Filter
(found 432 products)
Book cover image
Smart Science, Design & Technology represents the proceedings of the 5th International Conference on Applied System Innovation (ICASI 2019), which was held in Fukuoka, Japan, April 12-18, 2019. The conference received more than 300 submitted papers from at least 20 different countries, whereby one third of these papers was selected ...
Smart Science, Design & Technology: Proceedings of the 5th International Conference on Applied System Innovation (ICASI 2019), April 12-18, 2019, Fukuoka, Japan
Smart Science, Design & Technology represents the proceedings of the 5th International Conference on Applied System Innovation (ICASI 2019), which was held in Fukuoka, Japan, April 12-18, 2019. The conference received more than 300 submitted papers from at least 20 different countries, whereby one third of these papers was selected by the committees and invited to present at ICASI 2019. The resulting book aims to provide an integrated communication platform for researchers active in a wide range of fields including information technology, communication science, applied mathematics, computer science, advanced material science, and engineering. Major breakthroughs are being made by interdisciplinary collaborations between science and engineering technologists in academia and industry within this unique international network. Smart Science has emerged as a separate discipline, involving innovative practices, methodologies and processes.
https://magrudy-assets.storage.googleapis.com/9780367178673.jpg
210.000000 USD

Smart Science, Design & Technology: Proceedings of the 5th International Conference on Applied System Innovation (ICASI 2019), April 12-18, 2019, Fukuoka, Japan

Hardback
Book cover image
The calculus of IT support for the banking, securities, and insurance industries has changed dramatically and rapidly over the past few years. Consolidation and deregulation are creating opportunities and challenges never before seen. Unheard of just a few years ago, e-commerce has given birth to new infrastructures and departments needed ...
Financial Services Information Systems
The calculus of IT support for the banking, securities, and insurance industries has changed dramatically and rapidly over the past few years. Consolidation and deregulation are creating opportunities and challenges never before seen. Unheard of just a few years ago, e-commerce has given birth to new infrastructures and departments needed to support them. And the Internet/Intranet/Extranet triple-whammy is the most critical component of most financial IT shops. At the same time, new intelligent agents stand ready to take on such diverse functions as customer profiling and data mining. Get a handle on all these new and newer ripples with Financial Services Information Systems. Here, in this exhaustive new guide and reference book, industry guru Jessica Keyes gives you the no-nonsense scoop on not just the tried and true IT tools of today, but also the up-and-coming hot technologies of tomorrow, and how to plan for them. Financial Services Information Systems addresses challenges and solutions associated with: supporting the self-service revolution by servicing kiosks and ATMs efficiently and economically, straight-through processing for the securities industry, outsourcing business communications in the insurance industry, distributed integration as a cost-effective alternative to data warehousing, and putting inbound fax automation to work in financial organizations.
https://magrudy-assets.storage.googleapis.com/9780367398828.jpg
78.700000 USD

Financial Services Information Systems

Paperback / softback
Book cover image
This book helps participants in agile software development environments learn to become leaders. Facilitative leaders should be at every level of the organization, from individual contributor to informal team leader to managers of all stripes -- it takes much focus and intentionality from senior organizational leaders, who have special obligations ...
People Over Process: Leadership for Agility
This book helps participants in agile software development environments learn to become leaders. Facilitative leaders should be at every level of the organization, from individual contributor to informal team leader to managers of all stripes -- it takes much focus and intentionality from senior organizational leaders, who have special obligations in creating successful lean and agile development environments. But, beyond the principles of facilitative leadership for agility, People over Process provides tips and demonstrative scenes for the more important and common software meetings: architecture simulations, project planning, team configurations, retrospectives, and more. The author fully illustrates the principles and shares proven techniques for the most important leadership events in agile projects. While this book focuses on facilitating extraordinarily well-prepared meetings, it serves as a metaphor for leadership more broadly. The leader's obligation to help their team make rigorous fact-based decisions; to gain broad input and have participants aligned on the outcomes and next steps; and to do so in an efficient way that respects the time of the participants is as relevant to every-day leadership activity as it is to conducting meetings. The author mixes background and explanation with demonstration -- in this case, the story of an agile project at the fictitious Pacifica Bank. The scenario constructed at Pacifica illustrates the concepts of effective leadership and productive workplace environments. The book concentrates on the flow of software from understanding what is needed through design, development, testing, and deployment. Essentially, the author provides a simple and powerful model of leadership, examples, and tips. This is not a cookbook on how to lead -- It is a set of principles and examples. All leaders must find their own way for their team, their organization, and their unique challenges.
https://magrudy-assets.storage.googleapis.com/9780367341886.jpg
50.19 USD

People Over Process: Leadership for Agility

by Michael K. Levine
Paperback / softback
Book cover image
Hybrid computational intelligent techniques are efficient in dealing with the real-world problems encountered in engineering fields. The primary objective of this book is to provide an exhaustive introduction as well as review of the hybrid computational intelligent paradigm, with supportive case studies. In addition, it aims to provide a gallery ...
Hybrid Computational Intelligence: Research and Applications
Hybrid computational intelligent techniques are efficient in dealing with the real-world problems encountered in engineering fields. The primary objective of this book is to provide an exhaustive introduction as well as review of the hybrid computational intelligent paradigm, with supportive case studies. In addition, it aims to provide a gallery of engineering applications where this computing paradigm can be effectively use. Finally, it focuses on the recent quantum inspired hybrid intelligence to develop intelligent solutions for the future. The book also incorporates video demonstrations of each application for better understanding of the subject matter.
https://magrudy-assets.storage.googleapis.com/9781138320253.jpg
260.36 USD

Hybrid Computational Intelligence: Research and Applications

Hardback
Book cover image
The book provides an advanced vision and trends of computational intelligence in cyberspace and cyber-enabled spaces. It reviews architectures and models, as well as state-of-the-art computational and interpretation capabilities for social, industrial, and multimedia applications. Cyber-enabled intelligence involves the design and development of intelligent and innovative application scenarios in social ...
Cyber-Enabled Intelligence
The book provides an advanced vision and trends of computational intelligence in cyberspace and cyber-enabled spaces. It reviews architectures and models, as well as state-of-the-art computational and interpretation capabilities for social, industrial, and multimedia applications. Cyber-enabled intelligence involves the design and development of intelligent and innovative application scenarios in social networks, computer vision, multimedia, and image processing. Application scenarios can also cover the applicability of intelligent sensing, data collection and predictive analysis in Internet of Things.
https://magrudy-assets.storage.googleapis.com/9780367184872.jpg
178.53 USD

Cyber-Enabled Intelligence

Hardback
Book cover image
The Cloud in IoT-enabled Spaces addresses major issues and challenges in IoT-based solutions proposed for the Cloud. It paves the way for IoT-enabled spaces in the next generation cloud computing paradigm and opens the door for further innovative ideas. Topics include Cloud-based optimization in the IoT era, scheduling and routing, ...
The Cloud in IoT-enabled Spaces
The Cloud in IoT-enabled Spaces addresses major issues and challenges in IoT-based solutions proposed for the Cloud. It paves the way for IoT-enabled spaces in the next generation cloud computing paradigm and opens the door for further innovative ideas. Topics include Cloud-based optimization in the IoT era, scheduling and routing, medium access, data caching, secure access, uncertainty, home automation, machine learning in wearable devices, energy monitoring, and plant phenotyping in farming. Smart spaces are solutions where Internet of Things (IoT)-enabling technologies have been employed towards further advances in the lifestyle. It tightly integrates with the existing Cloud infrastructure to impact several fields in academia and industry. The Cloud in IoT-enabled Spaces provides an overview of the issues around small spaces and proposes the most up-to-date alternatives and solutions. The objective is to pave the way for IoT-enabled spaces in the next-generation Cloud computing and open the door for further innovative ideas.
https://magrudy-assets.storage.googleapis.com/9780367278144.jpg
178.53 USD

The Cloud in IoT-enabled Spaces

by Fadi Al-Turjman
Hardback
Book cover image
This is a book about the development of dependable, embedded software. It is for systems designers, implementers, and verifiers who are experienced in general embedded software development, but who are now facing the prospect of delivering a software-based system for a safety-critical application. It is aimed at those creating a ...
Embedded Software Development for Safety-Critical Systems, Second Edition
This is a book about the development of dependable, embedded software. It is for systems designers, implementers, and verifiers who are experienced in general embedded software development, but who are now facing the prospect of delivering a software-based system for a safety-critical application. It is aimed at those creating a product that must satisfy one or more of the international standards relating to safety-critical applications, including IEC 61508, ISO 26262, EN 50128, EN 50657, IEC 62304, or related standards. Of the first edition, Stephen Thomas, PE, Founder and Editor of FunctionalSafetyEngineer.com said, I highly recommend Mr. Hobbs' book.
https://magrudy-assets.storage.googleapis.com/9780367338855.jpg
115.28 USD

Embedded Software Development for Safety-Critical Systems, Second Edition

by Chris Hobbs
Paperback / softback
Book cover image
The field of artificial intelligence (AI) has grown dramatically in recent decades from niche expert systems to the current myriad of deep machine learning applications that include personal assistants, natural-language interfaces, and medical, financial, and traffic management systems. This boom in AI engineering masks the fact that all current AI ...
AI and Human Thought and Emotion
The field of artificial intelligence (AI) has grown dramatically in recent decades from niche expert systems to the current myriad of deep machine learning applications that include personal assistants, natural-language interfaces, and medical, financial, and traffic management systems. This boom in AI engineering masks the fact that all current AI systems are based on two fundamental ideas: mathematics (logic and statistics, from the 19th century), and a grossly simplified understanding of biology (mainly neurons, as understood in 1943). This book explores other fundamental ideas that have the potential to make AI more anthropomorphic. Most books on AI are technical and do not consider the humanities. Most books in the humanities treat technology in a similar manner. AI and Human Thought and Emotion, however is about AI, how academics, researchers, scientists, and practitioners came to think about AI the way they do, and how they can think about it afresh with a humanities-based perspective. The book walks a middle line to share insights between the humanities and technology. It starts with philosophy and the history of ideas and goes all the way to usable algorithms. Central to this work are the concepts of introspection, which is how consciousness is viewed, and consciousness, which is accessible to humans as they reflect on their own experience. The main argument of this book is that AI based on introspection and emotion can produce more human-like AI. To discover the connections among emotion, introspection, and AI, the book travels far from technology into the humanities and then returns with concrete examples of new algorithms. At times philosophical, historical, and technical, this exploration of human emotion and thinking poses questions and provides answers about the future of AI.
https://magrudy-assets.storage.googleapis.com/9780367029296.jpg
185.97 USD

AI and Human Thought and Emotion

by Sam Freed
Hardback
Book cover image
In this book, Vivek Kale makes an important contribution to the theory and practice of enterprise architecture ... this book captures the breadth and depth of information that a modern enterprise architecture must address to effectively support an agile enterprise. This book should have a place in every practicing architect's ...
Digital Transformation of Enterprise Architecture
In this book, Vivek Kale makes an important contribution to the theory and practice of enterprise architecture ... this book captures the breadth and depth of information that a modern enterprise architecture must address to effectively support an agile enterprise. This book should have a place in every practicing architect's library. -John D. McDowall, Author of Complex Enterprise Architecture Digital Transformation of Enterprise Architecture is the first book to propose Enterprise Architecture (EA) as the most important element (after Business Models) for digital transformation of enterprises. This book makes digital transformation more tangible by showing the rationale and typical technologies associated with it, and these technologies in turn reveal the essence of digital transformation. This book would be useful for analysts, designers and developers of future-ready agile application systems. This book proposes that it is the perennial quest for interoperability & portability, scalability, availability, etc., that has directed and driven the evolution of the IT/IS industry in the past 50 years. It is this very quest that has led to the emergence of technologies like service-oriented, cloud, and big data computing. In addition to the conventional attributes of EA like interoperability, scalability and availability, this book identifies additional attributes of mobility, ubiquity, security, analyticity, and usability. This pragmatic book: Identifies three parts effort for any digital transformation: Business Models, Enterprise Architectures and Enterprise Processes. Describes eight attributes of EA: interoperability, scalability, availability, mobility, ubiquity, security, analyticity, and usability. Explains the corresponding technologies of service-oriented, cloud, big data, context-aware, Internet of Things (IoT), blockchain, soft, and interactive computing. Briefs on auxiliary technologies like integration, virtualization, replication, spatio-temporal databases, embedded systems, cryptography, data mining, and interactive interfaces that are essential for digital transformation of enterprise architecture. Introduces interactive interfaces like voice, gaze, gesture and 3D interfaces. Provides an overview of blockchain computing, soft computing, and customer interaction systems. Digital Transformation of Enterprise Architecture proposes that to withstand the disruptive digital storms of the future, enterprises must bring about digital transformation, i.e. a transformation that affects an exponential change (amplification or attenuation) in any aspect of the constituent attributes of EA. It proposes that each of these technologies (service-oriented, cloud, big data, context-aware, IoT, blockchain, soft, and interactive computing) bring about digital transformation of the corresponding EA attribute viz. interoperability, scalability, availability, mobility, ubiquity, security, analyticity, and usability.
https://magrudy-assets.storage.googleapis.com/9781138553781.jpg
247.34 USD

Digital Transformation of Enterprise Architecture

by Vivek Kale
Hardback
Book cover image
Client-Centered Software Development: The CO-FOSS Approach introduces a method to creating a customized software product for a single client, either from scratch or by reusing open source components. The clients are typically non-profit humanitarian, educational, or public service organizations. This approach has been used in undergraduate courses where students learn ...
Client-Centered Software Development: The CO-FOSS Approach
Client-Centered Software Development: The CO-FOSS Approach introduces a method to creating a customized software product for a single client, either from scratch or by reusing open source components. The clients are typically non-profit humanitarian, educational, or public service organizations. This approach has been used in undergraduate courses where students learn the principles of software development while implementing a real-world software product. This book provides instructors, students, clients, and professional software developers with detailed guidance for developing a new CO-FOSS product from conceptualization to completion. Features Provides instructors, students, clients, and professional software developers with a roadmap for the development of a new CO-FOSS product from conceptualization to completion Motivates students with real-world projects and community service experiences Teaches all elements of the software process, including requirements gathering, design, collaboration, coding, testing, client communication, refactoring, and writing developer and user documentation Uses source code that can be reused and refitted to suit the needs of future projects, since each CO-FOSS product is free and open source software Provides links to a rich variety of resources for instructors and students to freely use in their own courses that develop new CO-FOSS products for other non-profits.
https://magrudy-assets.storage.googleapis.com/9781138583849.jpg
143.20 USD

Client-Centered Software Development: The CO-FOSS Approach

by Allen B. Tucker
Hardback
Book cover image
Driving innovation can reduce costs for companies, institutions, military programs, and successful businesses. Quality is key to successful innovation. Delivery of complex products must have high quality to reduce customer problems and defects. This book explains how to integrate Quality Assurance processes to produce compliant product management and gap analysis. ...
Effective Processes for Quality Assurance
Driving innovation can reduce costs for companies, institutions, military programs, and successful businesses. Quality is key to successful innovation. Delivery of complex products must have high quality to reduce customer problems and defects. This book explains how to integrate Quality Assurance processes to produce compliant product management and gap analysis. It shows how Quality Assurance provides a common operating framework in which best practices, improvements, and cost avoidance activities can be shared. Effective Processes for Quality Assurance emphasizes improving process execution and reducing operational costs. It also focuses on how Quality Assurance personnel must support companies, institutions, military programs, and successful businesses by encouraging a cooperative, proactive approach and ensure compliance through management and team member participation. Lean and Agile can provide a competitive advantage, and this practical reference explains how to implement these two principles to deliver products that have fewer defects. It also explains: Quality Assurance methods Measuring benefits of Quality Assurance process improvement Quality Assurance performance and improvement Risk management Quality Assurance improvement with metrics Effective processes for Quality Assurance Quantitative process performance and commitments Quality Assurance plans Quality Assurance for customers and suppliers Supporting software configuration Effective Processes for Quality Assurance covers the critical issues for implementing Quality Assurance processes that can deliver high-quality products successfully.
https://magrudy-assets.storage.googleapis.com/9780367172961.jpg
104.950000 USD

Effective Processes for Quality Assurance

by Boyd L. Summers
Hardback
Book cover image
It is a major challenge to migrate very large databases from one system, say for example, to transfer critical data from Oracle to SQL Server. One has to consider several issues such as loss of data being transferred, the security of the data, the cost and effort, technical aspects of ...
Practical Guide to Large Database Migration
It is a major challenge to migrate very large databases from one system, say for example, to transfer critical data from Oracle to SQL Server. One has to consider several issues such as loss of data being transferred, the security of the data, the cost and effort, technical aspects of the software involved, etc. There a very few books that provide practical tools and the methodology to migrate data from one vendor to another. This book introduces the concepts in database migration with large sample databases. It provides step by step guides and screenshots for database migration tools. Many examples are shown for migrating Oracle, SQL Server and MySQL databases.
https://magrudy-assets.storage.googleapis.com/9781138391628.jpg
178.450000 USD

Practical Guide to Large Database Migration

by Preston Zhang
Hardback
Book cover image
The next big area within the information and communication technology field is Artificial Intelligence (AI). The industry is moving to automate networks, cloud-based systems (e.g., Salesforce), databases (e.g., Oracle), AWS machine learning (e.g., Amazon Lex), and creating infrastructure that has the ability to adapt in real-time to changes and learn ...
Artificial Intelligence and Machine Learning for Business for Non-Engineers
The next big area within the information and communication technology field is Artificial Intelligence (AI). The industry is moving to automate networks, cloud-based systems (e.g., Salesforce), databases (e.g., Oracle), AWS machine learning (e.g., Amazon Lex), and creating infrastructure that has the ability to adapt in real-time to changes and learn what to anticipate in the future. It is an area of technology that is coming faster and penetrating more areas of business than any other in our history. AI will be used from the C-suite to the distribution warehouse floor. Replete with case studies, this book provides a working knowledge of AI's current and future capabilities and the impact it will have on every business. It covers everything from healthcare to warehousing, banking, finance and education. It is essential reading for anyone involved in industry.
98.54 USD

Artificial Intelligence and Machine Learning for Business for Non-Engineers

Paperback / softback
Book cover image
This book aims to teach the core concepts that make Self-driving vehicles (SDVs) possible. It is aimed at people who want to get their teeth into self-driving vehicle technology, by providing genuine technical insights where other books just skim the surface. The book tackles everything from sensors and perception to ...
Introduction to Self-Driving Vehicle Technology
This book aims to teach the core concepts that make Self-driving vehicles (SDVs) possible. It is aimed at people who want to get their teeth into self-driving vehicle technology, by providing genuine technical insights where other books just skim the surface. The book tackles everything from sensors and perception to functional safety and cybersecurity. It also passes on some practical know-how and discusses concrete SDV applications, along with a discussion of where this technology is heading. It will serve as a good starting point for software developers or professional engineers who are eager to pursue a career in this exciting field and want to learn more about the basics of SDV algorithms. Likewise, academic researchers, technology enthusiasts, and journalists will also find the book useful. Key Features: Offers a comprehensive technological walk-through of what really matters in SDV development: from hardware, software, to functional safety and cybersecurity Written by an active practitioner with extensive experience in series development and research in the fields of Advanced Driver Assistance Systems (ADAS) and Autonomous Driving Covers theoretical fundamentals of state-of-the-art SLAM, multi-sensor data fusion, and other SDV algorithms. Includes practical information and hands-on material with Robot Operating System (ROS) and Open Source Car Control (OSCC). Provides an overview of the strategies, trends, and applications which companies are pursuing in this field at present as well as other technical insights from the industry.
85.53 USD

Introduction to Self-Driving Vehicle Technology

by Hanky Sjafrie
Paperback / softback
Book cover image
This book aims to teach the core concepts that make Self-driving vehicles (SDVs) possible. It is aimed at people who want to get their teeth into self-driving vehicle technology, by providing genuine technical insights where other books just skim the surface. The book tackles everything from sensors and perception to ...
Introduction to Self-Driving Vehicle Technology
This book aims to teach the core concepts that make Self-driving vehicles (SDVs) possible. It is aimed at people who want to get their teeth into self-driving vehicle technology, by providing genuine technical insights where other books just skim the surface. The book tackles everything from sensors and perception to functional safety and cybersecurity. It also passes on some practical know-how and discusses concrete SDV applications, along with a discussion of where this technology is heading. It will serve as a good starting point for software developers or professional engineers who are eager to pursue a career in this exciting field and want to learn more about the basics of SDV algorithms. Likewise, academic researchers, technology enthusiasts, and journalists will also find the book useful. Key Features: Offers a comprehensive technological walk-through of what really matters in SDV development: from hardware, software, to functional safety and cybersecurity Written by an active practitioner with extensive experience in series development and research in the fields of Advanced Driver Assistance Systems (ADAS) and Autonomous Driving Covers theoretical fundamentals of state-of-the-art SLAM, multi-sensor data fusion, and other SDV algorithms. Includes practical information and hands-on material with Robot Operating System (ROS) and Open Source Car Control (OSCC). Provides an overview of the strategies, trends, and applications which companies are pursuing in this field at present as well as other technical insights from the industry.
125.950000 USD

Introduction to Self-Driving Vehicle Technology

by Hanky Sjafrie
Hardback
Book cover image
Toward Deep Neural Networks: WASD Neuronet Models, Algorithms, and Applications introduces the outlook and extension toward deep neural networks, with a focus on the weights-and-structure determination (WASD) algorithm. Based on the authors' 20 years of research experience on neuronets, the book explores the models, algorithms, and applications of the WASD ...
Deep Neural Networks: WASD Neuronet Models, Algorithms, and Applications
Toward Deep Neural Networks: WASD Neuronet Models, Algorithms, and Applications introduces the outlook and extension toward deep neural networks, with a focus on the weights-and-structure determination (WASD) algorithm. Based on the authors' 20 years of research experience on neuronets, the book explores the models, algorithms, and applications of the WASD neuronet, and allows reader to extend the techniques in the book to solve scientific and engineering problems. The book will be of interest to engineers, senior undergraduates, postgraduates, and researchers in the fields of neuronets, computer mathematics, computer science, artificial intelligence, numerical algorithms, optimization, simulation and modeling, deep learning, and data mining. Features Focuses on neuronet models, algorithms, and applications Designs, constructs, develops, analyzes, simulates and compares various WASD neuronet models, such as single-input WASD neuronet models, two-input WASD neuronet models, three-input WASD neuronet models, and general multi-input WASD neuronet models for function data approximations Includes real-world applications, such as population prediction Provides complete mathematical foundations, such as Weierstrass approximation, Bernstein polynomial approximation, Taylor polynomial approximation, and multivariate function approximation, exploring the close integration of mathematics (i.e., function approximation theories) and computers (e.g., computer algorithms) Utilizes the authors' 20 years of research on neuronets
https://magrudy-assets.storage.googleapis.com/9781138387034.jpg
213.86 USD

Deep Neural Networks: WASD Neuronet Models, Algorithms, and Applications

by Chengxu Ye, Dechao Chen, Yunong Zhang
Hardback
Book cover image
Solving pattern recognition problems involves an enormous amount of computational effort. By applying genetic algorithms - a computational method based on the way chromosomes in DNA recombine - these problems are more efficiently and more accurately solved. Genetic Algorithms for Pattern Recognition covers a broad range of applications in science ...
Revival: Genetic Algorithms for Pattern Recognition (1986)
Solving pattern recognition problems involves an enormous amount of computational effort. By applying genetic algorithms - a computational method based on the way chromosomes in DNA recombine - these problems are more efficiently and more accurately solved. Genetic Algorithms for Pattern Recognition covers a broad range of applications in science and technology, describing the integration of genetic algorithms in pattern recognition and machine learning problems to build intelligent recognition systems. The articles, written by leading experts from around the world, accomplish several objectives: they provide insight into the theory of genetic algorithms; they develop pattern recognition theory in light of genetic algorithms; and they illustrate applications in artificial neural networks and fuzzy logic. The cross-sectional view of current research presented in Genetic Algorithms for Pattern Recognition makes it a unique text, ideal for graduate students and researchers.
https://magrudy-assets.storage.googleapis.com/9781138558885.jpg
71.350000 USD

Revival: Genetic Algorithms for Pattern Recognition (1986)

by Paul P. Wang, Sankar K. Pal
Paperback / softback
Book cover image
This book teaches the basics of Oracle GoldenGate, which is a product that is used to simplify the process of Oracle Database Replication. GoldenGate can be used for reporting, failover, high availability, live reporting, data warehousing, and BigData ETL process, as well as connecting to multiple other data sources outside ...
Working with Oracle GoldenGate 12c: From Implementation to Troubleshooting
This book teaches the basics of Oracle GoldenGate, which is a product that is used to simplify the process of Oracle Database Replication. GoldenGate can be used for reporting, failover, high availability, live reporting, data warehousing, and BigData ETL process, as well as connecting to multiple other data sources outside of Oracle Database such as SQL Server, MySQL, Teradata, PostgreSQL, and many others. The purpose of GoldenGate and its popularity is its ability to make the highly complex architecture of database replication into a much more simplistic task. This book teaches the reader how to use Oracle GoldenGate, from installation to troubleshooting.
https://magrudy-assets.storage.googleapis.com/9781138197572.jpg
78.700000 USD

Working with Oracle GoldenGate 12c: From Implementation to Troubleshooting

by Gavin Powell
Hardback
Book cover image
Smart Cities and intelligence are among the most significant topics in IoT. Intelligence in communication and infrastructure implementation is at the heart of this concept, and its development is a key issue in smart cities. This book addresses the challenges in realizing intelligence in smart cities and sensing platforms in ...
Intelligence in IoT-enabled Smart Cities
Smart Cities and intelligence are among the most significant topics in IoT. Intelligence in communication and infrastructure implementation is at the heart of this concept, and its development is a key issue in smart cities. This book addresses the challenges in realizing intelligence in smart cities and sensing platforms in the era of cloud computing and IoT, varying from cost and energy efficiency to availability and service quality. It focuses on both the design and implementation aspects of artificial intelligence approaches in smart cities and sensing applications that are enabled and supported by IoT paradigms, and mainly on data delivery approaches and their performability aspects.
https://magrudy-assets.storage.googleapis.com/9781138316843.jpg
147.000000 USD

Intelligence in IoT-enabled Smart Cities

by Fadi Al-Turjman
Hardback
Book cover image
Security for Software Engineers is designed to introduce security concepts to undergraduate software engineering students. The book is divided into four units, each targeting activities that a software engineer will likely be involved in within industry. The book explores the key areas of attack vectors, code hardening, privacy, and social ...
Security for Software Engineers
Security for Software Engineers is designed to introduce security concepts to undergraduate software engineering students. The book is divided into four units, each targeting activities that a software engineer will likely be involved in within industry. The book explores the key areas of attack vectors, code hardening, privacy, and social engineering. Each topic is explored from a theoretical and a practical-application standpoint. Features: Targets software engineering students - one of the only security texts to target this audience. Focuses on the white-hat side of the security equation rather than the black-hat side. Includes many practical and real-world examples that easily translate into the workplace. Covers a one-semester undergraduate course. Describes all aspects of computer security as it pertains to the job of a software engineer and presents problems similar to that which an engineer will encounter in the industry. This text will equip students to make knowledgeable security decisions, be productive members of a security review team, and write code that protects a user's information assets.
https://magrudy-assets.storage.googleapis.com/9781138583825.jpg
143.18 USD

Security for Software Engineers

by James N. Helfrich
Hardback
Book cover image
The objective of this edited book is to gather best practices in the development and management of mobile apps projects. Mobile Apps Engineering aims to provide software engineering lecturers, students and researchers of mobile computing a starting point for developing successful mobile apps. To achieve these objectives, the book's contributors ...
Mobile Apps Engineering: Design, Development, Security, and Testing
The objective of this edited book is to gather best practices in the development and management of mobile apps projects. Mobile Apps Engineering aims to provide software engineering lecturers, students and researchers of mobile computing a starting point for developing successful mobile apps. To achieve these objectives, the book's contributors emphasize the essential concepts of the field, such as apps design, testing and security, with the intention of offering a compact, self-contained book which shall stimulate further research interest in the topic. The editors hope and believe that their efforts in bringing this book together can make mobile apps engineering an independent discipline inspired by traditional software engineering, but taking into account the new challenges posed by mobile computing.
https://magrudy-assets.storage.googleapis.com/9781138054356.jpg
110.250000 USD

Mobile Apps Engineering: Design, Development, Security, and Testing

Hardback
Book cover image
A First Course in Fuzzy Logic, Fourth Edition is an expanded version of the successful third edition. It provides a comprehensive introduction to the theory and applications of fuzzy logic. This popular text offers a firm mathematical basis for the calculus of fuzzy concepts necessary for designing intelligent systems and ...
A First Course in Fuzzy Logic
A First Course in Fuzzy Logic, Fourth Edition is an expanded version of the successful third edition. It provides a comprehensive introduction to the theory and applications of fuzzy logic. This popular text offers a firm mathematical basis for the calculus of fuzzy concepts necessary for designing intelligent systems and a solid background for readers to pursue further studies and real-world applications. New in the Fourth Edition: Features new results on fuzzy sets of type-2 Provides more information on copulas for modeling dependence structures Includes quantum probability for uncertainty modeling in social sciences, especially in economics With its comprehensive updates, this new edition presents all the background necessary for students, instructors and professionals to begin using fuzzy logic in its many-applications in computer science, mathematics, statistics, and engineering. About the Authors: Hung T. Nguyen is a Professor Emeritus at the Department of Mathematical Sciences, New Mexico State University. He is also an Adjunct Professor of Economics at Chiang Mai University, Thailand. Carol L. Walker is also a Professor Emeritus at the Department of Mathematical Sciences, New Mexico State University. Elbert A. Walker is a Professor Emeritus, Department of Mathematical Sciences, New Mexico State University.
https://magrudy-assets.storage.googleapis.com/9781138585089.jpg
195.27 USD

A First Course in Fuzzy Logic

by Elbert a Walker, Carol L. Walker, Hung T. Nguyen
Hardback
Book cover image
Systems thinking tells us that human error, violations and technology failures result from poorly designed and managed work systems. To help us understand and prevent injuries and incidents, incident reporting systems must be capable of collecting data on contributory factors from across the overall work system, in addition to factors ...
Translating Systems Thinking into Practice: A Guide to Developing Incident Reporting Systems
Systems thinking tells us that human error, violations and technology failures result from poorly designed and managed work systems. To help us understand and prevent injuries and incidents, incident reporting systems must be capable of collecting data on contributory factors from across the overall work system, in addition to factors relating to the immediate context of the event (e.g. front-line workers, environment, and equipment). This book describes how to design a practical, usable incident reporting system based on this approach. The book contains all the information needed to effectively design and implement a new incident reporting system underpinned by systems thinking. It also provides guidance on how to evaluate and improve existing incident reporting systems so they are practical for users, collect good quality data, and reflect the principles of systems thinking. Features Highlights the key principles of systems thinking for designing incident reporting systems Outlines a process for developing and testing incident reporting systems Describes how to evaluate incident reporting systems to ensure they are practical, usable, and collect good quality data Provides detailed guidance on how to analyze incident data, and translate the findings into appropriate incident prevention strategies
https://magrudy-assets.storage.googleapis.com/9781472436917.jpg
213.86 USD

Translating Systems Thinking into Practice: A Guide to Developing Incident Reporting Systems

by Caroline Finch, Michael Lenne, Paul M. Salmon, Natassia Goode
Hardback
Book cover image
This book provides comprehensive details of all Swarm Intelligence based Techniques available till date in a comprehensive manner along with their mathematical proofs. It will act as a foundation for authors, researchers and industry professionals. This monograph will present the latest state of the art research being done on varied ...
Advances in Swarm Intelligence for Optimizing Problems in Computer Science
This book provides comprehensive details of all Swarm Intelligence based Techniques available till date in a comprehensive manner along with their mathematical proofs. It will act as a foundation for authors, researchers and industry professionals. This monograph will present the latest state of the art research being done on varied Intelligent Technologies like sensor networks, machine learning, optical fiber communications, digital signal processing, image processing and many more.
https://magrudy-assets.storage.googleapis.com/9781138482517.jpg
241.76 USD

Advances in Swarm Intelligence for Optimizing Problems in Computer Science

Hardback
Book cover image
SQL is a widely used to access most databases, therefore database developers and system administrators should be familiar with it. This hands-on SQL book will help beginner and intermediate users to write queries that apply complex conditions on a table. The book's unique side by side approach makes it easy ...
Practical Guide for Oracle SQL, T-SQL and MySQL
SQL is a widely used to access most databases, therefore database developers and system administrators should be familiar with it. This hands-on SQL book will help beginner and intermediate users to write queries that apply complex conditions on a table. The book's unique side by side approach makes it easy for the reader to learn three major query languages in the IT industry. The author has over 20 years of experience in database design. KEY FEATURES: Contains numerous practical screenshots of Oracle SQL, T-SQL, MySQL statements and results. Shows the differences between Oracle SQL, T-SQL and MySQL side by side. Gives a real world experience for SQL developers and database administrators. Sample data is available to work on (available on our website).
https://magrudy-assets.storage.googleapis.com/9781138347526.jpg
65.07 USD

Practical Guide for Oracle SQL, T-SQL and MySQL

by Preston Zhang
Paperback / softback
Book cover image
GPS Tracking with Java EE Components: Challenges of Connected Cars highlights how the self-driving car is actually changing the automotive industry, from programing embedded software to hosting services and data crunching, in real time, with really big data. The book analyzes how the challenges of the Self Driving Car (SDC) ...
GPS Tracking with Java EE Components: Challenges of Connected Cars
GPS Tracking with Java EE Components: Challenges of Connected Cars highlights how the self-driving car is actually changing the automotive industry, from programing embedded software to hosting services and data crunching, in real time, with really big data. The book analyzes how the challenges of the Self Driving Car (SDC) exceed the limits of a classical GPS Tracking System (GTS.) It provides a guidebook on setting up a tracking system by customizing its components. It also provides an overview of the prototyping and modeling process, and how the reader can modify this process for his or her own software. Every component is introduced in detail and includes a number of design decisions for development. The book introduces Java EE (JEE) Modules, and shows how they can be combined to a customizable GTS, and used as seed components to enrich existing systems with live tracking. The book also explores how to merge tracking and mapping to guide SDCs, and focuses on client server programming to provide useful information. It also discusses the challenges involved with the live coordination of moving cars. This book is designed to aid GTS developers and engineers in the automotive industry. It can also help Java Developers, not only interested in GPS Tracking, but in modern software design from many individual modules. Source code and sample applications will be available on the book's website.
https://magrudy-assets.storage.googleapis.com/9781138313828.jpg
230.950000 USD
Hardback
Book cover image
The history of robotics and artificial intelligence in many ways is also the history of humanity's attempts to control such technologies. From the Golem of Prague to the military robots of modernity, the debate continues as to what degree of independence such entities should have and how to make sure ...
Artificial Intelligence Safety and Security
The history of robotics and artificial intelligence in many ways is also the history of humanity's attempts to control such technologies. From the Golem of Prague to the military robots of modernity, the debate continues as to what degree of independence such entities should have and how to make sure that they do not turn on us, its inventors. Numerous recent advancements in all aspects of research, development and deployment of intelligent systems are well publicized but safety and security issues related to AI are rarely addressed. This book is proposed to mitigate this fundamental problem. It is comprised of chapters from leading AI Safety researchers addressing different aspects of the AI control problem as it relates to the development of safe and secure artificial intelligence. The book is the first edited volume dedicated to addressing challenges of constructing safe and secure advanced machine intelligence. The chapters vary in length and technical content from broad interest opinion essays to highly formalized algorithmic approaches to specific problems. All chapters are self-contained and could be read in any order or skipped without a loss of comprehension.
https://magrudy-assets.storage.googleapis.com/9781138320840.jpg
168.000000 USD

Artificial Intelligence Safety and Security

Hardback
Book cover image
In an age of globalization, widely distributed systems, and rapidly advancing technological change, IT professionals and their managers must understand that risk is ever present. The key to project success is to identify risk and subsequently deal with it. The CIO's Guide to Risk addresses the many faces of risk, ...
The CIO's Guide to Risk
In an age of globalization, widely distributed systems, and rapidly advancing technological change, IT professionals and their managers must understand that risk is ever present. The key to project success is to identify risk and subsequently deal with it. The CIO's Guide to Risk addresses the many faces of risk, whether it be in systems development, adoption of bleeding edge tech, the push for innovation, and even the march toward all things social media. Risk management planning, risk identification, qualitative and quantitative risk analysis, contingency planning, and risk monitoring and control are all addressed on a macro as well as micro level. The book begins with a big-picture view of analyzing technology trends to evaluate risk. It shows how to conceptualize trends, analyze their effect on infrastructure, develop metrics to measure success, and assess risk in adapting new technology. The book takes an in-depth look at project-related risks. It explains the fundamentals of project management and how project management relates to systems development and technology implementation. Techniques for analyzing project risk include brainstorming, the Delphi technique, assumption analysis, and decision analysis. Metrics to track and control project risks include the Balance Scorecard, project monitoring and reporting, and business and technology metrics. The book also takes an in-depth look at the role of knowledge management and innovation management in identifying, assessing, and managing risk. The book concludes with an executive's guide to the legal and privacy issues related to risk management, as well overviews of risks associated with social media and mobile environments. With its checklists, templates, and worksheets, the book is an indispensable reference on risk and information technology.
https://magrudy-assets.storage.googleapis.com/9781138090361.jpg
104.13 USD

The CIO's Guide to Risk

by Jessica Keyes
Hardback
Book cover image
Software is one of the most important products in human history and is widely used by all industries and all countries. It is also one of the most expensive and labor-intensive products in human history. Software also has very poor quality that has caused many major disasters and wasted many ...
Quantifying Software: Global and Industry Perspectives
Software is one of the most important products in human history and is widely used by all industries and all countries. It is also one of the most expensive and labor-intensive products in human history. Software also has very poor quality that has caused many major disasters and wasted many millions of dollars. Software is also the target of frequent and increasingly serious cyber-attacks. Among the reasons for these software problems is a chronic lack of reliable quantified data. This reference provides quantified data from many countries and many industries based on about 26,000 projects developed using a variety of methodologies and team experience levels. The data has been gathered between 1970 and 2017, so interesting historical trends are available. Since current average software productivity and quality results are suboptimal, this book focuses on best in class results and shows not only quantified quality and productivity data from best-in-class organizations, but also the technology stacks used to achieve best-in-class results. The overall goal of this book is to encourage the adoption of best-in-class software metrics and best-in-class technology stacks. It does so by providing current data on average software schedules, effort, costs, and quality for several industries and countries. Because productivity and quality vary by technology and size, the book presents quantitative results for applications between 100 function points and 100,000 function points. It shows quality results using defect potential and DRE metrics because the number one cost driver for software is finding and fixing bugs. The book presents data on cost of quality for software projects and discusses technical debt, but that metric is not standardized. Finally, the book includes some data on three years of software maintenance and enhancements as well as some data on total cost of ownership.
https://magrudy-assets.storage.googleapis.com/9781138033115.jpg
98.650000 USD
Hardback
Book cover image
The notion of artificial intelligence (AI) often sparks thoughts of characters from science fiction, such as the Terminator and HAL 9000. While these two artificial entities do not exist, the algorithms of AI have been able to address many real issues, from performing medical diagnoses to navigating difficult terrain to ...
Contemporary Artificial Intelligence
The notion of artificial intelligence (AI) often sparks thoughts of characters from science fiction, such as the Terminator and HAL 9000. While these two artificial entities do not exist, the algorithms of AI have been able to address many real issues, from performing medical diagnoses to navigating difficult terrain to monitoring possible failures of spacecrafts. Exploring these algorithms and applications, Contemporary Artificial Intelligence presents strong AI methods and algorithms for solving challenging problems involving systems that behave intelligently in specialized domains such as medical and software diagnostics, financial decision making, speech and text recognition, genetic analysis, and more. One of the first AI texts accessible to students, the book focuses on the most useful problem-solving strategies that have emerged from AI. In a student-friendly way, the authors cover logic-based methods; probability-based methods; emergent intelligence, including evolutionary computation and swarm intelligence; data-derived logical and probabilistic learning models; and natural language understanding. Through reading this book, students discover the importance of AI techniques in computer science.
https://magrudy-assets.storage.googleapis.com/9781439844694.jpg
52.67 USD

Contemporary Artificial Intelligence

by Xia Jiang, Richard E. Neapolitan
Hardback
Page 1 of 15