Based Approach
  Jon Holt/ 9781785615542/ Price:¢G 145.00
 
   
SD05-479 Cyber Defence in Industry 4.0 Systems and Related Logistics and IT Infrastructures
  Konstantin Dimitrov/ 9781614998877/ Price:EUR 104.00
 
Book Cover Industry and government are increasingly reliant on an intelligent ¡V or ¡¥smart¡¦ ¡V and interconnected computer infrastructure, but the reality is that it is extremely difficult to provide full cyber defense and/or intrusion prevention for the smart networks that connect intelligent industrial and logistics modules, since the more intelligent the systems are, the more vulnerable they become. This book presents papers from the NATO Advanced Research Workshop (ARW) on Cyber Defence in Industry 4.0 Systems and Related Logistics and IT Infrastructures, held in Jyvaskyla, Finland, in October 2017. The main focus of the 11 papers included here is the creation and implementation of cyber systems and cyber platforms capable of providing enhanced cyber security and interoperability for smart IT infrastructure. Topics covered include: smart intrusion prevention; adaptive cyber defense; smart recovery of systems; and the smart monitoring, control and management of Industry 4.0 complexes and related logistics systems such as robotic equipment, logistics modules, units and technologic equipment, as well as their IT infrastructure.
   
SD05-479 Hybrid Algorithms, Techniques and Implementations of Fuzzy Logic.
  D.K. Cooper/ 9781682513132/ Price:US$ 150.00
 
Book Cover Fuzzy set theory has become a popular tool for control applications in recent years. New computing methods based on fuzzy logic can be used in the development of intelligent systems for decision making, identification, pattern recognition, optimization, and control. The focus of the work is extremely useful for many people involved in research and development including engineers, mathematicians, computer software developers and researchers, as well as social scientists, public policy analysts, business analysts, and jurists.
   
SD05-479 Current Trends in Computer Graphics.
  Jyh-tong Teng/ 9781682513415/ Price:US$ 155.00
 
Book Cover Graphics has always been associated with the display of information. Recently there has been great interest in problems of scientific visualization. Although researchers are now using supercomputers to solve formerly intractable problems in fields such as fluid flow and molecular biology, they need new display techniques to interpret the results of analyzing the vast quantities of multidimensional data generated. This book integrate the new algorithms, systems and toolkits for advancing graphics and visualization techniques. This comprehensive issue will provide useful insights for students and researchers in computer graphics.
   
SD05-479 Database Theory and Application.
  Rex Porbasas Flejoles/ 9781773612218/ Price:US$ 160.00
 
This book gives a full treatment of databases, managing the total syllabuses for both a starting course and a propelled course on databases. It offers an adjusted perspective of ideas, dialects/languages and models, with solid reference to current innovation what's more, to business database management systems (DBMSs). The book is intended to clarify the standards of information administration and for instruct how to ace two fundamental abilities: how to inquiry a database (and compose programming that includes database get to) and how to outline its blueprint structure.
   
SD05-479 Optimization and Decision Theory.
  Ivan Stanimirovic/ 9781773610689/ Price:US$ 180.00
 
Book Cover This book includes how to solve solutions of multi-objective problems considered through genetic algorithms. The problem of multi-objective optimization is described, as well as a primer on classic techniques of optimization and meta techniques, which include using heuristics to solve such problems. The book will be an important element of the library of graduate and postgraduate students in the fields of operations research, decision theory, optimization theory, linear algebra, interval analysis and fuzzy sets among others.
   
SD05-479 Advanced Analytic Methods in Science and Engineering.
  Ivan Stanimirovic/ 9781773610726/ Price:US$ 180.00
 
Book Cover This book provides the foundation for readers to understand the relationship of the discipline of applications in engineering. A number of applications, including integrated through the horizontality of the methods for solving complex application problems, are considered. In this book, several analytical methods are described through bibliographic research and information technology, in order to analyze the characteristics of each of them and update their status of validity in an increasingly technical world.
   
SD05-479 Digital Encryption.
  Nelson Bolivar/ 9781773610962/ Price:US$ 160.00
 
Book Cover This book is packed with methods and techniques to guide the reader into encryption, as how is cryptography present in their lives, at almost every aspect without even notice it. The authors focus on major advances to achieve secure transactions, secure communications and even to impact on the way economy works, emerging as a tool not only for secrecy but as a seed to a different approach to see the modern world. Some simple examples will guide the reader to the relevant ideas behind cryptography, the encryption of messages.
   
SD05-479 Computer Aided Design.
  3G Editorial Board/ 9781680948103/ Price:US$ 85.00
 
Book Cover A wide variety of design projects based on real situations and realistic numbers are presented. This edition provides an update on recent developments in computer-aided design and modeling of catalysts for a variety of important industrial applications. Covers the developments and trends in computer- aided design. It assesses the role of the computer in making design decisions and surveys the current CAD industry.
   
SD05-479 Grid Computing.
  3G Editorial Board/ 9781680948158/ Price:US$ 85.00
 
Book Cover Deliberate the Grid in depth, describing its immense potential and complexity from the perspective of the community of individuals working hard to transform the Grid computing vision into reality. Illustrates how the novel technologies of semantic web and workflow have been integrated into the grid and grid services. Enables the student not only to understand the concepts involved in grid computing but also to build their own grids for specific applications.
   
SD05-479 XML Based Applications.
  3G Editorial Board/ 9781680948172/ Price:US$ 85.00
 
Book Cover Gives a formal introduction to XML technology, starting with in-depth coverage of basic syntax and fundamental "pieces" of XML, including DTDs, Schemas, and Namespaces. This work focuses on two main aspects, the seamless integration of XML and persistency concepts into the object-oriented programming language Java. This book is for students and professionals working in the field of XML in various disciplines who want to improve their understanding of the XML data management technologies.
   
SD05-479 Theory, Practice and Techniques in Web Development.
  3G Editorial Board/ 9781680948233/ Price:US$ 75.00
 
Book Cover This book describes how to approach real-world projects and takes the reader through the design, planning, and building of several projects. A guide to the skills required for state-of-the-art web development, this book covers a variety of web development frameworks. Intended for the students delving into the world of web development, this text illustrates how to create dynamic, interactive web applications with ease.
   
SD05-479 Illustrated Handbook of Web Technology & Design.
  3G Editorial Board/ 9781680949704/ Price:US$ 180.00
 
Book Cover All the basics of web designs, from creating web pages to publishing them online, are explored indepth by each chapter of this book. Covers HTML, lists, links, tables, and frames, authoring programs, Web graphics applications, navigation systems, and information and interface design. Emphasis is also given on XML with examples including XML Transformations (XSTL) Apart from this, the book also dwells into the alternatives to XML such as the JSON.
   
SD05-479 3GE Collection on Computer Science: Systems & Software Engineering.
  3G Editorial Board/ 9781680959772/ Price:US$ 160.00
 
   
SD05-479 Illustrated Handbook of Cloud Computing.
  3G Editorial Board/ 9781680949728/ Price:US$ 180.00
 
Book Cover This book aims to capture the state-of-the-art in Cloud Computing technologies and applications. Illustrates a good foundation to the core concepts and principles of cloud computing. Beneficial to computer and system infrastructure designers, developers, business managers, entrepreneurs and investors within the cloud computing related industry.
   
SD05-478 Query Processing over Graph-structured Data on the Web
  Maribel Acosta Deibe/ 9781614999157/ Price:EUR 60.00
 
Book Cover In the last years, Linked Data initiatives have encouraged the publication of large graph-structured datasets using the Resource Description Framework (RDF). Due to the constant growth of RDF data on the web, more flexible data management infrastructures must be able to efficiently and effectively exploit the vast amount of knowledge accessible on the web. This book presents flexible query processing strategies over RDF graphs on the web using the SPARQL query language. In this work, we show how query engines can change plans on-the-fly with adaptive techniques to cope with unpredictable conditions and to reduce execution time. Furthermore, this work investigates the application of crowdsourcing in query processing, where engines are able to contact humans to enhance the quality of query answers. The theoretical and empirical results presented in this book indicate that flexible techniques allow for querying RDF data sources efficiently and effectively.
   
SD05-478 The Theory of Quantum Information
  John Watrous/ 9781107180567/ Price:¢G 59.99
 
   
SD05-478 Knowledge Driven Development: Bridging Waterfall and Agile Methodologies
  Manoj Kumar Lal/ 9781108475211/ Price:¢G 53.99
 
   
SD05-478 Beyond the Digital Divide: Contextualizing the Information Society
  Petr Lupac/ 9781787565487/ Price:¢G 60.00
 
   
SD05-477 GPU Pro 360 Guide to Mobile Devices
  Wolfgang Engel/ 9780815352815/ Price:¢G 38.99
 
   
SD05-476 Computer Organization: Basic Processor Structure
  James Gil de Lamadrid/ 9781498799515/ Price:¢G 63.99
 
   
SD05-476 Intelligent Environments 2018:Workshop Proceedings of the 14th International Conference on Intelligent Environments
  Ioannis Chatzigiannakis/ 9781614998730/ Price:EUR 113.00
 
Book Cover This book presents the workshop and tutorial proceedings of the 14th International Conference on Intelligent Environments (IE18), held in Rome, Italy, 25-28 June 2018. The conference focused on the development of advanced intelligent environments, and the 9 workshop and 9 tutorial proceedings included here emphasize the multidisciplinary and transversal aspects of IEs, as well as covering a number of cutting-edge topics, including: smart cities; environmental protection; smart sensing systems; personalized health and intelligent workplaces; ergonomics; healthcare; and education and learning.
   
SD05-476 High-Performance and Time-Predictable Embedded Computing
  Luis Miguel Pinho/ 9788793609693/ Price:EUR 90.00
 
Book Cover Nowadays, the prevalence of computing systems in our lives is so ubiquitous that we live in a cyber-physical world dominated by computer systems, from pacemakers to cars and airplanes. These systems demand for more computational performance to process large amounts of data from multiple data sources with guaranteed processing times. Actuating outside of the required timing bounds may cause the failure of the system, being vital for systems like planes, cars, business monitoring, e-trading, etc. High-Performance and Time-Predictable Embedded Computing presents recent advances in software architecture and tools to support such complex systems, enabling the design of embedded computing devices which are able to deliver high-performance whilst guaranteeing the application required timing bounds.
   
SD05-476 GDPR and Cyber Security for Business Information Systems
  Antoni Gobeo/ 9788793609136/ Price:EUR 60.00
 
Book Cover The General Data Protection Regulation is the latest, and one of the most stringent, regulations regarding Data Protection to be passed into law by the European Union. Fundamentally, it aims to protect the Rights and Freedoms of all the individuals included under its terms; ultimately the privacy and security of all our personal data. This requirement for protection extends globally, to all organisations, public and private, wherever personal data is held, processed, or transmitted concerning any EU citizen. Cyber Security is at the core of data protection and there is a heavy emphasis on the application of encryption and state of the art technology within the articles of the GDPR. This is considered to be a primary method in achieving compliance with the law. Understanding the overall use and scope of Cyber Security principles and tools allows for greater efficiency and more cost effective management of Information systems. GDPR and Cyber Security for Business Information Systems is designed to present specific and practical information on the key areas of compliance to the GDPR relevant to Business Information Systems in a global context.
   
SD05-476 Cybernetics in C++
  Avi Bhattacharyya/ 9788793609457/ Price:EUR 85.00
 
Book Cover Cybernetics in C++ combines a theoretical overview and practical approach in one book, which should prove to be a useful reference for computer scientists, software programmers, engineers and students in this and related field.
   
SD05-476 Internet of Things Security: Fundamentals, Techniques and Applications
  Shishir Kumar Shandilya/ 9788793609532/ Price:EUR 90.00
 
Book Cover Internet of Things (IoT) security deals with safeguarding the devices and communications of IoT systems, by implementing protective measures and avoiding procedures which can lead to intrusions and attacks. However, security was never the prime focus during the development of the IoT, hence vendors have sold IoT solutions without thorough preventive measures. The idea of incorporating networking appliances in IoT systems is relatively new, and hence IoT security has not always been considered in the product design. To improve security, an IoT device that needs to be directly accessible over the Internet should be segmented into its own network, and have general network access restricted. The network segment should be monitored to identify potential anomalous traffic, and action should be taken if a problem arises. This has generated an altogether new area of research, which seeks possible solutions for securing the devices, and communication amongst them.
   
SD05-476 The Web and Faith: Theological Analysis of Cyberspace Technologies
  Ayse Kok/ 9788793609570/ Price:EUR 70.00
 
Book Cover Computing technology is an indispensable feature of modern life. Our rapid-paced world seems more and more remote from the world narrated in sacred scriptures. However, despite its pervasiveness, there remains a dearth of theological reflection about computer technology and what it means to live as a faithful individual in a digitally - saturated society. The Web and Faith provides a brief theology of technology, rooted in the Islamic tradition and oriented around the grand themes of creation, redemption and new creation. The book combines a concise, accessible style with penetrating cultural and theological analysis. Building on the work of Marshall McLuhan and Neil Postman, and drawing from a wide range of enlightened Islamic thinkers, the book situates computer technology within the big picture of the story of creation. Technology is not neutral, but neither is there an exclusively 'faith-based' form of technological production and use. Instead, this book guides us to see the digital world as part of a larger creation, which is redeemable according to the law of faith. Responsibly used, technology can become an integral part of religious wisdom world-wide.
   
SD05-476 Fuzzing for Software Security Testing and Quality Assurance.
  Ari Takanen/ 9781608078509/ Price:¢G 119.00
 
   
SD05-474 Information Modelling and Knowledge Bases XXIX
  Virach Sornlertlamvanich/ 9781614998334/ Price:EUR 130.00
 
Book Cover This book presents the proceedings of the 27th International Conference on Information Modelling and Knowledge Bases (EJC2017), held in Krabi, Thailand, in June 2017. The EJC conferences originally began in 1982 as a co-operative initiative between Japan and Finland, but have since become a world-wide research forum bringing together researchers and practitioners in information modelling and knowledge bases for the exchange of scientific results and achievements. Of the 42 papers submitted, 29 were selected for publication here, and these cover a wide range of information-modelling topics, including the theory of concepts, semantic computing, data mining, context-based information retrieval, ontological technology, image databases, temporal and spatial databases, document data management, software engineering, cross-cultural computing, environmental analysis, social networks, and WWW information.
   
SD05-473 Self-organizing Multiagent Negotiations: Cooperation and Competition of Concurrently Acting Agents with Limited Knowledge
  Jan Ole Berndt/ 9781614998488/ Price:EUR 60.00
 
Book Cover This book provides an interdisciplinary foundation of coordination and connects sociological concepts with reinforcement learning techniques. It includes a comprehensive formalization of Self-Organizing Multiagent Negotiations as well as a formal analysis of their algorithmic properties. In addition, the author evaluates that method in a simulation and demonstrates its practical application to a real-world logistics coordination problem.
   
SD05-473 From Logic Programing to Human Reasoning: How to be Artifically Human
  Emmanuelle-Anna Dietz Saldanha/ 9781614998419/ Price:EUR 60.00
 
Book Cover Psychological experiments have shown that humans make assumptions, which are not necessarily valid, as they are influenced by their background knowledge and reason non-monotonically. These observations show that Classical Logic is not adequate for modeling human reasoning. Instead of assuming that humans do not reason logically at all, the author takes the view that humans do not necessarily reason in accordance with Classical Logic. The author investigates Weak Completion Semantics, a novel non-monotonic Logic Programming approach based on the three-valued ?ukasiewicz Logic, and applies it to the formalization of well-known human reasoning tasks. A surprising result is that the Weak Completion Semantics performs better than any other cognitive theory. Altogether, this publication shows one possible path for bridging the gap between Cognitive Science and Computational Logic, by building on previous formal approaches and modeling findings from psychological experiments within one cognitive theory.
   
SD05-472 Software Testing and User Experience.
  / 9781682514016/ Price:US$ 75.00
 
   
SD05-472 Data Center Management.
  / 9781682514023/ Price:US$ 75.00
 
   
SD05-472 Information Security.
  / 9781682513996/ Price:US$ 75.00
 
   
SD05-472 IT Service and Asset Management.
  / 9781682514009/ Price:US$ 75.00
 
   
SD05-472 Information Systems.
  / 9781682514047/ Price:US$ 75.00
 
   
SD05-472 Software Development.
  / 9781682514054/ Price:US$ 75.00
 
   
SD05-472 Computer and Network Technology.
  / 9781682514061/ Price:US$ 75.00
 
   
SD05-472 Database Systems.
  / 9781682514078/ Price:US$ 75.00
 
   
SD05-472 Principles of Internet Technologies.
  / 9781682514085/ Price:US$ 75.00
 
   
SD05-472 Information Technology Project Management.
  / 9781682514092/ Price:US$ 75.00
 
   
SD05-472 Information Technology Service Management.
  / 9781682514108/ Price:US$ 75.00
 
   
SD05-472 Advanced Databse Management Systems.
  / 9781682514122/ Price:US$ 75.00
 
   
SD05-472 Computer Services Management.
  / 9781682514139/ Price:US$ 75.00
 
   
SD05-472 Object Oriented Programming.
  / 9781682514153/ Price:US$ 75.00
 
   
SD05-472 Network Information Systems.
  / 9781682514177/ Price:US$ 75.00
 
   
SD05-472 Information Technology and the Environment.
  / 9781682514184/ Price:US$ 75.00
 
   
SD05-472 Web Engineering.
  / 9781682514191/ Price:US$ 75.00
 
   
SD05-472 Cyber Security.
  / 9781682514207/ Price:US$ 75.00
 
   
SD05-472 Illustrated Dictionary of Computer Hardware & Software.
  / 9781984600516/ Price:US$ 95.00
 
Book Cover This illustrated dictionary provides concise definitions and explanations of computer hardware & software related terms together with state-of-the-art scientific and practical terms, presented in an easy-to-use, A-Z order with pictures and figures as well as examples are given to clarify the terms. A perfect tool for understanding of computer related terms for Higher Secondary to Undergraduate students and improving their spelling and grammar.
   
SD05-472 Illustrated Dictionary of Information Technology.
  / 9781984600721/ Price:US$ 95.00
 
Book Cover This illustrated dictionary provides concise definitions and explanations of information technology terms together with state-of-the-art scientific and practical terms, presented in an easy-to-use, A-Z order with pictures and figures as well as examples are given to clarify the terms. It is a perfect tool for understanding of information technology terms for Higher Secondary to Undergraduate students and improving their spelling and grammar.
   
SD05-472 Illustrated Dictionary of Web Programming.
  / 9781984600912/ Price:US$ 95.00
 
Book Cover This illustrated dictionary provides concise definitions and explanations of web programming terms together with state-of-the-art scientific and practical terms, presented in an easy-to-use, A-Z order with pictures and figures as well as examples are given to clarify the terms. Packed with special full-page features on this subject and developed in close consultation with team of experts, this is the ultimate reference tool for Higher Secondary to Undergraduate students.
   
SD05-472 Illustrated Dictionary of Computer Science.
  / 9781984615909/ Price:US$ 95.00
 
Book Cover This illustrated dictionary provides concise definitions and explanations of computer science terms together with state-of-the-art scientific and practical terms, presented in an easy-to-use, A-Z order with pictures and figures as well as examples are given to clarify the terms. Packed with special full-page features on this subject and developed in close consultation with team of experts, this is the ultimate reference tool for Higher Secondary to Undergraduate students.
   
SD05-472 Social Media and Internet for IT Sector.
  / 9781680957082/ Price:US$ 75.00
 
   
SD05-472 Nature-Inspired Networking: Theory and Applications.
  Phan Cong Vinh/ 9781498761505/ Price:¢G 135.00
 
   
SD05-470 Theory of Computation.
  Gerard Prudhomme/ 9781773612706/ Price:US$ 155.00
 
Book Cover The book begins with automota theory and provides you with a fresh processed attractor-based way of measuring for Boolean repeated neural networks. Emphasizing the point that algorithmic remodeling is an effective strategy to getting a grasp on the mutual qualities of individual conduct, it gives information about a brand new way for pattern mining, antagonizing design patterns as well as a partnership between all of them. It depicts the utilization of a ¡§chromatin computer¡¨ to resolve an example of the Hamiltonian pathway issue describing a Boolean requirement for a signalling product.
   
SD05-470 Intelligent Information Management.
  Gerard Prudhomme/ 9781773612737/ Price:US$ 155.00
 
Book Cover An efficient and flexible framework to allow users to satisfy effectively their information needs is required. It provides cutting-edge research on the modeling; implementation; and financial, environmental, and organizational implications of this dynamic topic to researchers and practitioners containing 21 chapters written by prominent researchers and subject experts from all over the world.
   
SD05-470 Knowledge Management and Representation.
  Jovan Pehcevski/ 9781773610771/ Price:US$ 155.00
 
Book Cover This book provides the reader with a balanced presentation of key topics of knowledge management and representation, including methods and approaches for knowledge representation, knowledge management techniques, semantic web technology, and knowledge management applications in business and economy. A solid foundation in knowledge management using this text will help to improve the performance of business systems, pick strategic assets, and further raise the innovative capacity of the individuals in the businesses. This text offers up-to-date contributions that illustrate various approaches to this young and emerging technology area.
   
SD05-470 Object Oriented Programming with Java.
  Neha Kaul/ 9781773612089/ Price:US$ 160.00
 
Book Cover Packed with updated information, this book introduces the java language as its design is clean and easy to follow. Covering the fundamentals of Java and object oriented programming and it shows how well they work together. Several programming samples; tested against the latest Java version have been provided. This comprehensive text shows readers how to use such a versatile object-oriented programming language as a primary tool in many different aspects of programming work.
   
SD05-470 Fuzzy Logic: Controls and Concepts.
  Rex Porbasas Flejoles/ 9781773612287/ Price:US$ 155.00
 
Book Cover This book provides a broad-ranging, but detailed overview of the basics of Fuzzy Logic as the mathematical theory of vagueness as well as the theory of commonsense human reasoning, based on the use of natural language, the distinguishing feature of which is the vagueness of its semantics. A balanced approach between theoretical work and applications makes the book suitable for both researchers and engineers, as well as for graduate students.
   
SD05-470 Data Mining and Warehousing.
  Rex Porbasas Flejoles/ 9781773612607/ Price:US$ 155.00
 
Book Cover This book brings together a systematic introduction to the principles and disseminates new concepts and developments in the areas of data mining and data warehousing. This book is designed for practitioners and researchers in industry. This book is also suitable for upper-undergraduate and graduate-level students in computer science.
   
SD05-470 Theories and Applications in Computational and Numerical Simulations.
  Jaed K. Islam/ 9781682513408/ Price:US$ 160.00
 
Book Cover This book presents recent research intended to numerical simulations of physical and engineering systems. It offers both new theories and their applications, showing bridge between theoretical investigations and possibility to apply them by engineers of different branches of science. This work will be of interest for researchers, scientists, engineers and graduate students in many disciplines, who make use of mathematical modeling and computer simulation.
   
SD05-470 Interdisciplinary Topics in Applied Mathematics and Computational Science.
  Ivan Stanimirovic/ 9781773610702/ Price:US$ 180.00
 
Book Cover Focusing on interdisciplinary problems, this book covers a wide range of topics in mathematical modeling, computational science, and applied mathematics. This text is fit for researchers, graduate students, mathematicians, engineers, and anyone who would like to study and learn from the interdisciplinary research of applied and computational mathematics and the many areas of its application.
   
SD05-470 Advanced Database Theory and Applications.
  Yuan Chen/ 9781682513002/ Price:US$ 150.00
 
Book Cover This Book discusses recent progress in the area of database theory and application. It aims to present research relevant to database theory and application technology and the applications. Database theory is a relative newcomer to the field of computer science. Early data management systems were based on techniques from several classical areas of computer science, ranging from hardware and operating systems to data structures and programming languages. This book introduces you to the theory of relational databases, focusing on the application of that theory to the design of computer languages that properly embrace it.
   
SD05-470 Applications of Monte Carlo Techniques in Science and Engineering.
  Ali H. Hessami/ 9781682513439/ Price:US$ 155.00
 
Book Cover Monte Carlo techniques have proven very useful for providing optimal design, scheduling, and control of industrial systems, as well offering new approaches to solve classical optimization problems such as the traveling salesman problem, the quadratic assignment problem, and the satisfiability problem. The chapters of this book collectively illustrates how Monte Carlo techniques are used to solve difficult problems or analyze complex systems in various engineering and science domains.
   
SD05-470 Computer Networks and Communications.
  Abu Bakar/ 9781682513392/ Price:US$ 145.00
 
Book Cover Computers are critical for communication and are the centerpiece of information technology. Computer networks provide communication possibilities faster than other facilities. Because of these optimal information and communication possibilities, computer networks may increase the organizational learning rate, which many authors declare as the only fundamental advantage in competition. This book presents the original research studies in all areas of computer networks and communications.It aims to promote the integration of computer networks.
   
SD05-470 Illustrated Handbook of Operating Systems.
  3G Editorial Board/ 9781680949667/ Price:US$ 180.00
 
Book Cover This book is organized around basic concepts in the design of an operating system with plenty of actual code and cases. The main focus of this book is to provide an understanding of operating system fundamentals: what types of services they provide, how various applications interface with them, and the restrictions they have on those applications.
   
SD05-470 Illustrated Handbook of Graph Theory.
  3G Editorial Board/ 9781680949681/ Price:US$ 180.00
 
Book Cover Provides a thorough understanding of the structure of graphs and the techniques used to analyze problems in graph theory. Handbook of graph theory presents only those topics and material that are accessible to the true beginner in graph theory - making the subject accessible to those in mathematics, computer science, engineering, and management.
   
SD05-470 Illustrated Handbook of Multimedia Technologies.
  3G Editorial Board/ 9781680949698/ Price:US$ 180.00
 
Offers an in-depth explanation of multimedia technologies within their many specific application areas as well as presenting developing trends for the future. This book will explore the characteristics of both community and mentoring within the framework of a technology-supported virtual community.
   
SD05-470 Illustrated Handbook of Data Communication Networks.
  3G Editorial Board/ 9781680949735/ Price:US$ 180.00
 
Book Cover This text covers information for one or more courses spanning digital communication systems, computer communication and networks, and data communications. Offers coverage of the basic principles of data communications and covers such material as phase and timing recovery and echo cancellation. Intended primarily for the students of computer science and engineering, electronics and communication engineering, master of computer applications.
   
SD05-470 3GE Collection on Computer Science: Data Mining & Warehousing.
  3G Editorial Board/ 9781680959758/ Price:US$ 160.00
 
   
SD05-470 3GE Collection on Computer Science: Networking.
  3G Editorial Board/ 9781680959765/ Price:US$ 160.00
 
   
SD05-470 3GE Collection on Computer Science: Information Security & Privacy.
  3G Editorial Board/ 9781680959789/ Price:US$ 160.00
 
   
SD05-470 3GE Collection on Computer Science: Computer Simulation.
  3G Editorial Board/ 9781680959796/ Price:US$ 160.00
 
   
SD05-470 3GE Collection on Computer Science: Advanced Data Structures.
  3G Editorial Board/ 9781680959802/ Price:US$ 160.00
 
   
SD05-470 3GE Collection on Computer Science: Probability and Statistics for Computer Science.
  3G Editorial Board/ 9781680959819/ Price:US$ 160.00
 
   
SD05-470 C++ Technologies.
  Gerard Prudhomme/ 9781773612690/ Price:US$ 155.00
 
Book Cover This book features an enhanced, layflat binding, which allows the book to stay open more easily when placed on a flat surface; this book provides an outline of Standard Template Library ( STL) and describes the C++ collection marathon, that has already been made to calculate a number of structural attributes. It employs a structure that allows for quick contract growth in biomolecular and also structural modeling jobs with a personalized scoring functionality to calculate a quantitative capability rating for a vocabulary as well.
   
SD05-470 Object-oriented modelling for Scientific Computing.
  Euan Russano/ 9781773612812/ Price:US$ 165.00
 
   
SD05-470 Illustrated Handbook of Computer Graphics and Visualisation.
  3G Editorial Board/ 9781680949711/ Price:US$ 180.00
 
Book Cover This book is designed for the student who wishes to learn not only the concepts of computer graphics but also its meaningful implementation. This book is appropriate for courses in information visualization, human-computer interaction, interaction design, and computer graphics.
   
SD05-470 Theory, Practice and Techniques in Graphics and Multimedia.
  3G Editorial Board/ 9781680948240/ Price:US$ 75.00
 
Book Cover Explores the parameters of the application, problems and solutions related to digital disciplines. This book equips the readers with all the basic and advanced concepts of computer graphics and multimedia. Offers solutions to the challenges of storage and manipulation of a variety of media types providing data placement techniques, scheduling methods, caching techniques and emerging characteristics of multimedia information.
   
SD05-470 Theory, Practice and Techniques in HTML and CSS.
  3G Editorial Board/ 9781680948257/ Price:US$ 75.00
 
Book Cover This book will teach you how to build hand-crafted web pages the Web Standardistas way: using well-structured XHTML for content and CSS for presentation. A guide to Web design basics describes how the Web and Web pages work, building HTML pages, using CSS for presentation, using JavaScript in Web design, and creating Web graphics.
   
SD05-470 Theory, Practice and Techniques in Database Management Systems.
  3G Editorial Board/ 9781680948264/ Price:US$ 75.00
 
Book Cover This book provides simple and comprehensive explanation of fundamentals of database management systems. The book serves as essential reading material for students and computer professionals who are in the area of multimedia databases.
   
SD05-470 Theory, Practice and Techniques in Java Programming.
  3G Editorial Board/ 9781680948271/ Price:US$ 75.00
 
Book Cover This text takes the project-oriented approach to learning introductory Java programming skills. Provides a comprehensive introduction to the algorithms and techniques associated with machine vision systems, featuring a wide range of real-world image processing and analysis functions. A useful resource to learn and apply functional programming techniques in Java.
   
SD05-470 Theory, Practice and Techniques in Programming with C++.
  3G Editorial Board/ 9781680948288/ Price:US$ 75.00
 
Book Cover This book demonstrates the potential of C++ to produce highly efficient programs. Highlights general concepts, systematic ways of using C++ features, advanced techniques, and particular styles that will help you write object-oriented programs. Discusses basic errors present in almost all C++ code, as well as complex mistakes in syntax, preprocessing, conversions, initialization, memory and resource management, polymorphism, class design, and hierarchy design.
   
SD05-470 Theory, Practice and Techniques in Computer Science.
  3G Editorial Board/ 9781680948295/ Price:US$ 75.00
 
Book Cover An inspiring introduction to the field and its core principles, considering computer science as a science of symbol processing. Providing comprehensive coverage of computer applications in industry, school, work, education, and the home, this book is the ideal tool for students, professionals, and anyone who uses computers. Describes the aspects of mathematical logic that are closely related to each other, including classical logic, constructive logic, and modal logic.
   
SD05-470 Mobile Computing.
  3G Editorial Board/ 9781680948189/ Price:US$ 85.00
 
Book Cover Concepts have been identified and several seminal experimental systems developed. This book includes a set of contributed papers that describe these concepts and sys tems. Covers all the communication technologies starting from First Generation to Third Generation cellular technology, wireless LAN(WiFi), and wireless broadband(WiMax). Presents current trends in mobile computing and their commercial applications.
   
SD05-470 Computer Hardware & Software Tools.
  3G Editorial Board/ 9781680948196/ Price:US$ 85.00
 
Offers concepts of computer networking and hardware by offering fundamental concepts. Enable readers to use the principles set forth in the book to design and implement their own integrated solutions. Provides a complete survey of the computer technologies necessary for achieving basic technology literacy and sets you on the path to career success.
   
SD05-470 Theory, Practice and Techniques in Computer Networking Management.
  3G Editorial Board/ 9781680948202/ Price:US$ 75.00
 
Book Cover This book is an accessible, easy-to-understand introduction to the language of the Internet, featuring clear, concise explanations. This book has a comprehensive coverage with expanded coverage of the topics of utmost importance to networking professionals and students, including P2P, wireless, network security, and network applications. Covers network management technology; network management functional requirements; integrated network management systems; distributed network management; rinding fault; and knowledge technologies for evolving networks.
   
SD05-470 Theory, Practice and Techniques in Object Oriented Programming.
  3G Editorial Board/ 9781680948219/ Price:US$ 75.00
 
Book Cover Familiarize to the changing technology, more and more students are finding the need for a simple introductory text covering object-oriented concepts, programming, analysis and design. This book introduces the Java Programming Language ad explains how to create Java applications and applets. Provides a framework for the integrated design of object-oriented programs with algebraic specification techniques.
   
SD05-470 Theory, Practice and Techniques in Visual Programming.
  3G Editorial Board/ 9781680948226/ Price:US$ 75.00
 
Book Cover Shows how to use graphics to program computers, train programmers, enhance human-computer communications and improve productivity. An introduction to the ideas of computer programming within the context of the visual arts that also serves as a text for Processing, an open-source programming language designed for creating images, animation, and interactivity.
   
SD05-470 Free and Open Source Software.
  3G Editorial Board/ 9781680948165/ Price:US$ 85.00
 
Book Cover Covers the status of the open source revolution and its effect on industry and society. Presents a multitude of approaches to explore free and open source software development processes, attributes of their products, and the workings within the development communities. Reviews open and free software used in e-learning, examines the pedagogy behind FOSS and how it is applied to e-learning.
   
SD05-470 Computer Organization.
  3G Editorial Board/ 9781680948110/ Price:US$ 85.00
 
Book Cover The second edition of this book covers the key topics in computer organization and embedded systems. An introduction to computer systems; the representation of information; unsigned binary representations; signed integer representations; signed integer representations; character data type; floating-point representations and other data. Presents comprehensive coverage of the field of computer organization and architecture.
   
SD05-470 PC Assembling & Troubleshooting.
  3G Editorial Board/ 9781680948127/ Price:US$ 85.00
 
Book Cover This edition examines the basic components of computer hardware systems, as well as how to upgrade and troubleshoot computers. Provides an introduction to PC architecture and basic troubleshooting skills. Also, an understanding of the technical jargon is conveyed by this book. Special coverage of laptops, printers and scanners makes this book highly modernized.
   
SD05-470 Animation (3D Digital): Advanced. (With DVD)
  3G Editorial Board/ 9781680948059/ Price:US$ 160.00
 
Book Cover This edition brings revised and updated practical and visual skills with knowledge of specialized materials and techniques. This edition will introduce the knowledge and skills for those studying and/or working in animation industry. This book contains comprehensive information that a person must achieve to produce 3D digital animation, multimedia and special effects for film and television/video in both production and post-production stages.
   
SD05-470 Animation: Intermediate. (With DVD)
  3G Editorial Board/ 9781680948066/ Price:US$ 160.00
 
Book Cover This unit covers the knowledge, skills and attitudes required to gather, interpret and convey information in response to workplace requirements. This edition covers restructured competencies that a person must achieve to produce cleaned-up and in-between engineering drawings in both production and post-production stages. This edition will be of valuable tool for readers making career as clean-up artist, in-between artist/in-betweener, clean-up art checker, and in-between checker.
   
SD05-470 Computer Systems Servicing: Intermediate. (With DVD)
  3G Editorial Board/ 9781680948073/ Price:US$ 160.00
 
Book Cover This book is designed to develop knowledge, skills, and attitudes of a Computer Service Technician in accordance with industry standards. It covers basic and common competencies such as installing, maintaining, configuring, and diagnosing computer systems and networks. The content is restructured and revised in this edition.
   
SD05-470 Programming: Expert. (With DVD)
  3G Editorial Board/ 9781680948080/ Price:US$ 105.00
 
Book Cover This updated edition combines many different practical and visual skills with knowledge of specialized materials and techniques. It consists of competencies that are required for developing or writing program codes using a personal computer or workstation as part of a systems development team. This book will be of interest to programmer, program coder, programming support staff, and programmer-analyst.
   
SD05-470 Visual Graphic Design: Advanced. (With DVD)
  3G Editorial Board/ 9781680948097/ Price:US$ 160.00
 
Book Cover This edition will introduce the knowledge and skills for those studying and/or working in graphics industry. It contains comprehensive information that a person must achieve to design and develop visual graphic designs for print media; electronic media; product packaging; and booth and product/window display.
   
SD05-463 Android App Development. (Includes Navigate 2 Advantage Access)
  Herve Franceschi/ 9781284092127/ Price:US$ 124.95
 
Book Cover Using innovative, engaging methods, Android App Development cultivates student knowledge of app development through a progressive, building block approach. Each chapter includes a classroom-friendly, meaningful app that illustrates the concepts covered at the chapter level. Model View Controller architecture is used throughout the book to promote good software engineering practice. Students will be engaged by essential as well as specialized topics such as XML resources, event-driven programming, animation, sounds, making a game, voice recognition, and more.
   
SD05-457 Object-Oriented Data Structures Using Java. (Includes Navigate 2 Advantage Access)
  Nell Dale/ 9781284089097/ Price:NT$ 1750.00
 
Book Cover The updated and revised Object-Oriented Data Structures Using Java, Fourth Edition is an essential resource for students learning data structures using the Java programming language. It presents traditional data structures and object-oriented topics with an emphasis on problem-solving, theory, and software engineering principles. Beginning early and continuing throughout the text, it introduces and expands upon the use of many Java features including packages, interfaces, abstract classes, inheritance, and exceptions. Numerous case studies provide readers with real-world examples and demonstrate possible solutions to interesting problems. The lucid writing style guides readers through the rigor of standard data structures and presents essential concepts from logical, applications, and implementation levels.
   
SD05-457 C++ Plus Data Structures. (Includes Navigate 2 Advantage Access)
  Nell Dale/ 9781284089189/ Price:NT$ 1680.00
 
Book Cover C++ Plus Data Structures, Sixth Edition explores the specifications, applications, and implementations of abstract data types with unmatched accessibility. Topics such as modularization, data encapsulation, information hiding, object-oriented decomposition, algorithm analysis, life-cycle software verification models, and data abstraction are carefully presented to foster solid software engineering techniques. In addition to the real-world exercises and case studies that define Nell Dale¡¦s teaching philosophy, the Sixth Edition provides a clear emphasis on object-oriented design and an early introduction of object-oriented concepts.
   
SD05-457 Fundamentals of Information Systems Security.
  Kim, David/ 9781284116458/ Price:NT$ 1580.00
 
Book Cover Fundamentals of Information Systems Security, Third Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transition to a digital world. Part 2 presents a high level overview of the Security+ Exam and provides students with information as they move toward this certification. The book closes with information on information security standards, education, professional certifications, and compliance laws. With its practical, conversational writing style and step-by-step examples, this text is a must-have resource for those entering the world of information systems security.
   
SD05-457 Web Programming and Internet Technologies: An E-Commerce Approach. (Includes Navigate 2 Advantage Access)
  Porter Scobey/ 9781284070682/ Price:US$ 135.95
 
Book Cover Web Programming and Internet Technologies: An E-Commerce Approach is written for the one-term web programming course for first or second year students. It features a hands-on learning approach where students are provided with information on a need to know basis. The text provides a running case study throughout, and students then take the topics taught in each chapter and apply them to the development of an e-commerce website. At the end of the text students will have a fully functional e-commerce site!
   
Parallel Computing is Everywhere
  S. Bassini/ 9781614998426/ Price:EUR 135.00
 
Book Cover This book presents a selection of papers presented at the conference: Parallel Computing (ParCo2017), held in Bologna, Italy, on 12 to 15 September 2017. The conference included contributions about alternative approaches to achieving High Performance Computing (HPC) to potentially surpass exa- and zetascale performances, as well as papers on the application of quantum computers and FPGA processors. These developments are aimed at making available systems better capable of solving intensive computational scientific/engineering problems such as climate models, security applications and classic NP-problems, some of which cannot currently be managed by even the most powerful supercomputers available. New areas of application, such as robotics, AI and learning systems, data science, the Internet of Things (IoT), and in-car systems and autonomous vehicles were also covered. As always, ParCo2017 attracted a large number of notable contributions covering present and future developments in parallel computing, and the book will be of interest to all those working in the field.
   
Data Intensive Computing Applications for Big Data
  M. Mittal/ 9781614998136/ Price:EUR 112.00
 
Book Cover The book ¡¥Data Intensive Computing Applications for Big Data¡¦ discusses the technical concepts of big data, data intensive computing through machine learning, soft computing and parallel computing paradigms. It brings together researchers to report their latest results or progress in the development of the above mentioned areas. Since there are few books on this specific subject, the editors aim to provide a common platform for researchers working in this area to exhibit their novel findings. The book is intended as a reference work for advanced undergraduates and graduate students, as well as multidisciplinary, interdisciplinary and transdisciplinary research workers and scientists on the subjects of big data and cloud/parallel and distributed computing, and explains didactically many of the core concepts of these approaches for practical applications. It is organized into 24 chapters providing a comprehensive overview of big data analysis using parallel computing and addresses the complete data science workflow in the cloud, as well as dealing with privacy issues and the challenges faced in a data-intensive cloud computing environment. The book explores both fundamental and high-level concepts, and will serve as a manual for those in the industry, while also helping beginners to understand the basic and advanced aspects of big data and cloud computing.
   
Big Data and HPC: Ecosystem and Convergence
  / 9781614998815/ Price:EUR 90.00
 
Book Cover Due to the increasing need to solve complex problems, high-performance computing (HPC) is now one of the most fundamental infrastructures for scientific development in all disciplines, and it has progressed massively in recent years as a result. HPC facilitates the processing of big data, but the tremendous research challenges faced in recent years include: the scalability of computing performance for high velocity, high variety and high volume big data; deep learning with massive-scale datasets; big data programming paradigms on multi-core; GPU and hybrid distributed environments; and unstructured data processing with high-performance computing. This book presents 19 selected papers from the TopHPC2017 congress on Advances in High-Performance Computing and Big Data Analytics in the Exascale era, held in Tehran, Iran, in April 2017. The book is divided into 3 sections: State of the Art and Future Scenarios, Big Data Challenges, and HPC Challenges, and will be of interest to all those whose work involves the processing of Big Data and the use of HPC.
   
Secure and Smart Internet of Things (IoT): Using Blockchain and AI
  Ahmed Banafa/ 9788770220309/ Price:EUR 90.00
 
Book Cover By 2020, experts forecast that up to 28 billion devices will be connected to the Internet with only one third of them being computers, smartphones and tablets. The remaining two thirds will be other "devices" - sensors, terminals, household appliances, thermostats, televisions, automobiles, production machinery, urban infrastructure and many other "things" - which traditionally have not been Internet enabled. This "Internet of Things" (IoT) represents a remarkable transformation of the way in which our world will soon interact. Much like the World Wide Web connected computers to networks, and the next evolution connected people to the Internet and other people, IoT looks poised to interconnect devices, people, environments, virtual objects and machines in ways that only science fiction writers could have imagined. In a nutshell the Internet of Things (IoT) is the convergence of connecting people, things, data and processes is transforming our life, business and everything in between. Secure and Smart Internet of Things explores many aspects of the Internet of Things and explain many of the completed principles of IoT and the new advances in IoT including using Fog Computing , AI and Blockchain technology.
   
Cyber Security Innovation for the Digital Economy: A Case Study of the Russian Federation
  Sergei Petrenko/ 9788770220224/ Price:EUR 90.00
 
Book Cover Cyber Security Innovation for the Digital Economy considers possible solutions to the relatively new scientific-technical problem of developing innovative solutions in the field of cyber security for the Digital Economy. The solutions proposed are based on the results of exploratory studies conducted by the author in the areas of Big Data acquisition, cognitive information technologies (cogno-technologies), new methods of analytical verification of digital ecosystems on the basis of similarity invariants and dimensions, and "computational cognitivism," involving a number of existing models and methods. In practice, this successfully allowed the creation of new entities - the required safe and trusted digital ecosystems - on the basis of the development of digital and cyber security technologies, and the resulting changes in their behavioral preferences. Here, the ecosystem is understood as a certain system of organizations, created around a certain Technological Platform that use its services to make the best offers to customers and access to them to meet the ultimate needs of clients - legal entities and individuals. The basis of such ecosystems is a certain technological platform, created on advanced innovative developments, including the open interfaces and code, machine learning, cloud technologies, Big Data collection and processing, artificial intelligence technologies, etc. The mentioned Technological Platform allows creating the best offer for the client both from own goods and services and from the offers of external service providers in real time.
   
Dependable IoT for Human and Industry: Modeling, Architecting, Implementation
  Vyacheslav Kharchenko/ 9788770220149/ Price:EUR 95.00
 
Book Cover There are numerous publications which introduce and discuss the Internet of Things (IoT). In the midst of these, this work has several unique characteristics which should change the reader's perspective, and in particular, provide a more profound understanding of the impact of the IoT on society. Dependable IoT for Human and Industry covers the main aspects of Internet of Things and IoT based systems such as global issues of applications, modeling, development and implementation of dependable IoT for different human and industry domains.
   
Engineering Agile Big-Data Systems
  Kevin Feeney/ 9788770220163/ Price:EUR 95.00
 
Book Cover To be effective, data-intensive systems require extensive ongoing customisation to reflect changing user requirements, organisational policies, and the structure and interpretation of the data they hold. Manual customisation is expensive, time-consuming, and error-prone. In large complex systems, the value of the data can be such that exhaustive testing is necessary before any new feature can be added to the existing design. In most cases, the precise details of requirements, policies and data will change during the lifetime of the system, forcing a choice between expensive modification and continued operation with an inefficient design. Engineering Agile Big-Data Systems outlines an approach to dealing with these problems in software and data engineering, describing a methodology for aligning these processes throughout product lifecycles. It discusses tools which can be used to achieve these goals, and, in a number of case studies, shows how the tools and methodology have been used to improve a variety of academic and business systems.
   
Advancing IoT Platforms Interoperability
  Ovidiu Vermesan/ 9788770220064/ Price:EUR 45.00
 
Book Cover The IoT European Platforms Initiative (IoT-EPI) projects are addressing the topic of Internet of Things and Platforms for Connected Smart Objects and aim to deliver an IoT extended into a web of platforms for connected devices and objects that supports smart environments, businesses, services and persons with dynamic and adaptive configuration capabilities. The specific areas of focus of the research activities are architectures and semantic interoperability, which reliably cover multiple use cases. The goal is to deliver dynamically-configured infrastructure and integration platforms for connected smart objects covering multiple technologies and multiple intelligent artefacts. The IoT-EPI ecosystem has been created with the objective of increasing the impact of the IoT-related European research and innovation, including seven European promising projects on IoT platforms: AGILE, BIG IoT, INTER-IoT, VICINITY, SymbIoTe, bIoTope, and TagItSmart. This white paper provides an insight regarding interoperability in the IoT platforms and ecosystems created and used by IoT-EPI. The scope of this document covers the interoperability aspects, challenges and approaches that cope with interoperability in the current existing IoT platforms and presents some insights regarding the future of interoperability in this context. It presents possible solutions, and a possible IoT interoperability platform architecture.
   
Foundations of Probabilistic Logic Programming: Languages, Semantics, Inference and Learning
  Fabrizio Riguzzi/ 9788770220187/ Price:EUR 95.00
 
Book Cover Probabilistic Logic Programming extends Logic Programming by enabling the representation of uncertain information. Probabilistic Logic Programming is at the intersection of two wider research fields: the integration of logic and probability and Probabilistic Programming. Logic enables the representation of complex relations among entities while probability theory is useful for model uncertainty over attributes and relations. Combining the two is a very active field of study. Probabilistic Programming extends programming languages with probabilistic primitives that can be used to write complex probabilistic models. Algorithms for the inference and learning tasks are then provided automatically by the system. Probabilistic Logic programming is at the same time a logic language, with its knowledge representation capabilities, and a Turing complete language, with its computation capabilities, thus providing the best of both worlds.
   
Countering Terrorism and Urban Warfare: Training and Informative Operations
  / 9781614998839/ Price:EUR 104.00
 
Book Cover This book presents papers delivered at the NATO Advanced Training Course (ATC) ¡¥Countering Terrorism and Urban Warfare¡¦, held in Herzliya, Israel, in November 2017. Course participants from both the military and the civilian sectors shared theoretical and practical best practice in the countering of terrorism in an urban warfare context, and the 10 papers included here cover topics such as protecting the civilian population in urban combat areas; terrorists logic behind the choice of target; what Europe can learn from its southern neighbors; countering hybrid threats in megacities and densely populated urban areas; and where will ISIS regroup? The book will be of interest to all those concerned with the countering of terrorism, particularly in urban areas.
   
VSD05-002 The Routledge Companion to Global Internet Histories
  Goggin, Gerard/ 9781138812161/ Price:¢G 225.00
 
Book Cover The Routledge Companion to Global Internet Histories brings together research on the diverse Internet histories that have evolved in different regions, language cultures and social contexts across the globe. While the Internet is now in its fifth decade, the understanding and formulation of its histories outside of an anglophone framework is still very much in its infancy. From Tunisia to Taiwan, this volume emphasizes the importance of understanding and formulating Internet histories outside of the anglophone case studies and theoretical paradigms that have thus far dominated academic scholarship on Internet history. Interdisciplinary in scope, the collection offers a variety of historical lenses on the development of the Internet: as a new communication technology seen in the context of older technologies; as a new form of sociality read alongside previous technologically mediated means of relating; and as a new media "vehicle" for the communication of content.
   
VD05-935 Microcontroller System Design Using PIC18F Processors
  Haddad, Nicolas K./ 9781683180005/ Price:US$ 195.00
 
Book Cover Recent advancements in technology have led to significant improvements in designing various electronic systems. This provides a wide range of different components that can be utilized across numerous applications. Microcontroller System Design Using PIC18F Processors provides comprehensive discussions on strategies and techniques for optimizing microprocessor-based electronic system development and examines methods for acquiring improved software and hardware skills. Highlighting innovative concepts across a range of topics, such as serial peripheral interfaces, addressing modes, and asynchronous communications, this book is an ideal information source for professionals, researchers, academics, engineers, practitioners, and programmers. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAddressing Modes ¡EAnalog-to-Digital Conversion ¡EAsynchronous Serial Communications ¡EHarvard Architecture ¡EInput/Output Ports ¡EMacros and Subroutines ¡ESerial Peripheral Interface ¡EVon Neumann Architecture
   
VD05-902 Large-Scale Fuzzy Interconnected Control Systems Design and Analysis
  Zhong, Zhixiong/ 9781522523857/ Price:US$ 175.00
 
Book Cover Large-scale interconnected systems have become more prominent in society due to a higher demand for sustainable development. As such, it is imperative to create effective methods and techniques to control such systems. Large-Scale Fuzzy Interconnected Control Systems Design and Analysis is an innovative source of academic research that discusses the latest approaches to control large-scale systems, and the challenges that occur when implementing them. Highlighting a critical range of topics such as system stability, system stabilization, and fuzzy rules, this book is an ideal publication for engineers, researchers, academics, graduate students, and practitioners interested in the design of large-scale interconnected systems. Topics Covered ¡EContinuous-Time Systems ¡EDiscrete-Time Systems ¡EEvent-Triggered Control ¡EFuzzy Rules ¡ESliding-Mode Control ¡ESystem Stability ¡ESystem Stabilization
   
VD05-901 Handbook of Research on Applied Cybernetics and Systems Science
  Saha, Snehanshu/ 9781522524984/ Price:US$ 245.00
 
Book Cover In the digital era, novel applications and techniques in the realm of computer science are increasing constantly. These innovations have led to new techniques and developments in the field of cybernetics. The Handbook of Research on Applied Cybernetics and Systems Science is an authoritative reference publication for the latest scholarly information on complex concepts of more adaptive and self-regulating systems. Featuring exhaustive coverage on a variety of topics such as infectious disease modeling, clinical imaging, and computational modeling, this publication is an ideal source for researchers and students in the field of computer science seeking emerging trends in computer science and computational mathematics. Topics Covered ¡EAltmetrics ¡EApplied Differential Equations ¡EClinical Imaging ¡ECognition ¡EComputational Modeling ¡EData Analytic Communication Networks ¡EEcological Systems ¡EInfectious Disease Modeling ¡EMachine Learning ¡EScientometrics ¡ESignal Processing
   
VD05-899 Handbook of Research on Machine Learning Innovations and Trends, 2-Vols/Set.
  Hassanien, Aboul Ella/ 9781522522294/ Price:US$ 465.00
 
Book Cover Continuous improvements in technological applications have allowed more opportunities to develop automated systems. This not only leads to higher success in smart data analysis, but it increases the overall probability of technological progression. The Handbook of Research on Machine Learning Innovations and Trends is a key resource on the latest advances and research regarding the vast range of advanced systems and applications involved in machine intelligence. Highlighting multidisciplinary studies on decision theory, intelligent search, and multi-agent systems, this publication is an ideal reference source for professionals and researchers working in the field of machine learning and its applications. Topics Covered ¡EChaos Theory ¡EChaotic Systems ¡EDecision Theory ¡EFuzzy Logic ¡EGranular Computing ¡EIntelligent Search ¡EMulti-Agent Systems ¡EWeb Mining
   
VD05-897 Probabilistic Nodes Combination (PNC) for Object Modeling and Contour Reconstruction
  Dariusz Jacek Jakobczak/ 9781522525318/ Price:US$ 175.00
 
Book Cover Shape representation and reconstruction is a vital aspect of modern computer science applications. New modeling methods and techniques can significantly optimize these processes. Probabilistic Nodes Combination (PNC) for Object Modeling and Contour Reconstruction is an innovative reference source that examines the latest trends in 2D curve interpolation and modeling methodologies. Focusing on a range of pertinent topics such as 3D surface modeling, high-dimensional data, and numerical methods, this is an ideal publication for programmers, researchers, students, and practitioners interested in emerging methods in object modeling and contour reconstruction. Topics Covered ¡E3D Surface Modeling ¡E4D Object Modeling ¡EArtificial Intelligence ¡EHigh-Dimensional Data ¡EImage Processing ¡EMulti-Dimensional Data Modeling ¡ENumerical Methods
   
VD05-896 Sustainable ICT Adoption and Integration for Socio-Economic Development
  Ayo, Charles K./ 9781522525653/ Price:US$ 180.00
 
Book Cover It is becoming known that information and communications technology has the potential to increase development in the areas of health, education, governance, and business in impoverished countries. Thus, new levels of integration and applications must be studied in order to expand this research area further. Sustainable ICT Adoption and Integration for Socio-Economic Development is a pivotal publication featuring the latest scholarly research on current updates regarding adoption, integration, and application of communication devices and applications across the various aspects of human progression. Highlighting a number of topics and perspectives such as inclusive education, e-governance, and e-democracy, this book is ideally designed for researchers, government officials, and academicians seeking current information on the application of new technological tools for both social and economic growth in various countries. Topics Covered ¡EBig Data ¡ECloud Computing ¡EE-Democracy ¡EE-Governance ¡EInclusive Education ¡ELinked Open Data ¡EResource Optimization ¡EUrban-Rural Integration
   
VD05-895 Detecting and Mitigating Robotic Cyber Security Risks
  Kumar, Raghavendra/ 9781522521549/ Price:US$ 210.00
 
Book Cover Risk detection and cyber security play a vital role in the use and success of contemporary computing. By utilizing the latest technological advances, more effective prevention techniques can be developed to protect against cyber threats. Detecting and Mitigating Robotic Cyber Security Risks is an essential reference publication for the latest research on new methodologies and applications in the areas of robotic and digital security. Featuring extensive coverage on a broad range of topics, such as authentication techniques, cloud security, and mobile robotics, this book is ideally designed for students, researchers, scientists, and engineers seeking current research on methods, models, and implementations of optimized security in digital contexts. Topics Covered ¡EAuthentication Techniques ¡ECloud Robotics ¡ECloud Security ¡ECyber Physical System ¡EMobile Robotics ¡EMobile Security ¡ENetwork Simulation
   
VD05-894 Emerging Trends and Applications of the Internet of Things
  Kocovic, Petar/ 9781522524373/ Price:US$ 195.00
 
Book Cover The widespread availability of technologies has increased exponentially in recent years. This ubiquity has created more connectivity and seamless integration among technology devices. Emerging Trends and Applications of the Internet of Things is an essential reference publication featuring the latest scholarly research on the surge of connectivity between computing devices in modern society, as well as the benefits and challenges of this. Featuring extensive coverage on a broad range of topics such as cloud computing, spatial cognition, and ultrasonic sensing, this book is ideally designed for researchers, professionals, and academicians seeking current research on upcoming advances in the Internet of Things (IoT). Topics Covered ¡ECloud Computing ¡EIntelligent Algorithms ¡EIntelligent Predictive Algorithms ¡ENovel Network Paradigms ¡ESound Patterns ¡ESpatial Cognition ¡ETechnical Standardization ¡EUltrasonic Sensing
   
VD05-893 Data Visualization and Statistical Literacy for Open and Big Data
  Prodromou, Theodosia/ 9781522525127/ Price:US$ 205.00
 
Book Cover Data visualization has emerged as a serious scholarly topic, and a wide range of tools have recently been developed at an accelerated pace to aid in this research area. Examining different ways of analyzing big data can result in increased efficiency for many corporations and organizations. Data Visualization and Statistical Literacy for Open and Big Data highlights methodological developments in the way that data analytics is both learned and taught. Featuring extensive coverage on emerging relevant topics such as data complexity, statistics education, and curriculum development, this publication is geared toward teachers, academicians, students, engineers, professionals, and researchers that are interested in expanding their knowledge of data examination and analysis. Topics Covered ¡EConventional Statistics ¡ECurriculum Development ¡EData Complexity ¡EData Sets ¡ELanguage Analysis ¡EStatistics Education ¡EStudent Development ¡EText Visualization
   
VD05-892 Recent Developments in Intelligent Nature-Inspired Computing
  Patnaik, Srikanta/ 9781522523222/ Price:US$ 185.00
 
Book Cover The development of nature-inspired computational techniques has enhanced problem solving in dynamic and uncertain environments. By implementing effective computing strategies, this ensures adaptable, self-organizing, and decentralized behavioral techniques. Recent Developments in Intelligent Nature-Inspired Computing is an authoritative reference source for the latest scholarly material on natural computation methods and applications in diverse fields. Highlighting multidisciplinary studies on swarm intelligence, global optimization, and group technology, this publication is an ideal reference source for professionals, researchers, scholars, and engineers interested in the latest developments in computer science methodologies. Topics Covered ¡EArtificial Immune Systems ¡ECell Formation ¡EGlobal Optimization ¡EGroup Technology ¡EMetaheuristic Algorithms ¡EMulti-Agent Systems ¡ESwarm Intelligence
   
VD05-891 Model-Based Design for Effective Control System Development
  Wu, Wei/ 9781522523031/ Price:US$ 185.00
 
Book Cover Control systems are an integral aspect of modern society and exist across numerous domains and applications. As technology advances more and more, the complexity of such systems continues to increase exponentially. Model-Based Design for Effective Control System Development is a critical source of scholarly information on model-centric approaches and implementations for control and other similar dynamic systems. Highlighting innovative topics such as configuration management, controllability analysis, and modeling requirements, this book is ideally designed for engineers, researchers, academics, project managers, and professionals interested in the design of embedded control systems. Topics Covered ¡EConfiguration Management ¡EControl Algorithms ¡EControl Analysis and Simulation ¡EControllability Analysis ¡EController Performance ¡EModel Coverage Analysis ¡EModeling Requirements
   
VD05-890 Handbook of Research on Soft Computing and Nature-Inspired Algorithms
  Shandilya, Shishir K./ 9781522521280/ Price:US$ 280.00
 
Book Cover Soft computing and nature-inspired computing both play a significant role in developing a better understanding to machine learning. When studied together, they can offer new perspectives on the learning process of machines. The Handbook of Research on Soft Computing and Nature-Inspired Algorithms is an essential source for the latest scholarly research on applications of nature-inspired computing and soft computational systems. Featuring comprehensive coverage on a range of topics and perspectives such as swarm intelligence, speech recognition, and electromagnetic problem solving, this publication is ideally designed for students, researchers, scholars, professionals, and practitioners seeking current research on the advanced workings of intelligence in computing systems. Topics Covered ¡EElectromagnetic Problem Solving ¡EEvolutionary Computation ¡EFuzzy Logic ¡EMachine Learning ¡ENeural Computing ¡ESpeech Recognition ¡ESwarm Intelligence
   
VD05-889 Advanced Image-Based Spam Detection and Filtering Techniques
  Dhavale, Sunita Vikrant/ 9781683180135/ Price:US$ 175.00
 
Book Cover Security technologies have advanced at an accelerated pace in the past few decades. These advancements in cyber security have benefitted many organizations and companies interested in protecting their virtual assets. Advanced Image-Based Spam Detection and Filtering Techniques provides a detailed examination of the latest strategies and methods used to protect against virtual spam. Featuring comprehensive coverage across a range of related topics such as image filters, optical character recognition, fuzzy inference systems, and near-duplicate detection, this book is an ideal reference source for engineers, business managers, professionals, and researchers seeking innovative technologies to aid in spam recognition. Topics Covered ¡EAnti-Spam ¡EComputer Security ¡EFeature Extraction ¡EFuzzy Inference Systems ¡EHacking ¡EImage Detail ¡EImage Filters ¡ENear-Duplicate Detection ¡EOptical Character Recognition
   
VD05-887 Securing Government Information and Data in Developing Countries
  Zoughbi, Saleem/ 9781522517030/ Price:US$ 160.00
 
Book Cover The ongoing growth of information and communication technology is a high priority for any developing country. These advances help progress with different sectors of socio-economic development within these countries, and strengthens our global economy as a whole. Securing Government Information and Data in Developing Countries provides an informative examination of the latest strategies and methods for protecting government information and data within developing countries. Presenting dynamic topics such as security-critical systems, watermarking authentication, hybrid biometrics, and e-voting systems, this publication is an ideal reference source for practitioners, academicians, students, and researchers who are interested in the emerging trends of data security for governments. Topics Covered ¡EBig Data ¡EE-Government ¡EE-Voting ¡EHybrid Biometrics ¡EM-Government ¡ESecurity Systems ¡ESoftware Architecture ¡EWatermarking
   
VD05-886 Privacy and Security Policies in Big Data
  Tamane, Sharvari/ 9781522524861/ Price:US$ 210.00
 
Book Cover In recent years, technological advances have led to significant developments within a variety of business applications. In particular, data-driven research provides ample opportunity for enterprise growth, if utilized efficiently. Privacy and Security Policies in Big Data is a pivotal reference source for the latest research on innovative concepts on the management of security and privacy analytics within big data. Featuring extensive coverage on relevant areas such as kinetic knowledge, cognitive analytics, and parallel computing, this publication is an ideal resource for professionals, researchers, academicians, advanced-level students, and technology developers in the field of big data. Topics Covered ¡ECloud Computing ¡ECognitive Analytics ¡EData Analytics ¡EData Management ¡EInternet of Things ¡EKinetic Knowledge ¡EParallel Computing
   
VD05-885 Ubiquitous Machine Learning and Its Applications
  Kumar, Pradeep/ 9781522525455/ Price:US$ 185.00
 
Book Cover Constant improvements in technological applications have allowed for more opportunities to develop automated systems. This not only leads to higher success in smart data analysis, but also ensures that technological progression will continue. Ubiquitous Machine Learning and its Applications is a pivotal reference source for the latest research on the issues and challenges machines face in the new millennium. Featuring extensive coverage on relevant areas such as computational advertising, software engineering, and bioinformatics, this publication is an ideal resource for academicians, graduate students, engineering professionals, and researchers interested in discovering how they can apply these advancements to various disciplines. Topics Covered ¡EAdaptive Websites ¡EAffect Computing ¡EBioinformatics ¡EComputational Advertising ¡EComputational Finance ¡ESoftware Engineering ¡ESyntactic Pattern Recognition
   
VD05-884 The Internet of Things: Breakthroughs in Research and Practice
  Information Resources Management Association/ 9781522518327/ Price:US$ 340.00
 
Book Cover The ubiquity of modern technologies has allowed for increased connectivity between people and devices across the globe. This connected infrastructure of networks creates numerous opportunities for applications and uses. The Internet of Things: Breakthroughs in Research and Practice is an authoritative reference source for the latest academic material on the interconnectivity of networks and devices in the digital era and examines best practices for integrating this advanced connectivity across multiple fields. Featuring extensive coverage on innovative perspectives, such as secure computing, regulatory standards, and trust management, this book is ideally designed for engineers, researchers, professionals, graduate students, and practitioners seeking scholarly insights on the Internet of Things. Topics Covered ¡EData Analysis and Collection ¡EMobile Devices ¡ERegulatory Standards ¡ESecure Computing ¡ESocial Media ¡ETrust Management ¡EUbiquitous Interactive Spaces ¡EWeb of Things
   
VD05-882 Bio-Inspired Computing for Information Retrieval Applications
  Acharjya, D.P./ 9781522523758/ Price:US$ 205.00
 
Book Cover The growing presence of biologically-inspired processing has caused significant changes in data retrieval. With the ubiquity of these technologies, more effective and streamlined data processing techniques are available. Bio-Inspired Computing for Information Retrieval Applications is a key resource on the latest advances and research regarding current techniques that have evolved from biologically-inspired processes and its application to a variety of problems. Highlighting multidisciplinary studies on data processing, swarm-based clustering, and evolutionary computation, this publication is an ideal reference source for researchers, academics, professionals, students, and practitioners. Topics Covered ¡EData Processing ¡EEvolutionary Computation ¡EGene Expression Data ¡ERehabilitation Engineering ¡ESwarm-Based Clustering ¡EText Summarization ¡EWeb Crawling
   
VD05-881 Web Semantics for Textual and Visual Information Retrieval
  Singh, Aarti/ 9781522524830/ Price:US$ 185.00
 
Book Cover Modern society exists in a digital era in which high volumes of multimedia information exists. To optimize the management of this data, new methods are emerging for more efficient information retrieval. Web Semantics for Textual and Visual Information Retrieval is a pivotal reference source for the latest academic research on embedding and associating semantics with multimedia information to improve data retrieval techniques. Highlighting a range of pertinent topics such as automation, knowledge discovery, and social networking, this book is ideally designed for researchers, practitioners, students, and professionals interested in emerging trends in information retrieval. Topics Covered ¡EAutomation ¡EBig Data ¡EBiological Resources ¡EEducational Applications ¡EKnowledge Discovery ¡EMachine Translation ¡ESocial Networking
   
VD05-880 Fuzzy Systems: Concepts, Methodologies, Tools, and Applications, 3-Vols/Set.
  Information Resources Management Association (USA)/ 9781522519089/ Price:US$ 1800.00
 
Book Cover There are a myriad of mathematical problems that cannot be solved using traditional methods. The development of fuzzy expert systems has provided new opportunities for problem-solving amidst uncertainties. Fuzzy Systems: Concepts, Methodologies, Tools, and Applications is a comprehensive reference source on the latest scholarly research and developments in fuzzy rule-based methods and examines both theoretical foundations and real-world utilization of these logic sets. Featuring a range of extensive coverage across innovative topics, such as fuzzy logic, rule-based systems, and fuzzy analysis, this is an essential publication for scientists, doctors, engineers, physicians, and researchers interested in emerging perspectives and uses of fuzzy systems in various sectors. Topics Covered ¡EExpert Systems ¡EFuzzy Analysis ¡EFuzzy Logic ¡EFuzzy Neural Networks ¡EFuzzy Numbers ¡EFuzzy Sets ¡ERule-Based Systems
   
VD05-878 Advanced Image Processing Techniques and Applications
  Kumar, N. Suresh/ 9781522520535/ Price:US$ 290.00
 
Book Cover Today, the scope of image processing and recognition has broadened due to the gap in scientific visualization. Thus, new imaging techniques have developed, and it is imperative to study this progression for optimal utilization. Advanced Image Processing Techniques and Applications is an essential reference publication for the latest research on digital image processing advancements. Featuring expansive coverage on a broad range of topics and perspectives, such as image and video steganography, pattern recognition, and artificial vision, this publication is ideally designed for scientists, professionals, researchers, and academicians seeking current research on solutions for new challenges in image processing. Topics Covered ¡EArtificial Vision ¡ECipher Block Chaining ¡EImage Authentication ¡EImage De-Noising ¡EImage Encryption ¡EImage Steganography ¡EMultimodal Biometrics ¡EPattern Recognition ¡EVideo Steganography
   
VD05-877 Ontologies and Big Data Considerations for Effective Intelligence
  Lu, Joan/ 9781522520580/ Price:US$ 245.00
 
Book Cover Across numerous industries in modern society, there is a constant need to gather precise and relevant data efficiently and quickly. As such, it is imperative to research new methods and approaches to increase productivity in these areas. Ontologies and Big Data Considerations for Effective Intelligence is a key source on the latest advancements in multidisciplinary research methods and applications and examines effective techniques for managing and utilizing information resources. Featuring extensive coverage across a range of relevant perspectives and topics, such as visual analytics, spatial databases, retrieval systems, and ontology models, this book is ideally designed for researchers, graduate students, academics, and industry professionals seeking ways to optimize knowledge management processes. Topics Covered ¡EBehavioral Targeting ¡EBig Data ¡EEducational Databases ¡EFuzzy Classification ¡EInteractive Visual Analytics ¡EOntology ¡ERetrieval Systems ¡ESpatial Databases
   
VD05-876 Designing for Human-Machine Symbiosis using the URANOS Model: Emerging Research and Opportunities
  Hadorn, Benjamin/ 9781522518884/ Price:US$ 125.00
 
Book Cover Demand for integral and sustainable solutions is on the rise. As new ways of defining reality emerge, this generates the progression of more humanistic and sustainable construction of operating systems. Designing for Human-Machine Symbiosis Using the URANOS Model: Emerging Research and Opportunities is a pivotal reference source for the latest research on human-centered system modeling and methods to provide a generic system model to describe complex non-linear systems. Featuring extensive coverage across a range of relevant topics, such as pervasive computing systems, smart environments, and smart industrial machines, this book is ideally designed for researchers, engineers, and professionals seeking current research on the integration of human beings and their natural, informational, and socio-cultural environments into system design. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡ECyber-Physical System (CPS) ¡EIndustrial Machines ¡EModel Instantiations ¡EPervasive Computing Systems ¡ESmart Environments ¡ESmart Industrial Machines ¡ESystem Dynamics
   
VD05-875 Research Paradigms and Contemporary Perspectives on Human-Technology Interaction
  Mesquita, Anabela/ 9781522518686/ Price:US$ 195.00
 
Book Cover The integration of technology in modern society has created a deeper connectivity between people around the globe, as well as provided ample opportunity for the exchange of knowledge and ideas. These interactions allow greater opportunities for developments in research and innovation. Research Paradigms and Contemporary Perspectives on Human-Technology Interaction presents comprehensive coverage on the application of information technology and systems on daily activities and examines its impacts at an interdisciplinary level. Highlighting numerous insights into relevant areas such as e-government, web accessibility, and social media, this book is an ideal reference source for academics, professionals, practitioners, graduate students, and researchers seeking material on the relationship between humans and emerging technologies in modern society. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EE-Government ¡EE-Learning ¡EGender Considerations ¡EMobile Technologies ¡EOnline Reputation ¡ESocial Media ¡EWeb Accessibility
   
VD05-874 Combating Internet-Enabled Terrorism: Emerging Research and Opportunities
  Stacey, Emily/ 9781522521907/ Price:US$ 115.00
 
Book Cover The internet has become a vital part of modern society, with its impact reaching from private lives into the public sphere. However, along with its positive effects, the dissemination of this technology has created opportunities for increased cyber terrorism activities. Combating Internet-Enabled Terrorism: Emerging Research and Opportunities is an informative resource that highlights developments that will aid in combating internet-based hostility and violence. Featuring extensive coverage on relevant topics that include social media, military tactics, and counterterrorism, this publication will provide insight into the world of internet terrorism to researchers, academicians, and graduate students in this field. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡ECommunication Networks ¡ECounterterrorism ¡ECyber Threats ¡EGovernment Initiatives ¡EMilitary Tactics ¡EOnline Activism ¡ESocial Media
   
VD05-873 Decentralized Computing Using Blockchain Technologies and Smart Contracts: Emerging Research and Opportunities
  Asharaf, S./ 9781522521938/ Price:US$ 120.00
 
Book Cover Recent innovations have created significant developments in data storage and management. These new technologies now allow for greater security in databases and other applications. Decentralized Computing Using Blockchain Technologies and Smart Contracts: Emerging Research and Opportunities is a concise and informative source of academic research on the latest developments in block chain innovation and their application in contractual agreements. Highlighting pivotal discussions on topics such as cryptography, programming techniques, and decentralized computing, this book is an ideal publication for researchers, academics, professionals, students, and practitioners seeking content on utilizing block chains with smart contracts. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡ECryptography ¡EDecentralized Computing ¡EDigital Certificates and Records ¡EDistributed Ledgers ¡EFinancial Applications ¡EProgramming Techniques
   
VD05-872 Security Breaches and Threat Prevention in the Internet of Things
  Jeyanthi, N./ 9781522522966/ Price:US$ 180.00
 
Book Cover As the applications of the Internet of Things continue to progress, so do the security concerns for this technology. The study of threat prevention in the Internet of Things is necessary, as security breaches in this field can ruin industries and lives. Security Breaches and Threat Prevention in the Internet of Things provides a comprehensive examination of the latest strategies and methods for tracking and blocking threats within industries that work heavily with this technology. Featuring chapters on emerging topics such as security threats in autonomous vehicles, digital forensics, secure communications, and image encryption, this critical reference source is a valuable tool for all academicians, graduate students, practitioners, professionals, and researchers who are interested in expanding their knowledge of security practices pertaining to the Internet of Things. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EApplication Layer Protocols ¡EAutonomous Vehicles ¡EDigital Forensics ¡EEncryption Measures ¡EHealthcare Security ¡EImage Encryption ¡ESecure Communications
   
VD05-871 Information and Communication Overload in the Digital Age
  Rui Pedro Figueiredo Marques/ 9781522520610/ Price:US$ 195.00
 
Book Cover Advances in communication technologies have created an overabundance of available information and knowledge to people in contemporary society. Consequently, it has become pivotal to develop new approaches for information processing and understanding. Information and Communication Overload in the Digital Age is a comprehensive reference source for the latest scholarly material on the increased amount of information created by evolving technologies, examining creative methods for improved control of information overload. Focusing on theoretical and experimental topics, such as media consumption, media literacy, and business applications, this book is ideally designed for researchers, practitioners, academics, graduate students, and professionals seeking emerging perspectives on information and communication management. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAugmented Reality ¡EBusiness Applications ¡EDigital Manufacturing Environments ¡EEducational Technologies ¡EEmail Management ¡EMedia Consumption ¡EMedia Literacy
   
VD05-870 Developing Metadata Application Profiles
  Malta, Mariana Curado/ 9781522522218/ Price:US$ 170.00
 
Book Cover The prevalence of data science has grown exponentially in recent years. Increases in data exchange have created the need for standards and formats on handling data from different sources. Developing Metadata Application Profiles is an innovative reference source that discusses the latest trends and techniques for effectively managing and exchanging metadata. Including a range of perspectives on schemas and application profiles, such as interoperability, ontology-based design, and model-driven approaches, this book is ideally designed for researchers, academics, professionals, graduate students, and practitioners actively engaged in data science. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EImplementation Techniques ¡EInteroperability ¡EMinimum Mandatory Metadata Sets ¡EModel-Driven Approaches ¡EOntology-Based Design ¡EOpen Educational Resources ¡EPoetry Metadata
   
VD05-869 Advancing Cloud Database Systems and Capacity Planning With Dynamic Applications
  Kamila, Narendra Kumar/ 9781522520139/ Price:US$ 210.00
 
Book Cover Continuous improvements in data analysis and cloud computing have allowed more opportunities to develop systems with user-focused designs. This not only leads to higher success in day-to-day usage, but it increases the overall probability of technology adoption. Advancing Cloud Database Systems and Capacity Planning With Dynamic Applications is a key resource on the latest innovations in cloud database systems and their impact on the daily lives of people in modern society. Highlighting multidisciplinary studies on information storage and retrieval, big data architectures, and artificial intelligence, this publication is an ideal reference source for academicians, researchers, scientists, advanced level students, technology developers and IT officials. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EArtificial Intelligence ¡EBig Data Architectures ¡ECloud Capacity Planning ¡EDatabase Management ¡EInformation Storage and Retrieval ¡EInformation Systems Applications ¡EMultimedia Big Data
   
VD05-868 Developing Service-Oriented Applications using the Windows Communication Foundation (WCF) Framework
  Patel, Chirag/ 9781522519973/ Price:US$ 200.00
 
Book Cover Recent advancements in technology have allowed for significant improvements to computer software design and development. By utilizing the latest available frameworks, developers can build more innovative applications. Developing Service-Oriented Applications Using the Windows Communication Foundation (WCF) Framework is a pivotal source of research on the latest protocols and concepts for applying the Windows Communication Foundation (WCF) framework in the development of computer software applications. Highlighting pivotal perspectives on topics such as interoperability, programming methodologies, and security considerations, this book is ideally designed for professionals, researchers, graduate students, software developers, and practitioners interested in the optimization of service-oriented architectures. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EBinding ¡EClient and Service ¡ECommunication Reliability ¡EDistributed Computing ¡EInteroperability ¡EProgramming Methodologies ¡ESecurity Considerations ¡ETransaction Management
   
VD05-867 Theoretical and Practical Advancements for Fuzzy System Integration
  Li, Deng-Feng/ 9781522518488/ Price:US$ 200.00
 
Book Cover In real management situations, uncertainty is inherently present in decision making. As such, it is increasingly imperative to research and develop new theories and methods of fuzzy sets. Theoretical and Practical Advancements for Fuzzy System Integration is a pivotal reference source for the latest scholarly research on the importance of expressing and measuring fuzziness in order to develop effective and practical decision making models and methods. Featuring coverage on an expansive range of perspectives and topics, such as fuzzy logic control, intuitionistic fuzzy set theory, and defuzzification, this book is ideally designed for academics, professionals, and researchers seeking current research on theoretical frameworks and real-world applications in the area of fuzzy sets and systems. Topics Covered The many academic areas covered in this publication include, but are not limited to: ¡EAnalytical Hierarchy Process (AHP) ¡EDefuzzification ¡EFuzzy Logic Control ¡EIntuitionistic Fuzzy Set Theory ¡EManufacturing System Applications ¡EMulti-Attribute Decision Making (MADM) ¡EPerformance Estimation
   
VD05-866 Comparative Approaches to Using R and Python for Statistical Data Analysis
  Sarmento, Rui/ 9781683180166/ Price:US$ 180.00
 
Book Cover The application of statistics has proliferated in recent years and has become increasingly relevant across numerous fields of study. With the advent of new technologies, its availability has opened into a wider range of users. Comparative Approaches to using R and Python for Statistical Data Analysis is a comprehensive source of emerging research and perspectives on the latest computer software and available languages for the visualization of statistical data. By providing insights on relevant topics, such as inference, factor analysis, and linear regression, this publication is ideally designed for professionals, researchers, academics, graduate students, and practitioners interested in the optimization of statistical data analysis. Topics Covered ¡EClusters ¡EDatasets ¡EDescriptive Statistics ¡EFactor Analysis ¡ELinear Regression ¡EMatrices ¡EProgramming Installation ¡EStatistical Inference
   
VD05-865 Game Theory Solutions for the Internet of Things: Emerging Research and Opportunities
  Kim, Sungwook/ 9781522519522/ Price:US$ 130.00
 
Book Cover There is an enhanced level of connectivity available in modern society through the increased usage of various technological devices. Such developments have led to the integration of smart objects into the Internet of Things (IoT), an emerging paradigm in the digital age. Game Theory Solutions for the Internet of Things: Emerging Research and Opportunities examines the latest strategies for the management of IoT systems and the application of theoretical models to enhance real-world applications and improve system efficiency. Highlighting innovative algorithms and methods, as well as coverage on cloud computing, cross-domain applications, and energy control, this book is a pivotal source of information for researchers, practitioners, graduate students, professionals, and academics interested in the game theoretic solutions for IoT applications. Topics Covered ¡ECloud Computing ¡EControl Protocols ¡ECross-Domain Applications ¡EEnergy Control ¡ELarge-Scale Systems ¡EResource Sharing Mechanisms ¡ESystem Infrastructure
   
VD05-864 Cybersecurity Breaches and Issues Surrounding Online Threat Protection
  Moore, Michelle/ 9781522519416/ Price:US$ 195.00
 
Book Cover Technology has become deeply integrated into modern society and various activities throughout everyday life. However, this increases the risk of vulnerabilities, such as hacking or system errors, among other online threats. Cybersecurity Breaches and Issues Surrounding Online Threat Protection is an essential reference source for the latest scholarly research on the various types of unauthorized access or damage to electronic data. Featuring extensive coverage across a range of relevant perspectives and topics, such as robotics, cloud computing, and electronic data diffusion, this publication is ideally designed for academicians, researchers, computer engineers, graduate students, and practitioners seeking current research on the threats that exist in the world of technology. Topics Covered ¡ECloud Based Services ¡ECloud Computing ¡ECyber Crime ¡EData Breaches ¡EElectronic Data Diffusion ¡EInternet of Things (IoT) ¡ERobotics
   
VD05-861 Solutions for High-Touch Communications in a High-Tech World
  Brown, Michael A./ 9781522518976/ Price:US$ 185.00
 
Book Cover In recent years, modern society has experienced an increased use of online discourse. Due to continuous advances in technology, the ongoing transition away from face-to-face communications has steadily caused the communication gap to widen. Solutions for High-Touch Communications in a High-Tech World is a pivotal source of research for identifying new approaches for face-to-face communication, opportunities to create social bonding and social capital, and taking advantage of the full communication cycle. Featuring extensive coverage across a range of relevant perspectives and topics, such as social networking theory, conflict resolution, and interpersonal communications, this book is ideally designed for professionals, managers, researchers, students and academicians interested in perspectives on communication in the digital age. Topics Covered ¡EConflict Resolution ¡ECultural Considerations ¡EEmotional Intelligence ¡EInterpersonal Communication ¡ESender-Receiver Relationships ¡ESocial Media ¡ESocial Networking Theory ¡ESocial Presence
   
VD05-860 Multi-Agent-Based Simulations Applied to Biological and Environmental Systems
  Adamatti, Diana Francisca/ 9781522517566/ Price:US$ 205.00
 
Book Cover The discovery and development of new computational methods have expanded the capabilities and uses of simulations. With agent-based models, the applications of computer simulations are significantly enhanced. Multi-Agent-Based Simulations Applied to Biological and Environmental Systems is a pivotal reference source for the latest research on the implementation of autonomous agents in computer simulation paradigms. Featuring extensive coverage on relevant applications, such as biodiversity conservation, pollution reduction, and environmental risk assessment, this publication is an ideal source for researchers, academics, engineers, practitioners, and professionals seeking material on various issues surrounding the use of agent-based simulations. Topics Covered ¡EAgent Societies ¡EBiodiversity Conservation ¡EEnvironmental Risk Assessment ¡EIntuitive Agent-Based Software ¡EMicrobial Fuel Cells ¡ENeuronal Assemblies ¡EPollution Reduction ¡ESystems Biology Applications
   
VD05-859 Design Solutions for User-Centric Information Systems
  Saeed, Saqib/ 9781522519447/ Price:US$ 215.00
 
Book Cover Continuous improvements in technological applications have allowed more opportunities to develop systems with user-focused designs. This not only leads to higher success in day-to-day usage, but it increases the overall probability of technology adoption. Design Solutions for User-Centric Information Systems provides a comprehensive examination of the latest strategies and methods for creating technological systems with end users as the focal point of the design process. Highlighting innovative practices and applications across a variety of areas, such as cloud-based computing services, e-government adoption, and logistics evaluation, this book is an ideal reference source for computer engineers, practitioners, project managers, graduate students, and researchers interested in the enhancement of user-centric information system development. Topics Covered ¡ECloud-Based Computing Services ¡EDigital Retail ¡EE-Government Adoption ¡ELogistics Evaluation ¡EPersonal Finance Management ¡EUser Interface Design ¡EUser Performance Indicator Tools ¡EWeb-Based Information Retrieval Systems
   
VD05-858 Impacts of the Media on African Socio-Economic Development
  Nelson, Okorie/ 9781522518594/ Price:US$ 175.00
 
Book Cover Technology and media are now integrated in various facets of society, including social and economic development. This has allowed for new and innovative methods for aiding in development initiatives. Impacts of the Media on African Socio-Economic Development is an essential research publication for the latest scholarly information on societal and economical dimensions of development and the application of media to advance progress. Featuring extensive coverage on many topics including gender empowerment, international business, and health promotion, this book is ideally designed for government officials, academics, professionals, and students seeking current research on social realities and achieving further development in emerging economies. Topics Covered ¡EChild Rights ¡EEducation ¡EGender Empowerment ¡EHealth Promotion ¡EHIV/AIDS ¡EInternational Business ¡ESocial Media
   
VD05-857 Threat Mitigation and Detection of Cyber Warfare and Terrorism Activities
  Korstanje, Maximiliano E./ 9781522519386/ Price:US$ 190.00
 
Book Cover Technology provides numerous opportunities for positive developments in modern society; however, these venues inevitably increase vulnerability to threats in online environments. Addressing issues of security in the cyber realm is increasingly relevant and critical to society. Threat Mitigation and Detection of Cyber Warfare and Terrorism Activities is a comprehensive reference source for the latest scholarly perspectives on countermeasures and related methods to enhance security and protection against criminal activities online. Highlighting a range of topics relevant to secure computing, such as parameter tampering, surveillance and control, and digital protests, this book is ideally designed for academics, researchers, graduate students, professionals, and practitioners actively involved in the expanding field of cyber security. Topics Covered ¡EBig Data Analysis ¡EDigital Protests ¡EE-Participation ¡EOnline Blogging ¡EOnline Political Behavior ¡EParameter Tampering ¡ESurveillance and Control
   
VD05-856 Security Solutions and Applied Cryptography in Smart Grid Communications
  Ferrag, Mohamed Amine/ 9781522518297/ Price:US$ 215.00
 
Book Cover Electrical energy usage is increasing every year due to population growth and new forms of consumption. As such, it is increasingly imperative to research methods of energy control and safe use. Security Solutions and Applied Cryptography in Smart Grid Communications is a pivotal reference source for the latest research on the development of smart grid technology and best practices of utilization. Featuring extensive coverage across a range of relevant perspectives and topics, such as threat detection, authentication, and intrusion detection, this book is ideally designed for academicians, researchers, engineers and students seeking current research on ways in which to implement smart grid platforms all over the globe. Topics Covered ¡EAuthentication ¡EInfrequent Pattern Identification ¡EIntrusion Detection System ¡EPhotovoltaic Systems ¡ERenewable Energy ¡ESmart Meters ¡EThreat Detection
   
VD05-855 Transforming Gaming and Computer Simulation Technologies across Industries
  Dubbels, Brock/ 9781522518174/ Price:US$ 210.00
 
Book Cover In recent years, digital technologies have become more ubiquitous and integrated into everyday life. While once reserved mostly for personal uses, video games and similar innovations are now implemented across a variety of fields. Transforming Gaming and Computer Simulation Technologies across Industries is a pivotal reference source for the latest research on emerging simulation technologies and gaming innovations to enhance industry performance and dependency. Featuring extensive coverage across a range of relevant perspectives and topics, such as user research, player identification, and multi-user virtual environments, this book is ideally designed for engineers, professionals, practitioners, upper-level students, and academics seeking current research on gaming and computer simulation technologies across different industries. Topics Covered ¡EDigital vs. Non-Digital Platforms ¡ELudic Simulations ¡EMathematical Simulations ¡EMedical Gaming ¡EMulti-User Virtual Environments ¡EPlayer Experiences ¡EPlayer Identification ¡EUser Research
   
VD05-854 Intelligent Multidimensional Data Clustering and Analysis
  Bhattacharyya, Siddhartha/ 9781522517764/ Price:US$ 210.00
 
Book Cover Data mining analysis techniques have undergone significant developments in recent years. This has led to improved uses throughout numerous functions and applications. Intelligent Multidimensional Data Clustering and Analysis is an authoritative reference source for the latest scholarly research on the advantages and challenges presented by the use of cluster analysis techniques. Highlighting theoretical foundations, computing paradigms, and real-world applications, this book is ideally designed for researchers, practitioners, upper-level students, and professionals interested in the latest developments in cluster analysis for large data sets. Topics Covered ¡EBioinformatics ¡EComputer System Design ¡EHealthcare Applications ¡EHybrid Soft Computing ¡EImage Analysis ¡EMicroarray Spot Segmentation ¡EWireless sensor networks
   
VD05-852 Emerging Research on Applied Fuzzy Sets and Intuitionistic Fuzzy Matrices
  Adak, Amal Kumar/ 9781522509141/ Price:US$ 205.00
 
Book Cover The use of fuzzy logic has become prominent in a variety of fields and applications. By implementing these logic sets, problems and uncertainties are more effectively resolved. Emerging Research on Applied Fuzzy Sets and Intuitionistic Fuzzy Matrices is a pivotal reference source for the latest scholarly perspectives on the interdisciplinary use of fuzzy logic theory, focusing on the application of sets and matrices. Highlighting theoretical framework and empirical research findings, this book is ideally designed for academics, practitioners, upper-level students, and professionals interested in an innovative overview of fuzzy logic sets and matrices. Topics Covered ¡EBioinformatics ¡EData Mining ¡EDesign Optimization ¡EForecasting ¡EFuzzy Difference Equations ¡EFuzzy Rings ¡EInterval-Valued Intuitionistic Fuzzy Sets ¡EMachine Learning
   
VD05-851 Resource Management and Efficiency in Cloud Computing Environments
  Turuk, Ashok Kumar/ 9781522517214/ Price:US$ 205.00
 
Book Cover Today¡¦s advancements in technology have brought about a new era of speed and simplicity for consumers and businesses. Due to these new benefits, the possibilities of universal connectivity, storage and computation are made tangible, thus leading the way to new Internet-of Things solutions. Resource Management and Efficiency in Cloud Computing Environments is an authoritative reference source for the latest scholarly research on the emerging trends of cloud computing and reveals the benefits cloud paths provide to consumers. Featuring coverage across a range of relevant perspectives and topics, such as big data, cloud security, and utility computing, this publication is an essential source for researchers, students and professionals seeking current research on the organization and productivity of cloud computing environments. Topics Covered ¡EBig Data ¡ECloud Application Services (SaaS) ¡ECloud Security ¡EHybrid Cloud ¡EInternet of Things (IoT) ¡EPrivate Cloud ¡EPublic Cloud ¡EService Oriented Architecture (SOA) ¡EUtility Computing ¡EVirtualization Technology
   
VD05-850 Mobile Application Development, Usability, and Security
  Mukherjea, Sougata/ 9781522509455/ Price:US$ 180.00
 
Book Cover The development of mobile technology has experienced exponential growth in recent years. Mobile devices are ubiquitous in modern society, impacting both our personal and professional lives. Mobile Application Development, Usability, and Security provides a thorough overview on the different facets of mobile technology management and its integration into modern society. Highlighting issues related to analytics, cloud computing, and different types of application development, this book is a pivotal reference source for professionals, researchers, upper-level students, and practitioners actively involved in the area of mobile computing. Topics Covered ¡EAccess Control ¡EAdaptive Trust Negotiation ¡EApplication Testing ¡EContext-Aware Mobile Platforms ¡ELocation Tracking ¡EMachine Learning ¡EUser Analytics
   
VD05-849 Feature Detectors and Motion Detection in Video Processing
  Dey, Nilanjan/ 9781522510253/ Price:US$ 200.00
 
Book Cover Video is one of the most important forms of multimedia available, as it is utilized for security purposes, to transmit information, promote safety, and provide entertainment. As motion is the most integral element in videos, it is important that motion detection systems and algorithms meet specific requirements to achieve accurate detection of real time events. Feature Detectors and Motion Detection in Video Processing explores innovative methods and approaches to analyzing and retrieving video images. Featuring empirical research and significant frameworks regarding feature detectors and descriptor algorithms, the book is a critical reference source for professionals, researchers, advanced-level students, technology developers, and academicians. Topics Covered ¡E3D Animation Reconstruction ¡EDigital Image Processing ¡EEducational Data Mining ¡EFeature Detectors ¡EMedical Video Processing ¡EObject Recognition ¡EVision-Based Protective Devices
   
VD05-848 Applied Video Processing in Surveillance and Monitoring Systems
  Dey, Nilanjan/ 9781522510222/ Price:US$ 215.00
 
Book Cover Video monitoring has become a vital aspect within the global society as it helps prevent crime, promote safety, and track daily activities such as traffic. As technology in the area continues to improve, it is necessary to evaluate how video is being processed to improve the quality of images. Applied Video Processing in Surveillance and Monitoring Systems investigates emergent techniques in video and image processing by evaluating such topics as segmentation, noise elimination, encryption, and classification. Featuring real-time applications, empirical research, and vital frameworks within the field, this publication is a critical reference source for researchers, professionals, engineers, academicians, advanced-level students, and technology developers. Topics Covered ¡EAutomated Systems ¡EFalse Alarm Reduction ¡EGenetic Algorithms ¡EImage Segmentation ¡EReconfigurable Architectures ¡ERemote Monitoring Systems ¡EVideo Stenography
   
VD05-847 Identity Theft: Breakthroughs in Research and Practice
  Information Resources Management Association/ 9781522508083/ Price:US$ 345.00
 
Book Cover The preservation of private data is a main concern of governments, organizations, and individuals alike. For individuals, a breach in personal information can mean dire consequences for an individual¡¦s finances, medical information, and personal property. Identity Theft: Breakthroughs in Research and Practice highlights emerging perspectives and critical insights into the preservation of personal data and the complications that can arise when one¡¦s identity is compromised. This critical volume features key research on methods and technologies for protection, the problems associated with identity theft, and outlooks for the future. This publication is an essential resource for information security professionals, researchers, and graduate-level students in the fields of criminal science, business, and computer science. Topics Covered ¡EIdentity Credentials ¡EIdentity Fraud ¡EIdentity Protection ¡EIdentity Verification ¡ESecure Identity Systems ¡ETheft Prevention
   
VD05-846 Online Banking Security Measures and Data Protection
  Aljawarneh, Shadi A./ 9781522508649/ Price:US$ 215.00
 
Book Cover Technological innovations in the banking sector have provided numerous benefits to customers and banks alike; however, the use of e-banking increases vulnerability to system attacks and threats, making effective security measures more vital than ever. Online Banking Security Measures and Data Protection is an authoritative reference source for the latest scholarly material on the challenges presented by the implementation of e-banking in contemporary financial systems. Presenting emerging techniques to secure these systems against potential threats and highlighting theoretical foundations and real-world case studies, this book is ideally designed for professionals, practitioners, upper-level students, and technology developers interested in the latest developments in e-banking security. Topics Covered ¡ECloud Computing Applications ¡ECredit Card Fraud ¡ECross-Site Scripting Attacks ¡ECustomer Preferences ¡EData Validation ¡EDematerialization ¡EMobile Banking ¡ERansomware Attacks ¡EService Quality
   
VD05-845 3D Printing: Breakthroughs in Research and Practice
  Information Resources Management Association (USA)/ 9781522516774/ Price:US$ 350.00
 
Book Cover The advancement of modern technology has allowed for impressive developments in manufacturing processes. Out of these developments, 3D printing has emerged as a new method. 3D Printing: Breakthroughs in Research and Practice is a comprehensive reference source for the latest research and advances on 3D printing processes, technologies, and methods. Highlighting emerging perspectives on manufacturing and industrial applications, this book is ideally designed for professionals, practitioners, students, and researchers interested in the latest developments and uses of 3D printing. Topics Covered ¡EEnvironmental Uses ¡ELegal Considerations ¡EMass Customization ¡EMedical Applications ¡EMicroscale and Nanoscale Printing ¡EProduct Development ¡ERapid Prototyping
   
VD05-844 Enriching Urban Spaces with Ambient computing, the Internet of Things, and Smart City Design
  Shin'ichi Konomi/ 9781522508274/ Price:US$ 210.00
 
Book Cover In recent years, the presence of ubiquitous computing has increasingly integrated into the lives of people in modern society. As these technologies become more pervasive, new opportunities open for making citizens¡¦ environments more comfortable, convenient, and efficient. Enriching Urban Spaces with Ambient Computing, the Internet of Things, and Smart City Design is a pivotal reference source for the latest scholarly material on the interaction between people and computing systems in contemporary society, showcasing how ubiquitous computing influences and shapes urban environments. Highlighting the impacts of these emerging technologies from an interdisciplinary perspective, this book is ideally designed for professionals, researchers, academicians, and practitioners interested in the influential state of pervasive computing within urban contexts. Topics Covered ¡ECrowdsourcing ¡EData Analysis and Collection ¡EGeographic Information Systems ¡EMobile Devices ¡EPico-Payments ¡ESocial Media ¡EUbiquitous Interactive Spaces
   
VD05-843 Handbook of Research on End-to-End Cloud Computing Architecture Design
  Jianwen ¡§Wendy¡¨ Chen/ 9781522507598/ Price:US$ 325.00
 
Book Cover Cloud computing has become integrated into all sectors, from business to quotidian life. Since it has revolutionized modern computing, there is a need for updated research related to the architecture and frameworks necessary to maintain its efficiency. The Handbook of Research on End-to-End Cloud Computing Architecture Design provides architectural design and implementation studies on cloud computing from an end-to-end approach, including the latest industrial works and extensive research studies of cloud computing. This handbook enumerates deep dive and systemic studies of cloud computing from architecture to implementation. This book is a comprehensive publication ideal for programmers, IT professionals, students, researchers, and engineers. Topics Covered ¡EArchitectural Patterns ¡ECloud Service Broker ¡EData Encryption ¡EData Storage Security ¡EDDOS Detection ¡EEnterprise Mobility ¡EInternet of things ¡EResource Management Techniques ¡EService Cloud ¡EService Management
   
VD05-842 Biometrics: Concepts, Methodologies, Tools, and Applications, 3-Vols/Set.
  Information Resources Management Association/ 9781522509837/ Price:US$ 2200.00
 
Book Cover Security and authentication issues are surging to the forefront of the research realm in global society. As technology continues to evolve, individuals are finding it easier to infiltrate various forums and facilities where they can illegally obtain information and access. By implementing biometric authentications to these forums, users are able to prevent attacks on their privacy and security. Biometrics: Concepts, Methodologies, Tools, and Applications is a multi-volume publication highlighting critical topics related to access control, user identification, and surveillance technologies. Featuring emergent research on the issues and challenges in security and privacy, various forms of user authentication, biometric applications to image processing and computer vision, and security applications within the field, this publication is an ideal reference source for researchers, engineers, technology developers, students, and security specialists. Topics Covered ¡EBiometric Authentication ¡EComputer Vision Applications ¡EImage processing ¡EIntelligent Security Systems ¡EKeystroke Analysis ¡EObject Matching ¡ESecurity Applications ¡ESurveillance
   
VD05-841 Emerging Trends in the Development and Application of Composite Indicators
  Jeremic, Veljko/ 9781522507147/ Price:US$ 205.00
 
Book Cover Perceiving complex multidimensional problems has proven to be a difficult task for people to overcome. However, introducing composite indicators into such problems allows the opportunity to reduce the problem's complexity. Emerging Trends in the Development and Application of Composite Indicators is an authoritative reference source for the latest scholarly research on the benefits and challenges presented by building composite indicators, and how these techniques promote optimized critical thinking. Highlighting various indicator types and quantitative methods, this book is ideally designed for developers, researchers, public officials, and upper-level students. Topics Covered ¡EEnvironmental Applications ¡EHigher Education Ranking ¡EIndicator Construction ¡EIndustrial Applications ¡EQuality of Life Measures ¡ESocio-Economic Development ¡ESustainability Performance
   
VD05-840 Security Solutions for Hyperconnectivity and the Internet of Things
  Dawson, Maurice/ 9781522507413/ Price:US$ 215.00
 
Book Cover The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. Security Solutions for Hyperconnectivity and the Internet of Things offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks. Calling for revolutionary protection strategies to reassess security, this book is an essential resource for programmers, engineers, business professionals, researchers, and advanced students in relevant fields. Topics Covered ¡EBlackhole Attacks ¡ECertificate-less Signature Scheme ¡ECivil Aviation ¡EDistributed Computing System ¡EInternet of Everything ¡ERegulatory Standards ¡ESecure Computing ¡ETrust Management ¡EWeb of Things
   
VD05-839 Managing Security Issues and the Hidden Dangers of Wearable Technologies
  Marrington, Andrew/ 9781522510161/ Price:US$ 200.00
 
Book Cover Advances in mobile computing have provided numerous innovations that make people¡¦s daily lives easier and more convenient. However, as technology becomes more ubiquitous, corresponding risks increase as well. Managing Security Issues and the Hidden Dangers of Wearable Technologies examines the positive and negative ramifications of emerging wearable devices and their potential threats to individuals, as well as organizations. Highlighting socio-ethical issues, policy implementation, and appropriate usage, this book is a pivotal reference source for professionals, policy makers, academics, managers, and students interested in the security and privacy implications of wearable digital devices. Topics Covered ¡EAuthenticity ¡EData Storage ¡EEthical Considerations ¡EHealthcare Technology ¡ESmartwatches ¡ESpatial Data ¡ESurveillance
   
VD05-838 Handbook of Research on Advanced Trends in Microwave and Communication Engineering
  Oualkadi, Ahmed El/ 9781522507734/ Price:US$ 315.00
 
Book Cover Wireless communications have become invaluable in the modern world. The market is going through a revolutionary transformation as new technologies and standards endeavor to keep up with demand for integrated and low-cost mobile and wireless devices. Due to their ubiquity, there is also a need for a simplification of the design of wireless systems and networks. The Handbook of Research on Advanced Trends in Microwave and Communication Engineering showcases the current trends and approaches in the design and analysis of reconfigurable microwave devices, antennas for wireless applications, and wireless communication technologies. Outlining both theoretical and experimental approaches, this publication brings to light the unique design issues of this emerging research, making it an ideal reference source for engineers, researchers, graduate students, and IT professionals. Topics Covered ¡EArtificial Neural Networks ¡EAutonomous Systems ¡EEfficient Antenna Designs ¡EFractal Antennas ¡EMonopole Antenna ¡EPlanar Diplexers ¡EPower Protectors ¡ESierpinski Triangle ¡EWireless Power Transmission
   
VD05-837 Multi-Core Computer Vision and Image Processing for Intelligent Applications
  Mohan, S./ 9781522508892/ Price:US$ 210.00
 
Book Cover A multicore platform uses distributed or parallel computing in a single computer, and this can be used to assist image processing algorithms in reducing computational complexities. By implementing this novel approach, the performance of imaging, video, and vision algorithms would improve, leading the way for cost-effective devices like intelligent surveillance cameras. Multi-Core Computer Vision and Image Processing for Intelligent Applications is an essential publication outlining the future research opportunities and emerging technologies in the field of image processing, and the ways multi-core processing can further the field. This publication is ideal for policy makers, researchers, technology developers, and students of IT. Topics Covered ¡EComputer Vision ¡EFace Image Retrieval ¡EFish Monitoring ¡ELicense Plate Detection ¡EMobile Platforms ¡EParallel Computing ¡ERe-Configurable Architecture ¡ESound Glyph Database ¡EVideo Subtitling
   
VD05-836 Gamification-Based E-Learning Strategies for Computer Programming Education
  Ricardo Alexandre Peixoto de Queiros/ 9781522510345/ Price:US$ 200.00
 
Book Cover Computer technologies are forever evolving and it is vital that computer science educators find new methods of teaching programming in order to maintain the rapid changes occurring in the field. One of the ways to increase student engagement and retention is by integrating games into the curriculum. Gamification-Based E-Learning Strategies for Computer Programming Education evaluates the different approaches and issues faced in integrating games into computer education settings. Featuring emergent trends on the application of gaming to pedagogical strategies and technological tactics, as well as new methodologies and approaches being utilized in computer programming courses, this book is an essential reference source for practitioners, researchers, computer science teachers, and students pursuing computer science. Topics Covered ¡E3D Virtual Worlds ¡EE-Learning ¡EEducational Computer Games ¡EGame Design Principles ¡EMini-Games ¡EProgramming Language Training ¡ERemote Experimentation
   
VD05-835 Handbook of Research on Individualism and Identity in the Globalized Digital Age
  Topor, F. Sigmund/ 9781522505228/ Price:US$ 295.00
 
Book Cover Globalization has shifted perspectives on individualism and identity as cultural exchange occurs more rapidly in an age of heightened connectivity. As technology connects those around the world, it too helps to provoke a shift in the autonomy of individuals. The Handbook of Research on Individualism and Identity in the Globalized Digital Age is an essential resource for researchers, professionals, and graduate-level students. This book explores and explains how globalization has impacted humans with specific emphasis on education and human development. This research-based publication presents critical perspectives on universal changes that are occurring due to globalization. Topics Covered ¡EAcademic Mobility ¡EGender Studies ¡EInternational Education ¡EMOOCs ¡ESmart Phones ¡ETourism ¡EWellness and Healthcare
   
VD05-834 Web Usage Mining Techniques and Applications Across Industries
  Kumar, A.V. Senthil/ 9781522506133/ Price:US$ 200.00
 
Book Cover Web usage mining is defined as the application of data mining technologies to online usage patterns as a way to better understand and serve the needs of web-based applications. Because the internet has become a central component in information sharing and commerce, having the ability to analyze user behavior on the web has become a critical component to a variety of industries. Web Usage Mining Techniques and Applications Across Industries addresses the systems and methodologies that enable organizations to predict web user behavior as a way to support website design and personalization of web-based services and commerce. Featuring perspectives from a variety of sectors, this publication is designed for use by IT specialists, business professionals, researchers, and graduate-level students interested in learning more about the latest concepts related to web-based information retrieval and mining. Topics Covered ¡EAlgorithms ¡EData Processing ¡EInformation Retrieval ¡EPattern Analysis ¡EWeb Browsing Behavior ¡EWeb Data Extraction ¡EWeb Data Repositories
   
VD05-831 Pattern Recognition and Classification in Time Series Data
  Volna, Eva/ 9781522505655/ Price:US$ 185.00
 
Book Cover Patterns can be any number of items that occur repeatedly, whether in the behaviour of animals, humans, traffic, or even in the appearance of a design. As technologies continue to advance, recognizing, mimicking, and responding to all types of patterns becomes more precise. Pattern Recognition and Classification in Time Series Data focuses on intelligent methods and techniques for recognizing and storing dynamic patterns. Emphasizing topics related to artificial intelligence, pattern management, and algorithm development, in addition to practical examples and applications, this publication is an essential reference source for graduate students, researchers, and professionals in a variety of computer-related disciplines. Topics Covered ¡EAlgorithms ¡EAutomated Systems ¡ELanguage Modelling ¡EOptimization Methods ¡EPattern Management ¡EStatistics
   
VD05-830 Security Management in Mobile Cloud Computing
  Munir, Kashif/ 9781522506027/ Price:US$ 150.00
 
Book Cover Mobile Cloud Computing (MCC) has experienced explosive growth and is expected to continue to rise in popularity as new services and applications become available. As with any new technology, security issues continue to be a concern and developing effective methods to protect sensitive information and data on the cloud is imperative. Security Management in Mobile Cloud Computing explores the difficulties and challenges of securing user data and information on mobile cloud platforms. Investigating a variety of protocols and architectures that can be used to design, create, and develop security mechanisms, this publication is an essential resource for IT specialists, researchers, and graduate-level students interested in mobile cloud computing concepts and security. Topics Covered ¡ECloud Intrusion Detection ¡ECloud Services ¡EData Integrity ¡EGame Theory ¡EInformation Privacy ¡EMobile Cloud Databases ¡ERisk Management
   
VD05-829 Social Media Data Extraction and Content Analysis
  Hai-Jew, Shalin/ 9781522506485/ Price:US$ 225.00
 
Book Cover In today¡¦s society, the utilization of social media platforms has become an abundant forum for individuals to post, share, tag, and, in some cases, overshare information about their daily lives. As significant amounts of data flood these venues, it has become necessary to find ways to collect and evaluate this information. Social Media Data Extraction and Content Analysis explores various social networking platforms and the technologies being utilized to gather and analyze information being posted to these venues. Highlighting emergent research, analytical techniques, and best practices in data extraction in global electronic culture, this publication is an essential reference source for researchers, academics, and professionals. Topics Covered ¡EAutomation ¡ECrowdsourcing ¡EDistance Education ¡EEye-Tracking Methods ¡ENew Internet Economy ¡EOnline Communities ¡EProfessional Development
   
VD05-827 Nature-Inspired Computing: Concepts, Methodologies, Tools, and Applications, 3-Vols/Set.
  Information Resources Management Association (USA)/ 9781522507888/ Price:US$ 2200.00
 
Book Cover As technology continues to become more sophisticated, mimicking natural processes and phenomena also becomes more of a reality. Continued research in the field of natural computing enables an understanding of the world around us, in addition to opportunities for man-made computing to mirror the natural processes and systems that have existed for centuries. Nature-Inspired Computing: Concepts, Methodologies, Tools, and Applications takes an interdisciplinary approach to the topic of natural computing, including emerging technologies being developed for the purpose of simulating natural phenomena, applications across industries, and the future outlook of biologically and nature-inspired technologies. Emphasizing critical research in a comprehensive multi-volume set, this publication is designed for use by IT professionals, researchers, and graduate students studying intelligent computing. Topics Covered ¡EArtificial Life ¡EEvolutionary Algorithms ¡EGenetic Algorithms ¡EMolecular Computing ¡ENeural Networks ¡EQuantum Computing ¡ESwarm Intelligence
   
VD05-826 Developing and Applying Optoelectronics in Machine Vision
  Sergiyenko, Oleg/ 9781522506324/ Price:US$ 205.00
 
Book Cover Sensor technologies play a large part in modern life as they are present in security systems, digital cameras, smartphones, and motion sensors. While these devices are always evolving, research is being done to further develop this technology to help detect and analyze threats, perform in-depth inspections, and perform tracking services. Developing and Applying Optoelectronics in Machine Vision evaluates emergent research and theoretical concepts in scanning devices and 3D reconstruction technologies being used to measure their environment. Examining the development of the utilization of machine vision practices and research, optoelectronic devices, and sensor technologies, this book is ideally suited for academics, researchers, students, engineers, and technology developers. Topics Covered ¡E3D Imaging Systems ¡EAutomated Systems ¡EFacial Recognition ¡ELaser Scanners ¡EOptoelectronic Devices ¡ESensor Technologies ¡ESpatial Coordinate Measurement
   
VD05-822 Emerging Technologies and Applications for Cloud-Based Gaming
  Krishna, P. Venkata/ 9781522505464/ Price:US$ 195.00
 
Book Cover Online gaming is widely popular and gaining more user attention every day. Computer game industries have made considerable growth in terms of design and development, but the scarcity of hardware resources at player or client side is a major pitfall for the latest high-end multimedia games. Cloud gaming is one proposed solution, allowing the end-user to play games using a variety of platforms with less demanding hardware requirements. Emerging Technologies and Applications for Cloud-Based Gaming explores the opportunities for the gaming industry through the integration of cloud computing. Focusing on design methodologies, fundamental architectures, and the end-user experience, this publication is an essential reference source for IT specialists, game developers, researchers, and graduate-level students. Topics Covered ¡ECloud Storage ¡EData Sharing ¡EGaming Services ¡EMulti-Player Cloud Games ¡EQuality of Service ¡EVirtual Reality
   
VD05-821 Harnessing Social Media as a Knowledge Management Tool
  Chugh, Ritesh/ 9781522504955/ Price:US$ 185.00
 
Book Cover Knowledge is a valuable resource that must be managed well for any organization to thrive. Proper knowledge management practices can improve business processes by creating value, however, the available tools meant to aid in the creation, collection, and storage of information have drastically changed since the emergence of social media. By using this collaborative online application for engaging with information, organizations are able to precisely disseminate knowledge to the correct audience. Harnessing Social Media as a Knowledge Management Tool explores the usage of social media in managing knowledge from multiple dimensions highlighting the benefits, opportunities and challenges that are encountered in using and implementing social media. This publication endeavors to provide a thorough insight into the role of social media in knowledge management from both an organizational and individualistic perspective. This book elucidates emerging strategies perfect for policy makers, managers, advertisers, academics, students, and organizations who wish to effectively manage knowledge through social media. Topics Covered ¡EBig Data ¡EConflict Studies ¡ECrowdsourcing ¡ECybersecurity ¡EKnowledge Sharing ¡EMedical Tourism ¡EPolitical Marketing ¡EPrimary Education Online
   
VD05-820 Collaborative Filtering Using Data Mining and Analysis
  Bhatnagar, Vishal/ 9781522504894/ Price:US$ 195.00
 
Book Cover Internet usage has become a normal and essential aspect of everyday life. Due to the immense amount of information available on the web, it has become obligatory to find ways to sift through and categorize the overload of data while removing redundant material. Collaborative Filtering Using Data Mining and Analysis evaluates the latest patterns and trending topics in the utilization of data mining tools and filtering practices. Featuring emergent research and optimization techniques in the areas of opinion mining, text mining, and sentiment analysis, as well as their various applications, this book is an essential reference source for researchers and engineers interested in collaborative filtering. Topics Covered ¡EBig Data ¡EClustering Algorithms ¡EData Stream Mining ¡EE-Learning Systems ¡ERecommender Systems ¡EStatistical Rational Learning ¡EText Mining
   
SD05-481 Analytics and Big Data for Accountants
  Jim Lindell/ 9781119512332/ Price:US$ 114.95
 
   
SD05-479 Switching Theory and Logic Design.
  Prudhomme, Gerard I./ 9781680944464/ Price:US$ 165.00
 
Book Cover Switching theory is the theory of circuits made up of ideal digital devices, including their structure, behavior, and design. It incorporates Boolean logic, a basic component of modern digital switching systems. This book provides an in-depth knowledge of switching theory and the design techniques of digital circuits and presents a brief discussion of the basics of logic design.
   
SD05-479 Principles of Compiler Design.
  Moore, Albert/ 9781682512371/ Price:US$ 150.00
 
Compiler design principles provide an indepth view of translation and optimization process. Compiler design covers basic translation mechanism and error detection and recovery. It includes lexical, syntax, and semantic analysis as front end, and code generation and optimization as backend. This book deals with the optimization phase of compilers. In this phase, programs are transformed in order to increase their efficiency. To preserve the semantics of the programs in these transformations, the compiler has to meet the associated applicability conditions. These are checked using static analysis of the programs.
   
SD05-479 Network Security.
  / 9781680954081/ Price:US$ 64.95
 
Book Cover Network Security is the process of taking physical and software preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modi cation, destruction, or improper disclosure, thereby creating a secure platform for computers, users and programs to perform their permitted critical functions within a secure environment. It includes both hardware and software technologies. E ective network security manages access to the network. It targets a variety of threats and stops them from entering or spreading on your network. Network security combines multiple layers of defenses at the edge and in the network. Each network security layer implements policies and controls. Authorized users gain access to network resources, but malicious actors are blocked from carrying out exploits and threats. Every organization that wants to deliver the services that customers and employees demand must protect its network. Network security also helps you protect proprietary information from attack. Ultimately it protects the organization reputation.
   
SD05-479 Java Technologies.
  Prudhomme, Gerard I./ 9781680944570/ Price:US$ 165.00
 
Book Cover Java is the foundation for virtually every type of networked application and is the global standard for developing and delivering embedded and mobile applications, games, Webbased content, and enterprise software. This book combines coverage of best practices with information on the right open source Java tools and technologies.
   
SD05-479 Algorithms & Data Structures.
  Stanimirovic, Ivan/ 9781680944631/ Price:US$ 165.00
 
Book Cover Asymptotic algorithm analysis is a methodology which has been given a lot of attention recently. Several methods of asymptotic analysis are considered to estimate the resource consumption of an algorithm, giving an assessment if a proposed algorithm can meet the resource constraints for a problem before the implementation. Processing nodes of the binary and non-binary trees in an organized manner is investigated using various algorithms. Several methods for implementing binary trees and their nodes are given. Issues relating to the design of algorithms and data structures for disk-based applications are solved, as well as problems of searching data stored in lists and tables. Algorithms for solving some problems related to finding shortest routes in a graph and the minimum-cost spanning tree, are applied to determine lowest-cost connectivity in a network.
   
SD05-479 Software Project Management.
  Gacovski, Zoran/ 9781680944556/ Price:US$ 165.00
 
Book Cover The effective management of software projects involves four P-s: people, product,process, and project. The manager that will forget people?s aspect of the software engineering will never achieve success in the management of his projects. The manager who has not a proper communication with the clients in the early stage of the product development risks to create an elegant solution for a wrong problem (task). The manager who pays little attention to the process, risks to apply state-of-the-art technical solutions in the wrong place and the wrong time. This edition will cover different aspects of the software management process: interpersonal communication, management of requirements, risk management, change management, configuration and release management, budget and schedule etc. The methods that are explored in different chapters are: classical Waterfall approach, the Unified process (including RUP), as well as the Agile methodology (including Scrum).
   
SD05-479 Cloud Computing.
  / 9781680956955/ Price:US$ 64.95
 
Book Cover Cloud computing is a kind of Internet-based computing that provides shared processing resources and data to computers and other devices on demand. It is a model for enabling ubiquitous, on-demand access to a shared pool of con gurable computing resources, which can be rapidly provisioned and released with minimal management e ort. Cloud computing and storage solutions provide users and enterprises with various capabilities to store and process their data in third-party data centers. It relies on sharing of resources to achieve coherence and economy of scale, similar to a utility over a network. This book establishes concrete, academic coverage with a focus on structure, clarity, and well-de ned building blocks for mainstream cloud computing platforms and solutions. Cloud computing has become a highly demanded service or utility due to the advantages of high computing power, cheap cost of services, high performance, scalability, accessibility as well as availability. Cloud computing is the result of the evolution and adoption of existing technologies and paradigms.
   
SD05-479 Digital Image Processing.
  / 9781680956979/ Price:US$ 64.95
 
Book Cover Image processing is a physical process used to convert an image signal, either digital or analog, into a physical image. The actual output itself can be an actual physical image or the characteristics of an image. Digital image processing is the use of computer algorithms to perform image processing on digital images. As a subcategory or eld of digital signal processing, digital image processing has many advantages over analog image processing. It allows a much wider range of algorithms to be applied to the input data and can avoid problems such as the build-up of noise and signal distortion during processing. Since images are de ned over two dimensions digital image processing may be modeled in the form of multidimensional systems. Digital image processing allows the use of much more complex algorithms, and hence, can o er both more sophisticated performance at simple tasks, and the implementation of methods which would be impossible by analog means.
   
SD05-479 Computer Information Science.
  Mendoza, Charlemagne/ 9781680956696/ Price:US$ 145.00
 
Book Cover
   
SD05-474 Legal Knowledge and Information Systems JURIX 2017: The Thirtieth Annual Conference
  Adam Wyner/ 9781614998372/ Price:EUR 99.00
 
Book Cover This book presents papers from the 30th International Conference on Legal Knowledge and Information Systems (JURIX 2017), held in Luxembourg City, Luxembourg, in December 2017. In the three decades since they began, the JURIX conferences have been held under the auspices of the Dutch Foundation for Legal Knowledge Based Systems, and have become a fully European conference series which addresses familiar topics and extends known techniques, as well as exploring newer topics such as question answering and the use of data mining and machine learning. Of the 42 submissions received for this edition, 12 have been selected for publication as full papers and 13 as short papers, with an acceptance rate of around 59%. The papers address a wide range of topics in artificial intelligence and law, such as argumentation, norms, evidence, belief revision, citations, case-based reasoning and ontologies. Diverse techniques such as information retrieval and extraction, machine learning, semantic web, and network analysis were applied, among others, and textual sources include legal cases, bar examinations, and legislative/regulatory documents.
   
SD05-474 Advances in Ontology Design and Patterns
  Karl Hammar/ 9781614998259/ Price:EUR 52.00
 
The study of patterns in the context of ontology engineering for the semantic web was pioneered more than a decade ago by Blomqvist, Sandkuhl and Gangemi. Since then, this line of research has flourished and led to the development of ontology design patterns, knowledge patterns, and linked data patterns: the patterns as they are known by ontology designers, knowledge engineers, and linked data publishers, respectively. A key characteristic of those patterns is that they are modular and reusable solutions to recurrent problems in ontology engineering and linked data publishing. This book contains recent contributions which advance the state of the art on theory and use of ontology design patterns. The papers collected in this book cover a range of topics, from a method to instantiate content patterns, a proposal on how to document a content pattern, to a number of patterns emerging in ontology modeling in various situations.
   
SD05-468 A Concise Introduction to Hypercomplex Fractals.
  Katunin, Andrzej/ 9781138633421/ Price:¢G 55.99
 
   
SD05-467 Certifications of Critical Systems-The CECRIS Experience.
  Bondavalli, Andrea/ 9788793519565/ Price:EUR 85.00
 
Book Cover In recent years, a considerable amount of effort has been devoted, both in industry and academia, to the development, validation and verification of critical systems, i.e. those systems whose malfunctions or failures reach a critical level both in terms of risks to human life as well as having a large economic impact. Certifications of Critical Systems - The CECRIS Experience documents the main insights on Cost Effective Verification and Validation processes that were gained during work in the European Research Project CECRIS (Certification of Critical Systems). The objective of the research was to tackle the challenges of certification by focusing on those aspects that turn out to be more difficult/important for current and future critical systems industry: the effective use of methodologies, processes and tools. Starting from both the scientific and industrial state of the art methodologies for system development and the impact of their usage on the verification and validation and certification of critical systems, the project aimed at developing strategies and techniques supported by automatic or semi-automatic tools and methods for these activities, setting guidelines to support engineers during the planning of the verification and validation phases.
   
SD05-467 Cryptography.
  Buchanan, William J./ 9788793609143/ Price:EUR 57.00
 
Book Cover Cryptography has proven to be one of the most contentious areas in modern society. For some it protects the rights of individuals to privacy and security, while for others it puts up barriers against the protection of our society. This book aims to develop a deep understanding of cryptography, and provide a way of understanding how privacy, identity provision and integrity can be enhanced with the usage of encryption.
   
SD05-467 Building the Future Internet through FIRE: 2016 FIRE Book: A Research and Experimentation based Approach.
  Serrano, Martin/ 9788793519121/ Price:EUR 90.00
 
Book Cover The Internet as we know it today is the result of a continuous activity for improving network communications, end user services, computational processes and also information technology infrastructures. The Internet has become a critical infrastructure for the human-being by offering complex networking services and end-user applications that all together have transformed all aspects, mainly economical, of our lives. Recently, with the advent of new paradigms and the progress in wireless technology, sensor networks and information systems and also the inexorable shift towards everything connected paradigm, first as known as the Internet of Things and lately envisioning into the Internet of Everything, a data-driven society has been created. In a data-driven society, productivity, knowledge, and experience are dependent on increasingly open, dynamic, interdependent and complex Internet services. The challenge for the Internet of the Future design is to build robust enabling technologies, implement and deploy adaptive systems, to create business opportunities considering increasing uncertainties and emergent systemic behaviors where humans and machines seamlessly cooperate.
   
SD05-467 Semantic Search for Novel Information
  Farber, Michael/ 9781614997740/ Price:EUR 60.00
 
Book Cover In this book, new approaches are presented for detecting and extracting simultaneously relevant and novel information from unstructured text documents. A major contribution of these approaches is that the information already provided and the extracted information are modeled semantically. This leads to the following benefits: (a) ambiguities in the language can be resolved; (b) the exact information needs regarding relevance and novelty can be specified; and (c) knowledge graphs can be incorporated.
   
SD05-467 Cryptograph.
  Buchanan, William J./ 9788793379107/ Price:EUR 57.00
 
Book Cover Cryptography has proven to be one of the most contentious areas in modern society. For some it protects the rights of individuals to privacy and security, while for others it puts up barriers against the protection of our society. This book aims to develop a deep understanding of cryptography, and provide a way of understanding how privacy, identity provision and integrity can be enhanced with the usage of encryption. The book has many novel features including: full provision of Web-based material on almost every topic covered provision of additional on-line material, such as videos, source code, and labs coverage of emerging areas such as Blockchain, Light-weight Cryptography and Zero-knowledge Proofs (ZKPs)
   
SD05-466 Mining Multimedia Documents.
  Wahiba Ben Abdessalem Karaa/ 9781138031722/ Price:¢G 115.00
 
   
SD05-465 Semantic Data Mining: An Ontology-based Approach
  Lawrynowicz, Agnieszka/ 9781614997450/ Price:EUR 60.00
 
Book Cover his book presents, illustrates and empirically validates a new approach to modeling and explaining the nature of engineering design; the Recursive Model of Framing in Design (RFD). The RFD model offers a formalization of a grey area in design science by viewing the design process as a recursive interaction of problem framing and problem solving. Addressing the absence of any formalizations of the interactions occurring within this complex reasoning operation up to now, RFD expresses the existing knowledge in a formal and structured manner based on a cognitive phenomenon known as (reflective) solution talkback. The book explores several schemas implied by the model, making the interactive patterns of the design process explicit and further elaborating to reflect the empirical results. Including examples of how the RFD model has been used in designing user-focused environments for web and semantic web navigations, this volume will be of particular interest to those interested in designing and working with new semantic web applications.
   
SD05-465 Semantic Sentiment Analysis in Social Streams.
  Saif, Hassan/ 9781614997504/ Price:EUR 60.00
 
Book Cover A wide range of approaches to sentiment analysis on social media, have been recently built. Most of these approaches rely mainly on the presence of affect words or syntactic structures that explicitly and unambiguously reflect sentiment. However, these approaches are semantically weak, that is, they do not account for the semantics of words when detecting their sentiment in text. In order to address this problem, the author investigates the role of word semantics in sentiment analysis of microblogs. Specifically, Twitter is used as a case study of microblogging platforms to investigate whether capturing the sentiment of words with respect to their semantics leads to more accurate sentiment analysis models on Twitter. To this end, the author proposes several approaches in this book for extracting and incorporating two types of word semantics for sentiment analysis: contextual semantics (i.e., semantics captured from words¡¦ co-occurrences) and conceptual semantics (i.e., semantics extracted from external knowledge sources). Experiments are conducted with both types of semantics by assessing their impact in three popular sentiment analysis tasks on Twitter; entity-level sentiment analysis, tweet-level sentiment analysis and context-sensitive sentiment lexicon adaptation. The findings from this body of work demonstrate the value of using semantics in sentiment analysis on Twitter. The proposed approaches, which consider word semantics for sentiment analysis at both entity and tweet levels, surpass non-semantic approaches in most evaluation scenarios.
   
SD05-463 Computer Networking Essentials.
  Mendoza, Charlemagne/ 9781680956719/ Price:US$ 145.00
 
Book Cover
   
SD05-463 Fuzzy logic: Theory and Applications.
  Galido, Aldon C. B./ 9781680956733/ Price:US$ 145.00
 
Book Cover
   
SD05-463 Information Security: Principles and Practices.
  Galido, Aldon C. B./ 9781680956740/ Price:US$ 145.00
 
Book Cover This textbook explores the field of information security and assurance with updated content including new innovations in technology and methodologies. Information security (IS) is designed to protect the confidentiality, integrity and availability of computer system data from those with malicious intentions. The field of information security has grown and evolved significantly in recent years. It offers many areas for specialization, including securing networks and allied infrastructure, securing applications and databases, security testing, information systems auditing, business continuity planning and digital forensics.
   
SD05-463 Information Technology Management.
  Mendoza, Charlemagne/ 9781680956757/ Price:US$ 145.00
 
Book Cover
   
SD05-463 Illustrated Handbook of Information Technology.
  / 9781680946482/ Price:US$ 180.00
 
Book Cover Information technology is the use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data. Typically, IT is used in the context of enterprise operations as opposed to personal or entertainment technologies. The commercial use of IT encompasses both computer technology and telephony. Business applications include databases like SQL Server, transactional systems such as real-time order entry, email servers like Exchange, Web servers like Apache, customer relationship management and enterprise resource planning systems. These applications execute programmed instructions to manipulate, consolidate, disperse or otherwise affect data for a business purpose. This illustrated handbook covers the design, administration and support of computer and telecommunications systems.
   
SD05-463 Illustrated Handbook of Computer Architecture.
  / 9781680946925/ Price:US$ 180.00
 
Book Cover This comprehensive, illustrated text provides that precarious understanding of a central processor by clearly detailing fundamentals, and cutting edge design features. Computer architecture is a specification detailing how a set of software and hardware technology standards interact to form a computer system or platform. In short, computer architecture refers to how a computer system is designed and what technologies it is compatible with. As with other contexts and meanings of the word architecture, computer architecture is likened to the art of determining the needs of the user/system/technology, and creating a logical design and standards based on those requirements. This includes all hardware components in the system, including data processors aside from the CPU, such as the graphics processing unit and direct memory access. It also includes memory controllers, data paths and miscellaneous things like multiprocessing and virtualization.
   
SD05-462 Probabilistic Semantic Web: Reasoning and Learning.
  Zese, Riccardo/ 9781614997337/ Price:EUR 60.00
 
Book Cover he management of uncertainty in the Semantic Web is of foremost importance given the nature and origin of the available data. This book presents a probabilistic semantics for knowledge bases, DISPONTE, which is inspired by the distribution semantics of Probabilistic Logic Programming. The book also describes approaches for inference and learning. In particular, it discusses 3 reasoners and 2 learning algorithms. BUNDLE and TRILL are able to find explanations for queries and compute their probability with regard to DISPONTE KBs while TRILLP compactly represents explanations using a Boolean formula and computes the probability of queries. The system EDGE learns the parameters of axioms of DISPONTE KBs. To reduce the computational cost, EDGEMR performs distributed parameter learning. LEAP learns both the structure and parameters of KBs, with LEAPMR using EDGEMR for reducing the computational cost. The algorithms provide effective techniques for dealing with uncertain KBs and have been widely tested on various datasets and compared with state of the art systems.
   
SD05-462 Fundamentals of Logic Design.
  / 9781680956986/ Price:US$ 64.95
 
Book Cover Logic design is a system in electrical and computer engineering that uses simple number values to produce input and output operations. Digital logic design is the basis of electronic systems, such as computers and cell phones. Digital logic is rooted in binary code, which renders information through zeroes and ones, giving each number in the binary code an opposite value. This system facilitates the design of electronic circuits that convey information, including logic gates with functions that include AND, OR, and NOT commands. A Boolean algebra is a mathematical structure that is similar to a Boolean ring, but that is de ned using the meet and join operators instead of the usual addition and multiplication operators. Logic gate is an idealized or physical device implementing a Boolean function; that is, it performs a logical operation on one or more logical inputs, and produces a single logical output. A ip- op is a circuit that has two stable states and can be used to store state information. State machine is a device which can be in one of a set number of stable conditions depending on its previous condition and on the present values of its inputs.
   
SD05-462 Graphics and Multimedia.
  / 9781680954036/ Price:US$ 64.95
 
Book Cover Multimedia is the eld concerned with the computer-controlled integration of text, graphics, drawings, still and moving images (Video), animation, audio, and any other media where every type of information can be represented, stored, transmitted and processed digitally. Multimedia uses computers to present text, audio, video, animation, interactive features, and still images in various ways and combinations made possible through the advancement of technology. Multimedia can be accessed through computers or electronic devices and integrates the various forms together. One example of multimedia would be combining a website with video, audio, or text images.
   
SD05-462 Software Project Management.
  / 9781680954074/ Price:US$ 64.95
 
Book Cover A project is well-de ned task, which is a collection of several operations done in order to achieve a goal (for example, software development and delivery). Software project management is the art and science of planning and leading software projects. It is a sub-discipline of project management in which software projects are planned, implemented, monitored and controlled. The purpose of project planning is to identify the scope of the project, estimate the work involved, and create a project schedule. Project planning begins with requirements that de ne the software to be developed. The project plan is then developed to describe the tasks that will lead to completion. The purpose of project monitoring and control is to keep the team and management up to date on the project's progress. If the project deviates from the plan, then the project manager can take action to correct the problem. Project monitoring and control involves status meetings to gather status from the team. When changes need to be made, change control is used to keep the products up to date.
   
SD05-462 Computer Network.
  / 9781680956962/ Price:US$ 64.95
 
Book Cover A computer network is a telecommunications network which allows computers to exchange data. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media. The best-known computer network is the Internet. Computer networks support an enormous number of applications such as access to the World Wide Web, video, digital audio, shared use of application and storage servers, printers, and fax machines, and use of email and instant messaging applications as well as many others. Computer networks di er in the transmission medium used to carry their signals, the communications protocols to organize network tra c, the network's size, topology and organizational intent.
   
SD05-462 An Introduction to Stata Programming.
  / 9781680954098/ Price:US$ 64.95
 
Book Cover Stata programming is an advanced topic. Some Stata users live productive lives without ever programming Stata. After all, you do not need to know how to program Stata to import data, create new variables, and fit models. On the other hand, programming Stata is not diffcult¡Xat least if the problem is not diffcult¡Xand Stata¡¦s programmability is one of its best features. The real power of Stata is not revealed until you program it.Stata has two programming languages. One, known informally as ¡§ado¡¨, is the focus of this chapter. It is based on Stata¡¦s commands, and you can write scripts and programs to automate reproducible analyses and to add new features to Stata. Stata's capabilities include data management, statistical analysis, graphics, simulations, regression, and custom programming. Stata has always emphasized a command-line interface, which facilitates replicable analyses.
   
SD05-462 Computer Forensics.
  / 9781680954135/ Price:US$ 64.95
 
Book Cover Computer forensics is the practice of collecting, analysing and reporting on digital data in a way that is legally admissible. It can be used in the detection and prevention of crime and in any dispute where evidence is stored digitally. Computer forensics follows a similar process to other forensic disciplines, and faces similar issues. The eld of computer forensics has grown to become a science in itself and also known as cyber forensics. It involves applying computer investigation and analysis techniques to solve a crime and provide evidence to support a case. Investigators often use proprietary forensic applications and software programs to examine computer hard drives, extract certain types of data from les and folders, and also to recover information from encrypted les. This digital information must be organized and documented into an o cial report form to be presented in a court of law.
   
SD05-462 Introduction to Computer Theory.
  / 9781680954166/ Price:US$ 64.95
 
Book Cover and application of computations. These disciplines range from the pure and basic scienti c discipline concerned with the foundations (or theory) of computer science (or of computation) to engineering disciplines concerned with speci c applications. The theory of computation deals with how e ciently problems can be solved on a model of computation, using an algorithm. It is also concerned with nding the most e cient methods for solving speci c problems. The eld is divided into three major branches: automata theory and language, computability theory, and computational complexity theory, which are linked by the question. The theory of computation can be considered the creation of models of all kinds in the eld of computer science. Therefore,mathematics and logic are used. In the last century it became an independent academic discipline and was separated from mathematics.
   
SD05-462 Populating a Linked Data Entity Name System: A Big Data Solution to Unsupervised Instance Matching.
  Kejriwal, Mayank/ 9781614996910/ Price:EUR 60.00
 
Book Cover his publication presents an instance matcher with 4 properties, namely automation, heterogeneity, scalability and domain independence. Automation is addressed by employing inexpensive but well-performing heuristics to automatically generate a training set, which is employed by other machine learning algorithms in the pipeline. Data-driven alignment algorithms are adapted to deal with structural heterogeneity in RDF graphs. Domain independence is established by actively avoiding prior assumptions about input domains, and through evaluations on 10 RDF test cases. The full system is scaled by implementing it on cloud infrastructure using MapReduce algorithms. Resource Description Framework (RDF) is a graph-based data model used to publish data as a Web of Linked Data. RDF is an emergent foundation for large-scale data integration, the problem of providing a unified view over multiple data sources. An Entity Name System (ENS) is a thesaurus for entities, and is a crucial component in a data integration architecture. Populating a Linked Data ENS is equivalent to solving an Artificial Intelligence problem called instance matching, which concerns identifying pairs of entities referring to the same underlying entity.
   
SD05-462 Network Management.
  / 9781680958768/ Price:US$ 64.95
 
Book Cover Network management is an essential factor in successfully operating a network. It refers to the broad subject of managing computer networks. There exists a wide variety of software and hardware products that help network system administrators manage a network. Routing, which refers to the process of selecting the paths in a computer network on which to send data, is an important area of network management. Con guration management relates to both the security and quality areas of network management. It refers to the management of security features in a network by controlling changes made to the software, hardware, rmware, documentation, and test features in a system.
   
SD05-462 Java and Web Design.
  / 9781680958775/ Price:US$ 64.95
 
Book Cover Java is a general-purpose computer programming language that is concurrent, class-based, object-oriented, and speci cally designed to have as few implementation dependencies as possible. Java applications are typically compiled to bytecode that can run on any Java virtual machine regardless of computer architecture. Web design encompasses many di erent skills and disciplines in the production and maintenance of websites. The di erent areas of web design include web graphic design; interface design; authoring, including standardized code and proprietary software; user experience design; and search engine optimization. The term web design is normally used to describe the design process relating to the front-end design of a website including writing mark up. Web design partially overlaps web engineering in the broader scope of web development.
   
SD05-462 Advance Digital Enhancement.
  / 9781680958799/ Price:US$ 64.95
 
Book Cover Digital enhancement techniques have been widely used in many applications of image processing where the subjective quality of images is important for human interpretation. Contrast is an important factor in any subjective evaluation of image quality. Contrast is created by the di erence in luminance re ected from two adjacent surfaces. In other words, contrast is the di erence in visual properties that makes an object distinguishable from other objects and the background. The principal objective of image enhancement is to modify attributes of an image to make it more suitable for a given task and a speci c observer. During this process, one or more attributes of the image are modi ed. The choice of attributes and the way they are modi ed are specific to a given task.
   
SD05-462 Computer Applications.
  / 9781680957952/ Price:US$ 64.95
 
Book Cover Today, we are living in a computer age. The awareness of computer is more than at any other time. It has dominated almost all the elds. There is hardly an industry, which does not use computers. It is not anymore thought of as a mere calculating machine. Computers are used in banks, factories, in Government o ces, education institutions, for research and development and even supermarkets. The insurance companies, nance houses and stock broking rms are widely using computers for their concerns. Computers have become important part in hospitals, labs, and dispensaries. The computers are being used in hospitals to keep the record of patients and medicines. It is also used in scanning and diagnosing di erent diseases. ECG, EEG, Ultrasounds and CT Scans etc., are also done by computerized machines. A computer has high speed of calculation, diligence, accuracy, reliability, or versatility which made it an integrated part in all business organizations. The technological advances have made computers to be one of the most robust machine or device that help the business community and the society at large. It is now possible for the commercial establishments to reach the people globally. Modern computers are very di erent from early computers. They can do billions of calculations per second.
   
SD05-462 Advanced Programming Languages.
  / 9781680957969/ Price:US$ 64.95
 
Book Cover A programming language is a special language programmers use to develop software programs, scripts, or other sets of instructions for computers to execute. Programming languages can be used to create programs to control the behavior of a machine or to express algorithms. The text covers elements of formal methods needed to establish properties of programming languages and prove properties of programs. Programs are created through programming languages to control the behavior and output of a machine through accurate algorithms, similar to the human communication process. A programming language is also known as a programming system, computer language or computer system. The description of a programming language is usually split into the two components of syntax (form) and semantics (meaning). Some languages are de ned by a speci cation document (for example, the C programming language is speci ed by an ISO Standard), while other languages (such as Perl) have a dominant implementation that is treated as a reference. Some languages have both, with the basic language de ned by a standard and extensions taken from the dominant implementation being common.
   
SD05-462 Computer Systems & Architecture.
  / 9781680957976/ Price:US$ 64.95
 
Book Cover The computer has become an integral part of our lives. Apart from the computer you use to write your coursework and to communicate with friends, there is the computer technology embedded in your co ee maker that detects how hot to brew your co ee, in your mobile telephone, in the ticket reader that deducts your bus fare directly from your bus pass, in the ATM (automatic teller machine) that disposes your money for the week, etc. The list is huge and is getting longer each day. A computer system consists of hardware components that have been carefully chosen so that they work well together and software components or programs that run in the computer. The main software component is itself an operating system that manages and provides services to other programs that can be run in the computer. Computer architecture is a speci cation detailing how a set of software and hardware technology standards interact to form a computer system or platform. In short, computer architecture refers to how a computer system is designed and what technologies it is compatible with. As with other contexts and meanings of the word architecture, computer architecture is likened to the art of determining the needs of the user/system/technology, and creating a logical design and standards based on those requirements.
   
SD05-462 Fundamentals of IT & Programming.
  / 9781680958744/ Price:US$ 64.95
 
Book Cover Information technology (IT) is the use of any computers, storage, networking and other physical devices,infrastructure and processes to create, process, store, secure and exchange all forms of electronic data. Typically, IT is used in the context of enterprise operations as opposed to personal or entertainment technologies. The commercial use of IT encompasses both computer technology and telephony. Programming is a creative process done by programmers to instruct a computer on how to do a task. It is the process of taking an algorithm and encoding it into a notation, a programming language, so that it can be executed by a computer. Although many programming languages and many di erent types of computers exist, the important rst step is the need to have the solution. Without an algorithm there can be no program.
   
SD05-462 Problem Solving and Programming.
  / 9781680958782/ Price:US$ 64.95
 
Book Cover Programming is the process of taking an algorithm and encoding it into a notation, a programming language,so that it can be executed by a computer. Although many programming languages and many di erent types of computers exist, the important rst step is the need to have the solution. Without an algorithm there can be no program. Computer science is not the study of programming. Programming, however, is an important part of what a computer scientist does. Programming is often the way that we create a representation for our solutions. Therefore, this language representation and the process of creating it becomes a fundamental part of the discipline. Computers touch all areas of our lives: paying bills, driving cars, using the telephone, shopping.
   
SD05-462 Computer Organization and Assembly Language Programming.
  / 9781680958805/ Price:US$ 64.95
 
Book Cover In computer engineering, computer architecture is a set of rules and methods that describe the functionality, organization, and implementation of computer systems. Some de nitions of architecture de ne it as describing the capabilities and programming model of a computer but not a particular implementation. In other de nitions computer architecture involves instruction set architecture design, microarchitecture design, logic design, and implementation. Each personal computer has a microprocessor that manages the computer's arithmetical, logical, and control activities. Each family of processors has its own set of instructions for handling various operations such as getting input from keyboard, displaying information on screen and performing various other jobs. These set of instructions are called 'machine language instructions'. A processor understands only machine language instructions, which are strings of 1's and 0's. However, machine language is too obscure and complex for using in software development. So, the low-level assembly language is designed for a speci c family of processors that represents various instructions in symbolic code and a more understandable form. An assembly language is a low-level programming language for a computer, or other programmable device, in which there is a very strong (generally one-to-one) correspondence between the language and the architecture's machine code instructions.
   
SD05-462 Data Structures and Algorithm.
  / 9781680958812/ Price:US$ 64.95
 
Book Cover In computer science, a data structure is a particular way of organizing data in a computer so that it can be used e ciently. Data structures can implement one or more particular abstract data types (ADT), which specify the operations that can be performed on a data structure and the computational complexity of those operations. In comparison, a data structure is a concrete implementation of the speci cation provided by an ADT. Data Structures are the programmatic way of storing data so that data can be used e ciently. Almost every enterprise application uses various types of data structures in one or the other way. This text will give you a great understanding on Data Structures needed to understand the complexity of enterprise level applications and need of algorithms, and data structures. Data structures provide a means to manage large amounts of data e ciently for uses such as large databases and internet indexing services. Usually, e cient data structures are key to designing e cient algorithms. Some formal design methods and programming languages emphasize data structures, rather than algorithms, as the key organizing factor in software design. Data structures can be used to organize the storage and retrieval of information stored in both main memory and secondary memory.
   
SD05-462 Object Oriented Programming.
  / 9781680956825/ Price:US$ 64.95
 
Book Cover Object-oriented programming (OOP) is a programming paradigm based on the concept of "objects", which maycontain data, in the form of elds, often known as attributes; and code, in the form of procedures, often known as methods. A feature of objects is that an object's procedures can access and often modify the data elds of the object with which they are associated (objects have a notion of "this" or "self"). In OOP, computer programs are designed by making them out of objects that interact with one another. There is signi cant diversity of OOP languages, but the most popular ones are class-based, meaning that objects are instances of classes, which typically also determine their type. Many of the most widely used programming languages are multi-paradigm programming languages that support object-oriented programming to a greater or lesser degree, typically in combination with imperative, procedural programming. Object-oriented Programming uses objects, but not all of the associated techniques and structures are supported directly in languages that claim to support OOP.
   
SD05-462 Computer Oriented Numerical Methods.
  / 9781680957372/ Price:US$ 64.95
 
Book Cover Before the advent of modern computers numerical methods often depended on hand interpolation in large printed tables. Since the mid 20th century, computers calculate the required functions instead. These same interpolation formulas nevertheless continue to be used as part of the software algorithms for solving di erential equations. Numerical analysis is concerned with all aspects of the numerical solution of a problem, from the theoretical development and understanding of numerical methods to their practical implementation as reliable and e cient computer programs. Numerical analysis naturally nds applications in all elds of engineering and the physical sciences. The growth in power and availability of digital computers has led to an increasing use of realistic mathematical models in science and engineering, and numerical analysis of increasing sophistication is needed to solve these more detailed models of the world.
   
SD05-462 Data Communication.
  / 9781680956948/ Price:US$ 64.95
 
Book Cover Data communications refers to the transmission of digital data between two or more computers and a computer network or data network is a telecommunications network that allows computers to exchange data. The physical connection between networked computing devices is established using either cable media or wireless media. The best-known computer network is the Internet. A data communication system may collect data from remote locations through data transmission circuits, and then outputs processed results to remote locations. The di erent data communication techniques which are presently in widespread use evolved gradually either to improve the data communication techniques already existing or to replace the same with better options and features. Then, there are data communication jargons to contend with such as baud rate, modems, routers, LAN, WAN, TCP/IP, ISDN, during the selection of communication systems. The purpose of Data Communications is to provide the rules and regulations that allow computers with di erent disk operating systems, languages, cabling and locations to share resources. The rules and regulations are called protocols and standards in Data Communications. Hence, it becomes necessary to review and understand these terms and gradual development of data communication methods.
   
SD05-462 Introduction to Algorithm Design.
  / 9781680955736/ Price:US$ 64.95
 
Book Cover Problem solving is an essential part of every scienti c discipline. It has two components; problem identi cation and formulation, and solution of the formulated problem. One can solve a problem on its own using ad hoc techniques or follow those techniques that have produced e cient solutions to similar problems. This requires the understanding of various algorithm design techniques, how and when to use them to formulate solutions and the context appropriate for each of them. Algorithm design is identi ed and incorporated into many solution theories of operation research, such as dynamic programming and divide-and-conquer. Techniques for designing and implementing algorithm designs are algorithm design patterns, such as template method pattern and decorator pattern, and uses of data structures, and name and sort lists. Some current day uses of algorithm design can be found in internet retrieval processes of web crawling, packet routing and caching.
   
SD05-462 Visual Programming.
  / 9781680958690/ Price:US$ 64.95
 
Book Cover In computing, a visual programming language (VPL) is any programming language that lets users create programs by manipulating program elements graphically rather than by specifying them textually. A VPL allows programming with visual expressions, spatial arrangements of text and graphic symbols, used either as elements of syntax or secondary notation. For example, many VPLs are based on the idea of "boxes and arrows", where boxes or other screen objects are treated as entities, connected by arrows, lines or arcs which represent relations. Microsoft Visual Programming Language (VPL) is an application development environment designed on a graphical data ow-based programming model. Rather than series of imperative commands sequentially executed, a data ow program is more like a series of workers on an assembly line, who do their assigned task as the materials arrive. As a result VPL is well suited to programming a variety of concurrent or distributed processing scenarios. VPLs may be further classi ed, according to the type and extent of visual expression used, into icon-based languages, form-based languages, and diagram languages. Visual programming environments provide graphical or iconic elements which can be manipulated by users in an interactive way according to some speci c spatial grammar for program construction.
   
SD05-462 Introduction to Software Engineering.
  / 9781680956900/ Price:US$ 64.95
 
Book Cover Software engineering is the application of engineering to the design, development, implementation, testing and maintenance of software in a systematic method. Software engineering di ers from other branches of engineering in that professionals are building an intangible structure and not a tangible one. Since software is embedded in the machines used in various industries, though, malfunctioning software can actually have tangible e ects. With software used in everything from medical equipment to airplanes, the end result of faulty software can indeed be loss of life. When software projects require engineering, the process begins long before the product is designed ¡V and it continues long afterward. It begins with a thorough study of the software requirements. Some requirements involve the functions the program needs to carry out. The program may, for example, need to verify that a user is authorized to access it. Other requirements involve constraints, for example, systems already in place. Software engineering covers not only the technical aspects of building software systems, but also management issues, such as directing programming teams, scheduling, and budgeting.
   
SD05-462 Web Programming.
  / 9781680956917/ Price:US$ 64.95
 
Book Cover Programming is the intricate art of telling a computer what to do. It is giving written instructions in a logical manner that the computer can understand. Essentially, you give the computer small steps of instructions, and the computer goes down the list, doing each one in order. Programming allows you to make new software and have the computer do new things. Web site programming is the same except you write applications or web pages that are used by a web browser. Web programming refers to the writing, markup and coding involved in Web development, which includes Web content, Web client and server scripting and network security. The most common languages used for Web programming are XML, HTML, JavaScript, Perl 5 and PHP. Web programming is di erent from just programming, which requires interdisciplinary knowledge on the application area, client and server scripting, and database technology. This book will help you understand, what web programming is and why you might want to do it. Web programming is the practice of writing applications that run on a web server and can be used by many di erent people.
   
SD05-462 Compiler Design.
  / 9781680956931/ Price:US$ 64.95
 
In order to decrease the complexity of designing and building computers, nearly all of these are made to execute relatively simple commands. A program for a computer must be built by combining these very simple commands into a program in what is called machine language. Since this is a tedious and error prone process most programming is, instead, done using a high-level programming language. This language can be very di erent from the machine language that the computer can execute, so some means of bridging the gap is required. This is where the compiler comes in. A compiler translates the code written in one language to some other language without changing the meaning of the program. It is also expected that a compiler should make the target code e cient and optimized in terms of time and space. Compiler design principles provide an in-depth view of translation and optimization process. Compiler design covers basic translation mechanism and error detection & recovery. It includes lexical, syntax, and semantic analysis as front end, and code generation and optimization as back-end. A good compiler will, however, be able to get very close to the speed of hand-written machine code when translating well-structured programs.
   
SD05-460 Pattern Recognition and Image Processing.
  Stanimirovic, Ivan/ 9781680944471/ Price:US$ 165.00
 
Pattern recognition and image processing are rapidly growing technologies within engineering and computer science. Algorithms for pattern recognition aim to observe the environment, learn to distinguish patterns of interest from their background and make pattern classes. A series of methods are developed to group individual patterns into specific classes according to their common properties, resulting in different pattern classes. Because of emerging applications which are computationally demanding, a wide specter of algorithms is developed to deal with problems such as data mining, classification of multimedia data, and obtaining biometric features like face and fingerprint recognition. Contrast enhancement, labeling of connected components, segmentation and feature detection methods are created based on the existing signal processing algorithms.
   
SD05-460 Computer Based Management System & E-Commerce.
  Prudhomme, Gerard I./ 9781680944488/ Price:US$ 165.00
 
Book Cover The computer-based management system consists of all components necessary to capture, process, transfer, store, display, and manage information. E-commerce is a term for any type of business, or commercial transaction that involves the transfer of information across the Internet. This book presents a comprehensive introduction to methods used in managing the development of computer-based systems and e-commerce.
   
SD05-460 E-Security & Software Standards.
  Gacovski, Zoran/ 9781680944495/ Price:US$ 165.00
 
Book Cover E-security is a branch of computer security specifically related to the Internet, often involving browser security but also network security on a more general level as it applies to other applications or operating systems on a whole. A software standard is a standard, protocol, or other common format of a document, file, or data transfer accepted and used by one or more software developers while working on one or more than one computer programs. This book deals with e-security and software standards.
   
SD05-460 UNIX Programming.
  PEHCEVSKI, JOVAN/ 9781680944501/ Price:US$ 165.00
 
Book Cover UNIX is powerful, multi-user, multitasking, and extremely stable 32-bit computer operating system and the platform on which internet was built and continues to work. UNIX programming refers to programming explicitly for a UNIX environment. This would include programming for shells that conform to a relevant standard. This book reveals the software design secrets of the original UNIX designers, showing how they produce software that is fast, portable, reuseable, modular and long-lived.
   
SD05-460 Computer Based Numerical and Statistical Techniques.
  Velinova, Maria E./ 9781680944518/ Price:US$ 165.00
 
Book Cover The limitations of analytical methods in practical applications, the advent of high speed computers and increasing demand for numerical solutions to various problems, have led mathematicians to evolve numerical methods as an essential tool in the hands of engineers and scientists. The scope of this book is to provide several examples of constructive methods for obtaining answers to scientific problems in a numerical form.
   
SD05-460 Principles of Programming Languages.
  Stanimirovic, Ivan/ 9781680944525/ Price:US$ 165.00
 
Book Cover Recent years, a large focus on fundamental principles in the design, analysis, implementation of programming languages and programming interfaces has been conducted. A novel research of the basic structure of programming languages, including data types, control structures, naming conventions is presented. To give insight into different programming language paradigms, such as functional, imperative, object-oriented and logic paradigms, several reports are given. Procedural programming is represented as a flow chart where a linear sequence of statements is defined for the program to complete. When this sequence is followed, data is manipulated by the program to create the desired execution.
   
SD05-460 Network Analysis & Synthesis.
  Prudhomme, Gerard I./ 9781680944532/ Price:US$ 165.00
 
Book Cover Network analysis is the process of finding the voltages across, and the currents through, every component in the network. Network synthesis is a method of designing signal processing filters. This book covers most of the essential topics to understand the workings of modern networking and lays the foundation for more advanced studies into the various areas.
   
SD05-460 Systems Programming.
  Prudhomme, Gerard I./ 9781680944549/ Price:US$ 165.00
 
Book Cover System programming is the activity of programming computer system software. System programming produces software that accesses and controls the inner workings of a computer?s hardware and operating system. This book explains how the development of distributed applications depends on a foundational understanding of the relationship among operating systems, networking, distributed systems, and programming.
   
SD05-460 Operating Systems.
  Randrianarisoa, Harinirina/ 9781680944419/ Price:US$ 165.00
 
Book Cover An operating system is system software that manages computer hardware and software resources and provides common services for computer programs. Providing a comprehensive introduction to operating systems, this book emphasizes the fundamentals of the key mechanisms of modern operating systems, and the types of design tradeoffs and decisions involved in operating system design.
   
SD05-460 Database Management Systems.
  PEHCEVSKI, JOVAN/ 9781680944426/ Price:US$ 165.00
 
Book Cover A database management system is a computer program designed to manage a database, a large set of structured data, and run operations on the data requested by numerous users. This book provides comprehensive and up-to-date coverage of the fundamentals of database systems.
   
SD05-460 Computer Networks.
  Stanimirovic, Ivan/ 9781680944433/ Price:US$ 165.00
 
Book Cover Computer networks represent a main component of the economy of information. Their appliance spans from WiFi to cellular networks, enabling the foundations of the Web. Some fundamental problems of computer networking, from performing distributed applications to multiple-access and bandwidth allocation, are being investigated. For each problem, various design strategies are developed to assess its performance in practical applications. Many interconnections are considered in computer networking, and various aspects of computer system analysis using queueing network models are illustrated by particular case studies. A number of important modelling techniques are summarized in the algorithmic form, for all main widely-used networking technologies.
   
SD05-460 Computer Graphics and Visualisation.
  Stanimirovic, Ivan/ 9781680944440/ Price:US$ 165.00
 
Book Cover The appliances of methods in computer graphics span from simulations, computer aided education to digital photography and entertainment. Some fundamental problems of computer graphics and visualisations are investigated, such as the complexities of illumination in virtual scenes, different aspects of modeling and animating virtual environments and processing the main aspects which differ various imaging formats. Particular methods and technologies related to computer graphics and visualization are developed. The insight is given to how graphics can be generated and manipulated, and computed based to some specific applications. A large number of novel visualisation techniques are summarized.
   
SD05-460 Computer Language Engineering.
  Bolivar, Nelson/ 9781680944457/ Price:US$ 165.00
 
Book Cover A language is defined as the medium of expression of thoughts. All the human beings in this world communicate with each other by a language. Similarly, computer also needs some expression medium to communicate with others. This book analyzes issues associated with the implementation of high-level programming languages. Topics covered include: fundamental concepts, functions, and structures of compilers, the interaction of theory and practice, and using tools in building software.
   
SD05-460 Advanced Data Structures.
  Paul, Daved/ 9781682512388/ Price:US$ 150.00
 
Book Cover Data structures are the programmatic way of storing data so that data can be used efficiently. Almost every enterprise application uses various types of data structures in one or other way. This book examines ideas, analysis, and implementation details of data structures as a specialized topic in applied algorithms.
   
SD05-460 Advanced Networking and Security.
  Alwyn, D./ 9781682512395/ Price:US$ 150.00
 
Book Cover Network security is the process of taking physical and software preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure, thereby creating a secure platform for computers, users and programs to perform their permitted critical functions within a secure environment. This book introduces the advanced techniques which secure important data and also explains how to create and deploy an effective security policy, manage and assess risk, and perform audits.
   
SD05-460 Graph Theory and Its Applications.
  Strelkov, D. L./ 9781682503973/ Price:US$ 155.00
 
Book Cover Graph theory is the study of graphs, which are mathematical structures used to model pairwise relations between objects. A graph may be undirected, meaning that there is no distinction between the two vertices associated with each edge, or its edges may be directed from one vertex to another. Graphs are one of the prime objects of study in discrete mathematics. This book covers the main graph theoretic topics: connectivity, trees, traversability, planarity, coloring, covering, matching, digraphs, networks, matrices of a graph, graph theoretic algorithms, and matroids.
   
SD05-460 Fuzzy Logic: Controls, Concepts, Theories and Applications.
  Chen, Yuan/ 9781682512159/ Price:US$ 150.00
 
Book Cover Fuzzy logic is a type of mathematics and programming that more accurately represents how the human brain categorizes objects, evaluates conditions, and processes decisions. Fuzzy logic has been applied to many fields, from control theory to artificial intelligence. This book introduces new concepts and theories of fuzzy logic control for the application and development of robotics and intelligent machines.
   
SD05-460 Fundamentals of Electronic Data Processing.
  Roland, W. R./ 9781682512340/ Price:US$ 150.00
 
Electronic data processing (EDP), an infrequently used term for what is today usually called ¡§IS¡¨ (information services or systems) or ¡§MIS¡¨ (management information services or systems), is the processing of data by a computer and its programs in an environment involving electronic communication. EDP evolved from ¡§DP¡¨ (data processing), a term that was created when most computing input was physically put into the computer in punched card form and output as punched cards or paper reports. This book presents a comprehensive overview of electronic data processing.
   
SD05-460 Software Reliability.
  Potter, C. S./ 9781682512357/ Price:US$ 150.00
 
Book Cover Software reliability is the probability of failurefree software operation for a specified period of time in a specified environment. Software reliability is also an important factor affecting system reliability. It differs from hardware reliability in that it reflects the design perfection, rather than manufacturing perfection. This book shows how to develop tests that ensure the reliability of software systems.
   
SD05-460 Theory of Automata.
  Lewis, M. F./ 9781682512364/ Price:US$ 150.00
 
Book Cover Automata theory is the study of abstract machines and automata, as well as the computational problems that can be solved using them. It is a theory in theoretical computer science, under discrete mathematics. This book covers formal computer languages and computation.
   
SD05-460 Information Security and Cyber Laws.
  Gacovski, Zoran/ 9781680944563/ Price:US$ 165.00
 
Book Cover Information security is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. Cyber law is a term that encapsulates the legal issues related to use of the Internet. This book presents information security concepts and practices in an easy and reader-friendly style.
   
SD05-460 Database & Data Warehousing Technologies.
  PEHCEVSKI, JOVAN/ 9781680944648/ Price:US$ 165.00
 
Book Cover A database is an organized collection of data. It is the collection of schemas, tables, queries, reports, views and other objects. A data warehouse is a subject-oriented, integrated, timevariant and non-volatile collection of data in support of management?s decision making process. This book provides a comprehensive compilation of knowledge covering state-ofthe- art developments and research, as well as current innovative activities in data warehousing.
   
SD05-460 The Handbook of Information and Computer Ethics.
  Prudhomme, Gerard I./ 9781680944655/ Price:US$ 175.00
 
Book Cover Information ethics is a term used to describe the study and evaluation of the various ethical issues that arise in a world that is driven by the sharing of electronic data. Computer ethics is a part of practical philosophy which concerns with how computing professionals should make decisions regarding professional and social conduct. This book provides an accessible overview of the most important issues in information and computer ethics.
   
SD05-460 Microcomputer Architecture and Programming.
  Prudhomme, Gerard I./ 9781680944662/ Price:US$ 170.00
 
Book Cover Microcomputer is an antiquated term that refers to a computer that uses a microprocessor for its central processing unit. This book gives an overview of the architecture of a simple microcomputer. It describes the operation of the CPU address and data buses during read and write cycles.
   
SD05-460 Software Metrics and Software Metrology.
  Prudhomme, Gerard I./ 9781680944686/ Price:US$ 170.00
 
Book Cover A software metric is a standard of measure of a degree to which a software system or process possesses some property. This book looks at the classical metrology concepts from science and engineering, using them as criteria to propose an approach to analyze the design of current software measures and then design new software measures.
   
SD05-460 Advances in Geometric Modeling.
  Prudhomme, Gerard I./ 9781680944693/ Price:US$ 175.00
 
eometric modeling is a branch of applied mathematics and computational geometry that studies methods and algorithms for the mathematical description of shapes. This book presents new idea of gathering state of the art topics in geometric modeling together with techniques, applications, systems and tools.
   
SD05-460 Distributed Database Architecture.
  PEHCEVSKI, JOVAN/ 9781680944587/ Price:US$ 165.00
 
Book Cover A distributed database is a database in which storage devices are not all attached to a common processing unit such as the CPU, and which is controlled by a distributed database management system. It allows applications to access data from local and remote databases. This book discusses the fundamental principles of distributed data management and includes distribution design, data integration, distributed query processing and optimization, distributed transaction management, and replication.
   
SD05-460 Multimedia System
  Randrianarisoa, Harinirina/ 9781680944600/ Price:US$ 165.00
 
Book Cover A multimedia system is a system capable of processing multimedia data and applications. A multimedia system is characterized by the processing, storage, generation, manipulation and rendition of multimedia information. This book presents different aspects of a modern multimedia from content creation, compression, distribution and digital rights management.
   
SD05-460 Service-oriented Software System Engineering.
  PEHCEVSKI, JOVAN/ 9781680944617/ Price:US$ 165.00
 
Book Cover Software systems engineering is the branch of systems engineering concerned with the development of large and complex software intensive systems. This book presents in-depth knowledge of the main challenges and practices in the exciting, new world of service-oriented software engineering.
   
SD05-460 Software Process Improvement.
  Prudhomme, Gerard I./ 9781680944679/ Price:US$ 165.00
 
Book Cover The creation of quality software on time and within budget has been a major problem facing the software industry for several decades. Consideration of software development and maintenance as an engineering discipline to control the developmental process can help alleviate these obstacles. This book focuses on the best practices for software process improvement (SPI) and related international standards.
   
SD05-460 Principles of Information Security.
  Gacovski, Zoran/ 9781680944624/ Price:US$ 165.00
 
Book Cover The need for computer and network security dates since the ?80-s of the last century. The first computer networks were local and in an academic setting, so there was large confidence among users associated with them (there were almost no security problems). With the sudden development of the information technology and the today?s Internet, the first abuses occurred along with the need to protect private and corporate data. Today, information safety is crucial and it is most evident especially in the e-commerce and e-business. The information is a vital corporate?s property and it has enormous value. The information security, primarily comprising computer and the network security, is mainly concerned with the data protection (privacy), data integrity and data availability. This edition covers main security concepts, such as authentication methods, intrusion detection and prevention, cloud security protocols, and cryptography.
   
SD05-457 Databases Illuminated. (Includes Navigate 2 Advantage Access)
  Catherine M. Ricardo/ 9781284056945/ Price:NT$ 1650.00
 
Book Cover Databases Illuminated, Third Edition combines database theory with a practical approach to database design and implementation. Strong pedagogical features, including accessible language, real-world examples, downloadable code, and engaging hands-on projects and lab exercises create a text with a unique combination of theory and student-oriented activities. Providing an integrated, modern approach to databases, Databases Illuminated, Third Edition is the essential text for students in this expanding field.
   
SD05-457 Computer Systems.
  Warford, J. S./ 9781284079630/ Price:NT$ 2050.00
 
Book Cover Updated throughout with the latest updates as well as the new Pep/9 virtual machine, Computer Systems, Fifth Edition provides a clear, detailed, step-by-step introduction to the central concepts in computer organization, assembly language, and computer architecture. It urges students to explore the many dimensions of computer systems through a top-down approach to levels of abstraction. By examining how the different levels of abstraction relate to one another, the text helps students look at computer systems and their components as a unified concept.
   
SD05-452 Cyberethics: Morality and Law in Cyberspace. (Includes Navigate 2 Advantage Access)
  Spinello, Richard A./ 9781284081398/ Price:US$ 81.95
 
Book Cover Written for the undergraduate course, Cyberethics: Morality and Law in Cyberspace, Sixth Edition provides a modern, comprehensive examination of the social costs and moral issues emerging from the ever-expanding use of the internet and new information technologies, as well as internet governance and its control by the state. It highlights both the legal and philosophical perspective of content control, free speech, intellectual property, and security. The Sixth Edition includes interesting new case studies on social media, privacy, and the right to be forgotten, which encourages discussion and fosters critical thinking.
   
SD05-452 An Introduction to Formal Languages and Automata.
  Linz, Peter/ 9781284077247/ Price:NT$ 1350.00
 
Book Cover The Sixth Edition of An Introduction to Formal Languages and Automata provides an accessible, student-friendly presentation of all material essential to an introductory Theory of Computation course. Written to address the fundamentals of formal languages, automata, and computability, the text is designed to familiarize students with the foundations and principles of computer science and to strengthen the students' ability to carry out formal and rigorous mathematical arguments. The author, Peter Linz, continues to offer a straightforward, uncomplicated treatment of formal languages and automata and avoids excessive mathematical detail so that students may focus on and understand the underlying principles.
   
SD05-451 Android Programming Concepts. (Includes Navigate 2 Advantage Access)
  Trish Cornez/ 9781284070705/ Price:NT$ 1350.00
 
Book Cover Using a hands-on, student-friendly approach, Android Programming Concepts provides a comprehensive foundation for the development of mobile applications for devices and tablets powered by Android. This text offers in-depth coverage of the topics outlined by the official Android developer API guides, leading a programmer with object oriented programming skills through the app development process. Each chapter features a collection of well-designed and classroom tested lab examples, providing an opportunity to apply specific Android concepts while supported by visual guides, explanations, and code listings.
   
SD05-450 Security Strategies in Linux Platforms and Applications.
  Jang, Michael/ 9781284090659/ Price:US$ 99.95
 
Book Cover he Second Edition of Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system. Written by an industry expert, this book is divided into three natural parts to illustrate key concepts in the field. It opens with a discussion of the risks, threats, and vulnerabilities associated with Linux as an operating system using current examples and cases. Part 2 discusses how to take advantage of the layers of security available to Linux--user and group options, filesystems, and security options for important services, as well as the security modules associated with AppArmor and SELinux. The book closes with a look at the use of both open source and proprietary tools when building a layered security strategy for Linux operating system environments. Using real-world examples and exercises, this useful resource incorporates hands-on activities to walk readers through the fundamentals of security strategies related to the Linux system.
   
Career Guide: Programmer
  / 9781680959901/ Price:US$ 34.95
 
Book Cover A computer programmer is someone who writes computer software. The term computer programmer can refer to a specialist in one area of computer programming or to a generalist who writes code for many kinds of software. One who practices or professes a formal approach to programming may also be known as a programmer analyst. The term programmer can be used to refer to a software developer, software engineer, computer scientist, or software analyst. However, members of these professions typically possess other software engineering skills beyond programming. For this reason, the term programmer is sometimes considered an oversimplification of these other professions. A computer programmer figures out the process of designing, writing, testing, debugging/troubleshooting and maintaining the source code of computer programs. This source code is written in a programming language so the computer can ¡¥understand¡¦ it. The code may be a modification of an existing source or something completely new. The purpose of programming is to create a program that produces a certain desired behavior (customization). The process of writing source code often requires expertise in many different subjects, including knowledge of the application domain, specialized algorithms and formal logic. The computer programmer also designs a graphical user interface (GUI) so that non-technical users can use the software through easy, point-and-click menu options. The GUI acts as a translator between the user and the software code.
   
Strategic Cyber Defense: A Multidisciplinary Perspective
  Tatar, U./ 9781614997702/ Price:EUR 108.00
 
Book Cover This book presents papers from the NATO Advanced Research Workshop (ARW) entitled ¡§A Framework for a Military Cyber Defense Strategy¡¨, held in Norfolk, Virginia, USA, in April 2016. The workshop focused on key priority areas for cyber defense along with NATO¡¦s cyber defense policy implementation and brought together experts with an eclectic mix of backgrounds and specialties from a group of NATO member states and partner countries. The participants considered not only the technical implications of cyber security efforts, but also the legal, strategic, educational and organizational aspects, and the book reflects this wide view of the field and its intricacies, highlighting the complexity of cyber security and the many challenges it presents. This overview of cyber security offers state-of-the-art approaches from a multidisciplinary standpoint, and will be of interest to all those working in the field.
   
A Systems Approach to Cyber Security: Proceedings of the 2nd Singapore Cyber-Security R&D Conference (SG-CRC 2017)
  -/ 9781614997436/ Price:EUR 86.00
 
Book Cover With our ever-increasing reliance on computer technology in every field of modern life, the need for continuously evolving and improving cyber security remains a constant imperative. This book presents the 3 keynote speeches and 10 papers delivered at the 2nd Singapore Cyber Security R&D Conference (SG-CRC 2017), held in Singapore, on 21-22 February 2017. SG-CRC 2017 focuses on the latest research into the techniques and methodologies of cyber security. The goal is to construct systems which are resistant to cyber-attack, enabling the construction of safe execution environments and improving the security of both hardware and software by means of mathematical tools and engineering approaches for the design, verification and monitoring of cyber-physical systems. Covering subjects which range from messaging in the public cloud and the use of scholarly digital libraries as a platform for malware distribution, to low-dimensional bigram analysis for mobile data fragment classification, this book will be of interest to all those whose business it is to improve cyber security.
   
Intelligent Environments 2017 : Workshop Proceedings of the 13th International Conference on Intelligent Environments
  C. Analide/ 9781614997955/ Price:EUR 85.00
 
Book Cover This book presents the proceedings of the 13th International Conference on Intelligent Environments, held in Seoul, Korea, in August 2017. The conference provides a multidisciplinary collaborative forum for researchers and practitioners from computer science, electronic engineering, building architecture, art and design, sociology, government and education to present theoretical and practical results related to the development and applications of Intelligent Environments. IE¡¦17 focuses on the development of advanced Intelligent Environments, as well as other newly emerging and rapidly evolving topics. The book also includes the proceedings of the following associated workshops, held during the first 2 days of the conference, which emphasize the multi-disciplinary and transversal aspects of IEs: the 6th International Workshop on the Reliability of Intelligent Environments (WoRIE'17); the 1st International Workshop on Intelligent Systems for Agricultural Production and Environmental Protection (ISAPEP¡¦17); the 1st Workshop on Citizen Centric Smart Cities Solutions (CCSCS'17); and the 1st International Workshop on Advanced Multiple Access in Mobile Telecommunications (AMAMT'17).
   
New Frontiers in High Performance Computing and Big Data
  Fox, G./ 9781614998150/ Price:EUR 82.00
 
Book Cover This book presents papers from the International Research Workshop on Advanced High Performance Computing Systems, held in Cetraro, Italy, in July 2016. The workshop covered a wide range of topics and new developments related to the solution of intensive and large-scale computing problems, and the contributions included in this volume cover aspects of the evolution of parallel platforms and highlight some of the problems encountered with the development of ever more powerful computing systems. The importance of future large-scale data science applications is also discussed.
   
Deep Learning for Image Processing Applications
  Hemanth, D.J./ 9781614998211/ Price:EUR 82.00
 
Book Cover The aim of this book, ¡¥Deep Learning for Image Processing Applications¡¦, is to offer concepts from these two areas in the same platform, and the book brings together the shared ideas of professionals from academia and research about problems and solutions relating to the multifaceted aspects of the two disciplines. The first chapter provides an introduction to deep learning, and serves as the basis for much of what follows in the subsequent chapters, which cover subjects including: the application of deep neural networks for image classification; hand gesture recognition in robotics; deep learning techniques for image retrieval; disease detection using deep learning techniques; and the comparative analysis of deep data and big data.
   
VSD05-001 Fundamentals of Wearable Computers and Augmented Reality.
  Barfield, Woodrow/ 9781482243505/ Price:¢G 165.00
 
Book Cover Upon its initial publication, the first edition almost instantly became a trusted reference, setting the stage for the coming decade, in which the explosion in research and applications of wearable computers and augmented reality occurred. Written by expert researchers and teachers, each chapter in the second edition has been revised and updated to reflect advances in the field and provide fundamental knowledge on each topic, solidifying the book¡¦s reputation as a valuable technical resource as well as a textbook for augmented reality and ubiquitous computing courses. New Chapters in the Second Edition Explore: ¡EHaptics ¡EVisual displays ¡EUse of augmented reality for surgery and manufacturing ¡ETechnical issues of image registration and tracking ¡EAugmenting the environment with wearable audio interfaces ¡EUse of augmented reality in preserving cultural heritage ¡EHuman-computer interaction and augmented reality technology ¡ESpatialized sound and augmented reality ¡EAugmented reality and robotics ¡EComputational clothing From a technology perspective, much of what is happening now with wearables and augmented reality would not have been possible even five years ago. In the fourteen years since the first edition burst on the scene, the capabilities and applications of both technologies are orders of magnitude faster, smaller, and cheaper. Yet the book¡¦s overarching mission remains the same: to supply the fundamental information and basic knowledge about the design and use of wearable computers and augmented reality with the goal of enhancing people¡¦s lives.
   
VD05-833 Encyclopedia of Information Systems and Technology, 2-Vols/Set.
  Laplante, Phillip A./ 9781466560772/ Price:¢G 1895.00
 
Book Cover Spanning the multi-disciplinary scope of information technology, the Encyclopedia of Information Systems and Technology draws together comprehensive coverage of the inter-related aspects of information systems and technology. The topics covered in this encyclopedia encompass internationally recognized bodies of knowledge, including those of The IT BOK, the Chartered Information Technology Professionals Program, the International IT Professional Practice Program (British Computer Society), the Core Body of Knowledge for IT Professionals (Australian Computer Society), the International Computer Driving License Foundation (European Computer Driving License Foundation), and the Guide to the Software Engineering Body of Knowledge. Using the universally recognized definitions of IT and information systems from these recognized bodies of knowledge, the encyclopedia brings together the information that students, practicing professionals, researchers, and academicians need to keep their knowledge up to date.
   
VD05-825 Encyclopedia of Computer Science and Technology, 2-Vols/Set.
  Laplante, Phillip A./ 9781482208191/ Price:¢G 1685.00
 
Book Cover With breadth and depth of coverage, the Encyclopedia of Computer Science and Technology, Second Edition has a multi-disciplinary scope, drawing together comprehensive coverage of the inter-related aspects of computer science and technology. The topics covered in this encyclopedia include: ¡EGeneral and reference ¡EHardware ¡EComputer systems organization ¡ENetworks ¡ESoftware and its engineering ¡ETheory of computation ¡EMathematics of computing ¡EInformation systems ¡ESecurity and privacy ¡EHuman-centered computing ¡EComputing methodologies ¡EApplied computing ¡EProfessional issues ¡ELeading figures in the history of computer science The encyclopedia is structured according to the ACM Computing Classification System (CCS), first published in 1988 but subsequently revised in 2012. This classification system is the most comprehensive and is considered the de facto ontological framework for the computing field. The encyclopedia brings together the information and historical context that students, practicing professionals, researchers, and academicians need to have a strong and solid foundation in all aspects of computer science and technology.
   
VD05-824 Intelligent Analysis of Multimedia Information
  Bhattacharyya, Siddhartha/ 9781522504986/ Price:US$ 220.00
 
Book Cover Multimedia represents information in novel and varied formats. One of the most prevalent examples of continuous media is video. Extracting underlying data from these videos can be an arduous task. From video indexing, surveillance, and mining, complex computational applications are required to process this data. Intelligent Analysis of Multimedia Information is a pivotal reference source for the latest scholarly research on the implementation of innovative techniques to a broad spectrum of multimedia applications by presenting emerging methods in continuous media processing and manipulation. This book offers a fresh perspective for students and researchers of information technology, media professionals, and programmers. Topics Covered ¡EBiomedical Image Processing ¡EBiometric Systems ¡ECellular Automata Algorithms ¡ECompressive Sensing ¡EContent Based Image Retrieval ¡EContent Convergence ¡EFeature Extraction ¡EImage Segmentation ¡EMultilevel Image Segmentation ¡EParticle Swarm Optimization
   
VD05-823 Computational and Cognitive Approaches to Narratology
  Ogata, Takashi/ 9781522504320/ Price:US$ 215.00
 
Book Cover Studying narratives is often the best way to gain a good understanding of how various aspects of human information are organized and integrated¡Xthe narrator employs specific informational methods to build the whole structure of a narrative through combining temporally constructed events in light of an array of relationships to the narratee and these methods reveal the interaction of the rational and the sensitive aspects of human information. Computational and Cognitive Approaches to Narratology discusses issues of narrative-related information and communication technologies, cognitive mechanism and analyses, and theoretical perspectives on narratives and the story generation process. Focusing on emerging research as well as applications in a variety of fields including marketing, philosophy, psychology, art, and literature, this timely publication is an essential reference source for researchers, professionals, and graduate students in various information technology, cognitive studies, design, and creative fields. Topics Covered ¡EArtificial Intelligence ¡EComputational Narrative ¡EDigital Storytelling ¡ELinguistics ¡ENarrative Analysis ¡ENarrative Generation Systems ¡ENarrative Genres
   
VD05-819 Handbook of Research on Human-Computer Interfaces, Developments, and Applications
  Rodrigues, Joao/ 9781522504351/ Price:US$ 330.00
 
Book Cover Human Computer Interaction (HCI) is easy to define yet difficult to predict. Encompassing the management, study, planning, and design of the ways in which users interact with computers, this field has evolved from using punch cards to force touch in a matter of decades. What was once considered science fiction is now ubiquitous. The future of HCI is mercurial, yet predictions point to the effortless use of high-functioning services. The Handbook of Research on Human-Computer Interfaces, Developments, and Applications is primarily concerned with emerging research regarding gesture interaction, augmented reality, and assistive technologies and their place within HCI. From gaming to rehabilitation systems, these new technologies share the need to interface with humans, and as computers become thoroughly integrated into everyday life, so does the necessity of HCI research. This handbook of research benefits the research needs of programmers, developers, students and educators in computer science, and researchers. Topics Covered ¡EBilateral Teleoperation ¡EContext Aware Systems ¡EDynamic Motion Analysis ¡EE-Learning ¡EGesture Recognition ¡EGesture-based Interaction ¡EMachine Learning ¡EPain Management ¡ESmart Tourism ¡EVirtual Reality
   
VD05-818 Innovative Research and Applications in Next-Generation High Performance Computing
  Hassan, Qusay F./ 9781522502876/ Price:US$ 205.00
 
Book Cover High-performance computing (HPC) describes the use of connected computing units to perform complex tasks. It relies on parallelization techniques and algorithms to synchronize these disparate units in order to perform faster than a single processor could, alone. Used in industries from medicine and research to military and higher education, this method of computing allows for users to complete complex data-intensive tasks. This field has undergone many changes over the past decade, and will continue to grow in popularity in the coming years. Innovative Research Applications in Next-Generation High Performance Computing aims to address the future challenges, advances, and applications of HPC and related technologies. As the need for such processors increases, so does the importance of developing new ways to optimize the performance of these supercomputers. This timely publication provides comprehensive information for researchers, students in ICT, program developers, military and government organizations, and business professionals. Topics Covered ¡EBig Data and Next-Generation Analytics ¡ECloud Computing ¡ECPU/GPU Architectures ¡EDistributed and Parallel Computing ¡EEnergy and Performance Optimization ¡EExascale Supercomputers ¡EHeterogeneous Computing ¡EIntegrated Circuits ¡EInternet of Things and Ubiquitous Computing ¡EMassively Parallel Systems
   
VD05-817 Human Development and Interaction in the Age of Ubiquitous Technology
  Rahman, Hakikur/ 9781522505563/ Price:US$ 185.00
 
Book Cover The human condition is affected by numerous factors in modern society. In modern times, technology is so integrated into culture that it has become necessary to perform even daily functions. Human Development and Interaction in the Age of Ubiquitous Technology is an authoritative reference source for the latest scholarly research on the widespread integration of technological innovations around the globe and examines how human-computer interaction affects various aspects of people¡¦s lives. Featuring emergent research from theoretical perspectives and case studies, this book is ideally designed for professionals, students, practitioners, and academicians. Topics Covered ¡EBusiness Intelligence ¡ECommunity Media ¡EDay-Labor Market ¡EEducational Technologies ¡EOnline Learning ¡EOpen Innovation ¡EPolitical Activities
   
VD05-816 Digital Tools for Computer Music Production and Distribution
  Politis, Dionysios/ 9781522502647/ Price:US$ 180.00
 
Book Cover It is clear that the digital age has fully embraced music production, distribution, and transcendence for a vivid audience that demands more music both in quantity and versatility. However, the evolving world of digital music production faces a calamity of tremendous proportions: the asymmetrically increasing online piracy that devastates radio stations, media channels, producers, composers, and artists, severely threatening the music industry. Digital Tools for Computer Music Production and Distribution presents research-based perspectives and solutions for integrating computational methods for music production, distribution, and access around the world, in addition to challenges facing the music industry in an age of digital access, content sharing, and crime. Highlighting the changing scope of the music industry and the role of the digital age in such transformations, this publication is an essential resource for computer programmers, sound engineers, language and speech experts, legal experts specializing in music piracy and rights management, researchers, and graduate-level students across disciplines. Topics Covered ¡EAcoustics ¡EElectroacoustic Music ¡EMusic and Speech ¡EMusic Theory ¡EPiracy ¡EProduction Interfaces ¡ESound Synthesis
   
VD05-815 Handbook of Research on Human Social Interaction in the Age of Mobile Devices
  Xu, Xiaoge/ 9781522504696/ Price:US$ 325.00
 
Book Cover Digital innovations, such as mobile technologies, have had a significant impact on the way people relate to one another, as well as the way they obtain and distribute information. As mobile devices continue to evolve, it has become easier to socialize; however, these mobile advancements have also made certain aspects of interaction more complex. The Handbook of Research on Human Social Interaction in the Age of Mobile Devices features an interdisciplinary perspective on mobile innovations and the use of this technology in daily life. Investigating the successes, issues, and challenges of the utilization of mobile technology, this handbook of research is a comprehensive reference source for professionals, educators, policymakers, and students interested in the impact these devices have on digital interaction, media, and communication. Topics Covered ¡EGovernment Interaction ¡EJournalism and Mobility ¡EMobile Learning ¡EMobile Marketing ¡EPolitics ¡EPublic Relations ¡ESocial Media ¡EYouth Socialization
   
VD05-814 Combating Security Breaches and Criminal Activity in the Digital Sphere
  Geetha, S./ 9781522501930/ Price:US$ 205.00
 
Book Cover With the rapid advancement in technology, a myriad of new threats have emerged in online environments. The broad spectrum of these digital risks requires new and innovative methods for protection against cybercrimes. Combating Security Breaches and Criminal Activity in the Digital Sphere is a pivotal reference source for the latest scholarly research on current trends in cyber forensic investigations, focusing on advanced techniques for protecting information security and preventing potential exploitation for online users. Featuring law enforcement perspectives, theoretical foundations, and forensic methods, this book is ideally designed for policy makers, analysts, researchers, technology developers, and upper-level students. Topics Covered ¡ECloud Forensics ¡ECriminal Profiling ¡ECyber Culture ¡ECyber Warfare ¡EDigital Ethics ¡EDigital Evidence ¡ENetwork Forensics
   
VD05-813 Contemporary Research on Intertextuality in Video Games
  Duret, Christophe/ 9781522504771/ Price:US$ 185.00
 
Book Cover Culture is dependent upon intertextuality to fuel the consumption and production of new media. The notion of intertextuality has gone through many iterations, but what remains constant is its stalwart application to bring to light what audiences value through the marriages of disparate ideology and references. Videogames, in particular, have a longstanding tradition of weaving texts together in multimedia formats that interact directly with players. Contemporary Research on Intertextuality in Video Games brings together game scholars to analyze the impact of video games through the lenses of transmediality, intermediality, hypertextuality, architextuality, and paratextuality. Unique in its endeavor, this publication discusses the vast web of interconnected texts that feed into digital games and their players. This book is essential reading for game theorists, designers, sociologists, and researchers in the fields of communication sciences, literature, and media studies. Topics Covered ¡ECultural Transduction ¡EFilmetic Virtual Worlds ¡EHypertextuality ¡EIntermediality ¡EMusical Intertextuality ¡EOrientalism ¡EProcedural Intertextuality ¡ETotalizing Texts ¡EUncanny Media ¡EUniversal Learning
   
VD05-812 Analyzing Language and Humor in Online Communication
  Taiwo, Rotimi/ 9781522503385/ Price:US$ 185.00
 
Book Cover Misunderstandings in technology-mediated communication can be due to a lack of tone and facial expression on the part of the speaker, which provide additional context clues into the meaning of the message beyond textual representation. As technology becomes more of a ubiquitous element in our interactions with one another, further study into the ways in which language and humor are conveyed online and impact human communication is essential. Analyzing Language and Humor in Online Communication presents a compendium of research into virtual communities, online communication, social networks, and the ways that language, and humor in particular, are being conveyed and understood in these digital environments. Emphasizing examples from popular culture and contemporary media, this innovative publication fills the current void in the literature by focusing specifically on humor creation and perception in the digital age. Students, researchers, linguists, psychologists, media professionals, and sociologists will find this publication to be a unique reference source. Topics Covered ¡EComputer-Mediated Communication ¡EMemes ¡EPolitical Messaging ¡EPopular Culture ¡ERacial Humor ¡ERhetorical Functions of Humor ¡ESatire ¡EVirtual Communities ¡EVisual Rhetoric
   
VD05-811 Examining the Evolution of Gaming and Its Impact on Social, Cultural, and Political Perspectives
  Valentine, Keri Duncan/ 9781522502616/ Price:US$ 190.00
 
Book Cover With complex stories and stunning visuals eliciting intense emotional responses, coupled with opportunities for self-expression and problem solving, video games are a powerful medium to foster empathy, critical thinking, and creativity in players. As these games grow in popularity, ambition, and technological prowess, they become a legitimate art form, shedding old attitudes and misconceptions along the way. Examining the Evolution of Gaming and Its Impact on Social, Cultural, and Political Perspectives asks whether videogames have the power to transform a player and his or her beliefs from a sociopolitical perspective. Unlike traditional forms of storytelling, videogames allow users to immerse themselves in new worlds, situations, and politics. This publication surveys the landscape of videogames and analyzes the emergent gaming that shifts the definition and cultural effects of videogames. This book is a valuable resource to game designers and developers, sociologists, students of gaming, and researchers in relevant fields. Topics Covered ¡ECreativity in Video Games ¡ECritical Theory in Games ¡EE-Sports ¡EExperimental Video Games ¡EGame Customization ¡EGame Mechanics ¡ELGBT Gaming Issues ¡EMulticultural Gaming Issues ¡EPolitics and Gaming ¡ESocial Gaming ¡ETransformative Gaming
   
VD05-810 Effective Big Data Management and Opportunities for Implementation
  Singh, Manoj Kumar/ 9781522501824/ Price:US$ 195.00
 
Book Cover ¡§Big data¡¨ has become a commonly used term to describe large-scale and complex data sets which are difficult to manage and analyze using standard data management methodologies. With applications across sectors and fields of study, the implementation and possible uses of big data are limitless. Effective Big Data Management and Opportunities for Implementation explores emerging research on the ever-growing field of big data and facilitates further knowledge development on methods for handling and interpreting large data sets. Providing multi-disciplinary perspectives fueled by international research, this publication is designed for use by data analysts, IT professionals, researchers, and graduate-level students interested in learning about the latest trends and concepts in big data. Topics Covered ¡EApplied Big Data ¡EComplex Data ¡EData Analytics ¡EData Management ¡EData Visualization ¡EInformation Retrieval ¡ELarge-Scale Recommendation Systems ¡EOpen Data Sets
   
VD05-809 Integrating Cognitive Architectures into Virtual Character Design
  Turner, Jeremy Owen/ 9781522504542/ Price:US$ 185.00
 
Book Cover Cognitive architectures represent an umbrella term to describe ways in which the flow of thought can be engineered towards cerebral and behavioral outcomes. Cognitive Architectures are meant to provide top-down guidance, a knowledge base, interactive heuristics and concrete or fuzzy policies for which the virtual character can utilize for intelligent interaction with his/her/its situated virtual environment. Integrating Cognitive Architectures into Virtual Character Design presents emerging research on virtual character artificial intelligence systems and procedures and the integration of cognitive architectures. Emphasizing innovative methodologies for intelligent virtual character integration and design, this publication is an ideal reference source for graduate-level students, researchers, and professionals in the fields of artificial intelligence, gaming, and computer science. Topics Covered ¡EArtificial General Intelligence (AGI) ¡ECognitive Models ¡EGaming ¡EHumanoids ¡ELogic Structures ¡EVirtual Agents ¡EVirtual Worlds
   
VD05-808 Defining Identity and the Changing Scope of Culture in the Digital Age
  Novak, Alison/ 9781522502128/ Price:US$ 185.00
 
Book Cover Since the popularization of Internet technologies in the mid-1990s, human identity and collective culture has been dramatically shaped by our continued use of digital communication platforms and engagement with the digital world. Despite a plethora of scholarship on digital technology, questions remain regarding how these technologies impact personal identity and perceptions of global culture. Defining Identity and the Changing Scope of Culture in the Digital Age explores a multitude of topics pertaining to self-hood, self-expression, human interaction, and perceptions of civilization and culture in an age where technology has become integrated into every facet of our everyday lives. Highlighting issues of race, ethnicity, and gender in digital culture, interpersonal and computer-mediated communication, pop culture, social media, and the digitization of knowledge, this pivotal reference publication is designed for use by scholars, psychologists, sociologists, and graduate-level students interested in the fluid and rapidly evolving norms of identity and culture through digital media. Topics Covered ¡EComputer-Mediated Communications ¡EDigital Culture ¡EDigital Identity ¡EDigital Natives ¡EGender and Diversity ¡EOnline Communities ¡ESocial Media
   
VD05-807 Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security
  Gupta, Brij/ 9781522501053/ Price:US$ 305.00
 
Book Cover Internet usage has become a facet of everyday life, especially as more technological advances have made it easier to connect to the web from virtually anywhere in the developed world. However, with this increased usage comes heightened threats to security within digital environments. The Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention. Featuring theoretical perspectives, best practices, and future research directions, this handbook of research is a vital resource for professionals, researchers, faculty members, scientists, graduate students, scholars, and software developers interested in threat identification and prevention. Topics Covered ¡EAd Hoc Network Security ¡EBotnet Detection ¡ECyber Crime ¡ECyber Warfare ¡EDefense Techniques ¡EForensic Tools ¡EVisual Analytics ¡EWireless Security
   
VD05-806 Innovative Solutions for Access Control Management
  Malik, Ahmad Kamran/ 9781522504481/ Price:US$ 195.00
 
Book Cover Technological innovation and evolution continues to improve personal and professional lifestyles, as well as general organizational and business practices; however, these advancements also create potential issues in the security and privacy of the user¡¦s information. Innovative Solutions for Access Control Management features a comprehensive discussion on the trending topics and emergent research in IT security and governance. Highlighting theoretical frameworks and best practices, as well as challenges and solutions within the topic of access control and management, this publication is a pivotal reference source for researchers, practitioners, students, database vendors, and organizations within the information technology and computer science fields. Topics Covered ¡EAdaptive Trust Negotiation ¡ECloud Applications ¡ECollaborative Environments ¡EMobile Computing ¡ENetwork Intrusion Detection ¡ESocial Media ¡EUser Authentication Requirements
   
VD05-805 Big Data: Concepts, Methodologies, Tools, and Applications, 4-Vols/Set.
  Information Resources Management Association (USA)/ 9781466698406/ Price:US$ 2400.00
 
Book Cover The digital age has presented an exponential growth in the amount of data available to individuals looking to draw conclusions based on given or collected information across industries. Challenges associated with the analysis, security, sharing, storage, and visualization of large and complex data sets continue to plague data scientists and analysts alike as traditional data processing applications struggle to adequately manage big data. Big Data: Concepts, Methodologies, Tools, and Applications is a multi-volume compendium of research-based perspectives and solutions within the realm of large-scale and complex data sets. Taking a multidisciplinary approach, this publication presents exhaustive coverage of crucial topics in the field of big data including diverse applications, storage solutions, analysis techniques, and methods for searching and transferring large data sets, in addition to security issues. Emphasizing essential research in the field of data science, this publication is an ideal reference source for data analysts, IT professionals, researchers, and academics. Topics Covered ¡EApplied Big Data ¡EBig Data Analytics ¡EData Mining Techniques ¡EData Visualization ¡EInformation Retrieval Methods ¡ESecurity and Privacy Issues ¡ESentiment Analysis
   
VD05-804 Intelligent Techniques for Data Analysis in Diverse Settings
  Celebi, Numan/ 9781522500759/ Price:US$ 195.00
 
Book Cover Data analysis forms the basis of many forms of research ranging from the scientific to the governmental. With the advent of machine intelligence and neural networks, extracting, modeling, and approaching data has been unimpeachably altered. These changes, seemingly small, affect the way societies organize themselves, deliver services, or interact with each other. Intelligent Techniques for Data Analysis in Diverse Settings addresses the specialized requirements of data analysis in a comprehensive way. This title contains a comprehensive overview of the most innovative recent approaches borne from intelligent techniques such as neural networks, rough sets, fuzzy sets, and metaheuristics. Combining new data analysis technologies, applications, emerging trends, and case studies, this publication reviews the intelligent, technological, and organizational aspects of the field. This book is ideally designed for IT professionals and students, data analysis specialists, healthcare providers, and policy makers. Topics Covered ¡EFuzzy Logic ¡EHeuristic Algorithms ¡EInformation Systems ¡EKnowledge Management ¡ELegal Aspects ¡ENeural Networks ¡EPrivacy Issues ¡ERough Set ¡EStatistical Analysis
   
VD05-801 Advanced Methods for Complex Network Analysis
  Meghanathan, Natarajan/ 9781466699649/ Price:US$ 215.00
 
Book Cover As network science and technology continues to gain popularity, it becomes imperative to develop procedures to examine emergent network domains, as well as classical networks, to help ensure their overall optimization. Advanced Methods for Complex Network Analysis features the latest research on the algorithms and analysis measures being employed in the field of network science. Highlighting the application of graph models, advanced computation, and analytical procedures, this publication is a pivotal resource for students, faculty, industry practitioners, and business professionals interested in theoretical concepts and current developments in network domains. Topics Covered ¡EAutonomous System Networks ¡EDistributed Systems ¡EEvolutionary Computation ¡ENetwork Architecture ¡ESocial Network Analysis ¡EVirus Propagation ¡EWireless Networks
   
VD05-800 Developing Interoperable and Federated Cloud Architecture
  Kecskemeti, Gabor/ 9781522501534/ Price:US$ 210.00
 
Book Cover As cloud technology continues to advance and be utilized, many service providers have begun to employ multiple networks, or cloud federations; however, as the popularity of these federations increases, so does potential utilization challenges. Developing Interoperable and Federated Cloud Architecture provides valuable insight into current and emergent research occurring within the field of cloud infrastructures. Featuring barriers, recent developments, and practical applications on the interoperability issues of federated cloud architectures, this book is a focused reference for administrators, developers, and cloud users interested in energy awareness, scheduling, and federation policies and usage. Topics Covered ¡EAccess Management ¡ECloud Federations ¡EData Analytics ¡EFault-Tolerant Databases ¡EMulti-Cloud Infrastructure ¡EResource Brokerage ¡EVolunteer Clouds
   
VD05-799 Creative Technologies for Multidisciplinary Applications
  Connor, Andy M./ 9781522500162/ Price:US$ 205.00
 
Book Cover Given that institutions of higher education have a predisposition to compartmentalize and delineate areas of study, creative technology may seem oxymoronic. On the contrary, the very basis of western thought is found in the idea of transcendent knowledge. The marriage of opposing disciplines therefore acts as a more holistic approach to education. Creative Technologies for Multidisciplinary Applications acts as an inspiration to educators and researchers who wish to participate in the future of such multidisciplinary disciplines. Because creative technology encompasses many applications with the realm of art, gaming, the humanities, and digitization, this book features a diverse collection of relevant research for the modern world. It is a pivotal reference publication for educators, students, and researchers in fields related to sociology, technology, and the humanities. Topics Covered ¡EAdditive Manufacturing ¡EDigital Photography ¡EGamification ¡EHumanitarian Logistics ¡EMachinima ¡EMultimodality in Videogames ¡EVirtual Humanity ¡EVirtual Reality ¡EVisual Effects
   
VD05-797 Handbook of Research on Generalized and Hybrid Set Structures and Applications for Soft Computing.
  John, Sunil Jacob/ 9781466697980/ Price:US$ 375.00
 
Book Cover Successful development of effective computational systems is a challenge for IT developers across sectors due to uncertainty issues that are inherently present within computational problems. Soft computing proposes one such solution to the problem of uncertainty through the application of generalized set structures including fuzzy sets, rough sets, and multisets. The Handbook of Research on Generalized and Hybrid Set Structures and Applications for Soft Computing presents double blind peer-reviewed and original research on soft computing applications for solving problems of uncertainty within the computing environment. Emphasizing essential concepts on generalized and hybrid set structures that can be applied across industries for complex problem solving, this timely resource is essential to engineers across disciplines, researchers, computer scientists, and graduate-level students. Topics Covered ¡EDifferential Evolution ¡EFuzzy Sets ¡EGenuine Sets ¡ENeutrosophic Sets ¡ERough Sets ¡ESoft Sets
   
VD05-796 Handbook of Research on Modern Optimization Algorithms and Applications in Engineering and Economics.
  Vasant, Pandian/ 9781466696440/ Price:US$ 325.00
 
Book Cover Modern optimization approaches have attracted many research scientists, decision makers and practicing researchers in recent years as powerful intelligent computational techniques for solving several complex real-world problems. The Handbook of Research on Modern Optimization Algorithms and Applications in Engineering and Economics highlights the latest research innovations and applications of algorithms designed for optimization applications within the fields of engineering, IT, and economics. Focusing on a variety of methods and systems as well as practical examples, this book is a significant resource for graduate-level students, decision makers, and researchers in both public and private sectors who are seeking research-based methods for modeling uncertain real-world problems. Topics Covered ¡ECombinatorial Optimization Methods ¡EDynamic Programming Methods ¡EHybrid Systems ¡ELinear Programming Methods ¡EMixed-Integer Programming Methods ¡EOptimal Control Methods ¡EStochastic Optimal Control Methods
   
VD05-795 Problem Solving and Uncertainty Modeling through Optimization and Soft Computing Applications
  Saxena, Pratiksha/ 9781466698857/ Price:US$ 225.00
 
Book Cover Optimization techniques have developed into a modern-day solution for real-world problems in various industries. As a way to improve performance and handle issues of uncertainty, optimization research becomes a topic of special interest across disciplines. Problem Solving and Uncertainty Modeling through Optimization and Soft Computing Applications presents the latest research trends and developments in the area of applied optimization methodologies and soft computing techniques for solving complex problems. Taking a multi-disciplinary approach, this critical publication is an essential reference source for engineers, managers, researchers, and post-graduate students. Topics Covered ¡EAlgorithms ¡EComputational Intelligence ¡EDifferential Evolution ¡EGlobal Optimization ¡EMulti-Objective Optimization ¡ESimulation Tools
   
VD05-794 Mobile Technologies, 4-Vols/Set.
  Goggin, Gerard/ 9781138775732/ Price:¢G 995.00
 
Book Cover With at least seven billion subscriptions worldwide, the impact of mobile devices undoubtedly rivals that of television, radio, and newspapers. Mobile technologies have had¡Xand continue to have¡Xa profound influence on every sphere of public and private life. Unsurprisingly, since their emergence in the late 1970s, mobile technologies have been the focus of serious scholarly study and exploration, and, as research on mobile technologies continues to grow dramatically, this new four-volume collection from Routledge provides an authoritative reference work to make sense of their defining aspects and cardinal dynamics. Edited by three leading scholars, Mobile Technologies brings together in one easy-to-access set, the essential, ¡¥must-read¡¦ Major Works on the greatest technology of our time. Goggin, Ling, and Hjorth have carefully integrated foundational texts with the most significant and pioneering new material to create an indispensable research tool and pedagogic resource.
   
VD05-793 Analyzing Digital Discourse and Human Behavior in Modern Virtual Environments.
  Baggio, Bobbe Gaines/ 9781466698994/ Price:US$ 175.00
 
Book Cover Though humans have been communicating through virtual mediators since the invention of the telephone, new technologies make the use of virtual communications even more immediate and pervasive than ever before. By understanding the theories and models behind virtual communication, one can understand the way society has been changed and how it will continue to do so. Analyzing Digital Discourse and Human Behavior in Modern Virtual Environments examines the implications of virtual communication and online interaction and the theories and trends associated with them. It will discuss and address the differences and challenges that develop when communicating virtually and explore the various influences virtual communication plays in work, education, and quotidian life. This title provides a foundation of emerging trends from which new theories and models of communication can grow. This book will become a cherished resource for academics, researchers, technology developers, students, and government or institutional leaders. Topics Covered ¡EAccessibility ¡EBehavioral Economics ¡EFiltering and Search Engines ¡EGlobal Communications ¡EHuman Attention ¡EPerceptions of Virtual Communications ¡ESocietal Impacts of Communication ¡EVirtual Collaboration ¡EVirtual Communications in Education ¡EVirtual Identity and Anonymity
   
VD05-792 Managing Big Data in Cloud Computing Environments.
  Ma, Zongmin/ 9781466698345/ Price:US$ 195.00
 
Book Cover Cloud computing has proven to be a successful paradigm of service-oriented computing, and has revolutionized the way computing infrastructures are abstracted and used. By means of cloud computing technology, massive data can be managed effectively and efficiently to support various aspects of problem solving and decision making. Managing Big Data in Cloud Computing Environments explores the latest advancements in the area of data management and analysis in the cloud. Providing timely, research-based information relating to data storage, sharing, extraction, and indexing in cloud systems, this publication is an ideal reference source for graduate students, IT specialists, researchers, and professionals working in the areas of data and knowledge engineering. Topics Covered ¡ECloud Security ¡EData Exchange ¡EData Indexing ¡EData Queries ¡EData Stores ¡EDomain-Specific Data ¡EKnowledge Representation
   
VD05-791 Modern Software Engineering Methodologies for Mobile and Cloud Environments.
  Antonio Miguel Rosado da Cruz/ 9781466699168/ Price:US$ 210.00
 
Book Cover As technology continues to evolve, the popularity of mobile computing has become inherent within today¡¦s society. With the majority of the population using some form of mobile device, it has become increasingly important to develop more efficient cloud platforms. Modern Software Engineering Methodologies for Mobile and Cloud Environments investigates emergent trends and research on innovative software platforms in mobile and cloud computing. Featuring state-of-the-art software engineering methods, as well as new techniques being utilized in the field, this book is a pivotal reference source for professionals, researchers, practitioners, and students interested in mobile and cloud environments. Topics Covered ¡EAndroid Technologies ¡ECollaborative Applications ¡EMobile Platforms ¡EMobility Management ¡EModeling Environments ¡EPolyglot Programming ¡ESoftware Architecture
   
VD05-790 Emerging Innovations in Agile Software Development
  Ghani, Imran/ 9781466698581/ Price:US$ 205.00
 
Book Cover Agile is a relatively recent methodology used in the development process of a project. Therefore, it is important to share new emerging knowledge with researchers and professionals interested in adopting an agile mindset. Emerging Innovations in Agile Software Development focuses on the use of agile methodologies to manage, design, develop, test and maintain software projects. Emphasizing research-based solutions for contemporary software development, this publication is designed for use by software developers, researchers, and graduate-level students in software engineering and project management programs. Topics Covered ¡EAgile Assessment Methods ¡EAgile Transformation ¡EAgile Transmission Models ¡EIT Project Management ¡EOrganizational Agility ¡ESoftware Engineering
   
VD05-789 Network Security Attacks and Countermeasures.
  G., Dileep Kumar/ 9781466687615/ Price:US$ 205.00
 
Book Cover Our world is increasingly driven by sophisticated networks of advanced computing technology, and the basic operation of everyday society is becoming increasingly vulnerable to those networks¡¦ shortcomings. The implementation and upkeep of a strong network defense is a substantial challenge, beset not only by economic disincentives, but also by an inherent logistical bias that grants advantage to attackers. Network Security Attacks and Countermeasures discusses the security and optimization of computer networks for use in a variety of disciplines and fields. Touching on such matters as mobile and VPN security, IP spoofing, and intrusion detection, this edited collection emboldens the efforts of researchers, academics, and network administrators working in both the public and private sectors. This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, and more. Topics Covered ¡EDDoS Attacks ¡EIntrusion Detection and Prevention ¡ENetwork Administration ¡ERSA Vulnerabilities ¡EThreat Classification ¡EVirtual Private Networks ¡EVPN Security ¡EWireless Sensor Networks
   
VD05-788 Emerging Technologies in Intelligent Applications for Image and Video Processing.
  Santhi, V./ 9781466696853/ Price:US$ 235.00
 
Book Cover Image and Video Processing is an active area of research due to its potential applications for solving real-world problems. Integrating computational intelligence to analyze and interpret information from image and video technologies is an essential step to processing and applying multimedia data. Emerging Technologies in Intelligent Applications for Image and Video Processing presents the most current research relating to multimedia technologies including video and image restoration and enhancement as well as algorithms used for image and video compression, indexing and retrieval processes, and security concerns. Featuring insight from researchers from around the world, this publication is designed for use by engineers, IT specialists, researchers, and graduate level students. Topics Covered ¡EBiometric Authentication ¡EEvolutionary Algorithms ¡EImage Restoration ¡EImage Retrieval Systems ¡EMachine Learning ¡ENoise Removal Techniques ¡EWatermarking
   
VD05-787 Managing and Processing Big Data in Cloud Computing.
  Kannan, Rajkumar/ 9781466697676/ Price:US$ 200.00
 
Book Cover Big data has presented a number of opportunities across industries. With these opportunities come a number of challenges associated with handling, analyzing, and storing large data sets. One solution to this challenge is cloud computing, which supports a massive storage and computation facility in order to accommodate big data processing. Managing and Processing Big Data in Cloud Computing explores the challenges of supporting big data processing and cloud-based platforms as a proposed solution. Emphasizing a number of crucial topics such as data analytics, wireless networks, mobile clouds, and machine learning, this publication meets the research needs of data analysts, IT professionals, researchers, graduate students, and educators in the areas of data science, computer programming, and IT development. Topics Covered ¡EBig Data Virtualization ¡EData Clusters ¡EMobile Cloud Computing ¡EResource Scheduling ¡ESustainability Issues ¡EUnstructured Data
   
VD05-786 Design Solutions for Improving Website Quality and Effectiveness.
  Sreedhar, G./ 9781466697645/ Price:US$ 220.00
 
Book Cover As the Internet has evolved to become an integral part of modern society, the need for better quality assurance practices in web engineering has heightened. Adherence to and improvement of current standards ensures that overall web usability and accessibility are at optimum efficiency. Design Solutions for Improving Website Quality and Effectiveness is an authoritative reference source for the latest breakthroughs, techniques, and research-based solutions for the overall improvement of the web designing process. Featuring relevant coverage on the analytics, metrics, usage, and security aspects of web environments, this publication is ideally designed for reference use by engineers, researchers, graduate students, and web designers interested in the enhancement of various types of websites. Topics Covered ¡EBioclustering Optimization Techniques ¡EEmerging Economies ¡EOnline Content Management ¡EPrivacy Disclosure ¡ESemantic Web Applications ¡EService Oriented Architecture ¡EWeb 2.0 Application
   
VD05-785 Handbook of Research on Emerging Perspectives in Intelligent Pattern Recognition, Analysis, and Image Processing.
  Kamila, Narendra Kumar/ 9781466686540/ Price:US$ 255.00
 
Book Cover Whether an old photograph or a single video frame, there is a wealth of data hidden in a picture. Image processing and pattern analysis play a vital role in engineering science and can be applied in diverse areas to solve existing and practical problems. The Handbook of Research on Emerging Perspectives in Intelligent Pattern Recognition, Analysis, and Image Processing discusses the advances of image processing and pattern analysis and addresses how new innovations will cater to the demands of daily life. This handbook provides the resources necessary for technology developers, scientists, and policymakers to adopt and implement new inventions across the globe. The chapters presented in this publication encompass various aspects of recent image processing and pattern analysis innovations including, but not limited to, mobile image tracking, motion picture analysis, pattern classification, multisensory data fusion, 3D imaging, supporting routing protocols, brain computer interfaces, image restoration, and medical imaging. Topics Covered ¡E3D Imaging ¡EBrain Computer Interface ¡EImage Restoration ¡EMedi