Filter
(found 725 products)
Book cover image
Smart Science, Design & Technology represents the proceedings of the 5th International Conference on Applied System Innovation (ICASI 2019), which was held in Fukuoka, Japan, April 12-18, 2019. The conference received more than 300 submitted papers from at least 20 different countries, whereby one third of these papers was selected ...
Smart Science, Design & Technology: Proceedings of the 5th International Conference on Applied System Innovation (ICASI 2019), April 12-18, 2019, Fukuoka, Japan
Smart Science, Design & Technology represents the proceedings of the 5th International Conference on Applied System Innovation (ICASI 2019), which was held in Fukuoka, Japan, April 12-18, 2019. The conference received more than 300 submitted papers from at least 20 different countries, whereby one third of these papers was selected by the committees and invited to present at ICASI 2019. The resulting book aims to provide an integrated communication platform for researchers active in a wide range of fields including information technology, communication science, applied mathematics, computer science, advanced material science, and engineering. Major breakthroughs are being made by interdisciplinary collaborations between science and engineering technologists in academia and industry within this unique international network. Smart Science has emerged as a separate discipline, involving innovative practices, methodologies and processes.
https://magrudy-assets.storage.googleapis.com/9780367178673.jpg
210.000000 USD

Smart Science, Design & Technology: Proceedings of the 5th International Conference on Applied System Innovation (ICASI 2019), April 12-18, 2019, Fukuoka, Japan

Hardback
Book cover image
This book helps participants in agile software development environments learn to become leaders. Facilitative leaders should be at every level of the organization, from individual contributor to informal team leader to managers of all stripes -- it takes much focus and intentionality from senior organizational leaders, who have special obligations ...
People Over Process: Leadership for Agility
This book helps participants in agile software development environments learn to become leaders. Facilitative leaders should be at every level of the organization, from individual contributor to informal team leader to managers of all stripes -- it takes much focus and intentionality from senior organizational leaders, who have special obligations in creating successful lean and agile development environments. But, beyond the principles of facilitative leadership for agility, People over Process provides tips and demonstrative scenes for the more important and common software meetings: architecture simulations, project planning, team configurations, retrospectives, and more. The author fully illustrates the principles and shares proven techniques for the most important leadership events in agile projects. While this book focuses on facilitating extraordinarily well-prepared meetings, it serves as a metaphor for leadership more broadly. The leader's obligation to help their team make rigorous fact-based decisions; to gain broad input and have participants aligned on the outcomes and next steps; and to do so in an efficient way that respects the time of the participants is as relevant to every-day leadership activity as it is to conducting meetings. The author mixes background and explanation with demonstration -- in this case, the story of an agile project at the fictitious Pacifica Bank. The scenario constructed at Pacifica illustrates the concepts of effective leadership and productive workplace environments. The book concentrates on the flow of software from understanding what is needed through design, development, testing, and deployment. Essentially, the author provides a simple and powerful model of leadership, examples, and tips. This is not a cookbook on how to lead -- It is a set of principles and examples. All leaders must find their own way for their team, their organization, and their unique challenges.
https://magrudy-assets.storage.googleapis.com/9780367341886.jpg
50.19 USD

People Over Process: Leadership for Agility

by Michael K. Levine
Paperback / softback
Book cover image
Hybrid computational intelligent techniques are efficient in dealing with the real-world problems encountered in engineering fields. The primary objective of this book is to provide an exhaustive introduction as well as review of the hybrid computational intelligent paradigm, with supportive case studies. In addition, it aims to provide a gallery ...
Hybrid Computational Intelligence: Research and Applications
Hybrid computational intelligent techniques are efficient in dealing with the real-world problems encountered in engineering fields. The primary objective of this book is to provide an exhaustive introduction as well as review of the hybrid computational intelligent paradigm, with supportive case studies. In addition, it aims to provide a gallery of engineering applications where this computing paradigm can be effectively use. Finally, it focuses on the recent quantum inspired hybrid intelligence to develop intelligent solutions for the future. The book also incorporates video demonstrations of each application for better understanding of the subject matter.
https://magrudy-assets.storage.googleapis.com/9781138320253.jpg
260.36 USD

Hybrid Computational Intelligence: Research and Applications

Hardback
Book cover image
The Internet has become an integral part of human life, yet the web still utilizes mundane interfaces to the physical world, which makes Internet operations somewhat mechanical, tedious, and less human-oriented. Filling a large void in the literature, Intelligent Technologies for Web Applications is one of the first books to ...
Intelligent Technologies for Web Applications
The Internet has become an integral part of human life, yet the web still utilizes mundane interfaces to the physical world, which makes Internet operations somewhat mechanical, tedious, and less human-oriented. Filling a large void in the literature, Intelligent Technologies for Web Applications is one of the first books to focus on providing vital fundamental and advanced guidance in the area of Web intelligence for beginners and researchers. The book covers techniques from diverse areas of research, including: Natural language processing Information extraction, retrieval, and filtering Knowledge representation and management Machine learning Databases Data, web, and text mining Human-computer interaction Semantic web technologies To develop effective and intelligent web applications and services, it is critical to discover useful knowledge through analyzing large amounts of content, hidden content structures, or usage patterns of web data resources. Intended to improve and reinforce problem-solving methods in this area, this book delves into the hybridization of artificial intelligence (AI) and web technologies to help simplify complex Web operations. It introduces readers to the state-of-the art development of web intelligence techniques and teaches how to apply these techniques to develop the next generation of intelligent Web applications. The book lays out presented projects, case studies, and innovative ideas, which readers can explore independently as standalone research projects. This material facilitates experimentation with the book's content by including fundamental tools, research directions, practice questions, and additional reading.
https://magrudy-assets.storage.googleapis.com/9780367381363.jpg
78.700000 USD

Intelligent Technologies for Web Applications

by Rajendra Akerkar, Priti Srinivas Sajja
Paperback / softback
Book cover image
With recent advances in mobile communication technologies, more and more people are accessing cloud computing systems using mobile devices, such as smartphones and tablets. Unlike traditional mobile computing systems with limited capabilities, mobile cloud computing uses the powerful computing and storage resources available in the cloud to provide cutting-edge multimedia ...
Advances in Mobile Cloud Computing Systems
With recent advances in mobile communication technologies, more and more people are accessing cloud computing systems using mobile devices, such as smartphones and tablets. Unlike traditional mobile computing systems with limited capabilities, mobile cloud computing uses the powerful computing and storage resources available in the cloud to provide cutting-edge multimedia and information services. This book discusses the major research advances in mobile cloud computing systems. Contributed chapters from leading experts in this field cover different aspects of modeling, analysis, design, optimization, and architecture of mobile cloud computing systems. Advances in Mobile Cloud Computing Systems begins by discussing the background, features, and available service models of mobile cloud computing. It goes on to describe a mobile cloud computing system with several third party cloud mobile media (CMM) services that offers its services to a telecom operator. In this scenario, the telecom operator acts as broker that can mix and interchange the resources offered by the different CMM service providers. Subsequent contributed chapters discuss such key research areas as Energy-efficient task execution that reduces the energy consumption in both mobile devices and the cloud Design and architecture of a Proximity Cloud that delivers low-latency, bandwidth-efficient end-user services with a global footprint Virtual mobile networks in clouds that enable resource sharing between multiple mobile network operators Software piracy control framework in mobile cloud computing systems designed to prevent mobile application piracy Dynamic configuration of cloud radio access networks (C-RANs) to improve end-to-end TCP throughput performance in next generation wireless networks The book includes many supporting illustrations and tables along with
https://magrudy-assets.storage.googleapis.com/9780367377182.jpg
78.700000 USD

Advances in Mobile Cloud Computing Systems

Paperback / softback
Book cover image
Emphasizing that it's much easier and more cost effective to make changes in the planning phases of a project rather than later on, Project Management Tools and Techniques for Success provides an accessible introduction to project management fundamentals. Highlighting approaches for avoiding common pitfalls, it begins with an introduction to ...
Project Management Tools and Techniques for Success
Emphasizing that it's much easier and more cost effective to make changes in the planning phases of a project rather than later on, Project Management Tools and Techniques for Success provides an accessible introduction to project management fundamentals. Highlighting approaches for avoiding common pitfalls, it begins with an introduction to project management that compares and contrasts the stages of poor management with those of effective management. Because change is inherent in virtually all projects, the text outlines the human effects of change and suggests ways to mitigate these effects. It addresses team dynamics, sourcing alternatives, motivating the team, managing expectations, assessing risk, and defining and prioritizing project requirements. The book translates difficult concepts into practical applications with a case study that examines the merger of two companies, along with the subsequent development of a new corporate headquarters. By adding a layer of statistical methods and tools to the front-end of a project, Design for Six Sigma (DFSS) augments standard Six Sigma processes to help ensure project results meet customers' needs and that delays caused by new requirements or rework after implementation are eliminated or reduced. The book explains how to effectively incorporate DFSS tools to reduce the possibility of failure in your next project. Clearly illustrating effective project management practices, the book includes a listing of commonly used acronyms, suggestions for additional reading, along with instructions on how to create four of the most important tools discussed in the book.
https://magrudy-assets.storage.googleapis.com/9780367384036.jpg
78.700000 USD
Paperback / softback
Book cover image
Microservices architecture (MSA) is increasingly popular with software architects and engineers as it accelerates software solution design, development, and deployment in a risk-free manner. Placing a software system into a production environment is elegantly simplified and sped up with the use of MSA development platforms, runtime environments, acceleration engines, design ...
Essentials of Microservices Architecture: Paradigms, Applications, and Techniques
Microservices architecture (MSA) is increasingly popular with software architects and engineers as it accelerates software solution design, development, and deployment in a risk-free manner. Placing a software system into a production environment is elegantly simplified and sped up with the use of MSA development platforms, runtime environments, acceleration engines, design patterns, integrated frameworks, and related tools. The MSA ecosystem is expanding with third-party products that automate as many tasks as possible. MSA is being positioned as the enterprise-grade and agile-application design method. This book covers in-depth the features and facilities that make up the MSA ecosystem. Beginning with an overview of Service-Oriented Architecture (SOA) that covers the Common Object Request Broker Architecture (CORBA), Distributed Component Object Model (DCOM), and Remote Method Invocation (RMI), the book explains the basic essentials of MSA and the continuous delivery of applications to customers. The book gives software developers insight into: Current and emerging communication models Key architectural elements of MSA-based applications Designing efficient APIs for microservices MSA middleware platforms such as REST, SOAP, Apache Thrift, and gRPC Microservice discovery and the API gateway Service orchestration and choreography for composing individual services to achieve a useful business process Database transactions in MSA-centric applications Design, composition, security, and deployment patterns MSA security Modernizing legacy applications The book concludes with a chapter on composing and building powerful microservices. With the exponential growth of IoT devices, microservices are being developed and deployed on resource-constrained but resource-intensive devices in order to provide people-centric applications. The book discusses the challenges of these applications. Finally, the book looks at the role of microservices in smart environments and upcoming trends including ubiquitous yet disappearing microservices.
https://magrudy-assets.storage.googleapis.com/9780367249953.jpg
78.700000 USD

Essentials of Microservices Architecture: Paradigms, Applications, and Techniques

by Raj Pethuru, Gopinath Ganapathy, Chellammal Surianarayanan
Hardback
Book cover image
The book provides an advanced vision and trends of computational intelligence in cyberspace and cyber-enabled spaces. It reviews architectures and models, as well as state-of-the-art computational and interpretation capabilities for social, industrial, and multimedia applications. Cyber-enabled intelligence involves the design and development of intelligent and innovative application scenarios in social ...
Cyber-Enabled Intelligence
The book provides an advanced vision and trends of computational intelligence in cyberspace and cyber-enabled spaces. It reviews architectures and models, as well as state-of-the-art computational and interpretation capabilities for social, industrial, and multimedia applications. Cyber-enabled intelligence involves the design and development of intelligent and innovative application scenarios in social networks, computer vision, multimedia, and image processing. Application scenarios can also cover the applicability of intelligent sensing, data collection and predictive analysis in Internet of Things.
https://magrudy-assets.storage.googleapis.com/9780367184872.jpg
178.53 USD

Cyber-Enabled Intelligence

Hardback
Book cover image
The Cloud in IoT-enabled Spaces addresses major issues and challenges in IoT-based solutions proposed for the Cloud. It paves the way for IoT-enabled spaces in the next generation cloud computing paradigm and opens the door for further innovative ideas. Topics include Cloud-based optimization in the IoT era, scheduling and routing, ...
The Cloud in IoT-enabled Spaces
The Cloud in IoT-enabled Spaces addresses major issues and challenges in IoT-based solutions proposed for the Cloud. It paves the way for IoT-enabled spaces in the next generation cloud computing paradigm and opens the door for further innovative ideas. Topics include Cloud-based optimization in the IoT era, scheduling and routing, medium access, data caching, secure access, uncertainty, home automation, machine learning in wearable devices, energy monitoring, and plant phenotyping in farming. Smart spaces are solutions where Internet of Things (IoT)-enabling technologies have been employed towards further advances in the lifestyle. It tightly integrates with the existing Cloud infrastructure to impact several fields in academia and industry. The Cloud in IoT-enabled Spaces provides an overview of the issues around small spaces and proposes the most up-to-date alternatives and solutions. The objective is to pave the way for IoT-enabled spaces in the next-generation Cloud computing and open the door for further innovative ideas.
https://magrudy-assets.storage.googleapis.com/9780367278144.jpg
178.53 USD

The Cloud in IoT-enabled Spaces

by Fadi Al-Turjman
Hardback
Book cover image
Despite the range of studies into grief and mourning in relation to the digital, research to date largely focuses on the cultural practices and meanings that are played out in and through digital environments. Digital Afterlife brings together experts from diverse fields who share an interest in digital afterlife and ...
Digital Afterlife: Death Matters in a Digital Age
Despite the range of studies into grief and mourning in relation to the digital, research to date largely focuses on the cultural practices and meanings that are played out in and through digital environments. Digital Afterlife brings together experts from diverse fields who share an interest in digital afterlife and the wide-ranging issues that relate to this. The book covers a variety of matters which have been neglected in other research texts, for example: The legal, ethical and philosophical conundrums of digital afterlife. The ways digital media are currently being used to expand the possibilities of commemorating the dead and managing the grief of those left behind. Our lives are shaped by and shape the creation of our Digital Afterlife as the digital has become a taken for granted aspect of human experience. This book will be of interest to undergraduates from computing, theology, business studies, philosophy, psychology, sociology and education from all types of institutions. Secondary audiences include researchers and postgraduate researchers with an interest in the digital. At a practical level, cost of data storage, changing data storage systems mitigate the likelihood of our digital presence existing in perpetuity. Whether we create accidental or intentional digital memories this has psychological consequences for ourselves and for society. Essentially the foreverness of forever is in question. Maggi Savin-Baden is Professor of Higher Education Research at the University of Worcester. She has a strong publication record of over 50 research publications and 17 books. Victoria Mason-Robbie is a Chartered Psychologist and an experienced lecturer having worked in the Higher Education sector for over 15 years. Her current research focuses on evaluating web-based avatars, pedagogical agents, and virtual humans. For more information, please visit the author's website.
70.65 USD

Digital Afterlife: Death Matters in a Digital Age

Paperback / softback
Book cover image
This is a book about the development of dependable, embedded software. It is for systems designers, implementers, and verifiers who are experienced in general embedded software development, but who are now facing the prospect of delivering a software-based system for a safety-critical application. It is aimed at those creating a ...
Embedded Software Development for Safety-Critical Systems, Second Edition
This is a book about the development of dependable, embedded software. It is for systems designers, implementers, and verifiers who are experienced in general embedded software development, but who are now facing the prospect of delivering a software-based system for a safety-critical application. It is aimed at those creating a product that must satisfy one or more of the international standards relating to safety-critical applications, including IEC 61508, ISO 26262, EN 50128, EN 50657, IEC 62304, or related standards. Of the first edition, Stephen Thomas, PE, Founder and Editor of FunctionalSafetyEngineer.com said, I highly recommend Mr. Hobbs' book.
https://magrudy-assets.storage.googleapis.com/9780367338855.jpg
115.28 USD

Embedded Software Development for Safety-Critical Systems, Second Edition

by Chris Hobbs
Paperback / softback
Book cover image
In this book, Vivek Kale makes an important contribution to the theory and practice of enterprise architecture ... this book captures the breadth and depth of information that a modern enterprise architecture must address to effectively support an agile enterprise. This book should have a place in every practicing architect's ...
Digital Transformation of Enterprise Architecture
In this book, Vivek Kale makes an important contribution to the theory and practice of enterprise architecture ... this book captures the breadth and depth of information that a modern enterprise architecture must address to effectively support an agile enterprise. This book should have a place in every practicing architect's library. -John D. McDowall, Author of Complex Enterprise Architecture Digital Transformation of Enterprise Architecture is the first book to propose Enterprise Architecture (EA) as the most important element (after Business Models) for digital transformation of enterprises. This book makes digital transformation more tangible by showing the rationale and typical technologies associated with it, and these technologies in turn reveal the essence of digital transformation. This book would be useful for analysts, designers and developers of future-ready agile application systems. This book proposes that it is the perennial quest for interoperability & portability, scalability, availability, etc., that has directed and driven the evolution of the IT/IS industry in the past 50 years. It is this very quest that has led to the emergence of technologies like service-oriented, cloud, and big data computing. In addition to the conventional attributes of EA like interoperability, scalability and availability, this book identifies additional attributes of mobility, ubiquity, security, analyticity, and usability. This pragmatic book: Identifies three parts effort for any digital transformation: Business Models, Enterprise Architectures and Enterprise Processes. Describes eight attributes of EA: interoperability, scalability, availability, mobility, ubiquity, security, analyticity, and usability. Explains the corresponding technologies of service-oriented, cloud, big data, context-aware, Internet of Things (IoT), blockchain, soft, and interactive computing. Briefs on auxiliary technologies like integration, virtualization, replication, spatio-temporal databases, embedded systems, cryptography, data mining, and interactive interfaces that are essential for digital transformation of enterprise architecture. Introduces interactive interfaces like voice, gaze, gesture and 3D interfaces. Provides an overview of blockchain computing, soft computing, and customer interaction systems. Digital Transformation of Enterprise Architecture proposes that to withstand the disruptive digital storms of the future, enterprises must bring about digital transformation, i.e. a transformation that affects an exponential change (amplification or attenuation) in any aspect of the constituent attributes of EA. It proposes that each of these technologies (service-oriented, cloud, big data, context-aware, IoT, blockchain, soft, and interactive computing) bring about digital transformation of the corresponding EA attribute viz. interoperability, scalability, availability, mobility, ubiquity, security, analyticity, and usability.
https://magrudy-assets.storage.googleapis.com/9781138553781.jpg
247.34 USD

Digital Transformation of Enterprise Architecture

by Vivek Kale
Hardback
Book cover image
The field of Chemical Engineering and its link to computer science is in constant evolution and new engineers have a variety of tools at their disposal to tackle their everyday problems. Introduction to Software for Chemical Engineers, Second Edition provides a quick guide to the use of various computer packages ...
Introduction to Software for Chemical Engineers, Second Edition
The field of Chemical Engineering and its link to computer science is in constant evolution and new engineers have a variety of tools at their disposal to tackle their everyday problems. Introduction to Software for Chemical Engineers, Second Edition provides a quick guide to the use of various computer packages for chemical engineering applications. It covers a range of software applications from Excel and general mathematical packages such as MATLAB and MathCAD to process simulators, CHEMCAD and ASPEN, equation-based modeling languages, gProms, optimization software such as GAMS and AIMS, and specialized software like CFD or DEM codes. The different packages are introduced and applied to solve typical problems in fluid mechanics, heat and mass transfer, mass and energy balances, unit operations, reactor engineering, process and equipment design and control. This new edition offers a wider view of packages including open source software such as R, Python and Julia. It also includes complete examples in ASPEN Plus, adds ANSYS Fluent to CFD codes, Lingo to the optimization packages, and discusses Engineering Equation Solver. It offers a global idea of the capabilities of the software used in the chemical engineering field and provides examples for solving real-world problems. Written by leading experts, this book is a must-have reference for chemical engineers looking to grow in their careers through the use of new and improving computer software. Its user-friendly approach to simulation and optimization as well as its example-based presentation of the software, makes it a perfect teaching tool for both undergraduate and master levels.
https://magrudy-assets.storage.googleapis.com/9781138324213.jpg
139.46 USD

Introduction to Software for Chemical Engineers, Second Edition

Paperback / softback
Book cover image
In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy. Addressing the demand for authoritative information on anonymous Internet usage, Anonymous ...
Anonymous Communication Networks: Protecting Privacy on the Web
In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy. Addressing the demand for authoritative information on anonymous Internet usage, Anonymous Communication Networks: Protecting Privacy on the Web examines anonymous communication networks as a solution to Internet privacy concerns. It explains how anonymous communication networks make it possible for participants to communicate with each other without revealing their identities. The book explores various anonymous communication networks as possible solutions to Internet privacy concerns-making it ideal for network researchers and anyone interested in protecting their privacy or the privacy of their users. Identifying specific scenarios where it is best to be anonymous, it details the two main approaches to anonymous communication networks: onion routing and mixed networks. Details helpful tips for optimizing onion routing Defines and classifies mixed networks Illustrates the application of a mixed network to e-voting with a case study Considers the application of symmetric cipher and Diffie-Hellman key exchange in Tor Supplies detailed guidance on how to download and install Tor, I2P, JAP/JonDo, and QuickSilver Using examples and case studies, the book illustrates the usefulness of anonymous communication networks for web browsing, email, e-banking, and e-voting. It explains how to obtain anonymous usage permits for cloud software and analyzes the spectrum of existing techniques for anonymous cyber surfing. The text concludes by examining future directions to supply you with the understanding required to ensure anonymous Internet browsing.
https://magrudy-assets.storage.googleapis.com/9780367378738.jpg
78.700000 USD
Paperback / softback
Book cover image
Divided into two major parts, Enhancing Computer Security with Smart Technology introduces the problems of computer security to researchers with a machine learning background, then introduces machine learning concepts to computer security professionals. Realizing the massive scope of these subjects, the author concentrates on problems related to the detection of ...
Enhancing Computer Security with Smart Technology
Divided into two major parts, Enhancing Computer Security with Smart Technology introduces the problems of computer security to researchers with a machine learning background, then introduces machine learning concepts to computer security professionals. Realizing the massive scope of these subjects, the author concentrates on problems related to the detection of intrusions through the application of machine learning methods and on the practical algorithmic aspects of machine learning and its role in security. A collection of tutorials that draw from a broad spectrum of viewpoints and experience, this volume is made up of chapters written by specialists in each subject field. It is accessible to any professional with a basic background in computer science. Following an introduction to the issue of cyber-security and cyber-trust, the book offers a broad survey of the state-of-the-art in firewall technology and of the importance of Web application security. The remainder of the book focuses on the use of machine learning methods and tools and their performance.
https://magrudy-assets.storage.googleapis.com/9780367391720.jpg
78.700000 USD
Paperback / softback
Book cover image
Client-Centered Software Development: The CO-FOSS Approach introduces a method to creating a customized software product for a single client, either from scratch or by reusing open source components. The clients are typically non-profit humanitarian, educational, or public service organizations. This approach has been used in undergraduate courses where students learn ...
Client-Centered Software Development: The CO-FOSS Approach
Client-Centered Software Development: The CO-FOSS Approach introduces a method to creating a customized software product for a single client, either from scratch or by reusing open source components. The clients are typically non-profit humanitarian, educational, or public service organizations. This approach has been used in undergraduate courses where students learn the principles of software development while implementing a real-world software product. This book provides instructors, students, clients, and professional software developers with detailed guidance for developing a new CO-FOSS product from conceptualization to completion. Features Provides instructors, students, clients, and professional software developers with a roadmap for the development of a new CO-FOSS product from conceptualization to completion Motivates students with real-world projects and community service experiences Teaches all elements of the software process, including requirements gathering, design, collaboration, coding, testing, client communication, refactoring, and writing developer and user documentation Uses source code that can be reused and refitted to suit the needs of future projects, since each CO-FOSS product is free and open source software Provides links to a rich variety of resources for instructors and students to freely use in their own courses that develop new CO-FOSS products for other non-profits.
https://magrudy-assets.storage.googleapis.com/9781138583849.jpg
143.20 USD

Client-Centered Software Development: The CO-FOSS Approach

by Allen B. Tucker
Hardback
Book cover image
Driving innovation can reduce costs for companies, institutions, military programs, and successful businesses. Quality is key to successful innovation. Delivery of complex products must have high quality to reduce customer problems and defects. This book explains how to integrate Quality Assurance processes to produce compliant product management and gap analysis. ...
Effective Processes for Quality Assurance
Driving innovation can reduce costs for companies, institutions, military programs, and successful businesses. Quality is key to successful innovation. Delivery of complex products must have high quality to reduce customer problems and defects. This book explains how to integrate Quality Assurance processes to produce compliant product management and gap analysis. It shows how Quality Assurance provides a common operating framework in which best practices, improvements, and cost avoidance activities can be shared. Effective Processes for Quality Assurance emphasizes improving process execution and reducing operational costs. It also focuses on how Quality Assurance personnel must support companies, institutions, military programs, and successful businesses by encouraging a cooperative, proactive approach and ensure compliance through management and team member participation. Lean and Agile can provide a competitive advantage, and this practical reference explains how to implement these two principles to deliver products that have fewer defects. It also explains: Quality Assurance methods Measuring benefits of Quality Assurance process improvement Quality Assurance performance and improvement Risk management Quality Assurance improvement with metrics Effective processes for Quality Assurance Quantitative process performance and commitments Quality Assurance plans Quality Assurance for customers and suppliers Supporting software configuration Effective Processes for Quality Assurance covers the critical issues for implementing Quality Assurance processes that can deliver high-quality products successfully.
https://magrudy-assets.storage.googleapis.com/9780367172961.jpg
104.950000 USD

Effective Processes for Quality Assurance

by Boyd L. Summers
Hardback
Book cover image
It is a major challenge to migrate very large databases from one system, say for example, to transfer critical data from Oracle to SQL Server. One has to consider several issues such as loss of data being transferred, the security of the data, the cost and effort, technical aspects of ...
Practical Guide to Large Database Migration
It is a major challenge to migrate very large databases from one system, say for example, to transfer critical data from Oracle to SQL Server. One has to consider several issues such as loss of data being transferred, the security of the data, the cost and effort, technical aspects of the software involved, etc. There a very few books that provide practical tools and the methodology to migrate data from one vendor to another. This book introduces the concepts in database migration with large sample databases. It provides step by step guides and screenshots for database migration tools. Many examples are shown for migrating Oracle, SQL Server and MySQL databases.
https://magrudy-assets.storage.googleapis.com/9781138391628.jpg
178.450000 USD

Practical Guide to Large Database Migration

by Preston Zhang
Hardback
Book cover image
The book describes how to manage and successfully deliver large, complex, and expensive systems that can be composed of millions of line of software code, being developed by numerous groups throughout the globe, that interface with many hardware items being developed by geographically dispersed companies, where the system also includes ...
Project Management of Large Software-Intensive Systems
The book describes how to manage and successfully deliver large, complex, and expensive systems that can be composed of millions of line of software code, being developed by numerous groups throughout the globe, that interface with many hardware items being developed by geographically dispersed companies, where the system also includes people, policies, constraints, regulations, and a myriad of other factors. It focuses on how to seamlessly integrate systems, satisfy the customer's requirements, and deliver within the budget and on time. The guide is essentially a shopping list of all the activities that could be conducted with tailoring guidelines to meet the needs of each project.
https://magrudy-assets.storage.googleapis.com/9780367136710.jpg
139.46 USD

Project Management of Large Software-Intensive Systems

by Marvin Gechman
Paperback / softback
Book cover image
Solving pattern recognition problems involves an enormous amount of computational effort. By applying genetic algorithms - a computational method based on the way chromosomes in DNA recombine - these problems are more efficiently and more accurately solved. Genetic Algorithms for Pattern Recognition covers a broad range of applications in science ...
Revival: Genetic Algorithms for Pattern Recognition (1986)
Solving pattern recognition problems involves an enormous amount of computational effort. By applying genetic algorithms - a computational method based on the way chromosomes in DNA recombine - these problems are more efficiently and more accurately solved. Genetic Algorithms for Pattern Recognition covers a broad range of applications in science and technology, describing the integration of genetic algorithms in pattern recognition and machine learning problems to build intelligent recognition systems. The articles, written by leading experts from around the world, accomplish several objectives: they provide insight into the theory of genetic algorithms; they develop pattern recognition theory in light of genetic algorithms; and they illustrate applications in artificial neural networks and fuzzy logic. The cross-sectional view of current research presented in Genetic Algorithms for Pattern Recognition makes it a unique text, ideal for graduate students and researchers.
https://magrudy-assets.storage.googleapis.com/9781138558885.jpg
71.350000 USD

Revival: Genetic Algorithms for Pattern Recognition (1986)

by Paul P. Wang, Sankar K. Pal
Paperback / softback
Book cover image
This book teaches the basics of Oracle GoldenGate, which is a product that is used to simplify the process of Oracle Database Replication. GoldenGate can be used for reporting, failover, high availability, live reporting, data warehousing, and BigData ETL process, as well as connecting to multiple other data sources outside ...
Working with Oracle GoldenGate 12c: From Implementation to Troubleshooting
This book teaches the basics of Oracle GoldenGate, which is a product that is used to simplify the process of Oracle Database Replication. GoldenGate can be used for reporting, failover, high availability, live reporting, data warehousing, and BigData ETL process, as well as connecting to multiple other data sources outside of Oracle Database such as SQL Server, MySQL, Teradata, PostgreSQL, and many others. The purpose of GoldenGate and its popularity is its ability to make the highly complex architecture of database replication into a much more simplistic task. This book teaches the reader how to use Oracle GoldenGate, from installation to troubleshooting.
https://magrudy-assets.storage.googleapis.com/9781138197572.jpg
78.700000 USD

Working with Oracle GoldenGate 12c: From Implementation to Troubleshooting

by Gavin Powell
Hardback
Book cover image
Smart Cities and intelligence are among the most significant topics in IoT. Intelligence in communication and infrastructure implementation is at the heart of this concept, and its development is a key issue in smart cities. This book addresses the challenges in realizing intelligence in smart cities and sensing platforms in ...
Intelligence in IoT-enabled Smart Cities
Smart Cities and intelligence are among the most significant topics in IoT. Intelligence in communication and infrastructure implementation is at the heart of this concept, and its development is a key issue in smart cities. This book addresses the challenges in realizing intelligence in smart cities and sensing platforms in the era of cloud computing and IoT, varying from cost and energy efficiency to availability and service quality. It focuses on both the design and implementation aspects of artificial intelligence approaches in smart cities and sensing applications that are enabled and supported by IoT paradigms, and mainly on data delivery approaches and their performability aspects.
https://magrudy-assets.storage.googleapis.com/9781138316843.jpg
147.000000 USD

Intelligence in IoT-enabled Smart Cities

by Fadi Al-Turjman
Hardback
Book cover image
The objective of this edited book is to gather best practices in the development and management of mobile apps projects. Mobile Apps Engineering aims to provide software engineering lecturers, students and researchers of mobile computing a starting point for developing successful mobile apps. To achieve these objectives, the book's contributors ...
Mobile Apps Engineering: Design, Development, Security, and Testing
The objective of this edited book is to gather best practices in the development and management of mobile apps projects. Mobile Apps Engineering aims to provide software engineering lecturers, students and researchers of mobile computing a starting point for developing successful mobile apps. To achieve these objectives, the book's contributors emphasize the essential concepts of the field, such as apps design, testing and security, with the intention of offering a compact, self-contained book which shall stimulate further research interest in the topic. The editors hope and believe that their efforts in bringing this book together can make mobile apps engineering an independent discipline inspired by traditional software engineering, but taking into account the new challenges posed by mobile computing.
https://magrudy-assets.storage.googleapis.com/9781138054356.jpg
110.250000 USD

Mobile Apps Engineering: Design, Development, Security, and Testing

Hardback
Book cover image
A First Course in Fuzzy Logic, Fourth Edition is an expanded version of the successful third edition. It provides a comprehensive introduction to the theory and applications of fuzzy logic. This popular text offers a firm mathematical basis for the calculus of fuzzy concepts necessary for designing intelligent systems and ...
A First Course in Fuzzy Logic
A First Course in Fuzzy Logic, Fourth Edition is an expanded version of the successful third edition. It provides a comprehensive introduction to the theory and applications of fuzzy logic. This popular text offers a firm mathematical basis for the calculus of fuzzy concepts necessary for designing intelligent systems and a solid background for readers to pursue further studies and real-world applications. New in the Fourth Edition: Features new results on fuzzy sets of type-2 Provides more information on copulas for modeling dependence structures Includes quantum probability for uncertainty modeling in social sciences, especially in economics With its comprehensive updates, this new edition presents all the background necessary for students, instructors and professionals to begin using fuzzy logic in its many-applications in computer science, mathematics, statistics, and engineering. About the Authors: Hung T. Nguyen is a Professor Emeritus at the Department of Mathematical Sciences, New Mexico State University. He is also an Adjunct Professor of Economics at Chiang Mai University, Thailand. Carol L. Walker is also a Professor Emeritus at the Department of Mathematical Sciences, New Mexico State University. Elbert A. Walker is a Professor Emeritus, Department of Mathematical Sciences, New Mexico State University.
https://magrudy-assets.storage.googleapis.com/9781138585089.jpg
195.27 USD

A First Course in Fuzzy Logic

by Elbert a Walker, Carol L. Walker, Hung T. Nguyen
Hardback
Book cover image
Systems thinking tells us that human error, violations and technology failures result from poorly designed and managed work systems. To help us understand and prevent injuries and incidents, incident reporting systems must be capable of collecting data on contributory factors from across the overall work system, in addition to factors ...
Translating Systems Thinking into Practice: A Guide to Developing Incident Reporting Systems
Systems thinking tells us that human error, violations and technology failures result from poorly designed and managed work systems. To help us understand and prevent injuries and incidents, incident reporting systems must be capable of collecting data on contributory factors from across the overall work system, in addition to factors relating to the immediate context of the event (e.g. front-line workers, environment, and equipment). This book describes how to design a practical, usable incident reporting system based on this approach. The book contains all the information needed to effectively design and implement a new incident reporting system underpinned by systems thinking. It also provides guidance on how to evaluate and improve existing incident reporting systems so they are practical for users, collect good quality data, and reflect the principles of systems thinking. Features Highlights the key principles of systems thinking for designing incident reporting systems Outlines a process for developing and testing incident reporting systems Describes how to evaluate incident reporting systems to ensure they are practical, usable, and collect good quality data Provides detailed guidance on how to analyze incident data, and translate the findings into appropriate incident prevention strategies
https://magrudy-assets.storage.googleapis.com/9781472436917.jpg
213.86 USD

Translating Systems Thinking into Practice: A Guide to Developing Incident Reporting Systems

by Caroline Finch, Michael Lenne, Paul M. Salmon, Natassia Goode
Hardback
Book cover image
This book provides comprehensive details of all Swarm Intelligence based Techniques available till date in a comprehensive manner along with their mathematical proofs. It will act as a foundation for authors, researchers and industry professionals. This monograph will present the latest state of the art research being done on varied ...
Advances in Swarm Intelligence for Optimizing Problems in Computer Science
This book provides comprehensive details of all Swarm Intelligence based Techniques available till date in a comprehensive manner along with their mathematical proofs. It will act as a foundation for authors, researchers and industry professionals. This monograph will present the latest state of the art research being done on varied Intelligent Technologies like sensor networks, machine learning, optical fiber communications, digital signal processing, image processing and many more.
https://magrudy-assets.storage.googleapis.com/9781138482517.jpg
251.06 USD

Advances in Swarm Intelligence for Optimizing Problems in Computer Science

Hardback
Book cover image
Although the use of cloud computing platforms and applications has expanded rapidly, most books on the subject focus on high-level concepts. There has long been a need for a book that provides detailed guidance on how to develop secure clouds. Filling this void, Developing and Securing the Cloud provides a ...
Developing and Securing the Cloud
Although the use of cloud computing platforms and applications has expanded rapidly, most books on the subject focus on high-level concepts. There has long been a need for a book that provides detailed guidance on how to develop secure clouds. Filling this void, Developing and Securing the Cloud provides a comprehensive overview of cloud computing technology. Supplying step-by-step instruction on how to develop and secure cloud computing platforms and web services, it includes an easy-to-understand, basic-level overview of cloud computing and its supporting technologies. Presenting a framework for secure cloud computing development, the book describes supporting technologies for the cloud such as web services and security. It details the various layers of the cloud computing framework, including the virtual machine monitor and hypervisor, cloud data storage, cloud data management, and virtual network monitor. It also provides several examples of cloud products and prototypes, including private, public, and U.S. government clouds. Reviewing recent developments in cloud computing, the book illustrates the essential concepts, issues, and challenges in developing and securing today's cloud computing platforms and applications. It also examines prototypes built on experimental cloud computing systems that the author and her team have developed at the University of Texas at Dallas. This diverse reference is suitable for those in industry, government, and academia. Technologists will develop the understanding required to select the appropriate tools for particular cloud applications. Developers will discover alternative designs for cloud development, and managers will understand if it's best to build their own clouds or contract them out.
https://magrudy-assets.storage.googleapis.com/9781138374539.jpg
77.650000 USD

Developing and Securing the Cloud

by Bhavani Thuraisingham
Paperback / softback
Book cover image
Linux: The Textbook, Second Edition provides comprehensive coverage of the contemporary use of the Linux operating system for every level of student or practitioner, from beginners to advanced users. The text clearly illustrates system-specific commands and features using Debian-family Debian, Ubuntu, and Linux Mint, and RHEL-family CentOS, and stresses universal ...
Linux: The Textbook, Second Edition
Linux: The Textbook, Second Edition provides comprehensive coverage of the contemporary use of the Linux operating system for every level of student or practitioner, from beginners to advanced users. The text clearly illustrates system-specific commands and features using Debian-family Debian, Ubuntu, and Linux Mint, and RHEL-family CentOS, and stresses universal commands and features that are critical to all Linux distributions. The second edition of the book includes extensive updates and new chapters on system administration for desktop, stand-alone PCs, and server-class computers; API for system programming, including thread programming with pthreads; virtualization methodologies; and an extensive tutorial on systemd service management. Brand new online content on the CRC Press website includes an instructor's workbook, test bank, and In-Chapter exercise solutions, as well as full downloadable chapters on Python Version 3.5 programming, ZFS, TC shell programming, advanced system programming, and more. An author-hosted GitHub website also features updates, further references, and errata. Features New or updated coverage of file system, sorting, regular expressions, directory and file searching, file compression and encryption, shell scripting, system programming, client-server-based network programming, thread programming with pthreads, and system administration Extensive in-text pedagogy, including chapter objectives, student projects, and basic and advanced student exercises for every chapter Expansive electronic downloads offer advanced content on Python, ZFS, TC shell scripting, advanced system programming, internetworking with Linux TCP/IP, and many more topics, all featured on the CRC Press website Downloadable test bank, work book, and solutions available for instructors on the CRC Press website Author-maintained GitHub repository provides other resources, such as live links to further references, updates, and errata
https://magrudy-assets.storage.googleapis.com/9781138710085.jpg
185.97 USD

Linux: The Textbook, Second Edition

by Robert M. Koretsky, Syed Mansoor Sarwar
Hardback
Book cover image
SQL is a widely used to access most databases, therefore database developers and system administrators should be familiar with it. This hands-on SQL book will help beginner and intermediate users to write queries that apply complex conditions on a table. The book's unique side by side approach makes it easy ...
Practical Guide for Oracle SQL, T-SQL and MySQL
SQL is a widely used to access most databases, therefore database developers and system administrators should be familiar with it. This hands-on SQL book will help beginner and intermediate users to write queries that apply complex conditions on a table. The book's unique side by side approach makes it easy for the reader to learn three major query languages in the IT industry. The author has over 20 years of experience in database design. KEY FEATURES: Contains numerous practical screenshots of Oracle SQL, T-SQL, MySQL statements and results. Shows the differences between Oracle SQL, T-SQL and MySQL side by side. Gives a real world experience for SQL developers and database administrators. Sample data is available to work on (available on our website).
https://magrudy-assets.storage.googleapis.com/9781138347526.jpg
65.07 USD

Practical Guide for Oracle SQL, T-SQL and MySQL

by Preston Zhang
Paperback / softback
Book cover image
This book explains IoT technology, its potential applications, the security and privacy aspects, the key necessities like governance, risk management, regulatory compliance needs, the philosophical aspects of this technology that are necessary to support an ethical, safe and secure digitally enhanced environment in which people can live smarter. It describes ...
Internet of Things, for Things, and by Things
This book explains IoT technology, its potential applications, the security and privacy aspects, the key necessities like governance, risk management, regulatory compliance needs, the philosophical aspects of this technology that are necessary to support an ethical, safe and secure digitally enhanced environment in which people can live smarter. It describes the inherent technology of IoT, the architectural components and the philosophy behind this emerging technology. Then it shows the various potential applications of the Internet of Things that can bring benefits to the human society. Finally, it discusses various necessities to provide a secured and trustworthy IoT service.
https://magrudy-assets.storage.googleapis.com/9781138710443.jpg
115.28 USD

Internet of Things, for Things, and by Things

by Abhik Chaudhuri
Hardback
Page 1 of 25