Filter
(found 3438 products)
Book cover image
This best-selling software testing title is the only official textbook of the ISTQB-BCS Certified Tester Foundation Level. This fourth edition includes examples and exercises reflecting current technology and applications. It is ideal for those with a little experience of software testing who wish to cement their knowledge with industry-recognised techniques ...
Software Testing: An ISTQB-BCS Certified Tester Foundation guide - 4th edition
This best-selling software testing title is the only official textbook of the ISTQB-BCS Certified Tester Foundation Level. This fourth edition includes examples and exercises reflecting current technology and applications. It is ideal for those with a little experience of software testing who wish to cement their knowledge with industry-recognised techniques and theory.
https://magrudy-assets.storage.googleapis.com/9781780174921.jpg
68.24 USD

Software Testing: An ISTQB-BCS Certified Tester Foundation guide - 4th edition

by Peter Williams, Geoff Thompson, Angelina Samaroo, Peter Morgan, Brian Hambling
Paperback / softback
Book cover image
Business and IT organizations are currently embracing new strategically sound concepts in order to be more customer-centric, competitive, and cognitive in their daily operations. While useful, the various software tools, pioneering technologies, as well as their unique contributions largely go unused due to the lack of information provided on their ...
Novel Practices and Trends in Grid and Cloud Computing
Business and IT organizations are currently embracing new strategically sound concepts in order to be more customer-centric, competitive, and cognitive in their daily operations. While useful, the various software tools, pioneering technologies, as well as their unique contributions largely go unused due to the lack of information provided on their special characteristics. Novel Practices and Trends in Grid and Cloud Computing is a collection of innovative research on the key concerns of cloud computing and how they are being addressed, as well as the various technologies and tools empowering cloud theory to be participative, penetrative, pervasive, and persuasive. While highlighting topics including cyber security, smart technology, and artificial intelligence, this book is ideally designed for students, researchers, and business managers on the lookout for innovative IT solutions for all the business automation software and improvisations of computational technologies.
https://magrudy-assets.storage.googleapis.com/9781522590231.jpg
267.750000 USD

Novel Practices and Trends in Grid and Cloud Computing

Hardback
Book cover image
More software engineers are likely to work in a globally distributed environment, which brings benefits that include quick and better software development, less manpower retention, scalability, and less software development cost and sharing of knowledge from the global pool of employees. However, these work environments also introduce a physical separation ...
Human Factors in Global Software Engineering
More software engineers are likely to work in a globally distributed environment, which brings benefits that include quick and better software development, less manpower retention, scalability, and less software development cost and sharing of knowledge from the global pool of employees. However, these work environments also introduce a physical separation between team members and project leaders, which can create problems in communication and ultimately lead to the failure of the project. Human Factors in Global Software Engineering is a collection of innovative research focusing on the challenges, issues, and importance of human factors in global software engineering organizations in order to help these organizations better manage their manpower and provide an appropriate culture and technology in order to make their software development projects successful. While highlighting topics including agile software, knowledge management, and human-computer interaction, this book is ideally designed for project managers, administrators, business professionals, researchers, practitioners, students, and academicians.
https://magrudy-assets.storage.googleapis.com/9781522594482.jpg
257.250000 USD

Human Factors in Global Software Engineering

Hardback
Book cover image
The concept of a big data warehouse appeared in order to store moving data objects and temporal data information. Moving objects are geometries that change their position and shape continuously over time. In order to support spatio-temporal data, a data model and associated query language is needed for supporting moving ...
Emerging Perspectives in Big Data Warehousing
The concept of a big data warehouse appeared in order to store moving data objects and temporal data information. Moving objects are geometries that change their position and shape continuously over time. In order to support spatio-temporal data, a data model and associated query language is needed for supporting moving objects. Emerging Perspectives in Big Data Warehousing is an essential research publication that explores current innovative activities focusing on the integration between data warehousing and data mining with an emphasis on the applicability to real-world problems. Featuring a wide range of topics such as index structures, ontology, and user behavior, this book is ideally designed for IT consultants, researchers, professionals, computer scientists, academicians, and managers.
https://magrudy-assets.storage.googleapis.com/9781522555162.jpg
257.250000 USD

Emerging Perspectives in Big Data Warehousing

Hardback
Book cover image
Driving innovation can reduce costs for companies, institutions, military programs, and successful businesses. Quality is key to successful innovation. Delivery of complex products must have high quality to reduce customer problems and defects. This book explains how to integrate Quality Assurance processes to produce compliant product management and gap analysis. ...
Effective Processes for Quality Assurance
Driving innovation can reduce costs for companies, institutions, military programs, and successful businesses. Quality is key to successful innovation. Delivery of complex products must have high quality to reduce customer problems and defects. This book explains how to integrate Quality Assurance processes to produce compliant product management and gap analysis. It shows how Quality Assurance provides a common operating framework in which best practices, improvements, and cost avoidance activities can be shared. Effective Processes for Quality Assurance emphasizes improving process execution and reducing operational costs. It also focuses on how Quality Assurance personnel must support companies, institutions, military programs, and successful businesses by encouraging a cooperative, proactive approach and ensure compliance through management and team member participation. Lean and Agile can provide a competitive advantage, and this practical reference explains how to implement these two principles to deliver products that have fewer defects. It also explains: Quality Assurance methods Measuring benefits of Quality Assurance process improvement Quality Assurance performance and improvement Risk management Quality Assurance improvement with metrics Effective processes for Quality Assurance Quantitative process performance and commitments Quality Assurance plans Quality Assurance for customers and suppliers Supporting software configuration Effective Processes for Quality Assurance covers the critical issues for implementing Quality Assurance processes that can deliver high-quality products successfully.
https://magrudy-assets.storage.googleapis.com/9780367172961.jpg
104.950000 USD

Effective Processes for Quality Assurance

by Boyd L. Summers
Hardback
Book cover image
It is a major challenge to migrate very large databases from one system, say for example, to transfer critical data from Oracle to SQL Server. One has to consider several issues such as loss of data being transferred, the security of the data, the cost and effort, technical aspects of ...
Practical Guide to Large Database Migration
It is a major challenge to migrate very large databases from one system, say for example, to transfer critical data from Oracle to SQL Server. One has to consider several issues such as loss of data being transferred, the security of the data, the cost and effort, technical aspects of the software involved, etc. There a very few books that provide practical tools and the methodology to migrate data from one vendor to another. This book introduces the concepts in database migration with large sample databases. It provides step by step guides and screenshots for database migration tools. Many examples are shown for migrating Oracle, SQL Server and MySQL databases.
https://magrudy-assets.storage.googleapis.com/9781138391628.jpg
178.450000 USD

Practical Guide to Large Database Migration

by Preston Zhang
Hardback
Book cover image
It is now more important than ever to implement approaches and methods that can be effective in extracting meaningful information from large data sets. Although data sets may be available for different aspects of society, we may not assess the intrinsic characteristics of their behavior effectively. Additionally, frameworks are needed ...
Interdisciplinary Approaches to Information Systems and Software Engineering
It is now more important than ever to implement approaches and methods that can be effective in extracting meaningful information from large data sets. Although data sets may be available for different aspects of society, we may not assess the intrinsic characteristics of their behavior effectively. Additionally, frameworks are needed that can store, process, and represent the data in such a manner that can be of practical significance. Interdisciplinary Approaches to Information Systems and Software Engineering is an essential reference publication that assesses the significance of robust information systems in characterizing events of varying nature and dimensions. Additionally, the book includes studies on the development and application of decision-making and prediction modeling frameworks using different approaches such as agent-based modeling, spatial decision support systems, and spatial data mining. Covering topics such as management information systems, knowledge discovery, and mathematical analysis, this book is ideal for professionals, researchers, and academicians in various disciplines including computer science, information technology, geographical information systems, remote sensing, and earth system sciences.
https://magrudy-assets.storage.googleapis.com/9781522577843.jpg
225.750000 USD

Interdisciplinary Approaches to Information Systems and Software Engineering

Hardback
Book cover image
Toward Deep Neural Networks: WASD Neuronet Models, Algorithms, and Applications introduces the outlook and extension toward deep neural networks, with a focus on the weights-and-structure determination (WASD) algorithm. Based on the authors' 20 years of research experience on neuronets, the book explores the models, algorithms, and applications of the WASD ...
Deep Neural Networks: WASD Neuronet Models, Algorithms, and Applications
Toward Deep Neural Networks: WASD Neuronet Models, Algorithms, and Applications introduces the outlook and extension toward deep neural networks, with a focus on the weights-and-structure determination (WASD) algorithm. Based on the authors' 20 years of research experience on neuronets, the book explores the models, algorithms, and applications of the WASD neuronet, and allows reader to extend the techniques in the book to solve scientific and engineering problems. The book will be of interest to engineers, senior undergraduates, postgraduates, and researchers in the fields of neuronets, computer mathematics, computer science, artificial intelligence, numerical algorithms, optimization, simulation and modeling, deep learning, and data mining. Features Focuses on neuronet models, algorithms, and applications Designs, constructs, develops, analyzes, simulates and compares various WASD neuronet models, such as single-input WASD neuronet models, two-input WASD neuronet models, three-input WASD neuronet models, and general multi-input WASD neuronet models for function data approximations Includes real-world applications, such as population prediction Provides complete mathematical foundations, such as Weierstrass approximation, Bernstein polynomial approximation, Taylor polynomial approximation, and multivariate function approximation, exploring the close integration of mathematics (i.e., function approximation theories) and computers (e.g., computer algorithms) Utilizes the authors' 20 years of research on neuronets
https://magrudy-assets.storage.googleapis.com/9781138387034.jpg
157.450000 USD
Hardback
Book cover image
This book addresses the challenges in the software engineering of variability-intensive systems. Variability-intensive systems can support different usage scenarios by accommodating different and unforeseen features and qualities. The book features academic and industrial contributions that discuss the challenges in developing, maintaining and evolving systems, cloud and mobile services for variability-intensive ...
Software Engineering for Variability Intensive Systems: Foundations and Applications
This book addresses the challenges in the software engineering of variability-intensive systems. Variability-intensive systems can support different usage scenarios by accommodating different and unforeseen features and qualities. The book features academic and industrial contributions that discuss the challenges in developing, maintaining and evolving systems, cloud and mobile services for variability-intensive software systems and the scalability requirements they imply. The book explores software engineering approaches that can efficiently deal with variability-intensive systems as well as applications and use cases benefiting from variability-intensive systems.
https://magrudy-assets.storage.googleapis.com/9780815348054.jpg
136.450000 USD

Software Engineering for Variability Intensive Systems: Foundations and Applications

Hardback
Book cover image
This book teaches the basics of Oracle GoldenGate, which is a product that is used to simplify the process of Oracle Database Replication. GoldenGate can be used for reporting, failover, high availability, live reporting, data warehousing, and BigData ETL process, as well as connecting to multiple other data sources outside ...
Working with Oracle GoldenGate 12c: From Implementation to Troubleshooting
This book teaches the basics of Oracle GoldenGate, which is a product that is used to simplify the process of Oracle Database Replication. GoldenGate can be used for reporting, failover, high availability, live reporting, data warehousing, and BigData ETL process, as well as connecting to multiple other data sources outside of Oracle Database such as SQL Server, MySQL, Teradata, PostgreSQL, and many others. The purpose of GoldenGate and its popularity is its ability to make the highly complex architecture of database replication into a much more simplistic task. This book teaches the reader how to use Oracle GoldenGate, from installation to troubleshooting.
https://magrudy-assets.storage.googleapis.com/9781138197572.jpg
73.450000 USD

Working with Oracle GoldenGate 12c: From Implementation to Troubleshooting

by Gavin Powell
Hardback
Book cover image
C++ Programming
https://magrudy-assets.storage.googleapis.com/9783110469431.jpg
85.040000 USD

C++ Programming

by Fang Yang, Yuan Dong, Li Zheng
Paperback / softback
Book cover image
Cyber-attacks continue to rise as more individuals rely on storing personal information on networks. Even though these networks are continuously checked and secured, cybercriminals find new strategies to break through these protections. Thus, advanced security systems, rather than simple security patches, need to be designed and developed. Exploring Security in ...
Exploring Security in Software Architecture and Design
Cyber-attacks continue to rise as more individuals rely on storing personal information on networks. Even though these networks are continuously checked and secured, cybercriminals find new strategies to break through these protections. Thus, advanced security systems, rather than simple security patches, need to be designed and developed. Exploring Security in Software Architecture and Design is an essential reference source that discusses the development of security-aware software systems that are built into every phase of the software architecture. Featuring research on topics such as migration techniques, service-based software, and building security, this book is ideally designed for computer and software engineers, ICT specialists, researchers, academicians, and field experts.
https://magrudy-assets.storage.googleapis.com/9781522563136.jpg
225.750000 USD

Exploring Security in Software Architecture and Design

Hardback
Book cover image
The objective of this edited book is to gather best practices in the development and management of mobile apps projects. Mobile Apps Engineering aims to provide software engineering lecturers, students and researchers of mobile computing a starting point for developing successful mobile apps. To achieve these objectives, the book's contributors ...
Mobile Apps Engineering: Design, Development, Security, and Testing
The objective of this edited book is to gather best practices in the development and management of mobile apps projects. Mobile Apps Engineering aims to provide software engineering lecturers, students and researchers of mobile computing a starting point for developing successful mobile apps. To achieve these objectives, the book's contributors emphasize the essential concepts of the field, such as apps design, testing and security, with the intention of offering a compact, self-contained book which shall stimulate further research interest in the topic. The editors hope and believe that their efforts in bringing this book together can make mobile apps engineering an independent discipline inspired by traditional software engineering, but taking into account the new challenges posed by mobile computing.
https://magrudy-assets.storage.googleapis.com/9781138054356.jpg
104.950000 USD

Mobile Apps Engineering: Design, Development, Security, and Testing

Hardback
Book cover image
To provide the necessary security and quality assurance activities into Internet of Things (IoT)-based software development, innovative engineering practices are vital. They must be given an even higher level of importance than most other events in the field. Integrating the Internet of Things Into Software Engineering Practices provides research on ...
Integrating the Internet of Things Into Software Engineering Practices
To provide the necessary security and quality assurance activities into Internet of Things (IoT)-based software development, innovative engineering practices are vital. They must be given an even higher level of importance than most other events in the field. Integrating the Internet of Things Into Software Engineering Practices provides research on the integration of IoT into the software development life cycle (SDLC) in terms of requirements management, analysis, design, coding, and testing, and provides security and quality assurance activities to IoT-based software development. The content within this publication covers agile software, language specification, and collaborative software and is designed for analysts, security experts, IoT software programmers, computer and software engineers, students, professionals, and researchers.
https://magrudy-assets.storage.googleapis.com/9781522577904.jpg
225.750000 USD

Integrating the Internet of Things Into Software Engineering Practices

Hardback
Book cover image
Coupled with machine learning, the use of signal processing techniques for big data analysis, Internet of things, smart cities, security, and bio-informatics applications has witnessed explosive growth. This has been made possible via fast algorithms on data, speech, image, and video processing with advanced GPU technology. This book presents an ...
Learning Approaches in Signal Processing
Coupled with machine learning, the use of signal processing techniques for big data analysis, Internet of things, smart cities, security, and bio-informatics applications has witnessed explosive growth. This has been made possible via fast algorithms on data, speech, image, and video processing with advanced GPU technology. This book presents an up-to-date tutorial and overview on learning technologies such as random forests, sparsity, and low-rank matrix estimation and cutting-edge visual/signal processing techniques, including face recognition, Kalman filtering, and multirate DSP. It discusses the applications that make use of deep learning, convolutional neural networks, random forests, etc. The applications include super-resolution imaging, fringe projection profilometry, human activities detection/capture, gesture recognition, spoken language processing, cooperative networks, bioinformatics, DNA, and healthcare.
https://magrudy-assets.storage.googleapis.com/9789814800501.jpg
329.31 USD

Learning Approaches in Signal Processing

Hardback
Book cover image
Online social networking sites like Facebook, LinkedIn, and Twitter, offer millions of members the opportunity to befriend one another, send messages to each other, and post content on the site - actions which generate mind-boggling amounts of data every day.To make sense of the massive data from these sites, we ...
Network Data Mining And Analysis
Online social networking sites like Facebook, LinkedIn, and Twitter, offer millions of members the opportunity to befriend one another, send messages to each other, and post content on the site - actions which generate mind-boggling amounts of data every day.To make sense of the massive data from these sites, we resort to social media mining to answer questions like the following:Social media shatters the boundaries between the real world and the virtual world. We can now integrate social theories with computational methods to study how individuals interact with each other and how social communities form in bipartite and signed networks. The uniqueness of social media data calls for novel data mining techniques that can effectively handle user generated content with rich social relations. The study and development of these new techniques are under the purview of social media mining, an emerging discipline under the umbrella of data mining. Social Media Mining is the process of representing, analyzing, and extracting actionable patterns from social media data.
https://magrudy-assets.storage.googleapis.com/9789813274952.jpg
145.04 USD

Network Data Mining And Analysis

by David Lo, Ee-Peng Lim, Ming Gao
Hardback
Book cover image
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. This comprehensive test preparation system offers complete coverage of every topic on the PMI-ACP exam Pass the PMI-ACP Agile Certified Practitioner exam with ...
PMI-ACP Agile Certified Practitioner All-in-One Exam Guide
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. This comprehensive test preparation system offers complete coverage of every topic on the PMI-ACP exam Pass the PMI-ACP Agile Certified Practitioner exam with ease using the detailed information contained in this highly effective self-study guide. The book offers 100% coverage of all current exam objectives and shows, step by step, how to successfully set up and configure an Agile framework-based project. PMI-ACP Agile Certified Practitioner All-in-One Exam Guide features more than 240 accurate practice questions with in-depth answer explanations. All questions closely match those on the live test in tone, format, and content. Beyond fully preparing you for the exam, the book also serves as a valuable on-the-job reference. Coverage includes: -Agile principles and the PMI-ACP mindset-Value-driven delivery in Agile projects-Managing stakeholder engagement-Leading team performance-Planning for Agile projects-Detecting and resolving problems-Leading continuous improvement-And much more Digital content includes: -240 practice exam questions-Video training from the author-A secured book PDF
https://magrudy-assets.storage.googleapis.com/9781260115963.jpg
52.500000 USD

PMI-ACP Agile Certified Practitioner All-in-One Exam Guide

by Joseph Phillips
Mixed media product
Book cover image
SAFe(R) The World's Leading Framework for Enterprise Agility Philips is continuously driving to develop high-quality software in a predictable, fast, and Agile way. SAFe addresses this primary goal, and offers these further benefits: reduced time-to-market, improved quality, stronger alignment across geographically distributed multi-disciplinary teams, and collaboration across teams to deliver ...
SAFe 4.5 Distilled: Applying the Scaled Agile Framework for Lean Enterprises
SAFe(R) The World's Leading Framework for Enterprise Agility Philips is continuously driving to develop high-quality software in a predictable, fast, and Agile way. SAFe addresses this primary goal, and offers these further benefits: reduced time-to-market, improved quality, stronger alignment across geographically distributed multi-disciplinary teams, and collaboration across teams to deliver meaningful value to customers with reduced cycle time. --Sundaresan Jagadeesan, SW CoE Program Director, Philips To succeed in today's adapt-or-die marketplace, businesses must be able to rapidly change the way they create and deliver value to their customers. Hundreds of the world's most successful companies-including Intel, Capital One, AstraZeneca, Cisco, and Philips-have turned to the Scaled Agile Framework(R) (SAFe(R)) to achieve agility at scale and maintain a competitive edge. SAFe(R) 4.5 Distilled: Applying the Scaled Agile Framework(R) for Lean Enterprises explains how adopting SAFe can quickly improve time to market and increase productivity, quality, and employee engagement. In this book, you will Understand the business case for SAFe: its benefits, the problems it solves, and how to apply it Get an overview of SAFe across all parts of the business: team, program, value stream, and portfolio Learn why SAFe works: the power of SAFe's Lean-Agile mindset, values, and principles Discover how systems thinking, Agile development, and Lean product development form the underlying basis for SAFe Learn how to become a Lean-Agile leader and effectively drive an enterprise-wide transformation Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.
https://magrudy-assets.storage.googleapis.com/9780135170496.jpg
58.00 USD

SAFe 4.5 Distilled: Applying the Scaled Agile Framework for Lean Enterprises

by Dean Leffingwell, Richard Knaster
Paperback / softback
Book cover image
This book provides the latest research advances in the field of system reliability assurance and engineering. It contains reference material for applications of reliability in system engineering, offering a theoretical sound background with adequate numerical illustrations. Included are concepts pertaining to reliability analysis, assurance techniques and methodologies, tools, and practical ...
System Reliability Management: Solutions and Technologies
This book provides the latest research advances in the field of system reliability assurance and engineering. It contains reference material for applications of reliability in system engineering, offering a theoretical sound background with adequate numerical illustrations. Included are concepts pertaining to reliability analysis, assurance techniques and methodologies, tools, and practical applications of system reliability modeling and allocation. The collection discusses various soft computing techniques like artificial intelligence and particle swarm optimization approach for reliability assessment. Importance of differentiating between the optimal release time and testing stop time of the software has been explicitly discussed and presented in the book. Features: Creates understanding of the costs associated with complex systems Covers reliability measurement of engineering systems Incorporates an efficient effort-based expenditure policy incorporating cost and reliability criteria Provides information for optimal testing stop and release time of software system Presents software performance and security layout Addresses reliability prediction and its maintenance through advanced analytics techniques Overall, System Reliability Management: Solutions and Techniques is a collaborative and interdisciplinary approach for better communication of problems and solutions to increase the performance of the system for better utilization and resource management.
https://magrudy-assets.storage.googleapis.com/9780815360728.jpg
247.41 USD

System Reliability Management: Solutions and Technologies

Hardback
Book cover image
Artificial Intelligence for Autonomous Networks introduces the autonomous network by juxtaposing two unique technologies and communities: Networking and AI. The book reviews the technologies behind AI and software-defined network/network function virtualization, highlighting the exciting opportunities to integrate those two worlds. Outlining the new frontiers for autonomous networks, this book highlights ...
Artificial Intelligence for Autonomous Networks
Artificial Intelligence for Autonomous Networks introduces the autonomous network by juxtaposing two unique technologies and communities: Networking and AI. The book reviews the technologies behind AI and software-defined network/network function virtualization, highlighting the exciting opportunities to integrate those two worlds. Outlining the new frontiers for autonomous networks, this book highlights their impact and benefits to consumers and enterprise customers. It also explores the potential of the autonomous network for transforming network operation, cyber security, enterprise services, 5G and IoT, infrastructure monitoring and traffic optimization, and finally, customer experience and care. With contributions from leading experts, this book will provide an invaluable resource for network engineers, software engineers, artificial intelligence, and machine learning researchers.
https://magrudy-assets.storage.googleapis.com/9780815355311.jpg
105.78 USD

Artificial Intelligence for Autonomous Networks

Hardback
Book cover image
This textbook introduces the theories and practical procedures used in planetary spacecraft navigation. Written by a former member of NASA's Jet Propulsion Laboratory (JPL) navigation team, it delves into the mathematics behind modern digital navigation programs, as well as the numerous technological resources used by JPL as a key player ...
Planetary Spacecraft Navigation
This textbook introduces the theories and practical procedures used in planetary spacecraft navigation. Written by a former member of NASA's Jet Propulsion Laboratory (JPL) navigation team, it delves into the mathematics behind modern digital navigation programs, as well as the numerous technological resources used by JPL as a key player in the field. In addition, the text offers an analysis of navigation theory application in recent missions, with the goal of showing students the relationship between navigation theory and the real-world orchestration of mission operations.
https://magrudy-assets.storage.googleapis.com/9783319789156.jpg
115.490000 USD

Planetary Spacecraft Navigation

by James Miller
Hardback
Book cover image
Refinement is one of the cornerstones of a formal approach to software engineering. Refinement is all about turning an abstract description (of a soft or hardware system) into something closer to implementation. It provides that essential bridge between higher level requirements and an implementation of those requirements. This book provides ...
Refinement: Semantics, Languages and Applications
Refinement is one of the cornerstones of a formal approach to software engineering. Refinement is all about turning an abstract description (of a soft or hardware system) into something closer to implementation. It provides that essential bridge between higher level requirements and an implementation of those requirements. This book provides a comprehensive introduction to refinement for the researcher or graduate student. It introduces refinement in different semantic models, and shows how refinement is defined and used within some of the major formal methods and languages in use today. It (1) introduces the reader to different ways of looking at refinement, relating refinement to observations(2) shows how these are realised in different semantic models (3) shows how different formal methods use different models of refinement, and (4) how these models of refinement are related.
https://magrudy-assets.storage.googleapis.com/9783319927091.jpg
78.740000 USD

Refinement: Semantics, Languages and Applications

by Eerke Boiten, John Derrick
Hardback
Book cover image
Analyze, communicate, and design your own sophisticated and interactive web applications using the R (v 3.4) Shiny (1.1.0) package Key Features Explore the power of R Shiny to make interactive web applications easily Create engaging user interfaces using elements such as HTML5 shiny tags and Ttabsets Build and deploy your ...
Web Application Development with R Using Shiny: Build stunning graphics and interactive data visualizations to deliver cutting-edge analytics, 3rd Edition
Analyze, communicate, and design your own sophisticated and interactive web applications using the R (v 3.4) Shiny (1.1.0) package Key Features Explore the power of R Shiny to make interactive web applications easily Create engaging user interfaces using elements such as HTML5 shiny tags and Ttabsets Build and deploy your interactive Shiny web application using shinyapps.io Book DescriptionWeb Application Development with R Using Shiny helps you become familiar with the complete R Shiny package. The book starts with a quick overview of R and its fundamentals, followed by an exploration of the fundamentals of Shiny and some of the things that it can help you do. You'll learn about the wide range of widgets and functions within Shiny and how they fit together to make an attractive and easy to use application. Once you have understood the basics, you'll move on to studying more advanced UI features, including how to style apps in detail using the Bootstrap framework or and Shiny's inbuilt layout functions. You'll learn about enhancing Shiny with JavaScript, ranging from adding simple interactivity with JavaScript right through to using JavaScript to enhance the reactivity between your app and the UI. You'll learn more advanced Shiny features of Shiny, such as uploading and downloading data and reports, as well as how to interact with tables and link reactive outputs. Lastly, you'll learn how to deploy Shiny applications over the internet, as well as and how to handle storage and data persistence within Shiny applications, including the use of relational databases. By the end of this book, you'll be ready to create responsive, interactive web applications using the complete R (v 3.4) Shiny (1.1.0) suite. What you will learn Harness the power of JavaScript to customize your applications Build dashboards with predefined UI and layouts Engage your users and build better analytics using interactive plots Learn advanced code patterns to make your applications easy to write and maintain. Develop a full understanding of Shiny's UI functions to give you the power to build a wide variety of attractive applications. Store data and interact with databases with Shiny. Learn how to share your Shiny applications Understand reactivity at the conceptual level to build more efficient and robust apps Who this book is forWeb Application Development with R Using Shiny is for you if you are interested in creating compelling web applications and interactive data visualization over the web using Shiny. Programming experience with R is required.
https://magrudy-assets.storage.googleapis.com/9781788993128.jpg
36.740000 USD

Web Application Development with R Using Shiny: Build stunning graphics and interactive data visualizations to deliver cutting-edge analytics, 3rd Edition

by Shitalkumar R. Sukhdeve, Chris Beeley
Paperback / softback
Book cover image
The history of robotics and artificial intelligence in many ways is also the history of humanity's attempts to control such technologies. From the Golem of Prague to the military robots of modernity, the debate continues as to what degree of independence such entities should have and how to make sure ...
Artificial Intelligence Safety and Security
The history of robotics and artificial intelligence in many ways is also the history of humanity's attempts to control such technologies. From the Golem of Prague to the military robots of modernity, the debate continues as to what degree of independence such entities should have and how to make sure that they do not turn on us, its inventors. Numerous recent advancements in all aspects of research, development and deployment of intelligent systems are well publicized but safety and security issues related to AI are rarely addressed. This book is proposed to mitigate this fundamental problem. It is comprised of chapters from leading AI Safety researchers addressing different aspects of the AI control problem as it relates to the development of safe and secure artificial intelligence. The book is the first edited volume dedicated to addressing challenges of constructing safe and secure advanced machine intelligence. The chapters vary in length and technical content from broad interest opinion essays to highly formalized algorithmic approaches to specific problems. All chapters are self-contained and could be read in any order or skipped without a loss of comprehension.
https://magrudy-assets.storage.googleapis.com/9780815369820.jpg
80.18 USD

Artificial Intelligence Safety and Security

Paperback / softback
Book cover image
SQL is a widely used to access most databases, therefore database developers and system administrators should be familiar with it. This hands-on SQL book will help beginner and intermediate users to write queries that apply complex conditions on a table. The book's unique side by side approach makes it easy ...
Practical Guide for Oracle SQL, T-SQL and MySQL
SQL is a widely used to access most databases, therefore database developers and system administrators should be familiar with it. This hands-on SQL book will help beginner and intermediate users to write queries that apply complex conditions on a table. The book's unique side by side approach makes it easy for the reader to learn three major query languages in the IT industry. The author has over 20 years of experience in database design. KEY FEATURES: Contains numerous practical screenshots of Oracle SQL, T-SQL, MySQL statements and results. Shows the differences between Oracle SQL, T-SQL and MySQL side by side. Gives a real world experience for SQL developers and database administrators. Sample data is available to work on (available on our website).
https://magrudy-assets.storage.googleapis.com/9781138347526.jpg
59.70 USD

Practical Guide for Oracle SQL, T-SQL and MySQL

by Preston Zhang
Paperback / softback
Book cover image
This book explains IoT technology, its potential applications, the security and privacy aspects, the key necessities like governance, risk management, regulatory compliance needs, the philosophical aspects of this technology that are necessary to support an ethical, safe and secure digitally enhanced environment in which people can live smarter. It describes ...
Internet of Things, for Things, and by Things
This book explains IoT technology, its potential applications, the security and privacy aspects, the key necessities like governance, risk management, regulatory compliance needs, the philosophical aspects of this technology that are necessary to support an ethical, safe and secure digitally enhanced environment in which people can live smarter. It describes the inherent technology of IoT, the architectural components and the philosophy behind this emerging technology. Then it shows the various potential applications of the Internet of Things that can bring benefits to the human society. Finally, it discusses various necessities to provide a secured and trustworthy IoT service.
https://magrudy-assets.storage.googleapis.com/9781138710443.jpg
105.78 USD

Internet of Things, for Things, and by Things

by Abhik Chaudhuri
Hardback
Book cover image
GPS Tracking with Java EE Components: Challenges of Connected Cars highlights how the self-driving car is actually changing the automotive industry, from programing embedded software to hosting services and data crunching, in real time, with really big data. The book analyzes how the challenges of the Self Driving Car (SDC) ...
GPS Tracking with Java EE Components: Challenges of Connected Cars
GPS Tracking with Java EE Components: Challenges of Connected Cars highlights how the self-driving car is actually changing the automotive industry, from programing embedded software to hosting services and data crunching, in real time, with really big data. The book analyzes how the challenges of the Self Driving Car (SDC) exceed the limits of a classical GPS Tracking System (GTS.) It provides a guidebook on setting up a tracking system by customizing its components. It also provides an overview of the prototyping and modeling process, and how the reader can modify this process for his or her own software. Every component is introduced in detail and includes a number of design decisions for development. The book introduces Java EE (JEE) Modules, and shows how they can be combined to a customizable GTS, and used as seed components to enrich existing systems with live tracking. The book also explores how to merge tracking and mapping to guide SDCs, and focuses on client server programming to provide useful information. It also discusses the challenges involved with the live coordination of moving cars. This book is designed to aid GTS developers and engineers in the automotive industry. It can also help Java Developers, not only interested in GPS Tracking, but in modern software design from many individual modules. Source code and sample applications will be available on the book's website.
https://magrudy-assets.storage.googleapis.com/9781138313828.jpg
230.950000 USD
Hardback
Book cover image
The history of robotics and artificial intelligence in many ways is also the history of humanity's attempts to control such technologies. From the Golem of Prague to the military robots of modernity, the debate continues as to what degree of independence such entities should have and how to make sure ...
Artificial Intelligence Safety and Security
The history of robotics and artificial intelligence in many ways is also the history of humanity's attempts to control such technologies. From the Golem of Prague to the military robots of modernity, the debate continues as to what degree of independence such entities should have and how to make sure that they do not turn on us, its inventors. Numerous recent advancements in all aspects of research, development and deployment of intelligent systems are well publicized but safety and security issues related to AI are rarely addressed. This book is proposed to mitigate this fundamental problem. It is comprised of chapters from leading AI Safety researchers addressing different aspects of the AI control problem as it relates to the development of safe and secure artificial intelligence. The book is the first edited volume dedicated to addressing challenges of constructing safe and secure advanced machine intelligence. The chapters vary in length and technical content from broad interest opinion essays to highly formalized algorithmic approaches to specific problems. All chapters are self-contained and could be read in any order or skipped without a loss of comprehension.
https://magrudy-assets.storage.googleapis.com/9781138320840.jpg
157.450000 USD

Artificial Intelligence Safety and Security

Hardback
Book cover image
Behavior Trees (BTs) provide a way to structure the behavior of an artificial agent such as a robot or a non-player character in a computer game. Traditional design methods, such as finite state machines, are known to produce brittle behaviors when complexity increases, making it very hard to add features ...
Behavior Trees in Robotics and AI: An Introduction
Behavior Trees (BTs) provide a way to structure the behavior of an artificial agent such as a robot or a non-player character in a computer game. Traditional design methods, such as finite state machines, are known to produce brittle behaviors when complexity increases, making it very hard to add features without breaking existing functionality. BTs were created to address this very problem, and enables the creation of systems that are both modular and reactive. Behavior Trees in Robotics and AI: An Introduction provides a broad introduction as well as an in-depth exploration of the topic, and is the first comprehensive book on the use of BTs. This book introduces the subject of BTs from simple topics, such as semantics and design principles, to complex topics, such as learning and task planning. For each topic, the authors provide a set of examples, ranging from simple illustrations to realistic complex behaviors, to enable the reader to successfully combine theory with practice. Starting with an introduction to BTs, the book then describes how BTs relate to, and in many cases, generalize earlier switching structures, or control architectures. These ideas are then used as a foundation for a set of efficient and easy to use design principles. The book then presents a set of important extensions and provides a set of tools for formally analyzing these extensions using a state space formulation of BTs. With the new analysis tools, the book then formalizes the descriptions of how BTs generalize earlier approaches and shows how BTs can be automatically generated using planning and learning. The final part of the book provides an extended set of tools to capture the behavior of Stochastic BTs, where the outcomes of actions are described by probabilities. These tools enable the computation of both success probabilities and time to completion. This book targets a broad audience, including both students and professionals interested in modeling complex behaviors for robots, game characters, or other AI agents. Readers can choose at which depth and pace they want to learn the subject, depending on their needs and background.
https://magrudy-assets.storage.googleapis.com/9781138593732.jpg
92.13 USD

Behavior Trees in Robotics and AI: An Introduction

by Petter OEgren, Michele Colledanchise
Hardback
Book cover image
This book introduces readers to Web content credibility evaluation and evaluation support. It highlights empirical research and establishes a solid foundation for future research by presenting methods of supporting credibility evaluation of online content, together with publicly available datasets for reproducible experimentation, such as the Web Content Credibility Corpus. The ...
Web Content Credibility
This book introduces readers to Web content credibility evaluation and evaluation support. It highlights empirical research and establishes a solid foundation for future research by presenting methods of supporting credibility evaluation of online content, together with publicly available datasets for reproducible experimentation, such as the Web Content Credibility Corpus. The book is divided into six chapters. After a general introduction in Chapter 1, including a brief survey of credibility evaluation in the social sciences, Chapter 2 presents definitions of credibility and related concepts of truth and trust. Next, Chapter 3 details methods, algorithms and user interfaces for systems supporting Web content credibility evaluation. In turn, Chapter 4 takes a closer look at the credibility of social media, exemplified in sections on Twitter, Q&A systems, and Wikipedia, as well as fake news detection. In closing, Chapter 5 presents mathematical and simulation models of credibility evaluation, before a final round-up of the book is provided in Chapter 6. Overall, the book reviews and synthesizes the current state of the art in Web content credibility evaluation support and fake news detection. It provides researchers in academia and industry with both an incentive and a basis for future research and development of Web content credibility evaluation support services.
https://magrudy-assets.storage.googleapis.com/9783319777931.jpg
156.450000 USD

Web Content Credibility

by Adam Wierzbicki
Hardback
Page 1 of 40