Africans and African Americans divided:the male-female African and African American digital divide
ISBN: 9781435702721 / Angielski / Miękka / 228 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Africans' and African Americans' have been victims of diversity throughout history. Countless instances of inequality are well documented throughout both world and American history, yet the research of this book has determined that the African and African American, in particular the African and African American male, is the victim of another inequality, the Digital Divide, and since they are victim of such diversity, why cannot this problem be addressed and corrected. The intent of this book is to inform and empower the world. Let us follow proven methodologies to take action to help the...
Africans' and African Americans' have been victims of diversity throughout history. Countless instances of inequality are well documented throughout b...
|
|
cena:
104,44 zł |
Information Technology Governance and Service Management: Frameworks and Adaptations
ISBN: 9781605660080 / Angielski / Twarda / 520 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Increasingly, information technology governance is being considered an integral part of corporate governance. There has been a rapid increase in awareness and adoption of IT governance as well as the desire to conform to national governance requirements to ensure that IT is aligned with the objectives of the organization. Information Technology Governance and Service Management: Frameworks and Adaptations provides an in-depth view into the critical contribution of IT service management to IT governance, and the strategic and tactical value provided by effective service management. A must-have...
Increasingly, information technology governance is being considered an integral part of corporate governance. There has been a rapid increase in aware...
|
|
cena:
1141,01 zł |
Selected Readings on Information Technology Management: Contemporary Issues
ISBN: 9781605660929 / Angielski / Twarda / 532 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Education and research in the field of information technology management can prove problematic without the proper resources and tools on the most relevant issues, trends, and advancements. Selected Readings on Information Technology Management: Contemporary Issues supplements course instruction and student research with quality chapters focused on key issues concerning the management and utilization of information technology. Containing over 30 chapters from authors across the globe, these selected readings in areas such as information systems, knowledge management, and IT governance depict...
Education and research in the field of information technology management can prove problematic without the proper resources and tools on the most rele...
|
|
cena:
1141,01 zł |
Advances in Web Based Learning - Icwl 2007: 6th International Conference, Edinburgh, Uk, August 15-17, 2007, Revised Papers
ISBN: 9783540781387 / Angielski / Miękka / 676 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This year, we received a record high of about 180 submissions to ICWL 2007. From these, a total of 55 full papers plus one keynote paper were accepted for this LNCS proceedings volume, representing an acceptance rate of about 30%. The authors of these accepted papers were of a remarkable international diversity. We would like to thank all the reviewers for spending their precious time reviewing the papers and for providing valuable comments that aided significantly in the paper selection process. Authors of the best papers presented at this conference will be invited to submit extended...
This year, we received a record high of about 180 submissions to ICWL 2007. From these, a total of 55 full papers plus one keynote paper were accepted...
|
|
cena:
384,63 zł |
Relevance Feedback in Information Retrieval - A Comparison Including a Practical Evaluation of Several Approaches to Relevance Feedback in
ISBN: 9783836469579 / Angielski / Miękka / 140 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Relevance Feedback in Information Retrieval: The book is intended to be an analysis and an evaluation about relevance feedback methods in information retrieval. These methods are discussed since the early seventies and nowadays the need for relevance feedback is as big as any time before because of the enormous growth of the world wide web and the almost ubiquitous access to it. The tricky task remains the same "filtering out knowledge of the vast amount of information." Search engines can help the user to limit the informational overload but they are returning thousands of documents anyway....
Relevance Feedback in Information Retrieval: The book is intended to be an analysis and an evaluation about relevance feedback methods in information ...
|
|
cena:
267,00 zł |
Beautiful Teams
ISBN: 9780596518028 / Angielski / Miękka / 510 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. What's it like to work on a great software development team facing an impossible problem? How do you build an effective team? Can a group of people who don't get along still build good software? How does a team leader keep everyone on track when the stakes are high and the schedule is tight? What's it like to work on a great software development team facing an impossible problem? How do you build an effective team? Can a group of people... |
|
cena:
174,67 zł |
Sublime Communication Technologies
ISBN: 9780230537439 / Angielski / Twarda / 218 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This lively new studyis a critical cultural history of communication technologies, from railways and telegraphy to computers and the Internet, in whichRod Giblett argues that these technologiesplay a pivotal role in the cultural history of modernity and its project of the sublime."
This lively new studyis a critical cultural history of communication technologies, from railways and telegraphy to computers and the Internet, in whic...
|
|
cena:
192,30 zł |
Ciso Leadership: Essential Principles for Success
ISBN: 9780849379437 / Angielski / Twarda / 312 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Caught in the crosshairs of Leadership and Information Technology, Information Security professionals are increasingly tapped to operate as business executives. This often puts them on a career path they did not expect, in a field not yet clearly defined. IT training does not usually includemanagerial skills such as leadership, team-building, communication, risk assessment, and corporate business savvy, needed by CISOs. Yet a lack in any of these areas can short circuit a career in information security.
CISO Leadership: Essential Principles for Success captures years of hard knocks,... Caught in the crosshairs of Leadership and Information Technology, Information Security professionals are increasingly tapped to operate as business e...
|
|
cena:
414,91 zł |
Principles and Practice of Semantic Web Reasoning: Third International Workshop, PPSWR 2005, Dagstuhl Castle, Germany, September 11-16, 2005, Proceedings
ISBN: 9783540287933 / Angielski / Miękka / 166 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The promise of the Semantic Web is to move from a Web of data to a Web of meaning and distributed services. This vision of the Web has attracted - searchersfromdi?erent horizonswith the aims of de?ning newarchitecturesand languages necessary to make it possible, and of developing the ?rst applications of these concepts. This book contains the articles selected for publication and presentation at the workshop Principles and Practice of Semantic Web Reasoning PPSWR 2005, together with three invited talks. Three major aspects of Semantic Web research are represented in this selection:...
The promise of the Semantic Web is to move from a Web of data to a Web of meaning and distributed services. This vision of the Web has attracted - sea...
|
|
cena:
192,30 zł |
Monte Carlo Methods in Global Illumination - Photo-realistic Rendering with Randomization
ISBN: 9783836479196 / Angielski / Miękka / 136 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book discusses Monte Carlo algorithms and their application to solve the global illumination rendering problem of computer graphics. Mathematically, photo-realistic rendering is equivalent to the solution of an integral equation that can be successfully attacked by Monte Carlo integration techniques. The book first discusses the theory of light-surface interaction and the equations that describe materials and the transfer of the illumination. We examine Monte Carlo and quasi-Monte Carlo approaches, which can be used to solve these equations. A considerable space is devoted to variance...
This book discusses Monte Carlo algorithms and their application to solve the global illumination rendering problem of computer graphics. Mathematical...
|
|
cena:
267,00 zł |
Context Aware Voice User Interfaces for Workflow Support
ISBN: 9783836488747 / Angielski / Miękka / 256 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Audio is a significant factor in the design of the human computer interface in ubiquitous computing. The characteristics of the medium allow for a hands-free interaction without the need to switch the focus to a display (eyes-free). Moreover, determining the graphical capabilities of the wearable device to adapt the output to the device is not needed. But audio based interfaces are also challenging, since humans are visually oriented. The ubiquitous computing community recognized the advantages of the audio channel, but the restrictions inherent to the medium are mostly ignored. Authors of...
Audio is a significant factor in the design of the human computer interface in ubiquitous computing. The characteristics of the medium allow for a han...
|
|
cena:
357,51 zł |
A Framework for SLA-aware Execution of Grid-based Workflows
ISBN: 9783836488754 / Angielski / Miękka / 184 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
307,73 zł |
Multimedia Encoding for Access Control with Traitor Tracing - Balancing Secrecy, Privacy and Traceability
ISBN: 9783836436380 / Angielski / Miękka / 164 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The demand for information security professionals and applications has been one of the fastest growing markets internationally. This book is addressed to professionals, students, researchers and engineers interested in theory and applications of multimedia security. By exploring the ideas of fragile fingerprinting and non-perfect secret sharing, the authors take a fresh approach to
1.Deliver a framework for Joint fingerprinting and decryption (JFD) in multicast environments with focus on traitor tracing. 2.Introduce methodologies for constructing collusion resistant semi-fragile... The demand for information security professionals and applications has been one of the fastest growing markets internationally. This book is addressed...
|
|
cena:
313,98 zł |
Computational Rhythm Description - A Review and Novel Approach
ISBN: 9783836477697 / Angielski / Miękka / 260 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book is about musical rhythm. More precisely, it is concerned with computer programs that automatically extract rhythmic descriptions from musical audio signals. New algorithms are presented for tempo induction, tatum estimation, time signature determination, swing estimation, swing transformations and classification of ballroom dance music styles. These algorithms directly process digitized recordings of acoustic musical signals. The backbones of these algorithms are rhythm periodicity functions: functions measuring the salience of a rhythmic pulse as a function of the period (or...
This book is about musical rhythm. More precisely, it is concerned with computer programs that automatically extract rhythmic descriptions from musica...
|
|
cena:
357,51 zł |
Mobile Commerce: Grundlagen Und Techniken
ISBN: 9783540005353 / Niemiecki / Miękka / 244 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. M-Commerce (MC) als neue Auspragung des E-Commerce entsteht durch die Konvergenz von Internet- und Mobilfunk-Technologie. Das Buch vermittelt Studenten und Praktikern, insbesondere Entscheidungstragern, auf strukturierte und praxisorientierte Weise ein MC-Basiswissen aus der Sicht des Wirtschaftsinformatikers. Dabei werden sowohl Wissen und Methoden vermittelt als auch praktische Anleitungen gegeben. Technische und betriebswirtschaftliche Grundlagen sind hierbei etwa gleich gewichtet. Das Spektrum reicht von den technischen Grundlagen uber Sicherheitsaspekte und Besonderheiten des... M-Commerce (MC) als neue Auspragung des E-Commerce entsteht durch die Konvergenz von Internet- und Mobilfunk-Technologie. Das Buch vermittelt Stude... |
|
cena:
136,55 zł |
Adaptive and Assisted Educational Hypermedia
ISBN: 9783639004021 / Angielski / Miękka / 408 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. One of the biggest problems of the online learning systems is concerned with the way of offering adaptive education to each particular student. In this context, some of the Artificial Intelligence techniques as the multiagent systems, have demonstrated a potential to develop interactive systems for education since they introduce a new instructive paradigm based on the concept of shared skills and cooperative learning between human beings and computers. This book proposes the use of intelligent agents to assist students to develop learning activities in very attractive and personalized...
One of the biggest problems of the online learning systems is concerned with the way of offering adaptive education to each particular student. In thi...
|
|
cena:
420,41 zł |
Security Improvements in an existing Network Environment
ISBN: 9783836496155 / Angielski / Miękka / 64 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This publication addresses three network security related topics based on open source. Network flow analysis addresses the problem of finding suspicious packet flows on a big network, and also gives an introduction to how a proposal for an unfriendly firewall should look. Redundant firewalling gives an overview about redundant firewall technologies in routing and bridging mode with state synchronization for IPv6 and IPv4 networks. IPsec VPN deals with the implementation of a reliable open source IPsec VPN server that is secure and supports all standard clients with their standard connection...
This publication addresses three network security related topics based on open source. Network flow analysis addresses the problem of finding suspicio...
|
|
cena:
221,75 zł |
Information Technology and Societal Development
ISBN: 9781605660042 / Angielski / Twarda / 464 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Latent in the current environment of rapid technological advances are breakthroughs waiting to be discovered that will have profound impacts on how organizations will cope with the direction civilization is taking. Information Technology and Societal Development examines in depth the full range of impacts of information technology on civilization and the development of societies. Uniquely broad in the scope of examining the societal implications of informational technology, this groundbreaking reference work makes an essential contribution to research libraries worldwide.
Latent in the current environment of rapid technological advances are breakthroughs waiting to be discovered that will have profound impacts on how or...
|
|
cena:
1141,01 zł |
Learning Accuracy from Limited Data
ISBN: 9783836486033 / Angielski / Miękka / 80 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
221,75 zł |
Group Security with Elliptic Curve Cryptography
ISBN: 9783836499613 / Angielski / Miękka / 100 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. With the explosion of the Internet as well as the wireless and mobile communications, it faces a growing need for security. Both for secure web transaction and for secure messaging, an efficient public key system is required. The Elliptic Curve Cryptography delivers the highest security strength per bit of key in any known public key system. It well suits to the applications such as the smart card systems and the wireless/mobile communications. In this work, we apply the ECC and the bilinear pairings on elliptic curve to the authentication and the group security. There are four ECC-based...
With the explosion of the Internet as well as the wireless and mobile communications, it faces a growing need for security. Both for secure web transa...
|
|
cena:
221,75 zł |