Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • MPI Ethno. Forsch.  (236)
  • Electronic books ; local  (146)
  • Electronic books  (144)
  • Computersicherheit
  • Computer Science  (194)
  • American Studies  (42)
Datasource
Material
Language
  • 1
    ISBN: 9783031453045 , 9783031453038
    Language: Undetermined
    Pages: 1 Online-Ressource (637 p.)
    DDC: 303.4834
    RVK:
    Keywords: Ethical & social aspects of IT ; Ethics & moral philosophy ; Artificial intelligence ; Social & political philosophy ; ethics in computer science ; responsible technologies ; legal issues and regulation ; data privacy ; digitalization ; digital economy ; digital humanism ; social responsibility ; Aufsatzsammlung ; Aufsatzsammlung ; Electronic books. ; Electronic books ; Aufsatzsammlung
    Abstract: This open access textbook introduces and defines digital humanism from a diverse range of disciplines. Following the 2019 Vienna Manifesto, the book calls for a digital humanism that describes, analyzes, and, most importantly, influences the complex interplay of technology and humankind, for a better society and life, fully respecting universal human rights. The book is organized in three parts: Part I “Background” provides the multidisciplinary background needed to understand digital humanism in its philosophical, cultural, technological, historical, social, and economic dimensions. The goal is to present the necessary knowledge upon which an effective interdisciplinary discourse on digital humanism can be founded. Part II “Digital Humanism – a System’s View” focuses on an in-depth presentation and discussion of the main digital humanism concerns arising in current digital systems. The goal of this part is to make readers aware and sensitive to these issues, including e.g. the control and autonomy of AI systems, privacy and security, and the role of governance. Part III “Critical and Societal Issues of Digital Systems” delves into critical societal issues raised by advances of digital technologies. While the public debate in the past has often focused on them separately, especially when they became visible through sensational events the aim here is to shed light on the entire landscape and show their interconnected relationships. This includes issues such as AI and ethics, fairness and bias, privacy and surveillance, platform power and democracy. This textbook is intended for students, teachers, and policy makers interested in digital humanism. It is designed for stand-alone and for complementary courses in computer science, or curricula in science, engineering, humanities and social sciences. Each chapter includes questions for students and an annotated reading list to dive deeper into the associated chapter material. The book aims to provide readers with as wide an exposure as possible to digital advances and their consequences for humanity. It includes constructive ideas and approaches that seek to ensure that our collective digital future is determined through human agency
    Note: English
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Full-text  ((OIS Credentials Required))
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    San Francisco, CA : No Starch Press, Inc.
    ISBN: 9781718502314 , 1718502311
    Language: English
    Pages: 1 online resource
    Parallel Title: Erscheint auch als Kubica, Jeremy Data structures the fun way
    DDC: 005.7/3
    RVK:
    Keywords: Data structures (Computer science) ; Computer programming ; Computer programming ; Data structures (Computer science) ; Electronic books
    Abstract: "This accessible and entertaining book provides an in-depth introduction to computational thinking through the lens of data structures, a critical component in any programming endeavor. It will give you a strong background in implementing and working with more than 15 key data structures, from arrays, stacks, and queues to caches, bloom filters, skip lists, and graphs"--
    Note: Includes index. - Description based on print version record and CIP data provided by publisher; resource not viewed
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9781801814669 , 180181466X , 9781801810494
    Language: English
    Pages: 1 online resource
    Parallel Title: Erscheint auch als Edge, Ryan Cross-Platform UIs with Flutter
    DDC: 005.4/37
    RVK:
    Keywords: User interfaces (Computer systems) ; Electronic books ; Flutter 2.0
    Abstract: Build a variety of dynamic projects and beautiful UIs as you explore the power of Flutter for the web, desktop, and mobile Key Features Discover state management solutions with InheritedWidget and the Provider package Create responsive and beautiful UIs with the Material and Cupertino libraries Explore animations, forms, gestures, and backend integration with Supabase Book Description Flutter is a UI toolkit for building beautiful, natively compiled applications for mobile, web, desktop, and embedded devices from a single code base. With Flutter, you can write your code once and run it anywhere using a single code base to target multiple platforms. This book is a comprehensive, project-based guide for new and emerging Flutter developers that will help empower you to build bulletproof applications. Once you start reading book, you'll quickly realize what sets Flutter apart from its competition and establish some of the fundamentals of the toolkit. As you work on various project applications, you'll understand just how easy Flutter is to use for building stunning UIs. This book covers navigation strategies, state management, advanced animation handling, and the two main UI design styles: Material and Cupertino. It'll help you extend your knowledge with good code practices, UI testing strategies, and CI setup to constantly keep your repository's quality at the highest level possible. By the end of this book, you'll feel confident in your ability to transfer the lessons from the example projects and build your own Flutter applications for any platform you wish. What you will learn Create responsive and attractive UIs for any device Get to grips with caching and widget trees and learn some framework performance tips Manage state using Flutter's InheritedWidget system Orchestrate the app flow with Navigator 1.0 and 2.0 Explore the Material and Cupertino built-in themes Breathe life into your apps with animations Improve code quality with golden tests, CI setup, and linter rules Who this book is for This book is for software developers with a good grasp of Flutter, who want to learn best practices and techniques for building clean, intuitive UIs using a single codebase for mobile and the web. Prior experience with Flutter, Dart, and object-oriented programming (OOP) will help you understand the concepts covered in the book.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9781803247335
    Language: English
    Pages: 1 online resource (564 pages) , illustrations
    Edition: Second edition.
    Series Statement: Expert insight
    Parallel Title: Erscheint auch als Rothman, Denis Transformers for natural language processing
    DDC: 006.3
    RVK:
    Keywords: Artificial intelligence Data processing ; Artificial intelligence Computer programs ; Python (Computer program language) ; Cloud computing ; Intelligence artificielle ; Informatique ; Intelligence artificielle ; Logiciels ; Python (Langage de programmation) ; Infonuagique ; Electronic books ; Natürliche Sprache ; Deep learning
    Abstract: Transformers are a game-changer for natural language understanding (NLU) and have become one of the pillars of artificial intelligence. Transformers for Natural Language Processing, 2nd Edition, investigates deep learning for machine translations, speech-to-text, text-to-speech, language modeling, question-answering, and many more NLP domains with transformers. An Industry 4.0 AI specialist needs to be adaptable; knowing just one NLP platform is not enough anymore. Different platforms have different benefits depending on the application, whether it's cost, flexibility, ease of implementation, results, or performance. In this book, we analyze numerous use cases with Hugging Face, Google Trax, OpenAI, and AllenNLP. This book takes transformers' capabilities further by combining multiple NLP techniques, such as sentiment analysis, named entity recognition, and semantic role labeling, to analyze complex use cases, such as dissecting fake news on Twitter. Also, see how transformers can create code using just a brief description. By the end of this NLP book, you will understand transformers from a cognitive science perspective and be proficient in applying pretrained transformer models to various datasets.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 9781803234519
    Language: English
    Pages: 1 online resource (666 pages) , illustrations
    Edition: Second edition.
    Series Statement: Expert insight
    Parallel Title: Erscheint auch als Ledin, Jim Modern computer architecture and organization
    DDC: 004.2/2
    RVK:
    Keywords: Computer organization ; Computer architecture ; Electronic books ; Computerarchitektur
    Abstract: Are you a software developer, systems designer, or computer architecture student looking for a methodical introduction to digital device architectures, but are overwhelmed by the complexity of modern systems? This step-by-step guide will teach you how modern computer systems work with the help of practical examples and exercises. You'll gain insights into the internal behavior of processors down to the circuit level and will understand how the hardware executes code developed in high-level languages. This book will teach you the fundamentals of computer systems including transistors, logic gates, sequential logic, and instruction pipelines. You will learn details of modern processor architectures and instruction sets including x86, x64, ARM, and RISC-V. You will see how to implement a RISC-V processor in a low-cost FPGA board and write a quantum computing program and run it on an actual quantum computer. This edition has been updated to cover the architecture and design principles underlying the important domains of cybersecurity, blockchain and bitcoin mining, and self-driving vehicles. By the end of this book, you will have a thorough understanding of modern processors and computer architecture and the future directions these technologies are likely to take.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Parallel Title: Erscheint auch als Sweigart, Al The recursive book of recursion
    DDC: 005.1
    RVK:
    Keywords: Computer programming ; Recursion theory ; Python (Computer program language) ; JavaScript (Computer program language) ; Electronic books ; Rekursiver Algorithmus ; Python ; JavaScript
    Abstract: Recursion has an intimidating reputation: it’s considered to be an advanced computer science topic frequently brought up in coding interviews. But there’s nothing magical about recursion. The Recursive Book of Recursion uses Python and JavaScript examples to teach the basics of recursion, exposing the ways that it’s often poorly taught and clarifying the fundamental principles of all recursive algorithms. You’ll learn when to use recursive functions (and, most importantly, when not to use them), how to implement the classic recursive algorithms often brought up in job interviews, and how recursive techniques can help solve countless problems involving tree traversal, combinatorics, and other tricky topics.
    Note: Includes index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'REILLY MEDIA, INC, USA
    ISBN: 9781492096450 , 1492096458
    Language: English
    Pages: 1 online resource
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als Kuhn, Max Tidy Modeling with R
    DDC: 003/.3
    RVK:
    Keywords: Computer simulation ; R (Computer program language) ; Electronic books ; R ; Modellierung
    Abstract: Get going with tidymodels, a collection of R packages for modeling and machine learning. Whether you're just starting out or have years of experience with modeling, this practical introduction shows data analysts, business analysts, and data scientists how the tidymodels framework offers a consistent, flexible approach for your work. RStudio engineers Max Kuhn and Julia Silge demonstrate ways to create models by focusing on an R dialect called the tidyverse. Software that adopts tidyverse principles shares both a high-level design philosophy and low-level grammar and data structures, so learning one piece of the ecosystem makes it easier to learn the next. You'll understand why the tidymodels framework has been built to be used by a broad range of people. With this book, you will: Learn the steps necessary to build a model from beginning to end Understand how to use different modeling and feature engineering approaches fluently Examine the options for avoiding common pitfalls of modeling, such as overfitting Learn practical methods to prepare your data for modeling Tune models for optimal performance Use good statistical practices to compare, evaluate, and choose among models.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Shelter Island, NY : Manning Publications
    ISBN: 9781617298295 , 1617298298
    Language: English
    Pages: 1 online resource (400 pages) , illustrations
    Edition: [First edition].
    Parallel Title: Erscheint auch als Wang, Rosemary Infrastructure as code, patterns and practices
    DDC: 004.6
    RVK:
    Keywords: Computer networks Management ; Computer network architectures ; Computer network architectures ; Computer networks ; Management ; Electronic books ; Rechnernetz
    Abstract: Use Infrastructure as Code (IaC) to automate, test, and streamline infrastructure for business-critical systems. In Infrastructure as Code, Patterns and Practices you will learn how to: Optimize infrastructure for modularity and isolate dependencies Test infrastructure configuration Mitigate, troubleshoot, and isolate failed infrastructure changes Collaborate across teams on infrastructure development Update infrastructure with minimal downtime using blue-green deployments Scale infrastructure systems supporting multiple business units Use patterns for provisioning tools, configuration management, and image building Deliver secure infrastructure configuration to production Infrastructure as Code, Patterns and Practices teaches you to automate infrastructure by applying changes in a codified manner. You'll learn how to create, test, and deploy infrastructure components in a way that's easy to scale and share across an entire organization. The book is full of flexible automation techniques that work whether you're managing your personal projects or making live network changes across a large enterprise. A system administrator or infrastructure engineer will learn essential software development practices for managing IaC, while developers will benefit from in-depth coverage of assembling infrastructure as part of DevOps culture. While the patterns and techniques are tool agnostic, you'll appreciate the easy-to-follow examples in Python and Terraform. About the Technology Infrastructure as Code is a set of practices and processes for provisioning and maintaining infrastructure using scripts, configuration, or programming languages. With IaC in place, it's easy to test components, implement features, and scale with minimal downtime. Best of all, since IaC follows good development practices, you can make system-wide changes with just a few code commits! About the Book Infrastructure as Code, Patterns and Practices teaches flexible techniques for building resilient, scalable infrastructure, including structuring and sharing modules, migrating legacy systems, and more. Learn to build networks, load balancers, and firewalls using Python and Terraform, and confidently update infrastructure while your software is running. You'll appreciate the expert advice on team collaboration strategies to avoid instability, improve security, and manage costs. What's Inside Optimize infrastructure for modularity and isolate dependencies Mitigate, troubleshoot, and isolate failed infrastructure changes Update infrastructure with minimal downtime using blue-green deployments Use patterns for provisioning tools, configuration management, and image building About the Reader For infrastructure or software engineers familiar with Python, provisioning tools, and public cloud providers. About the Author Rosemary Wang is an educator, contributor, writer, and speaker. She has worked on many infrastructure as code projects, and open source tools such as Terraform, Vault, and Kubernetes. Quotes Goes deep into fundamentals like reusability, idempotency, modularity, and evolvability while staying tool agnostic. A great read! - Lucian Maly, Red Hat Clear and comprehensive. Learn to automate your infrastructure in a reliable and replicable way. - Cosimo Attanasi, ER Sistemi Helps teams apply IaC best practices in real-world projects. - David Krief, Altansia Critical insights and practical knowledge. Th is book is a truly great resource! - Jeremy Bryan, Anchore.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    ISBN: 9783960105039
    Language: German
    Pages: 1 Online-Ressource (XXXIV, 631 Seiten)
    Edition: 3. Auflage, Übersetzung der 2. englischen Auflage
    Parallel Title: Übersetzung von Freeman, Eric, 1965 - Head first design patterns
    Parallel Title: Erscheint auch als Freeman, Eric, 1965 - Entwurfsmuster von Kopf bis Fuß
    DDC: 005.1
    RVK:
    RVK:
    RVK:
    Keywords: Electronic books ; Entwurfsmuster ; Java Standard Edition 8 ; Java Standard Edition 8
    Abstract: Dieses Buch ist ein moderner Klassiker zum Thema Entwurfsmuster. Mit dem einzigartigen Von-Kopf-bis-Fuß-Lernkonzept gelingt es den Autoren, die anspruchsvolle Materie witzig, leicht verständlich und dennoch gründlich darzustellen. Jede Seite ist ein Kunstwerk für sich, mit vielen visuellen Überraschungen, originellen Comic-Zeichnungen, humorvollen Dialogen und geistreichen Selbstlernkontrollen. Spätestens, wenn es heißt »Spitzen Sie Ihren Bleistift«, wird Leser*innen klar, dass bei diesem Buch Mitmachen gefragt ist. Das ist nicht nur unterhaltsam, sondern auch effektiv: Komplexe Sachverhalte lassen sich nach Erkenntnis der modernen Lernwissenschaft am gründlichsten über mehrere verschiedene Kanäle verstehen. Das Buch verspricht Ihnen daher nicht nur Spaß beim Lernen, Sie werden nach der Lektüre auch die Herausforderungen des Software-Designs meistern können.
    Note: Auf dem Umschlag: "Ein gehirnfreundliches Buch" , Online resource; Title from title page (viewed November 2, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Cambridge : The MIT Press | The Hague : OAPEN FOUNDATION
    ISBN: 9780262368865 , 9780262046664
    Language: English
    Pages: 1 Online-Ressource (200 p.)
    DDC: 303.4833
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Advertising & society ; Machine learning ; Algorithms & data structures ; Media studies ; Artificial intelligence ; Algorithms and data structures ; Electronic books
    Abstract: A proposal that we think about digital technologies such as machine learning not in terms of artificial intelligence but as artificial communication. Algorithms that work with deep learning and big data are getting so much better at doing so many things that it makes us uncomfortable. How can a device know what our favorite songs are, or what we should write in an email? Have machines become too smart? In Artificial Communication, Elena Esposito argues that drawing this sort of analogy between algorithms and human intelligence is misleading. If machines contribute to social intelligence, it will not be because they have learned how to think like us but because we have learned how to communicate with them. Esposito proposes that we think of “smart” machines not in terms of artificial intelligence but in terms of artificial communication. To do this, we need a concept of communication that can take into account the possibility that a communication partner may be not a human being but an algorithm—which is not random and is completely controlled, although not by the processes of the human mind. Esposito investigates this by examining the use of algorithms in different areas of social life. She explores the proliferation of lists (and lists of lists) online, explaining that the web works on the basis of lists to produce further lists; the use of visualization; digital profiling and algorithmic individualization, which personalize a mass medium with playlists and recommendations; and the implications of the “right to be forgotten.” Finally, she considers how photographs today seem to be used to escape the present rather than to preserve a memory.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : No Starch Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (464 pages)
    Edition: 3rd edition
    Parallel Title: Erscheint auch als Ward, Brian, 1972 - How Linux works
    DDC: 005.432
    RVK:
    Keywords: Electronic books ; local ; LINUX
    Abstract: Unlike some operating systems, Linux doesn’t try to hide the important bits from you—it gives you full control of your computer. But to truly master Linux, you need to understand its internals, like how the system boots, how networking works, and what the kernel actually does. In this third edition of the bestselling How Linux Works , author Brian Ward peels back the layers of this well-loved operating system to make Linux internals accessible. This edition has been thoroughly updated and expanded with added coverage of Logical Volume Manager (LVM), virtualization, and containers. You'll learn: •How Linux boots, from boot loaders to init (systemd) •How the kernel manages devices, device drivers, and processes •How networking, interfaces, firewalls, and servers work •How development tools work and relate to shared libraries •How to write effective shell scripts You’ll also explore the kernel and examine key system tasks inside user space, including system calls, input and output, and filesystems. With its combination of background, theory, real-world examples, and patient explanations, How Linux Works , 3rd edition will teach you what you need to know to solve pesky problems and take control of your operating system.
    Note: Online resource; Title from title page (viewed April 13, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Apress | Boston, MA : Safari
    ISBN: 9781484253649
    Language: English
    Pages: 1 online resource (316 pages)
    Edition: 2nd edition
    Parallel Title: Erscheint auch als Ketkar, Nikhil Deep learning with Python
    RVK:
    RVK:
    Keywords: Electronic books ; local ; Electronic books ; Deep learning ; Python ; PyTorch
    Abstract: Master the practical aspects of implementing deep learning solutions with PyTorch, using a hands-on approach to understanding both theory and practice. This updated edition will prepare you for applying deep learning to real world problems with a sound theoretical foundation and practical know-how with PyTorch, a platform developed by Facebook’s Artificial Intelligence Research Group. You'll start with a perspective on how and why deep learning with PyTorch has emerged as an path-breaking framework with a set of tools and techniques to solve real-world problems. Next, the book will ground you with the mathematical fundamentals of linear algebra, vector calculus, probability and optimization. Having established this foundation, you'll move on to key components and functionality of PyTorch including layers, loss functions and optimization algorithms. You'll also gain an understanding of Graphical Processing Unit (GPU) based computation, which is essential for training deep learning models. All the key architectures in deep learning are covered, including feedforward networks, convolution neural networks, recurrent neural networks, long short-term memory networks, autoencoders and generative adversarial networks. Backed by a number of tricks of the trade for training and optimizing deep learning models, this edition of Deep Learning with Python explains the best practices in taking these models to production with PyTorch. What You'll Learn Review machine learning fundamentals such as overfitting, underfitting, and regularization. Understand deep learning fundamentals such as feed-forward networks, convolution neural networks, recurrent neural networks, automatic differentiation, and stochastic gradient descent. Apply in-depth linear algebra with PyTorch Explore PyTorch fundamentals and its building blocks Work with tuning and optimizing models Who This Book Is For Beginners with a working knowledge of Python who want to understand Deep Learning in a practical, hands-on manner.
    Note: Online resource; Title from title page (viewed April 9, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    Oxford : Oxford University Press
    ISBN: 9780191840166
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Oxford handbooks online
    Series Statement: Political Science
    Parallel Title: Erscheint auch als The Oxford handbook of cyber security
    DDC: 005.8
    RVK:
    Keywords: Computer security ; Computer networks Security measures ; Computersicherheit ; Cyberattacke ; Computerkriminalität ; Sicherheitspolitik
    Abstract: 'The Oxford Handbook of Cyber Security' presents forty-eight chapters examining the technological, economic, commercial, and strategic aspects of cyber security, including studies at the international, regional, amd national level.
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (300 pages)
    Edition: 2nd edition
    Parallel Title: Erscheint auch als Downey, Allen B. Think Bayes
    RVK:
    Keywords: Electronic books ; local
    Abstract: If you know how to program, you're ready to tackle Bayesian statistics. With this book, you'll learn how to solve statistical problems with Python code instead of mathematical formulas, using discrete probability distributions rather than continuous mathematics. Once you get the math out of the way, the Bayesian fundamentals will become clearer and you'll begin to apply these techniques to real-world problems. Bayesian statistical methods are becoming more common and more important, but not many resources are available to help beginners. Based on undergraduate classes taught by author Allen Downey, this book's computational approach helps you get a solid start. Use your programming skills to learn and understand Bayesian statistics Work with problems involving estimation, prediction, decision analysis, evidence, and Bayesian hypothesis testing Get started with simple examples, using coins, dice, and a bowl of cookies Learn computational methods for solving real-world problems
    Note: Online resource; Title from title page (viewed May 25, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    ISBN: 9780136523796
    Language: English
    Pages: 1 online resource (336 pages)
    Edition: 1st edition
    Parallel Title: Erscheint auch als Erder, Murat Continuous architecture in practice
    RVK:
    Keywords: Electronic books ; local
    Abstract: Revamp Your Architectural Practices for New Challenges, Environments, and Stakeholder Expectations "This book recognizes that software architecture is not the merely conceptual domain of disconnected experts but is the . . . give-and-take daily tussle of team members who have to balance trade-offs and competing forces to deliver resilient, high-performing, secure applications. . . . [It] bridges the significant gap between the 'Earth from orbit' view and the pavement-level view of refactoring microservice code." --Kurt Bittner, VP, Enterprise Solutions, Scrum.org Authors Murat Erder, Pierre Pureur, and Eoin Woods have taken their extensive enterprise architecture experience and applied it to the practical aspects of continuous architecture in real-world environments. Continuous Architecture in Practice provides hands-on advice for leveraging continuous architecture in real-world environments and illuminates architecture's changing role in the age of Agile, DevSecOps, and cloud platforms. This guide will help technologists update their architecture practice for new application challenges. As part of the Vaughn Vernon Addison-Wesley Signature Series, this title was hand-selected for the practical, delivery-oriented knowledge that architects and software engineers can quickly apply. It includes in-depth guidance for addressing today's key quality attributes, including cross-cutting concerns such as security, performance, scalability, resilience, data, and innovation. Each key technique is demonstrated through a start-to-finish case study reflecting the authors' deep experience evolving complex software environments. Create sustainable, coherent systems that meet functional requirements and the quality attributes stakeholders care about Understand team-based software architecture and architecture as a "flow of decisions" Reflect varied data technologies and crucial issues of data management, integration, and change Architect for security, including continuous threat modeling and mitigation Use architecture to improve performance in continuous delivery environments Architect for scalability and scale microservices and serverless environments Use architecture to apply emerging technologies more successfully
    Note: Online resource; Title from title page (viewed June 7, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Packt Publishing | Boston, MA : Safari
    ISBN: 9781800208117
    Language: English
    Pages: 1 online resource (464 pages)
    Edition: 1st edition
    Parallel Title: Erscheint auch als Pikus, Fedor G. The art of writing efficient programs
    RVK:
    Keywords: Electronic books
    Abstract: Get to grips with various performance improvement techniques such as concurrency, lock-free programming, atomic operations, parallelism, and memory management Key Features Understand the limitations of modern CPUs and their performance impact Find out how you can avoid writing inefficient code and get the best optimizations from the compiler Learn the tradeoffs and costs of writing high-performance programs Book Description The great free lunch of "performance taking care of itself" is over. Until recently, programs got faster by themselves as CPUs were upgraded, but that doesn't happen anymore. The clock frequency of new processors has almost peaked. New architectures provide small improvements to existing programs, but this only helps slightly. Processors do get larger and more powerful, but most of this new power is consumed by the increased number of processing cores and other "extra" computing units. To write efficient software, you now have to know how to program by making good use of the available computing resources, and this book will teach you how to do that. The book covers all the major aspects of writing efficient programs, such as using CPU resources and memory efficiently, avoiding unnecessary computations, measuring performance, and how to put concurrency and multithreading to good use. You'll also learn about compiler optimizations and how to use the programming language (C++) more efficiently. Finally, you'll understand how design decisions impact performance. By the end of this book, you'll not only have enough knowledge of processors and compilers to write efficient programs, but you'll also be able to understand which techniques to use and what to measure while improving performance. At its core, this book is about learning how to learn. What you will learn Discover how to use the hardware computing resources in your programs effectively Understand the relationship between memory order and memory barriers Familiarize yourself with the performance implications of different data structures and organizations Assess the performance impact of concurrent memory accessed and how to minimize it Discover when to use and when not to use lock-free programming techniques Explore different ways to improve the effectiveness of compiler optimizations Design APIs for concurrent data structures and high-performance data structures to avoid inefficiencies Who this book is for This book is for experienced developers and programmers who work ...
    Note: Online resource; Title from title page (viewed October 22, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Wiley | Boston, MA : Safari
    ISBN: 9781119740759
    Language: English
    Pages: 1 online resource (400 pages)
    Edition: 1st edition
    Parallel Title: Erscheint auch als Big data analytics for Internet of things
    DDC: 005.7
    RVK:
    Keywords: Electronic books ; local ; Big Data ; Datenverarbeitung ; Internet der Dinge
    Abstract: BIG DATA ANALYTICS FOR INTERNET OF THINGS Discover the latest developments in IoT Big Data with a new resource from established and emerging leaders in the field Big Data Analytics for Internet of Things delivers a comprehensive overview of all aspects of big data analytics in Internet of Things (IoT) systems. The book includes discussions of the enabling technologies of IoT data analytics, types of IoT data analytics, challenges in IoT data analytics, demand for IoT data analytics, computing platforms, analytical tools, privacy, and security. The distinguished editors have included resources that address key techniques in the analysis of IoT data. The book demonstrates how to select the appropriate techniques to unearth valuable insights from IoT data and offers novel designs for IoT systems. With an abiding focus on practical strategies with concrete applications for data analysts and IoT professionals, Big Data Analytics for Internet of Things also offers readers: A thorough introduction to the Internet of Things, including IoT architectures, enabling technologies, and applications An exploration of the intersection between the Internet of Things and Big Data, including IoT as a source of Big Data, the unique characteristics of IoT data, etc. A discussion of the IoT data analytics, including the data analytical requirements of IoT data and the types of IoT analytics, including predictive, descriptive, and prescriptive analytics A treatment of machine learning techniques for IoT data analytics Perfect for professionals, industry practitioners, and researchers engaged in big data analytics related to IoT systems, Big Data Analytics for Internet of Things will also earn a place in the libraries of IoT designers and manufacturers interested in facilitating the efficient implementation of data analytics strategies.
    Note: Online resource; Title from title page (viewed April 20, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Manning Publications | Boston, MA : Safari
    ISBN: 9781617294556
    Language: English
    Pages: 1 online resource (456 pages)
    Edition: 1st edition
    Parallel Title: Erscheint auch als McNamara, Tim Rust in action
    DDC: 005.133
    RVK:
    Keywords: Electronic books ; local ; Rust ; Systemprogrammierung ; Parallelverarbeitung
    Abstract: Rust in Action is a hands-on guide to systems programming with Rust. Written for inquisitive programmers, it presents real-world use cases that go far beyond syntax and structure. You’ll explore Rust implementations for file manipulation, networking, and kernel-level programming and discover awesome techniques for parallelism and concurrency. Along the way, you’ll master Rust’s unique borrow checker model for memory management without a garbage collector.
    Note: Online resource; Title from title page (viewed August 4, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    Bielefeld : transcript
    ISBN: 9783839455609 , 383945560X
    Language: English
    Pages: 1 Online-Ressource (217 p)
    Series Statement: Science Studies
    Parallel Title: Erscheint auch als Voss, Laura More Than Machines? : The Attribution of (In)Animacy to Robot Technology
    DDC: 303.4834
    RVK:
    RVK:
    Keywords: Robots Social aspects ; SOCIAL SCIENCE / Sociology / General ; Robots ; Social aspects ; Hochschulschrift ; Hochschulschrift ; Hochschulschrift ; Hochschulschrift ; Electronic books ; Hochschulschrift
    Abstract: 1. Robots Wanted – Dead And/Or Alive; 1.1. Making Love and Killing People: The Old and New Age of Robotics; 1.2. Hype, Hope, and Horror; 1.3. Robots and Science Fiction: Inseparably Linked; 1.4. Research Question and Approach; 1.5. Some Methodological Clarifications; 1.6. A Tour Along the Life Cycle of Robots -- 2. Disciplinary Context and Terminology; 2.1. Human-Robot-Interaction Research: “Controlling” In/Animacy Attributions; 2.2. Terminology: Anthropomorphism, Agency, Animacy, and More; 2.3. Disciplinary Perspectives: Animacy Attribution as an Object of Research vs. Methodological Malpractice -- 3. Making Robots: In/Animacy Attributions in Robotics Research and Development; 3.1. Complex Epistemic Practices in Long-Term HRI; 3.2. Approach; 3.3. The Robot Body in the Center of Attention; 3.4. The Robot as Tool and Team Member; 3.5. Testing in the Real World: The Unpredictable Robot; 3.6. Switching Perspectives: In/Animacy Attributions as Constructive Practice; 3.7. Summary -- 4. Showing Off Robots: In/Animacy Attributions in Robotics Demonstrations, Science Communication, and Marketing; 4.1. Demo or Die: Outreach, Engagement, and Accountability; 4.2. Approach; 4.3. Narratives of Agency: Proof of Functionality; 4.4. Narratives of Desired Futures: Proof of Applicability; 4.5. Narratives of Animacy: Making Robots Engaging; 4.6. Switching Perspectives: In/Animacy Attributions as Constructive Practice; 4.7. Critical Discourse: Simulation or Deception?; 4.8. Summary -- 5. Reporting on Robots: In/Animacy Attributions in Media Discourse; 5.1. Robotics and Medialization; 5.2. Approach; 5.3. Hope, Horror, and Science Fiction; 5.4. From Human-Shaped Software to the Robot Apocalypse: Practices of Animacy Attribution; 5.5. Switching Perspectives: In/Animacy Attributions as Constructive Practice; 5.6. Critical Discourse: Animacy Attributions as Traffic Bait?; 5.7. Summary -- 6. Conclusions … and Openings; 6.1. A Recapitulation; 6.2. The Constructive Quality of In/Animacy Attributions; 6.3. Critical Discourse: Individual and Systemic Issues; 6.4. In/Animacy: Beyond Robotics; 6.5. Speaking Clearly: A Take-Home Message
    Abstract: We know that robots are just machines. Why then do we often talk about them as if they were alive? Laura Voss explores this fascinating phenomenon, providing a rich insight into practices of animacy (and inanimacy) attribution to robot technology: from science-fiction to robotics R&D, from science communication to media discourse, and from the theoretical perspectives of STS to the cognitive sciences. Taking an interdisciplinary perspective, and backed by a wealth of empirical material, Voss shows how scientists, engineers, journalists - and everyone else - can face the challenge of robot technology appearing »a little bit alive« with a reflexive and yet pragmatic stance
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Cover
    URL: Cover  (lizenzpflichtig)
    URL: Full-text  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    ISBN: 9783748927679
    Language: German
    Pages: 1 Online-Ressource (156 Seiten)
    Edition: 1. Auflage
    Series Statement: Schriften zum IT-Sicherheitsrecht Band 2
    Parallel Title: Erscheint auch als Cybersecurity als Unternehmensleitungsaufgabe
    DDC: 346.43065
    RVK:
    RVK:
    Keywords: Aufsatzsammlung ; Deutschland ; Unternehmensleitung ; Computersicherheit ; Risikomanagement ; Compliance-System ; Haftung ; China ; Unternehmensleitung ; Computersicherheit ; Compliance-System ; Datenschutz ; Deutschland ; Unternehmensleitung ; Computersicherheit ; Risikomanagement ; Compliance-System ; Haftung ; China ; Unternehmensleitung ; Computersicherheit ; Compliance-System ; Datenschutz
    Note: Enthält 7 Beiträge
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Language: English , German
    Pages: 1 Online-Ressource
    Edition: 1. Auflage
    RVK:
    Keywords: Electronic books ; local ; Chatbot ; Amazon Alexa
    Abstract: Einfacher Einstieg in die Programmierung von Alexa Skills mit JavaScript Nutzerantworten speichern und verarbeiten, Bilder und Audiofiles einbinden, fortgeschrittenes Dialogmanagement, Anbindung externer APIs u.v.m. Skills bekannt machen und damit Geld verdienen Über 11 Millionen Menschen in Deutschland nutzen Amazon Alexa aktiv und das Potenzial der verfügbaren Skills ist noch lange nicht ausgeschöpft. Egal, ob Sie experimentierfreudiger Privatanwender oder professioneller Programmierer sind – wenn Sie einen Skill für Amazon Alexa entwickeln möchten und bereits erste Erfahrungen mit JavaScript haben, ist dieses Buch genau das richtige für Sie. Anhand verschiedener Praxisbeispiele zeigt der Autor, wie Sie mit der Alexa Developer Console und Node.js ganz einfach Ihren ersten Skill erstellen und Schritt für Schritt um neue Funktionen erweitern. Dank des AWS-Promotional-Credits-Programms ist das für Entwickler völlig kostenlos möglich. Sie lernen, Nutzerantworten zu speichern und zu verarbeiten, Skill Cards für die Ausgabe in der Alexa App zu erstellen und Alexa mit verschiedenen Stimmen sprechen zu lassen. Für alle, die noch einen Schritt weitergehen wollen, beschreibt der Autor das fortgeschrittene Dialogmanagement, das Erstellen von Skills mit der AWS Cloud sowie die Nutzung externer Informationen, beispielsweise für das Abrufen von Wetterdaten oder Versenden von E-Mails. Abschließend zeigt der Autor Ihnen Schritt für Schritt, wie Sie einen Eintrag im Alexa Skill Store erstellen und gibt Ihnen praktische Tipps für die Veröffentlichung und die Monetarisierung Ihrer Skills an die Hand. Aus dem Inhalt: Skills in der Alexa Developer Console anlegen Skill-Code automatisch erzeugen JSON-Sprachmodell und Skill-Logik in Node.js Antworten speichern mit DynamoDB Skills testen Debugging mit CloudWatch SSML-Tags zur Veränderung der Aussprache Skill Cards für die Alexa App erstellen Audiodateien, Bilder und Videos einbinden Antworten auf Plausibilität prüfen und Kontextwechsel Alexa Skills in der AWS Cloud Externe Informationen nutzen und APIs einbinden Skills zertifizieren und veröffentlichen Alexa-SEO und Monetarisierung Code-Beispiele zum Download
    Note: Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    ISBN: 9783960103936
    Language: English , German
    Pages: 1 Online-Ressource
    Edition: 1. Auflage
    Uniform Title: Make your first GAN with PyTorch
    Parallel Title: Erscheint auch als Rashid, Tariq GANs mit PyTorch selbst programmieren
    RVK:
    Keywords: Electronic books ; local ; Generative Adversarial Network ; PyTorch ; Programmierung ; Neuronales Netz ; PyTorch ; Generative Adversarial Network
    Abstract: Die coolste Idee im Deep Learning in den letzten 20 Jahren« sagt Yann LeCun, einer der weltweit führenden Forscher auf dem Gebiet der neuronalen Netze, über GANs, die Generative Adversarial Networks. Bei dieser noch neuen KI-Technik treten zwei neuronale Netze gegeneinander an mit dem Ziel, Bilder, Ton und Videos zu erzeugen, die vom Original nicht zu unterscheiden sind. Dieses Buch richtet sich an alle, die selbst ausprobieren möchten, wie GANs funktionieren. Tariq Rashid zeigt Ihnen Schritt für Schritt, wie Sie mit dem populären Framework PyTorch Ihre eigenen GANs erstellen und trainieren. Sie starten mit einem sehr einfachen GAN, um einen Workflow einzurichten, und üben erste Techniken anhand der MNIST-Datenbank ein. Mit diesem Wissen programmieren Sie dann ein GAN, das realistische menschliche Gesichter erzeugen kann. Tariq Rashids besondere Fähigkeit, komplexe Ideen verständlich zu erklären, macht das Buch zu einer unterhaltsamen Lektüre.
    Note: Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    ISBN: 9783958457843
    Language: English , German
    Pages: 1 Online-Ressource
    Edition: 1. Auflage
    Series Statement: mitp Professional
    RVK:
    Keywords: Electronic books ; local ; Datenbanksystem ; Datenbankentwurf ; Abfragesprache
    Abstract: Fundierte Einführung in relationale Datenbanken und die Anfragesprache SQL Datenbanken für die Berufspraxis verstehen, anwenden und entwickeln Mit zwei durchgängigen Beispielen und zahlreichen Übungen Datenbanken haben sich zu einem unverzichtbaren Bestandteil jeglicher Informationssysteme entwickelt, um größere Mengen strukturierter Daten verwalten, wiederauffinden und analysieren zu können. Die Autoren vermitteln fundiert und kompakt die zum Verständnis und auch zur Entwicklung solcher Systeme notwendigen Kenntnisse aus den Bereichen Datenbankentwurf, Datenmodellierung, Datenänderungen und Datenanalysen und stellen die relationale Datenbanksprache SQL ausführlich vor. Alle Konzepte und Sprachelemente erläutern die Autoren anhand von zwei durchgängigen Beispielen. Des Weiteren besprechen die Autoren Themen wie Nutzersichten, Datenschutz, Integritätssicherung, Tuning von Datenbankanwendungen sowie statistische Datenanalysen (Data Warehousing, Data Mining). Sie erläutern auch neuere Entwicklungen wie NoSQL-Datenbanksysteme, spaltenorientierte Speicherungsformen und die Analyse von Big Data. Das Buch richtet sich vor allem an Schüler und Studenten außerhalb des Fachbereichs Informatik, die schnell und dennoch fundiert die Grundlagen zur Entwicklung und zum Einsatz von Datenbanken lernen wollen. Übungsaufgaben am Ende jedes Kapitels machen das Buch ideal für Studium und Selbststudium. Aus dem Inhalt: Was sind Datenbanken? Relationale Datenbanken: Daten als Tabellen Das Entity-Relationship-Modell Datenbankentwurf Normalisierung für eine redundanzfreie Datenbank Datendefinition und Updates in SQL Anfragen in SQL Sichten und Datenschutz Integrität und Trigger Statistische Datenanalysen (Data Warehousing, Data Mining) Arbeitsweise eines DBMS und Tuning OLTP- und OLAP-Systeme Row und Column Stores, NoSQL und NewSQL Ausblick inklusive Verarbeitung von Big Data Zwei durchgängige Beispiele mit Datenbankentwurf und relationaler Repräsentation
    Note: Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : mitp Verlag | Boston, MA : Safari
    Language: English , German
    Pages: 1 online resource (376 pages)
    Edition: 1st edition
    Parallel Title: Erscheint auch als Russell, Stuart J., 1962 - Human compatible
    DDC: 006.3
    RVK:
    Keywords: Electronic books ; local ; Informationsgesellschaft ; Technischer Fortschritt ; Künstliche Intelligenz ; Kontrolle ; Gesellschaft ; Entwicklung ; Zukunft ; Künstliche Intelligenz ; Kontrolle ; Informationsgesellschaft ; Technischer Fortschritt ; Mensch-Maschine-Kommunikation
    Abstract: Der bekannte KI-Pionier Stuart Russell zeigt die Chancen und Risiken der Künstlichen Intelligenz auf Eine Superintelligenz als Zukunftsszenario - wie wir es schaffen, die Kontrolle zu behalten Eine realistische und kritische Betrachtung der KI mit anschaulichen Analogien und konkreten Lösungsvorschlägen In diesem bahnbrechenden Buch über die größte Frage bei der Entwicklung der KI zeigt der bekannte KI-Forscher Stuart Russell, wieso er sein eigenes Forschungsgebiet als Bedrohung für die menschliche Spezies ansieht und wie wir den aktuellen Kurs ändern können, bevor es zu spät ist. Niemand könnte die Chancen und Risiken dieser Zukunftstechnologie besser beurteilen als Stuart Russell, der seit mehr als einer Dekade an vorderster Front der KI-Forschung steht. Mit brillanten Analogien erklärt er, wie KI genau funktioniert und welche enormen Chancen sie mit sich bringt. Doch wir müssen sicherstellen, dass wir niemals die Kontrolle über diese Maschinen verlieren, die mächtiger sind als wir selbst. Russell zeigt auf, wie wir die schlimmsten Bedrohungen abwenden, indem wir die Grundlagen der KI neu denken, um zu garantieren, dass die Maschinen unsere Ziele verfolgen, nicht ihre. Fundiert, eindringlich und visionär ist Human Compatible ein Buch, das jeder lesen sollte, um die Zukunft zu verstehen, die schneller kommt, als wir denken. Über den Autor: Stuart Russell ist Professor der Informatik am Lehrstuhl Engineering der University of California, Berkeley. Er hat als stellvertretender Vorsitzender des Councils über Künstliche Intelligenz und Robotik des Weltwirtschaftsforums und Berater für die Rüstungskontrolle der Vereinten Nationen fungiert. Darüber hinaus ist er Fellow von Andrew Carnegie sowie der Association for Computing Machinery und der American Association for the Advancement of Science.
    Note: Online resource; Title from title page (viewed June 19, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    Heidelberg : dpunkt.verlag | Boston, MA : Safari
    ISBN: 9783969100660
    Language: English , German
    Pages: 1 Online-Ressource (608 pages)
    Edition: 6., überarbeitete und erweiterte Auflage
    Parallel Title: Erscheint auch als Saake, Gunter, 1960 - Algorithmen und Datenstrukturen
    RVK:
    Keywords: Electronic books ; local ; Lehrbuch ; Datenstruktur ; Algorithmus ; Java ; Datenstruktur ; Algorithmus ; Java ; Algorithmus ; Datenstruktur
    Abstract: Algorithmen und Datenstrukturen sind Grundbausteine eines jeden Informatikstudiums. Das Buch behandelt diese Thematik in Verbindung mit der Programmiersprache Java. Darüber hinaus werden grundlegende Konzepte angesprochen wie formale und alternative Algorithmenmodelle, Korrektheit und Komplexität. Einen weiteren Schwerpunkt bilden fundamentale Datenstrukturen sowie deren objektorientierte Implementierung mit modernen Methoden der Softwareentwicklung. Die 6. Auflage führt einige neue Algorithmen ein und berücksichtigt die Neuerungen der aktuellen Java-Versionen, u.a. zu Themen wie Parallelisierung.
    Note: Online resource; Title from title page (viewed October 28, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : For Dummies | Boston, MA : Safari
    ISBN: 9781119546658
    Language: English
    Pages: 1 online resource (320 pages)
    Edition: 2nd edition
    Parallel Title: Erscheint auch als Kirsch, Daniel D. Cloud computing
    RVK:
    Keywords: Electronic books ; local ; Cloud Computing ; Virtuelle Maschine ; Computersimulation ; Cloud Computing
    Abstract: Get your head —and your business—into the Cloud Cloud computing is no longer just a clever new toy in the world of IT infrastructure. Despite the nebulous name, it’s become a real and important part of our information architecture—and tech professionals who ignore it or try to skim their way through risk falling behind rapidly. The new edition of Cloud Computing For Dummies gets you up to speed fast, clarifying your Cloud options, showing you where can save you time and money, giving you ways to frame your decisions, and helping you avoid weeks of research. In a friendly, easy-to-follow style, Cloud Computing For Dummies, 2nd Edition demystifies the Cloud’s virtual landscape, breaking up a complex and multi-layered topic into simple explanations that will make the various benefits clear and ultimately guide you toward making the most appropriate choices for your organization. Know the business case for the Cloud Understand hybrid and multi-cloud options Develop your Cloud strategy Get tips on best practices The Cloud is everywhere, and it can deliver amazing benefits to our lives and businesses. Get a much clearer vision of exactly how with Cloud Computing For Dummies —and you’ll begin to see that the sky really is the limit!
    Note: Online resource; Title from title page (viewed August 4, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Language: English , German
    Pages: 1 Online-Ressource (xiii, 125 Seiten)
    Edition: 1st edition
    Parallel Title: Erscheint auch als Yablonski, Jon Laws of UX
    RVK:
    Keywords: Electronic books ; local ; Mensch-Maschine-Kommunikation ; Webdesign ; Gebrauchsgrafik ; Benutzerfreundlichkeit ; Verhaltenspsychologie
    Abstract: Jon Yablonski erklärt in diesem Buch, wie UX-Designerinnen Grundprinzipien aus der Psychologie nutzen können, um eine bessere User Experience zu generieren. Anstatt Benutzerinnen zu zwingen, sich an das Design eines Produkts (z. B. App) anzupassen, hilft dieser praktische Leitfaden dabei, das Design danach auszurichten, wie Benutzer*innen sich verhalten und mit digitalen Schnittstellen interagieren, um ihre Nutzung einfacher und angenehmer zu gestalten. Dabei greift der Autor auf bekannte Regeln und Prinzipien aus der psychologischen Forschung zurück und überträgt sie in die UX-Design-Welt. So sprechen wir beispielsweise einer App mit schönem Design mehr Kompetenz zu und verzeihen ihr eher Fehler, oder erwarten von einem Onlineshop, dass der Kaufprozess so funktionieren, wie wir es von anderen Shops gewohnt sind. Außerdem können wir eine große Menge an Informationen besser speichern und verarbeiten, wenn sie in Chunks gegliedert sind, weshalb etwa Texte, die mithilfe von Überschriften und Absätzen gegliedert sind, eine höhere UX generieren als ein langer Fließtext, der die User überfordert. Nachdem der Autor die verschiedenen Prinzipien erklärt und an anschaulichen, einfach nachzuvollziehenden Beispielen demonstriert hat, zeigt er, wie man diese Prinzipien praktisch für die eigene Arbeit und im Team nutzen kann. Zusätzlich geht er auch auf die ethischen Komponenten ein (Beispiele: Endlos-Scrollen, Like-Button).
    Note: Online resource; Title from title page (viewed September 30, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Packt Publishing | Boston, MA : Safari
    ISBN: 9781800208988
    Language: English
    Pages: 1 online resource (750 pages)
    Edition: 2nd edition
    Parallel Title: Erscheint auch als Bancila, Marius Modern C++ programming cookbook
    DDC: 005.133
    RVK:
    Keywords: Electronic books ; local ; C++ ; C++20
    Abstract: A pragmatic recipe book for acquiring a comprehensive understanding of the complexities and core fundamentals of C++ programming Key Features Explore the latest language and library features of C++20 such as modules, coroutines, concepts, and ranges Shed new light on the core concepts in C++ programming, including functions, algorithms, threading, and concurrency, through practical self-contained recipes Leverage C++ features like smart pointers, move semantics, constexpr, and more for increased robustness and performance Book Description C++ has come a long way to be one of the most widely used general-purpose languages that is fast, efficient, and high-performance at its core. The updated second edition of Modern C++ Programming Cookbook addresses the latest features of C++20, such as modules, concepts, coroutines, and the many additions to the standard library, including ranges and text formatting. The book is organized in the form of practical recipes covering a wide range of problems faced by modern developers. The book also delves into the details of all the core concepts in modern C++ programming, such as functions and classes, iterators and algorithms, streams and the file system, threading and concurrency, smart pointers and move semantics, and many others. It goes into the performance aspects of programming in depth, teaching developers how to write fast and lean code with the help of best practices. Furthermore, the book explores useful patterns and delves into the implementation of many idioms, including pimpl, named parameter, and attorney-client, teaching techniques such as avoiding repetition with the factory pattern. There is also a chapter dedicated to unit testing, where you are introduced to three of the most widely used libraries for C++: Boost.Test, Google Test, and Catch2. By the end of the book, you will be able to effectively leverage the features and techniques of C++11/14/17/20 programming to enhance the performance, scalability, and efficiency of your applications. What you will learn Understand the new C++20 language and library features and the problems they solve Become skilled at using the standard support for threading and concurrency for daily tasks Leverage the standard library and work with containers, algorithms, and iterators Solve text searching and replacement problems using regular expressions Work with different types of strings and learn the various aspects of compilation Take advantage of the file sys...
    Note: Online resource; Title from title page (viewed September 11, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Apress | Boston, MA : Safari
    ISBN: 9781484265529
    Language: English
    Pages: 1 online resource (353 pages)
    Edition: 1st edition
    Parallel Title: Erscheint auch als Jean-Baptiste, Lamy Ontologies with Python
    RVK:
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Use ontologies in Python, with the Owlready2 module developed for ontology-oriented programming. You will start with an introduction and refresher on Python and OWL ontologies. Then, you will dive straight into how to access, create, and modify ontologies in Python. Next, you will move on to an overview of semantic constructs and class properties followed by how to perform automatic reasoning. You will also learn about annotations, multilingual texts, and how to add Python methods to OWL classes and ontologies. Using medical terminologies as well as direct access to RDF triples is also covered. Python is one of the most used programming languages, especially in the biomedical field, and formal ontologies are also widely used. However, there are limited resources for the use of ontologies in Python. Owlready2, downloaded more than 60,000 times, is a response to this problem, and this book is the first one on the topic of using ontologies with Python. What You Will Learn Use Owlready2 to access and modify OWL ontologies in Python Publish ontologies on dynamic websites Perform automatic reasoning in Python Use well-known ontologies, including DBpedia and Gene Ontology, and terminological resources, such as UMLS (Unified Medical Language System) Integrate Python methods in OWL ontologies Who Is This Book For Beginner to experienced readers from biomedical sciences and artificial intelligence fields would find the book useful.
    Note: Online resource; Title from title page (viewed December 17, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    ISBN: 9781788119986
    Language: English
    Pages: 1 Online-Ressource (xvi, 295 Seiten) , Illustrationen, Diagramme
    Series Statement: Research handbooks in business and management series
    Parallel Title: Erscheint auch als Handbook of digital innovation
    RVK:
    RVK:
    Keywords: Innovation ; Digitalisierung ; Technischer Fortschritt ; Interdisziplinäre Forschung ; Technological innovations ; Business Technological innovations ; Technological innovation Social aspects ; Technological innovation Economic aspects ; Softwareplattform ; Technische Innovation ; Geschäftsmodell ; Systemplattform ; Electronic books ; Handbuch ; Aufsatzsammlung ; Technische Innovation ; Softwareplattform ; Systemplattform ; Geschäftsmodell
    Abstract: Contents: Section 1: Introduction -- Chapter 1: Digital innovation: Towards a transdisciplinary perspective (Nambisan, Lyytinen, Yoo) -- Section 2: Foundations of digital innovation -- Introduction to section 2 (Joel Cutcher-Gershenfeld) -- Chapter 2: The new wave of digital innovation: the need for a theory of sociotechnical self-orchestration (Majchrzak & Griffith) -- Chapter 3: Digital innovation and entrepreneurship in and around institutional voids: The case of fundación cardiovascular (FCV) in colombia (Jarvenpaa, Echeverri-Carroll, Pedraza) -- Chapter 4: Theorizing the connections between digital innovations and societal transformation: Learning from the case of m-pesa in Kenya (Markus & Nan) -- Chapter 5: Agile development as the root metaphor for strategy in digital innovation (Berente) -- Section 3: Digital platforms, ecosystems and entrepreneurship -- Introduction to section 3 (Annabelle Gawer) Chapter 6: Value co-creation in ecosystems: Insights and research promise from three disciplinary perspectives (Autio & Thomas) -- Chapter 7: Remixing systems: Collective design through modification (Nickerson) -- Chapter 8: Scaling digital enterprises (Henfridsson) -- Section 4: Digital innovation, business models and value creation Introduction to section 4 (Varun Grover) Chapter 9: data and value (Alaimo, Kallinikos, Aaltonen) -- Chapter 10: Business model cohesiveness scorecard: Implications of digitization for business model innovation (Velu) -- Chapter 11: Automate, informate, and generate: affordance primitives of smart devices and the internet of things (Seidel & Berente) -- Section 5: Digital innovation and future of work Introduction to section 5 (Paul Courant) Chapter 12: Prolegomena on digital innovation and jobs (King & Grudin) -- Chapter 13: Making the one-sided gig economy really two-sided: Implications for future of work (Malhotra) -- Section 6: Digital innovation and application domains Introduction to section 6 (Ken Loparo) Chapter 14: The bits and bytes of biology: digitalization fuels an emerging generative platform for biological innovation (Kulathinal, Yoo, Kumar) -- Chapter 15: Innovations in micro-robotics and their implications in a digital world (Rogowski, Bubel, Zhang, Kim) -- Section 7: Conclusion Chapter 16: A transdisciplinary research agenda for digital innovation: Key themes and directions for future research (Lyytinen, Nambisan, Yoo) -- Index.
    Abstract: "Digital innovations influence every aspect of our lives in this increasingly technological world. Firms that pursue digital innovations must think carefully about how digital technologies shape the nature, process and outcomes of innovation as well as the long- and short-term social, economic and cultural consequences of their offerings. The Handbook contributes to building a transdisciplinary understanding of digital innovation by bringing together a diverse set of leading scholars from business, engineering, economics, science and public policy. Their distinct perspectives advance ideas and principles intended to set the agenda for future research on digital innovation in ways that inform not only firm-level strategies and practices but policy decisions and science-focused investments as well. The first of its kind, this Handbook provides scope and depth for scholars interested in information systems and digital technologies, innovation and entrepreneurship, strategy, and digital platforms and ecosystems. In addition, it is informative and enlightening to scholars and practitioners interested in the impact of digital technologies on organizations and the broader society"--
    Note: Literaturangaben
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly Media
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: First edition.
    Parallel Title: Erscheint auch als Lauwens, Ben Think Julia
    DDC: 005.73
    RVK:
    Keywords: Julia (Computer program language) ; Dynamic programming ; Electronic books ; Electronic books ; local ; Julia
    Abstract: If you're just learning how to program, Julia is an excellent JIT-compiled, dynamically typed language with a clean syntax. This hands-on guide uses Julia 1.0 to walk you through programming one step at a time, beginning with basic programming concepts before moving on to more advanced capabilities, such as creating new types and multiple dispatch. Designed from the beginning for high performance, Julia is a general-purpose language ideal for not only numerical analysis and computational science but also web programming and scripting. Through exercises in each chapter, you'll try out programming concepts as you learn them. Think Julia is perfect for students at the high school or college level as well as self-learners and professionals who need to learn programming basics. Start with the basics, including language syntax and semantics Get a clear definition of each programming concept Learn about values, variables, statements, functions, and data structures in a logical progression Discover how to work with files and databases Understand types, methods, and multiple dispatch Use debugging techniques to fix syntax, runtime, and semantic errors Explore interface design and data structures through case studies
    Note: Includes bibliographical references and index. - Description based on online resource; title from title page (Safari, viewed April 15, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    ISBN: 9783960103370
    Language: English , German
    Pages: 1 Online-Ressource (400 pages)
    Edition: 2. Auflage
    Parallel Title: Erscheint auch als Grus, Joel Einführung in Data Science
    RVK:
    RVK:
    Keywords: Data mining ; Electronic books ; local ; Data Mining ; Datenanalyse ; Datenstruktur ; Python ; Datenanalyse ; Python 2.7 ; Data Mining
    Abstract: Dieses Buch führt Sie in Data Science ein, indem es grundlegende Prinzipien der Datenanalyse erläutert und Ihnen geeignete Techniken und Werkzeuge vorstellt. Sie lernen nicht nur, wie Sie Bibliotheken, Frameworks, Module und Toolkits konkret einsetzen, sondern implementieren sie auch selbst. Dadurch entwickeln Sie ein tieferes Verständnis für die Zusammenhänge und erfahren, wie essenzielle Tools und Algorithmen der Datenanalyse im Kern funktionieren. Falls Sie Programmierkenntnisse und eine gewisse Sympathie für Mathematik mitbringen, unterstützt Joel Grus Sie dabei, mit den mathematischen und statistischen Grundlagen der Data Science vertraut zu werden und sich Programmierfähigkeiten anzueignen, die Sie für die Praxis benötigen. Dabei verwendet er Python: Die weit verbreitete Sprache ist leicht zu erlernen und bringt zahlreiche Bibliotheken für Data Science mit.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    [Place of publication not identified] : Published with the authorization of Microsoft Corporation by Pearson Education
    ISBN: 9781509305940 , 1509305947
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Third edition.
    Series Statement: Inside out
    Parallel Title: Erscheint auch als Bott, Ed, 1955 - Windows 10 für Experten
    DDC: 005.446
    RVK:
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; Electronic books ; local ; Windows 10
    Abstract: Conquer today's Windows 10-from the inside out! Dive into Windows 10-and really put your Windows expertise to work. Focusing on Windows 10's newest, most powerful, and most innovative features, this supremely organized reference packs hundreds of timesaving solutions, up-to-date tips, and workarounds. From the new Timeline to key improvements in Microsoft Edge, Cortana, security, and virtualization, you'll discover how experts tackle today's essential tasks. Adapt to faster change in today's era of "Windows as a service," as you challenge yourself to new levels of mastery. • Install, configure, and personalize the latest versions of Windows 10 • Manage Windows reliability, security, and feature updates in any environment • Maximize your productivity with Windows 10's growing library of built-in apps • Pinpoint information fast with advanced Windows Search and Cortana techniques • Discover major Microsoft Edge enhancements, from extensions to accessibility • Use Cortana to perform tasks, set reminders, retrieve data, and get instant answers to pressing questions • Secure devices, data, and identities, and block malware and intruders • Safeguard your business with BYOD work accounts, Windows Hello, biometrics, and Azure AD • Deploy, use, and manage Universal Windows Platform (UWP) apps • Store, sync, and share content with OneDrive and OneDrive for Business • Collaborate more efficiently with the Windows 10 Mail, Calendar, and Skype apps • Seamlessly manage both physical and virtual storage • Optimize performance and battery life and troubleshoot crashes
    Note: Includes index. - Description based on online resource; title from title page (Safari, viewed March 12, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (170 pages)
    Edition: 1st edition
    Parallel Title: Erscheint auch als Calavera, David Linux observability with BPF
    RVK:
    Keywords: Electronic books ; local ; LINUX ; Programmierung ; Leistungsbewertung
    Abstract: Want to master the BPF virtual machine in the Linux Kernel? This practical guide shows you how to write applications that use BPF to observe and modify the kernel’s behavior on demand—without having prior knowledge of Linux Kernel development. David Calavera and Lorenzo Fontana introduce concepts to help systems engineers understand the BPF program lifecycle. If you have knowledge about performance optimization, networking, and security, this book shows you how to inject code to monitor, trace, and observe events in the kernel in a secure way—without the need to recompile the kernel or reboot the system. You’ll find code examples in C, Go, and Python.
    Note: Online resource; Title from title page (viewed September 25, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (693 pages)
    Edition: 1st edition
    Parallel Title: Erscheint auch als Gregg, Brendan BPF performance tools
    RVK:
    Keywords: Electronic books ; local ; LINUX
    Abstract: BPF and related observability tools give software professionals unprecedented visibility into software, helping them analyze operating system and application performance, troubleshoot code, and strengthen security. BPF Performance Tools: Linux System and Application Observability is the industry's most comprehensive guide to using these tools for observability. Brendan Gregg, author of the industry's definitive guide to system performance, introduces powerful new methods and tools for doing analysis that leads to more robust, reliable, and safer code. This authoritative guide: Explores a wide spectrum of software and hardware targets Thoroughly covers open source BPF tools from the Linux Foundation iovisor project's bcc and bpftrace repositories Summarizes performance engineering and kernel internals you need to understand Provides and discusses 150+ bpftrace tools, including 80 written specifically for this book: tools you can run as-is, without programming — or customize and develop further, using diverse interfaces and the bpftrace front-end You'll learn how to use BPF (eBPF) tracing tools to analyze CPUs, memory, disks, file systems, networking, languages, applications, containers, hypervisors, security, and the Linux kernel. You'll move from basic to advanced tools and techniques, producing new metrics, stack traces, custom latency histograms, and more. It's like having a superpower: with Gregg's guidance and tools, you can analyze virtually everything that impacts system performance, so you can improve virtually any Linux operating system or application.
    Note: Online resource; Title from title page (viewed November 6, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    ISBN: 9783110625783 , 9783110628517
    Language: English
    Pages: 1 Online-Ressource (176 Seiten) , Illustrationen, Diagramme
    Series Statement: De Gruyter Series on the Internet of Things
    Parallel Title: Erscheint auch als The internet of everything
    DDC: 004.678
    RVK:
    Keywords: Computers ; Computers / Artificial Intelligence ; Electronic books ; Internet der Dinge
    Abstract: In the era before IoT, the world wide web, internet, web 2.0 and social media made people's lives comfortable by providing web services and enabling access personal data irrespective of their location. Further, to save time and improve efficiency, there is a need for machine to machine communication, automation, smart computing and ubiquitous access to personal devices. This need gave birth to the phenomenon of Internet of Things (IoT) and further to the concept of Internet of Everything (IoE)
    Note: Literaturangaben
    URL: Cover  (Thumbnail cover image)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    Wiesbaden : Springer VS
    ISBN: 9783658261504
    Language: German
    Pages: 1 Online-Ressource (XII, 162 Seiten) , Illustrationen
    Parallel Title: Erscheint auch als
    DDC: 306.42
    RVK:
    RVK:
    Keywords: Knowledge - Discourse ; Cybercrime ; Computer crimes ; Computersicherheit ; Internetkriminalität ; Einführung ; Lehrbuch ; Einführung ; Lehrbuch ; Einführung ; Lehrbuch ; Internetkriminalität ; Computersicherheit
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    ISBN: 9783839447192
    Language: English
    Pages: 1 Online-Ressource (331 Seiten) , Illustrationen
    Series Statement: AI critique volume 1
    Parallel Title: Erscheint auch als The democratization of artificial intelligence
    DDC: 303.483
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Social sciences ; Social Science / Media Studies ; Electronic books ; Konferenzschrift 2018 ; Electronic books ; Konferenzschrift 2018 ; Aufsatzsammlung ; Electronic books. ; Electronic books ; Konferenzschrift 2018 ; Konferenzschrift 2018 ; Electronic books. ; Künstliche Intelligenz ; Algorithmus ; Demokratisierung ; Künstliche Intelligenz ; Medienpolitik
    Abstract: After a long time of neglect, Artificial Intelligence is once again at the center of most of our political, economic, and socio-cultural debates. Recent advances in the field of Artifical Neural Networks have led to a renaissance of dystopian and utopian speculations on an AI-rendered future. Algorithmic technologies are deployed for identifying potential terrorists through vast surveillance networks, for producing sentencing guidelines and recidivism risk profiles in criminal justice systems, for demographic and psychographic targeting of bodies for advertising or propaganda, and more generally for automating the analysis of language, text, and images. Against this background, the aim of this book is to discuss the heterogenous conditions, implications, and effects of modern AI and Internet technologies in terms of their political dimension: What does it mean to critically investigate efforts of net politics in the age of machine learning algorithms?
    Note: Von der letzten BuchseiteIn "acknowledgments" : ... "is based in part on contributions from an international coference that took place in Bochum in 2018" , Literaturangaben
    URL: Cover  (Thumbnail cover image)
    URL: Cover  (Thumbnail cover image)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (kostenfrei)
    URL: Cover
    URL: Cover  (Thumbnail cover image)
    URL: Cover
    URL: Cover  (lizenzpflichtig)
    URL: FULL  ((Currently Only Available on Campus))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    San Francisco, CA : No Starch Press
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Parallel Title: Erscheint auch als Sweigart, Al Cracking codes with Python
    DDC: 005.8
    RVK:
    Keywords: Data encryption (Computer science) ; Python (Computer program language) ; Computer security ; Hacking ; Electronic books ; Electronic books ; local ; Python ; Python
    Abstract: "Learn how to program in Python while making and breaking ciphers-algorithms used to create and send secret messages! After a crash course in Python programming basics, you'll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère cipher. You'll begin with simple programs for the reverse and Caesar ciphers and then work your way up to public key cryptography, the type of encryption used to secure today's online transactions, including digital signatures, email, and Bitcoin. Each program includes the full code and a line-by-line explanation of how things work. By the end of the book, you'll have learned how to code in Python and you'll have the clever programs to prove it! You'll also learn how to: • Combine loops, variables, and flow control statements into real working programs• Use dictionary files to instantly detect whether decrypted messages are valid English or gibberish• Create test programs to make sure that your code encrypts and decrypts correctly• Code (and hack!) a working example of the affine cipher, which uses modular arithmetic to encrypt a message• Break ciphers with techniques such as brute-force and frequency analysis There's no better way to learn to code than to play with real programs. Cracking Codes with Python makes the learning fun!"
    Note: Includes index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : mitp Verlag | Boston, MA : Safari
    ISBN: 9783958452756
    Language: English , German
    Pages: 1 online resource (520 pages)
    Edition: 2nd edition
    Parallel Title: Erscheint auch als Harich, Thomas W. IT-Sicherheitsmanagement
    DDC: 005.80218
    RVK:
    RVK:
    Keywords: Electronic books ; local ; BSI ; ISMS ; ISO-27001 ; IT-System ; Compliance ; Monitoring ; Sicherheit ; Controlling ; Datenschutz ; Richtlinien ; DIN-NIA-01-27 ; IT-Compliance ; IT-Sicherheit ; Risikofaktoren ; Cloud Computing ; Datensicherheit ; Risikobewertung ; Datenschutzrecht ; Penetrationstest ; Softwareprojekte ; Geschäftsprozesse ; Notfallmanagement ; digitale Signatur ; Balanced Scorecard ; IT-Risikomanagement ; Softwareentwicklung ; Identitätsmanagement ; Informationssicherheit ; Business Impact-Analyse ; IT-Sicherheitsverfahren ; Risikomanagementprozess ; IT-Sicherheitsmanagement ; ISO/IEC 27001 ; Europäische Union Datenschutz-Grundverordnung ; Computersicherheit ; Rechnernetz ; Systemverwaltung ; Datensicherung ; Computersicherheit
    Abstract: Praxiswissen für IT Security Manager Mit einem durchdachten IT-Sicherheitskonzept zu mehr Informationssicherheit IT Compliance, Business Continuity Management, Risikomanagement oder Security Audit – alle Bereiche des IT Security Managers praxisnah erklärt Aufbau eines Information Security Management Systems (ISMS) nach ISO 27001 und BSI – unter Berücksichtigung der neuen DSGVO Immer mehr Daten werden in Public Clouds verarbeitet, auf Mobiltelefonen gespeichert, über Chat-Apps geteilt oder im Rahmen von Industrie 4.0 in einer Größenordnung erhoben, die bislang kaum denkbar war. Die entsprechenden Maßnahmen der IT-Security müssen sich an diese Veränderungen anpassen. Ebenso wie an die EU-Datenschutz-Grundverordnung, das IT-Sicherheitsgesetz oder das China Cybersecurity Law. Alle diese Regelungen haben immense Auswirkungen darauf, wie Unternehmen Daten erfassen, verarbeiten, speichern oder austauschen dürfen. In der Fülle und der Bandbreite der neuen Regelungen liegt aber immer auch die Gefahr, etwas falsch zu machen. Dieser Praxisleitfaden wird Ihnen dabei helfen, von der schieren Menge an Einzelthemen und Aufgaben, mit denen sich der (angehende) IT Security Manager auseinanderzusetzen hat, nicht erschlagen zu werden und den richtigen Weg zu wählen, um mit all diesen Anforderungen umzugehen. Jedes Kapitel dieses Buches beschreibt einen zusammenhängenden Bereich der IT Security. Die notwendige theoretische Fundierung wechselt sich dabei ab mit Tipps aus der Praxis für die Praxis, mit für den Berufsalltag typischen Fragestellungen, vielen konkreten Beispielen und hilfreichen Checklisten. Alle Teilgebiete werden abschließend in einem Kapitel zusammengeführt, das die Einführung und Weiterentwicklung eines IT-Sicherheitsmanagements auf Basis der ISO-27000-Normen-Familie unter Beachtung der datenschutzrechtlichen Bestimmungen der EU-DSGVO behandelt. So erhalten Sie sowohl einen kompetenten Praxisleitfaden (auch für den Berufseinstieg) als auch ein umfassendes Nachschlagewerk für Ihre tägliche Arbeit. Aus dem Inhalt: Umfang und Aufgabe des IT-Security-Managements Organisation der IT-Security IT-Compliance Organisation von Richtlinien Betrieb der IT-Security IT Business Continuity Management IT-Notfallmanagement Verfügbarkeitsmanagement Technische IT-Security IT-Risikomanagement Sicherheitsmonitoring IT-Security-Audit Management von Sicherheitsereignissen und IT-Forensik Kennzahlen Praxis: Aufbau eines ISMS Awareness und Schulung Über den Autor: T...
    Note: Online resource; Title from title page (viewed June 26, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Language: German
    Pages: 1 Online-Ressource (245 Seiten) , Illustrationen, Diagramme
    Parallel Title: Erscheint auch als CASE | KRITIS
    DDC: 363.10028558
    RVK:
    Keywords: Datensicherheit ; Krisenmanagement ; Infrastruktur ; Unternehmen ; Öffentliche Verwaltung ; Deutschland ; Datensicherheit ; Krisenmanagement ; Infrastruktur ; Unternehmen ; Öffentliche Verwaltung ; Deutschland ; Datensicherheit ; Deutschland ; Infrastruktur ; Krisenmanagement ; Unternehmen ; Öffentliche Verwaltung ; Fallstudie ; Fallstudiensammlung ; Deutschland ; Kritische Infrastruktur ; Computersicherheit ; Informationsmanagement ; Erfolgsfaktor ; Deutschland ; Kritische Infrastruktur ; Computersicherheit ; Krisenmanagement
    Note: Förderkennzeichen BMBF16 KIS 0213 K-16 KIS 0216 K. - Verbund-Nummer 01157786 , Enthält 17 Beiträge , Literaturangaben
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    Bielefeld : transcript
    ISBN: 9783839446003
    Language: English
    Pages: 1 Online-Ressource (179 Seiten) , Illustrationen
    Series Statement: Lettre
    Uniform Title: No place like home
    Parallel Title: Erscheint auch als Bieger, Laura, 1971 - Belonging and narrative
    Dissertation note: Habilitationsschrift Freie Universität Berlin
    DDC: 813.0093552
    RVK:
    Keywords: Literature History and criticism ; Literary Criticism / American ; Electronic books ; Hochschulschrift ; USA ; Roman ; Zugehörigkeit ; Heimat ; Geschichte
    Abstract: Why did the novel become so popular in the past three centuries, and how did the American novel contribute to this trend? As a key provider of the narrative frames and formulas needed by modern individuals to give meaning and mooring to their lives. Drawing on phenomenological hermeneutics, human geography and social psychology, Laura Bieger contends that belonging is not a given; it is continuously produced by narrative. Against the current emphasis on metaphors of movement and destabilization, she explores the salience and significance of home. Challenging views of narrative as a mechanism of ideology, she approaches narrative as a practical component of dwelling in the world - and the novel a primary place-making agent
    Note: Literaturverzeichnis: Seite 163-179
    URL: Cover  (Thumbnail cover image)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    ISBN: 9783839436608
    Language: English
    Pages: 1 Online-Ressource (284 Seiten) , Illustrationen
    Series Statement: American culture studies volume 17
    Parallel Title: Erscheint auch als Power relations in black lives
    DDC: 810.9/896073
    RVK:
    Keywords: Bourdieu, Pierre ; Elias, Norbert ; American literature African American authors ; History and criticism ; African Americans Music ; History and criticism ; African Americans Politics and government ; Racism in literature ; Violence in literature ; Literature History and criticism ; Literary Criticism / Subjects & Themes ; Electronic books ; Aufsatzsammlung ; USA ; Schwarze ; Literatur ; Kultur
    Abstract: According to relational sociology, power imbalances are at the root of human conflicts and consequently shape the physical and symbolic struggles between interdependent groups or individuals. This volume highlights the role of power relations in the African American experience by applying key concepts of Pierre Bourdieu and Norbert Elias to black literature and culture. The authors offer new readings of power asymmetries as represented in works of canonical and contemporary black writers (Richard Wright, Ralph Ellison, Gwendolyn Brooks, Toni Morrison, Percival Everett, Colson Whitehead), rap music (e.g., Jay Z), images of black homelessness, and figurations of political activism (civil rights activist Bayard Rustin
    Note: Literaturangaben
    URL: Cover  (Thumbnail cover image)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    ISBN: 9783958457782 , 3958457789
    Language: German
    Pages: 1 online resource (1 volume) , illustrations
    Edition: 6. Auflage.
    Parallel Title: Erscheint auch als Saake, Gunter, 1960 - Datenbanken
    DDC: 005.74
    RVK:
    RVK:
    Keywords: Database management ; Relational databases ; Database design ; Electronic books ; Electronic books ; local ; Datenbanksystem ; Datenbankentwurf ; Datenbanksprache ; Datenbanksystem ; Datenbankentwurf ; Datenbanksprache
    Abstract: Detaillierte Einführung in die Datenbanktechnologie in der 6. aktualisierten Neuauflage Konzepte relationaler Datenbanken: Architekturen, Modelle, Entwurfsmethoden, Relationenalgebra Ausführliche Behandlung von SQL sowie Einblick in weitere Datenbanksprachen Datenbanken sind eines der wichtigsten Teilgebiete der Informatik und dank Big Data, Industrie 4.0, Internet of Things & Co. müssen immer mehr Daten effizient verwaltet, performant analysiert und sinnvoll ausgegeben werden. Das Buch behandelt systematisch und fundiert die wichtigsten Konzepte und Sprachen, die für den Einsatz von Datenbanksystemen und die Entwicklung von Datenbankanwendungen eine Rolle spielen. Die Grundlagen relationaler Datenbanken werden dabei umfassend erklärt. Die Autoren gehen außerdem auf Theorie, Entwurfsmethoden sowie Sprachkonzepte für relationale Datenbanken inklusive der ausführlichen Behandlung von SQL ein. Des Weiteren werden Alternativen und Erweiterungen von Datenbankmodellen vorgestellt. Eine durchgehende Beispielanwendung liefert einen wertvollen Praxisbezug und hilft Ihnen dabei, die zugrundeliegenden theoretischen Konzepte besser zu verstehen. Zusammenfassungen und Übungsaufgaben am Ende eines jeden Kapitels erleichtern Ihnen außerdem das Selbststudium und ermöglichen Ihnen eine optimale Prüfungsvorbereitung. Das Buch eignet sich als Lehrbuch für Studierende der Informatik und verwandter Fächer, aber auch für Anwender und Entwickler, die sich über aktuelle Datenbanktechnologie genauer informieren möchten. Zusätzliche Kapitel sind als kostenloser Download verfügbar. Aus dem Inhalt: Kernkonzepte relationaler Datenbanken Konzepte und Architektur Datenbankentwurf Entity-Relationship-Modell Relationenalgebra Die relationale Datenbanksprache SQL (SQL:2016) Erweiterte Konzepte Erweiterte Entwurfsmodelle QUEL, QBE und Datalog Sichten, Transaktionen, Integrität und Trigger Datenbankanwendungsentwicklung Zugriffskontrolle & Privacy Weitere Datenbankmodelle Multimediale, raum- und zeitbezogene Daten Objektorientierte und objektrelationale Datenbankmodelle XML, XPath, XQuery und SQL/XML NoSQL und Graphdatenbanken Über die Autoren: Gunter Saake, Andreas Heuer und Kai-Uwe Sattler sind Professoren für Informatik an den Universitäten von Magdeburg, Rostock und Ilmenau.
    Note: Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed July 9, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: First edition.
    RVK:
    Keywords: Software architecture ; Information technology ; Management ; Electronic books ; Electronic books ; local ; Softwarearchitektur ; Softwareentwicklung
    Abstract: The software development ecosystem is constantly changing, providing a constant stream of new tools, frameworks, techniques, and paradigms. Over the past few years, incremental developments in core engineering practices for software development have created the foundations for rethinking how architecture changes over time, along with ways to protect important architectural characteristics as it evolves. This practical guide ties those parts together with a new way to think about architecture and time.
    Note: Includes index. - Description based on online resource; title from title page (Safari, viewed September 28, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    ISBN: 9780128038383 , 0128038381
    Language: English
    Pages: 1 online resource (273 pages) , illustrations
    Series Statement: Syngress advanced topics in information security
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 005.8
    RVK:
    RVK:
    Keywords: COMPUTERS / Security / General ; Computer networks / Security measures ; Computer security ; Cyber intelligence (Computer security) ; Computer security ; Computer networks Security measures ; Cyber intelligence (Computer security) ; Informationssystem ; Unternehmen ; Datensicherung ; Computersicherheit ; Rechnernetz ; Rechnernetz ; Computersicherheit ; Datensicherung ; Unternehmen ; Datensicherung ; Informationssystem
    Abstract: "Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis, Business of Safety, Functional Safety, Software Systems, and Cyber Physical Systems presents an update on the world's increasing adoption of computer-enabled products and the essential services they provide to our daily lives. The tailoring of these products and services to our personal preferences is expected and made possible by intelligence that is enabled by communication between them. Ensuring that the systems of these connected products operate safely, without creating hazards to us and those around us, is the focus of this book, which presents the central topics of current research and practice in systems safety and security as it relates to applications within transportation, energy, and the medical sciences. Each chapter is authored by one of the leading contributors to the current research and development on the topic.
    Abstract: The perspective of this book is unique, as it takes the two topics, systems safety and systems security, as inextricably intertwined. Each is driven by concern about the hazards associated with a system's performance.
    Abstract: Presents the most current and leading edge research on system safety and security, featuring a panel of top experts in the field Includes several research advancements published for the first time, including the use of 'goal structured notation' together with a 'judgment calculus' and their automation as a 'rule set' to facilitate systems safety and systems security process execution in compliance with existing standards Presents for the first time the latest research in the field with the unique perspective that systems safety and systems security are inextricably intertwined Includes coverage of systems architecture, cyber physical systems, tradeoffs between safety, security, and performance, as well as the current methodologies and technologies and implantation practices for system safety and security"--Provided by publisher
    Note: Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    Cambridge, MA : Syngress, an imprint of Elsevier
    ISBN: 9780128045053 , 0128045051 , 0128044586 , 9780128044582
    Language: English
    Pages: 1 online resource (144 pages) , illustrations
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 004.67/8
    RVK:
    RVK:
    Keywords: COMPUTERS / Computer Literacy ; COMPUTERS / Computer Science ; COMPUTERS / Data Processing ; COMPUTERS / Hardware / General ; COMPUTERS / Information Technology ; COMPUTERS / Machine Theory ; COMPUTERS / Reference ; Computer networks / Security measures ; Computer security ; Internet of things ; Internet of things ; Computer networks Security measures ; Computer security ; Internet der Dinge ; Computersicherheit ; Internet der Dinge ; Computersicherheit
    Abstract: "Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound. This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things. Helps researchers and practitioners understand the security architecture in IoT and the state-of-the-art in IoT security countermeasures ; Explores how the threats in IoT are different from traditional ad hoc or infrastructural networks ; Provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, and IoT ; Contributed material by Dr. Imed Romdhani"--Provided by publisher
    Note: Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    ISBN: 9783958456372 , 3958456375
    Language: German
    Pages: 1 Online-Ressource , illustrations
    Edition: 1. Auflage.
    RVK:
    RVK:
    RVK:
    Keywords: Internet ; Security measures ; Computer security ; Data protection ; Privacy, Right of ; Electronic books ; Electronic books ; local ; Internet ; Personenbezogene Daten ; Privatsphäre ; Datenschutz ; Internet ; Daten ; Anonymität
    Abstract: Ob Sie wollen oder nicht - jede Ihrer Online-Aktivitäten wird beobachtet und analysiert. Sie haben keine Privatsphäre. Im Internet ist jeder Ihrer Klicks für Unternehmen, Regierungen und kriminelle Hacker uneingeschränkt sichtbar. Ihr Computer, Ihr Smartphone, Ihr Auto, Ihre Alarmanlage, ja sogar Ihr Kühlschrank bieten potenzielle Angriffspunkte für den Zugriff auf Ihre Daten. Niemand kennt sich besser aus mit dem Missbrauch persönlicher Daten als Kevin D. Mitnick. Als von der US-Regierung ehemals meistgesuchter Computer-Hacker kennt er alle Schwachstellen und Sicherheitslücken des digitalen Zeitalters. Seine Fallbeispiele sind spannend und erschreckend: Sie werden Ihre Aktivitäten im Internet neu überdenken. Mitnick weiß aber auch, wie Sie Ihre Daten bestmöglich schützen. Er zeigt Ihnen anhand zahlreicher praktischer Tipps und Schritt-für-Schritt-Anleitungen, was Sie tun können, um online und offline anonym zu sein. Bestimmen Sie selbst über Ihre Daten. Lernen Sie, Ihre Privatsphäre im Internet zu schützen. Kevin D. Mitnick zeigt Ihnen, wie es geht. Hinterlassen Sie keine Spuren • Sichere Passwörter festlegen und verwalten • Mit dem Tor-Browser im Internet surfen, ohne Spuren zu hinterlassen • E-Mails und Dateien verschlüsseln und vor fremden Zugriffen schützen • Öffentliches WLAN, WhatsApp, Facebook & Co. sicher nutzen • Sicherheitsrisiken vermeiden bei GPS, Smart-TV, Internet of Things und Heimautomation • Eine zweite Identität anlegen und unsichtbar werden
    Note: Authorized German translation of the English language edition: The art of invisibility : the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data. Cf. Title page verso. - Place of publication from publisher's website. - Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed January 4, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    San Francisco, CA : No Starch Press
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    RVK:
    RVK:
    Keywords: Programmable controllers ; Amateurs' manuals ; Microcontrollers ; Programming ; Science projects ; Design and construction ; Arduino (Programmable controller) ; Electronic books ; Electronic books ; local ; Arduino-Plattform
    Abstract: This second volume of Arduino Project Handbook follows up the acclaimed first volume with 25 new and fresh projects. Each project provides step-by-step instructions, full-color photos and circuit diagrams, and the complete code to bring your build to life. With the low-cost Arduino board and a handful of components, you'll use LEDs to build a light matrix display for scrolling text, sensors to make an ultrasonic Super Soaker that detects and drenches intruders, buzzers and buttons for a digital piano, a fingerprint scanner to ramp up security in your home, LCD screens to build a code-breaking bomb-diffuser game, and so much more. The handbook finishes with more advanced builds to test your skills, like an Arduino nerve center for controlling your gadgets remotely. Arduino Project Handbook, Volume II provides a crash course to get you set up with the Arduino and to introduce electronics parts and tools, as well as a troubleshooting chapter for solving your hardware problems. This is a perfect guide for kids, parents, educators, and hobbyists getting started with Arduino or just levelling up their hardware skills. Praise for the first volume of Arduino Project Handbook : "Easily the best beginner's guide out there. Pair with an inexpensive clone-based starter kit, and it's never been cheaper to join the maker revolution." MakeUseOf.com "Beautifully designed." Boing Boing
    Note: Description based on online resource; title from title page (Safari, viewed April 17, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : mitp Verlag | Boston, MA : Safari
    ISBN: 9783958455481 , 9783958455474
    Language: English , German
    Pages: 1 online resource (432 pages)
    Edition: 1st edition
    Series Statement: Mitp Business
    Parallel Title: Erscheint auch als Provost, Foster, 1964 - Data Science für Unternehmen
    DDC: 658.403802856312
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Data mining ; Big data ; Business Data processing ; Management Data processing ; Electronic books ; local ; Exploration de données (Informatique) ; Données volumineuses ; Gestion ; Informatique ; Management ; Data processing ; Big data ; Business ; Data processing ; Data mining ; Unternehmen ; Datenmanagement ; Data Mining ; Datenanalyse
    Abstract: Die grundlegenden Konzepte der Data Science verstehen, Wissen aus Daten ziehen und für Vorhersagen und Entscheidungen nutzen Die wichtigsten Data-Mining-Verfahren gezielt und gewinnbringend einsetzen Zahlreiche Praxisbeispiele zur Veranschaulichung Die anerkannten Data-Science-Experten Foster Provost und Tom Fawcett stellen in diesem Buch die grundlegenden Konzepte der Data Science vor, die für den effektiven Einsatz im Unternehmen von Bedeutung sind. Sie erläutern das datenanalytische Denken, das erforderlich ist, damit Sie aus Ihren gesammelten Daten nützliches Wissen und geschäftlichen Nutzen ziehen können. Sie erfahren detailliert, welche Methoden der Data Science zu hilfreichen Erkenntnissen führen, so dass auf dieser Grundlage wichtige Entscheidungsfindungen unterstützt werden können. Dieser Leitfaden hilft Ihnen dabei, die vielen zurzeit gebräuchlichen Data-Mining-Verfahren zu verstehen und gezielt und gewinnbringend anzuwenden. Sie lernen u.a., wie Sie: Data Science in Ihrem Unternehmen nutzen und damit Wettbewerbsvorteile erzielen Daten als ein strategisches Gut behandeln, in das investiert werden muss, um echten Nutzen daraus zu ziehen Geschäftliche Aufgaben datenanalytisch angehen und den Data-Mining-Prozess nutzen, um auf effiziente Weise sinnvolle Daten zu sammeln Das Buch beruht auf einem Kurs für Betriebswirtschaftler, den Provost seit rund zehn Jahren an der New York University unterrichtet, und nutzt viele Beispiele aus der Praxis, um die Konzepte zu veranschaulichen. Das Buch richtet sich an Führungskräfte und Projektmanager, die Data-Science-orientierte Projekte managen, an Entwickler, die Data-Science-Lösungen implementieren sowie an alle angehenden Data Scientists und Studenten. Aus dem Inhalt: Datenanalytisches Denken lernen Der Data-Mining-Prozess Überwachtes und unüberwachtes Data Mining Einführung in die Vorhersagemodellbildung: von der Korrelation zur überwachten Segmentierung Anhand der Daten optimale Modellparameter finden mit Verfahren wie lineare und logistische Regression sowie Support Vector Machines Prinzip und Berechnung der Ähnlichkeit Nächste-Nachbarn-Methoden und Clustering Entscheidungsanalyse I: Was ist ein gutes Modell Visualisierung der Leistung von Modellen Evidenz und Wahrscheinlichkeiten Texte repräsentieren und auswerten Entscheidungsanalyse II: Analytisches Engineering Data Science und Geschäftsstrategie
    Note: Online resource; Title from title page (viewed October 27, 2017) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    ISBN: 9781911307570 , 9781911307594 , 9781911307563 , 9781911307587
    Language: English
    Pages: 1 Online-Ressource (xviii, 278 Seiten) , illustrations, figures, tables
    Parallel Title: Print version The Web as History: Using Web Archives to Understand the Past and the Present
    DDC: 302.231
    RVK:
    RVK:
    Keywords: Web archives ; Web archiving ; History Methodology ; Electronic books ; Aufsatzsammlung ; Edited volumes ; Case studies ; Electronic books ; World Wide Web ; Geschichte
    Abstract: This is the first book to present a series of findings about how culture and society has evolved with the Web. It includes a number of histories of national web spaces, accounts of different domains such as government and media websites, and case studies of topics such as religion, education, political activism, and literature. In each case, the focus is on what this medium reveals about how culture has changed. A phrase often heard nowadays is ‘if it’s not online, it doesn’t exist.' This is not entirely true, but it is becoming an increasingly accurate reflection of the Web's role as an indispensable treasure trove for those who want to understand the past
    Note: eng
    URL: Volltext  (kostenfrei)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: FULL
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Online Resource
    Online Resource
    San Francisco : No Starch Press
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    RVK:
    RVK:
    Keywords: Programmable controllers ; Microcontrollers ; Programming ; Science projects ; Design and construction ; Arduino (Programmable controller) ; Electronic books ; Electronic books ; local ; Arduino-Plattform
    Abstract: The Arduino Project Handbook is a full-color illustrated guide to building 25 projects with the low cost Arduino microcontroller.
    Note: Description based on online resource; title from title page (viewed July 5, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    Cambridge, MA : Syngress is an imprint of Elsevier
    ISBN: 9780128004784 , 0128004789 , 0128000066 , 9780128000069
    Language: English
    Pages: 1 online resource
    Parallel Title: Erscheint auch als
    DDC: 005.8
    RVK:
    Keywords: COMPUTERS / Security / Networking ; Big data ; Computer security ; Computer security ; Big data ; Computersicherheit ; Bedrohung ; Big Data ; Prognose ; Computersicherheit ; Big Data ; Bedrohung ; Prognose
    Abstract: This book discusses the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools
    Note: Includes index , Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    Liverpool : Liverpool University Press | Berlin : Knowledge Unlatched
    ISBN: 9781781383322 , 1786944111 , 9781786944115
    Language: English
    Pages: 1 Online-Ressource (viii, 272 Seiten) , illustrations, figures, tables
    Series Statement: Liverpool science fiction texts and studies
    Parallel Title: Print version Biopunk Dystopias, Genetic Engineering, Society and Science Fiction
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Science fiction History and criticism ; Science fiction ; Biotechnology in literature ; Electronic books ; Science-Fiction-Literatur ; Genetik
    Abstract: 'Biopunk Dystopias' contends that we find ourselves at a historical nexus, defined by the rise of biology as the driving force of scientific progress, a strongly grown mainstream attention given to genetic engineering in the wake of the Human Genome Project (1990-2003), the changing sociological view of a liquid modern society, and shifting discourses on the posthuman, including a critical posthumanism that decenters the privileged subject of humanism. The book argues that this historical nexus produces a specific cultural formation in the form of "biopunk", a subgenre evolved from the cyberpunk of the 1980s. The analysis deals with dystopian science fiction artifacts of different media from the year 2000 onwards that project a posthuman intervention into contemporary socio-political discourse based in liquid modernity in the cultural formation of biopunk. Biopunk makes use of current posthumanist conceptions in order to criticize contemporary reality as already dystopian, warning that a future will only get worse, and that society needs to reverse its path, or else destroy all life on this planet. As Rosi Braidotti argues, "there is a posthuman agreement that contemporary science and biotechnologies affect the very fibre and structure of the living and have altered dramatically our understanding of what counts as the basic frame of reference for the human today" (40). The proposed book analyzes this alteration as directors, creators, authors, and artists from the field of science fiction extrapolate it from current trends
    Note: eng
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    Cham : Springer International Publishing AG
    ISBN: 9783319319278
    Language: English
    Pages: 1 online resource (231 pages)
    Parallel Title: Erscheint auch als
    DDC: 812.54
    RVK:
    Keywords: America-Literatures ; Electronic books
    Abstract: Intro -- Foreword -- Sources -- Acknowledgments -- Contents -- List of Figures -- Chapter 1: Transatlantic Exchanges: An Introduction -- Note -- Works Cited -- Chapter 2: Tennessee Williams' Italian Reputation -- "A World Theater" -- Lo zoo di vetro and Un tram che si chiama desiderio -- "Migrants Like All of Us" -- Becoming a Celebrity -- "An Imaginary Queer Love" -- Entering the Canon -- Requiem for a Playwright -- In Memoriam -- Notes -- Works Cited -- Chapter 3: Luchino Visconti and Tennessee Williams: Various Stages of Censorship -- Luchino's Apprenticeship and Travels -- Tatiana and Rina: Two Prima Donnas for Tennessee -- Visconti versus Williams -- Scene Changes -- Stage Censorship, (Homo)sexuality and "Issues of Morality" -- "A Wop Version of Gone With the Wind" -- Notes -- Works Cited -- Chapter 4: More Streetcars: The Screen and the Stage -- Under Surveillance -- Cut and Paste Before Distribution -- And the Church Said "Yes" -- Streetcars Staged After Visconti -- Swept Away by the Streetcar -- The New Millennium -- Notes -- Works Cited -- Chapter 5: The Rose and the Stone: Williams' Two "Most Italian" Works -- Pursuing Anna Magnani -- Sources -- Resisting Americanization -- La Rosa in Italia -- Filming "Questions of Sex and Lust" -- Sex and the (Eternal) City -- Mediterranean Gender Bending -- Tennessee Williams' Neapolitan Connection -- Notes -- Works Cited -- Chapter 6: The Golden Years: 1957-1964 -- The Ingenuous and the Malicious -- What Is This Cat all About? -- "So Many People Swinging Both Ways" -- A Global Phenomenon -- Cat on Film -- "Future Historians of American Theater" -- Poetry of the Two -- The Shattered Hedonist -- "Detrimental to Young Viewers" -- Before Night Falls -- Notes -- Works Cited -- Chapter 7: Decline and… Comeback. The Last 50 Years: 1965-2015 -- Sweet Adolescents and Black Masseurs. The Stories.
    Note: Description based on publisher supplied metadata and other sources
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    ISBN: 9781137303493
    Language: English
    Pages: 1 Online-Ressource (VIII, 269 p)
    Edition: Springer eBook Collection. Literature, Cultural and Media Studies
    Series Statement: Palgrave Gothic
    Series Statement: Springer eBook Collection
    Parallel Title: Printed edition
    DDC: 301
    RVK:
    RVK:
    RVK:
    Keywords: Culture Study and teaching ; Sex (Psychology) ; Gender expression ; Gender identity ; Motion pictures ; Film genres ; Creative writing ; Literature ; Feminist theory ; Sociology ; Film genres. ; Motion pictures. ; Literature   . ; Creative writing. ; Sociology. ; Feminist theory. ; Electronic books
    Abstract: ‘At last we have a definitive guide to the marriage between contemporary women’s fiction and the Gothic, which gleefully plunges the romance plot into darkness and prises heroines away from constraining narratives in an endless series of reinventions from the Cartesque through to the post-colonial.’ - Marie Mulvey-Roberts, University of the West of England, UK This book revives and revitalises the literary Gothic in the hands of contemporary women writers. It makes a scholarly, lively and convincing case that the Gothic makes horror respectable, and establishes contemporary women’s Gothic fictions in and against traditional Gothic. The book provides new, engaging perspectives on established contemporary women Gothic writers, with a particular focus on Angela Carter, Margaret Atwood and Toni Morrison. It explores how the Gothic is malleable in their hands and is used to demythologise oppressions based on difference in gender and ethnicity. The study presents new Gothic work and new nuances, critiques of dangerous complacency and radical questionings of what is safe and conformist in works as diverse as Twilight (Stephenie Meyer) and A Girl Walks Home Alone (Ana Lily Amirpur), as well as by Anne Rice and Poppy Brite. It also introduces and critically explores postcolonial, vampire and neohistorical Gothic and women’s ghost stories
    Abstract: 1.Introduction -- 2.Angela Carter: Living in Gothic Times -- 3.Margaret Atwood and Canadian Women's Gothic: Spite, Lies, Split Selves and Self Deception -- 4.Cultural Haunting: Toni Morrison and Tananarive Due -- 5.Postcolonial and Cultural Haunting Revenants: Letting the 'Right' Ones In -- 6.Testing the Fabric of Bluebeard's Castle: Postcolonial Reconfigurations, Demythologizing, Re-Mythologizing and Shape-shifting -- 7.Vampire Bites -- 8.Vampire Kisses -- 9.Ghostings and Hauntings: Splintering the Fabric of Domestic Gothic with Horror Houses, Stately Homes, Ghosts Behind Walls, Playroom Deaths, Women in Black, Little Strangers -- 10.Reviving, Revisiting and Mainstreaming Gothic
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    Bielefeld : Transcript Verlag$h | Berlin : Knowledge Unlatched
    ISBN: 9783839436660 , 3839436664
    Language: English
    Pages: 1 Online-Ressource (212 Seiten) , Illustrationen
    Series Statement: Postcolonial studies volume 28
    Series Statement: Postcolonial studies
    Parallel Title: Erscheint auch als Nehl, Markus, 1985 - Transnational black dialogues
    Dissertation note: Dissertation Universität Münster 2015
    RVK:
    Keywords: African diaspora in literature ; English literature Black authors ; History and criticism ; English literature History and criticism ; 21st century ; Slavery in literature ; Violence in literature ; Hochschulschrift ; Electronic books ; USA ; Schwarze ; Roman ; Sklaverei ; Geschichte 2006-2009
    Abstract: Cover. Transnational Black Dialogues -- Contents -- Acknowledgements -- Introduction: Slavery-An "Unmentionable" Past? -- 1. The Concept of the African Diaspora and the Notion of Difference -- 2. From Human Bondage to Racial Slavery: Toni Morrison's A Mercy (2008). -- 3. Rethinking the African Diaspora: Saidiya Hartman's Lose Your Mother (2007) 4. "Hertseer:" Re-Imagining Cape Slavery in Yvette Christiansë's Unconfessed (2006) -- 5. Transnational Diasporic Journeys in Lawrence Hill's The Book of Negroes (2007). -- 6. A Vicious Circle of Violence: Revisiting Jamaican Slavery in Marlon James's The Book of Night Women (2009) Epilogue: The Past of Slavery and "the Incomplete Project of Freedom" -- Works Cited
    Note: Leicht überarbeitete und aktualisierte Version der Dissertation, Universität Münster, 2015
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    Oxford : Liverpool University Press
    ISBN: 9781786944115 , 1781383324 , 1781383766 , 1786944111 , 9781781383766 , 9781781383322
    Language: English
    Pages: 1 Online-Ressource (viii, 272 pages)
    Series Statement: Liverpool science fiction texts and studies [56]
    Parallel Title: Schmeink, Lars, 1975 - Biopunk dystopias
    Parallel Title: Print version Schmeink, Lars Biopunk dystopias : genetic engineering, society and science fiction
    DDC: 809.38762
    RVK:
    RVK:
    Keywords: Science fiction History and criticism 21st century ; Biotechnology in literature ; Dystopias in literature ; Genetic engineering in literature ; Science fiction ; Biotechnology in literature ; Dystopias in literature ; Genetic engineering in literature ; BIOGRAPHY & AUTOBIOGRAPHY ; Literary ; LITERARY CRITICISM ; Science Fiction & Fantasy ; Biotechnology in literature ; Dystopias in literature ; Genetic engineering in literature ; Science fiction ; Fiction and related items ; Science fiction ; Criticism, interpretation, etc ; Electronic books ; Science-Fiction
    Abstract: 'Biopunk Dystopias' contends that we find ourselves at a historical nexus, defined by the rise of biology as the driving force of scientific progress, a strongly grown mainstream attention given to genetic engineering in the wake of the Human Genome Project (1990-2003), the changing sociological view of a liquid modern society, and shifting discourses on the posthuman, including a critical posthumanism that decenters the privileged subject of humanism. The book argues that this historical nexus produces a specific cultural formation in the form of "biopunk", a subgenre evolved from the cyberpunk of the 1980s. Biopunk makes use of current posthumanist conceptions in order to criticize contemporary reality as already dystopian, warning that a future will only get worse, and that society needs to reverse its path, or else destroy all life on this planet
    Abstract: 'Biopunk Dystopias' contends that we find ourselves at a historical nexus, defined by the rise of biology as the driving force of scientific progress, a strongly grown mainstream attention given to genetic engineering in the wake of the Human Genome Project (1990-2003), the changing sociological view of a liquid modern society, and shifting discourses on the posthuman, including a critical posthumanism that decenters the privileged subject of humanism. The book argues that this historical nexus produces a specific cultural formation in the form of "biopunk", a subgenre evolved from the cyberpunk of the 1980s. Biopunk makes use of current posthumanist conceptions in order to criticize contemporary reality as already dystopian, warning that a future will only get worse, and that society needs to reverse its path, or else destroy all life on this planet
    Note: Includes bibliographical references (pages 247-265) and index
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    ISBN: 9781137400529
    Language: English
    Pages: 1 Online-Ressource (XIII, 222 Seiten)
    Edition: Springer eBook Collection. Political Science and International Studies
    Series Statement: New security challenges series
    Parallel Title: Erscheint auch als Christou, George, 1973 - Cybersecurity in the European Union
    DDC: 005.8
    RVK:
    RVK:
    Keywords: Computer science ; Political science ; European Union ; International relations ; Politics and war ; Computer security ; Computer science ; Political science ; European Union ; International relations ; Politics and war ; Computer security ; Außenpolitik ; Politische Wissenschaft ; Computersicherheit ; Europäische Union ; Internet ; Internetkriminalität ; Politik ; Sicherheit
    Abstract: Cybercrime affects over 1 million people worldwide a day, and cyber attacks on public institutions and businesses are increasing. This book interrogates the European Union's evolving cybersecurity policies and strategy and argues that while progress is being made, much remains to be done to ensure a secure and resilient cyberspace in the future.
    Abstract: Cybercrime affects over 1 million people worldwide a day, and cyber attacks on public institutions and businesses are increasing. This book interrogates the European Union's evolving cybersecurity policies and strategy and argues that while progress is being made, much remains to be done to ensure a secure and resilient cyberspace in the future
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    ISBN: 9783839434192 , 9783837634198
    Language: English
    Pages: 1 Online-Ressource (315 Seiten)
    Series Statement: Queer studies volume 12
    Series Statement: Queer studies
    Dissertation note: Dissertation Humboldt Universität zu Berlin
    DDC: 306.7685
    RVK:
    RVK:
    RVK:
    Keywords: Geschichte 1993-2010 ; Activism ; Autobiography ; Body ; Cultural Studies ; Feminism ; Gender Studies ; Gender ; Intersex ; Medicine ; Popular Culture ; Queer Theory ; Sexuality ; Medizin ; Intersex people ; Intersexuality in literature ; Popular culture ; Prosa ; Intersexualität ; USA ; Hochschulschrift ; Hochschulschrift ; Hochschulschrift ; Hochschulschrift ; Hochschulschrift ; Electronic books ; Hochschulschrift ; Hochschulschrift ; Hochschulschrift ; Electronic books ; Hochschulschrift ; USA ; Prosa ; Intersexualität ; Geschichte 1993-2010
    Abstract: This book explores representations of intersex - intersex persons, intersex communities, and intersex as a cultural concept and knowledge category - in contemporary North American literature and popular culture. The study turns its attention to the significant paradigm shift in the narratives on intersex that occurred within early 1990s intersex activism in response to biopolitical regulations of intersex bodies. Focusing on the emergence of recent autobiographical stories and cultural productions like novels and TV series centering around intersex, Viola Amato provides a first systematic analysis of an activism-triggered resignification of intersex
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (kostenfrei)
    URL: Cover
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (kostenfrei)
    URL: JSTOR
    URL: OAPEN
    URL: Image  (Thumbnail cover image)
    URL: Cover
    URL: Cover
    URL: Cover  (lizenzpflichtig)
    URL: Cover
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    ISBN: 9781317553700 , 1317553705
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Series Statement: Routledge studies in innovation, organization and technology 41
    Parallel Title: Erscheint auch als
    DDC: 658.4/78
    RVK:
    Keywords: Data protection ; Computer security ; Management information systems ; Security measures ; Computer networks ; Security measures ; Electronic books ; local ; Electronic books
    Abstract: As retail businesses migrate to the digital realm, internal information theft incidents continue to threaten on-line and off-line retail operations. The evolving propagation of internal information theft has surpassed the traditional techniques of crime prevention practices. Many business organizations search for internal information theft prevention guides that fit into their retail business operation, only to be inundated with generic and theoretical models. This book examines applicable methods for retail businesses to effectively prevent internal information theft. Information Theft Prevention offers readers a comprehensive understanding of the current status of the retail sector information theft prevention models in relation to the internationally recognized benchmark of information security. It presents simple and effective management processes for ensuring better information system security, fostering a proactive approach to internal information theft prevention. Furthermore, it builds on well-defined retail business cases to identify applicable solutions for businesses today. Integrating the retail business operations and information system security practices, the book identifies ways to coordinate efforts across a business in order to achieve the best results. IT security managers and professionals, financial frauds consultants, cyber security professionals and crime prevention professionals will find this book a valuable resource for identifying and creating tools to prevent internal information theft.
    Note: Includes bibliographical references and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    Bielefeld : transcript | Berlin : Knowledge Unlatched
    ISBN: 3839434556 , 9783839434550
    Language: English
    Pages: 1 Online-Ressource (215 Seiten)
    Series Statement: American culture studies volume 14
    Series Statement: American studies
    Parallel Title: Erscheint auch als Leyda, Julia American mobilities
    Dissertation note: Dissertation
    DDC: 304.873
    RVK:
    RVK:
    RVK:
    Keywords: Hochschulschrift ; History ; Hochschulschrift ; Electronic books ; Electronic books ; USA ; Mobilität ; Gruppe ; Film ; Literatur ; USA ; Literatur ; Film ; Mobilität ; Rasse ; Soziale Klasse ; Soziale Mobilität ; Geschichte 1929-1960 ; USA ; Literatur ; Film ; Mobilität ; Rasse ; Soziale Klasse ; Soziale Mobilität ; Geschichte 1929-1960
    Abstract: "American Mobilities investigates representations of mobility--social, economic, geographic--in American film and literature during the Depression, WWII, and the early Cold War. With an emphasis on the dual meaning of 'domestic,' referring to both the family home and the nation, this study traces the important trope of mobility that runs through the 'American' century. Juxtaposing canonical fiction with popular, and low-budget independent films with Classical Hollywood, Leyda brings the analytic tools of American cultural and literary studies to bear on an eclectic array of primary texts as she builds a case for the significance of mobility in the study of the United States."--Back cover
    Abstract: Reading white trash : class, race, and mobility in Faulkner and Le Sueur -- Incorporation and embodiment : gender, race, and space in Hurst and Himes -- Who's got the car keys? : geographic, economic, and social mobility in the magic kingdom of Los Angeles -- Black-audience westerns : race, nation, and mobility in the 1930s -- Space, class, city : imagined geographies of Maud Martha -- Home on the range : space, nation, and mobility in The searchers
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (kostenfrei)
    URL: Cover
    URL: Cover
    URL: Cover  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    ISBN: 9780124201842 , 0124201849
    Language: English
    Pages: 1 online resource (xix, 439 pages) , illustrations
    Edition: Second edition
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 670.42/7
    RVK:
    Keywords: TECHNOLOGY & ENGINEERING / Industrial Engineering ; TECHNOLOGY & ENGINEERING / Industrial Technology ; TECHNOLOGY & ENGINEERING / Manufacturing ; TECHNOLOGY & ENGINEERING / Technical & Manufacturing Industries & Trades ; Computer security ; Corporate Network ; Computersicherheit ; Intelligentes Stromnetz ; SCADA / Programm ; Process control Security measures ; Computer security ; Intelligentes Stromnetz ; Computersicherheit ; SCADA ; Corporate Network ; Computersicherheit ; Corporate Network ; Intelligentes Stromnetz ; SCADA
    Abstract: Annotation
    Note: Previous edition: 2011 , Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Online Resource
    Online Resource
    Waltham, MA : Syngress
    ISBN: 9780128010969 , 0128010967 , 0128008997 , 9780128008997
    Language: English
    Pages: 1 online resource (xvii, 262 pages) , illustrations
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 363.28/9
    RVK:
    Keywords: HISTORY / Military / Other ; TECHNOLOGY & ENGINEERING / Military Science ; Computer security ; Private security services / Management ; Security systems / Management ; Computer Security ; Computer security ; Private security services Management ; Security systems Management ; Computersicherheit ; Unternehmen ; Unternehmen ; Computersicherheit
    Abstract: Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence that will allow you to configure your system to ward off attacks? Organizations need to be committed to defending their own assets and their customers' information. This book will show you how to develop the organization, infrastructure, and capabilities to protect your company and your customers effectively, efficiently, and discreetly. It explains how to develop and build a security operations center; shows how to gather invaluable intelligence to protect your organization; helps you evaluate the pros and cons behind each decision during the SOC-building process. --
    Note: Includes index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    ISBN: 9781783471294
    Language: English
    Pages: 1 Online-Ressource (xix, 316 pages) , diagrams, illustrations, maps
    Series Statement: NECTAR series on transportation and communications networks research
    Series Statement: Edward Elgar E-Book Archive
    Parallel Title: Erscheint auch als ICT for transport
    DDC: 388/.0285
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Transportgewerbe ; Verkehrsökonomik ; Informationstechnik ; IT-gestützte Logistik ; Communication and technology ; Transportation Data processing ; Intelligent transportation systems ; Information technology ; Electronics in transportation ; Transportation Information technology ; Electronic books ; Informationstechnik ; Transport
    Abstract: As the importance and value of information increases, Information and Communication Technology (ICT) is rapidly evolving and taking centre stage in everyday life in the 21st century. This is particularly evident in the transport sector, where ICT is greatly influencing our mobility and travel choices as well as travel experience. In this context, ICT for Transport examines the opportunities, threats, underlying principles and practical issues faced when deploying ICT for transport applications, especially in the quest to achieve sustainable transport. Focusing on infrastructure, people and processes, the contributors to this book use diverse case studies from around the world to illustrate the challenges faced by academics, practitioners and policy makers alike. The contents and bibliography provide up-to-date knowledge and expertise drawn from state of the art research in Europe, America, Asia and Africa. ICT for Transport is a valuable source of information for those aiming to be at the forefront of the evolving field of ICT for transport. This analysis of the various threats and opportunities will assist them in making more informed decisions about the future use of ICT for transport and for the benefit of society.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    ISBN: 9781783988037 , 1783988037
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Community experience distilled
    DDC: 005.3
    RVK:
    Keywords: Go (Computer program language) ; Application software ; Development ; Electronic books ; Electronic books ; local
    Abstract: Build real-world, production-ready solutions in Go using cutting-edge technology and techniques In Detail Dive headfirst into solving actual enterprise problems and start cutting code from the word go. You will build complete applications around a variety of subjects using a range of different technologies and techniques, all of which are directly applicable to today's tech start-up world. Scale, performance, and high availability lie at the heart of the projects, and the lessons learned throughout this book will arm you with everything you need to build world-class solutions. Well-designed applications and sensible architectures can scale horizontally to cope with the demands of up to millions of users, while avoiding the prohibitive up-front investment that can bring a project to its knees. What You Will Learn Build quirky and fun projects from scratch while exploring widely applicable skills, patterns, practices, and techniques, as well as a range of different technologies Create websites and data services capable of massive scale using Go's net/http package, exploring RESTful patterns as well as low-latency WebSocket APIs Interact with a variety of remote web services to consume capabilities ranging from authentication and authorization to a fully functioning thesaurus Develop high-quality command-line tools that utilize the powerful shell capabilities and have great performance using Go's in-built concurrency mechanisms Implement a modern document database as well as high-throughput messaging queue technology to put together an architecture that is truly ready for scale Write concurrent programs and gracefully manage their execution and communication with smart use of channels
    Note: Includes index. - Description based on online resource; title from cover (Safari, viewed February 17, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    ISBN: 9781783983537 , 1783983531
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Third edition.
    Series Statement: Community Experience Distilled
    DDC: 005.2762
    RVK:
    Keywords: JavaBeans ; Java (Computer program language) ; Electronic books ; Electronic books ; local
    Abstract: Develop professional enterprise Java EE applications quickly and easily with this popular IDE In Detail NetBeans has several features that greatly simplify Java EE development, but with many features and great flexibility, Java developers can become overwhelmed by the options available in NetBeans. Java EE 7 Development with NetBeans 8 takes you through the most important parts of Java EE programming and shows you how to use the features of NetBeans that will improve your development experience through clear, careful instructions and screenshots. This book will take you through the major Java EE APIs and how to get them working in the NetBeans environment. This is a practical guide that covers how to leverage NetBeans 8 functionality to quickly and easily develop enterprise applications compliant with the Java EE 7 standard. What You Will Learn Develop Java web applications by leveraging NetBeans' functionality Build standard JSF applications by taking advantage of NetBeans' features Develop aesthetically pleasing JSF web applications by leveraging JSF component libraries Integrate NetBeans with a third-party RDBMS Quickly and easily develop applications taking advantage of the Java Persistence API Take advantage of NetBeans' functionality to easily develop Enterprise JavaBeans, including configuring transaction management via annotations Utilize NetBeans to easily add messaging functionality to enterprise applications, through the Java Messaging Service API and through message-driven EJBs Develop SOAP-based and RESTful web services using NetBeans, including exposing EJBs' functionality as web services
    Note: Includes index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    ISBN: 9781784395650 , 178439565X
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Community experience distilled
    DDC: 005.2762
    RVK:
    Keywords: JavaScript (Computer program language) ; Application software ; Development ; Electronic books ; Electronic books ; local
    Abstract: Implement fast, lean, and readable code effectively with Lo-Dash In Detail Lo-Dash Essentials walks you through the Lo-Dash utility library, which promises consistency and performance in JavaScript development. This book looks into the most common functions and the various contexts in which they're used. You'll first start with object types and their properties, then you'll dive into larger development patterns, such as MapReduce, and how to chain functionality together. Following this, you'll learn how to make suitable builds for various environments, and discover how high-level patterns complement one another and how they lead to reusable building blocks for applications. Finally, you will gain some practical exposure to Lo-Dash by working alongside other libraries, and learn some useful techniques for improving performance. What You Will Learn Analyze the difference between arrays, collections, and objects and look at how Lo-Dash treats them Understand the subtle differences between iterating over arrays and objects, along with object-creation patterns used with Lo-Dash Exploit and work with Lo-Dash functional tools, such as partially applying arguments, and composing higher-order functions Explore the various approaches of MapReduce and their relationships with other Lo-Dash functions Build your own Lo-Dash application for various environments Compare Lo-Dash with other libraries and decide where Lo-Dash is a good fit Understand the key Lo-Dash design principles and utilize this knowledge to deliver performant user interfaces
    Note: Includes index. - Description based on online resource; title from cover (Safari, viewed February 17, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    ISBN: 9781783553327 , 1783553324
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Community experience distilled
    DDC: 006.8
    RVK:
    Keywords: Programming languages (Electronic computers) ; Numerical analysis ; Data processing ; Electronic books ; Electronic books ; local ; Lehrbuch ; Lehrbuch
    Abstract: Develop your analytical and programming skills further in Julia to solve complex data processing problems In Detail Julia is a well-constructed programming language with fast execution speed, eliminating the classic problem of performing analysis in one language and translating it for performance into a second. This book will help you develop and enhance your programming skills in Julia to solve real-world automation challenges. This book starts off with a refresher on installing and running Julia on different platforms. Next, you will compare the different ways of working with Julia and explore Julia's key features in-depth by looking at design and build. You will see how data works using simple statistics and analytics, and discover Julia's speed, its real strength, which makes it particularly useful in highly intensive computing tasks and observe how Julia can cooperate with external processes in order to enhance graphics and data visualization. Finally, you will look into meta-programming and learn how it adds great power to the language and establish networking and distributed computing with Julia. What You Will Learn Install and build Julia and configure it with your environment Build a data science project through the entire cycle of ETL, analytics, and data visualization Understand the type system and principles of multiple dispatch for a better coding experience in Julia Interact with data files and data frames to study simple statistics and analytics Display graphics and visualizations to carry out modeling and simulation in Julia Use Julia to interact with SQL and NoSQL databases Work with distributed systems on the Web and in the cloud Develop your own packages and contribute to the Julia Community
    Note: Includes index. - Description based on online resource; title from cover (Safari, viewed August 25, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    ISBN: 9781783981199 , 1783981199
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    DDC: 621.36702856693
    RVK:
    Keywords: JavaScript (Computer program language) ; Application software ; Development ; Electronic books ; Electronic books ; local
    Abstract: Over 80 shortcuts, solutions, and recipes that allow you to create the most stunning visualizations and 3D scenes using the Three.js library In Detail Modern browsers are becoming more powerful each year and in recent years have adopted WebGL as the standard to deliver 3D graphics in a browser. Beginning with some basic recipes to get you started, this book will guide you through the most important features that Three.js has to offer. You'll even learn how to quickly create new geometries from scratch. Solutions and methods that show you how to use HTML5 video and canvas as textures will follow on from this. By the end of the book, you'll be able to quickly add advanced features to your scene, improve the way users interact with your 3D scene, and make your scenes look stunning. What You Will Learn Create a standard HTML skeleton and advanced features such as keyboard controls, drag and drop support, WebGL detection, and loading resources Build and transform Three.js geometries using simple properties and advanced matrix transformations Enhance the look of your scene using Three.js materials, texture maps, and dynamic textures Apply realistic lighting and shadows to the 3D objects you have created Animate particle systems created from scratch or from existing geometries Work with animations, advanced physics, and collision detection
    Note: "Quick answers to common problems"--Cover. - Includes index. - Description based on online resource; title from cover (Safari, viewed January 19, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    Boca Raton, FL : CRC Press
    ISBN: 9781482244991 , 1482244993
    Language: English
    Pages: 1 online resource (xix, 209 pages) , illustrations.
    Series Statement: Best practices and advances in program management series
    DDC: 658.404028551
    RVK:
    Keywords: Agile software development ; Project management ; Electronic books ; Electronic books ; local
    Abstract: Agile project management is a proven approach for designing and delivering software with improved value to customers. Agility is all about self-directed teams, feedback, light documentation, and working software with shorter development cycles.The role of the project manager with agile differs significantly from traditional project management in th
    Note: "An Auerbach book"--T.p. - Includes bibliographical references (pages 205-209). - Description based on online resource; title from title page (Safari, viewed May 6, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    ISBN: 9781783988488 , 1783988487
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Second edition.
    Series Statement: Community experience distilled
    DDC: 005.75/8
    RVK:
    Keywords: Apache Cassandra ; Database management ; Software patterns ; Electronic books ; Electronic books ; local
    Abstract: Build real-world, industry-strength data storage solutions with time-tested design methodologies using Cassandra About This Book Explore design patterns which co-exist with legacy data stores, migration from RDBMS, and caching technologies with Cassandra Learn about design patterns and use Cassandra to provide consistency, availability, and partition tolerance guarantees for applications Handle temporal data for analytical purposes Who This Book Is For This book is intended for big data developers who are familiar with the basics of Cassandra and wish to understand and utilize Cassandra design patterns to develop real-world big data solutions. Prior knowledge of RDBMS solutions is assumed. What You Will Learn Enable Cassandra to co-exist with RDBMS and other legacy data stores Explore various design patterns to build effective and robust storage solutions Migrate from RDBMS-based data stores and caching solutions to Cassandra Understand the behaviour of Cassandra when trying to balance the needs of consistency, availability, and partition tolerance Deal with time stamps related to data effectively See how Cassandra can be used in analytical use cases Apply the design patterns covered in this book in real-world use cases In Detail There are many NoSQL data stores used by big data applications. Cassandra is one of the most widely used NoSQL data stores that is frequently used by a huge number of heavy duty Internet-scale applications. Unlike the RDBMS world, the NoSQL landscape is very diverse and there is no one way to model data stores. This mandates the need to have good solutions to commonly seen data store design problems. Cassandra addresses such common problems simply. If you are new to Cassandra but well-versed in RDBMS modeling and design, then it is natural to model data in the same way in Cassandra, resulting in poorly performing applications and losing the real purpose of Cassandra. If you want to learn to make the most of Cassandra, this book is for you. This book starts with strategies to integrate Cassandra with other legacy data stores and progresses to the ways in which a migration from RDBMS to Cassandra can be accomplished. The journey continues with ideas to migrate data from cache solutions to Cassandra. With this, the stage is set and the book moves on to some of the most commonly seen problems in applications when dealing with consistency, availability, and partition tolerance guarantees. Cassandra is exceptionally good at...
    Note: Includes index. - Description based on online resource; title from cover page (Safari, viewed November 23, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    ISBN: 9781785286803 , 1785286803
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Community experience distilled
    DDC: 003/.3
    RVK:
    Keywords: Unity (Electronic resource) ; Computer simulation ; Virtual reality ; Electronic books ; Electronic books ; local
    Abstract: Explore the world of Virtual Reality by building immersive and fun VR projects using Unity 3D About This Book Learn the basic principles of virtual reality applications and get to know how they differ from games and desktop apps Build various types of VR experiences, including diorama, first-person characters, riding on rails, 360 degree projections, and social VR A project-based guide that teaches you to use Unity to develop VR applications, which can be experienced with devices such as the Oculus Rift or Google Cardboard In Detail What is consumer ?virtual reality?? Wearing a head-mounted display you view stereoscopic 3D scenes. You can look around by moving your head, and walk around using hand controls or motion sensors. You are engaged in a fully immersive experience. On the other hand, Unity is a powerful game development engine that provides a rich set of features such as visual lighting, materials, physics, audio, special effects, and animation for creating 2D and 3D games. Unity 5 has become the leading platform for building virtual reality games, applications and experiences for this new generation of consumer VR devices. Using a practical and project-based approach, this book will educate you about the specifics of virtual reality development in Unity. You will learn how to use Unity to develop VR applications which can be experienced with devices such as the Oculus Rift or Google Cardboard. We will then learn how to engage with virtual worlds from a third person and first person character point of view. Furthermore, you will explore the technical considerations especially important and possibly unique to VR. The projects in the book will demonstrate how to build a variety of VR experiences. You will be diving into the Unity 3D game engine via the interactive Unity Editor as well as C-Sharp programming. By the end of the book, you will be equipped to develop rich, interactive virtual reality experiences using Unity. So, let's get to it! What You Will Learn Create 3D scenes with Unity and Blender while learning about world space and scale Build and run VR applications for consumer headsets including Oculus Rift and Google Cardboard Build interactive environments with physics, gravity, animations, and lighting using the Unity engine Experiment with various user interface (UI) techniques that you can use in your VR applications Implement the first-person and third-person experiences that use only head motion gestures for input Create a...
    Note: Includes index. - Description based on online resource; title from cover (Safari, viewed September 25, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    ISBN: 9781784392376 , 1784392375
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Community experience distilled
    DDC: 006.78
    RVK:
    Keywords: Google Apps ; Python (Computer program language) ; Application software ; Development ; Electronic books ; Electronic books ; local
    Abstract: Master the full range of development features provided by Google App Engine to build and run scalable web applications in Python In Detail Google App Engine is a key component of the Google Cloud Platform and one of the most comprehensive cloud services. Together with Python, the first programming language ever supported by the platform, Google App Engine favors rapid development, significantly contributing to the success of your projects. This book will guide you through the Google Cloud Platform starting from the basics all the way through successfully designing, building, and running modern and scalable web applications in Python with Google App Engine. From authentication to data storage, and from asynchronous jobs to server push techniques, you will learn how to use services such as datastore, cloud storage, Cloud SQL, task queues and channels in a Python application based on web frameworks such as Webapp2 and Django. As the topics in this book are covered in a step-by-step fashion, you will get to grips with the information quickly and easily. What You Will Learn Persist and manage data in the cloud datastore with the NDB Python API Run asynchronous tasks with task queue and Cron Set up, use, and manage a MySQL server instance on Cloud SQL Employ channels to develop real-time applications with push notifications from the server Write a complete Django application using Cloud SQL as the data backend Use cloud endpoints to rapidly provide REST APIs for your mobile clients
    Note: Includes index. - Description based on online resource; title from cover (Safari, viewed February 17, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    ISBN: 9781784397159 , 1784397156
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Community experience distilled
    DDC: 681.2
    RVK:
    RVK:
    Keywords: Wireless sensor networks ; Arduino (Programmable controller) ; Microcontrollers ; Programming ; Wireless communication systems ; Electronic books ; Electronic books ; local
    Abstract: Leverage the powerful Arduino and XBee platforms to monitor and control your surroundings About This Book Build your own low-power, wireless network using ready-made Arduino and XBee hardware Create a complex project using the Arduino prototyping platform A guide that explains the concepts and builds upon them with the help of examples to form projects Who This Book Is For This book is targeted at embedded system developers and hobbyists who have some working knowledge of Arduino and who wish to extend their projects using wireless connectivity. What You Will Learn Interact with XBee boards using the XCTU program on Windows, OS X, or Linux Make your Arduino boards communicate wirelessly, using XBee modules in the advanced API mode Centrally collect and store measured sensor data, in the cloud or your own database Connect the coordinator Arduino to the Internet and send data to web services Control your environment automatically, based on sensor input from your network Interact with off-the-shelf ZigBee Home Automation devices Make your devices battery-powered and let them sleep to get months or even years of battery life In Detail Arduino has been established as the de facto standard microcontroller programming platform, being used for one-off do-it-yourself projects as well as prototypes for actual products. By providing a myriad of libraries, the Arduino community has made it very easy to interact with pretty much any piece of hardware out there. XBee offers a great range of low-power wireless solutions that are easy to work with, by taking all of the complexity of wireless (mesh) networking out of your hands and letting you focus on what to send without worrying about the how. Building wireless sensor networks is cost-effective as well as efficient as it will be done with Arduino support. The book starts with a brief introduction to various wireless protocols, concepts, and the XBee hardware that enables their use. Then the book expands to explain the Arduino boards to you, letting them read and send sensor data, collect that data centrally, and then even control your home from the Internet. Moving further more advanced topics such as interacting through the standard Zigbee Home Automation protocol, or making your application power-efficient are covered. By the end of the book, you will have all the tools needed to build complete, real-world solutions. Style and approach A hands-on guide, featuring a single home automation project that can ...
    Note: Date of publication from resource description page. - Includes index. - Description based on online resource; title from cover page (Safari, viewed November 9, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    ISBN: 9781784398231 , 1784398233
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Community experience distilled
    DDC: 794.8
    RVK:
    Keywords: Computer games ; Development ; Computer games ; Mathematics ; Electronic books ; Electronic books ; local
    Abstract: Gain practical knowledge of mathematical and physics concepts in order to design and develop an awesome game world using Unreal Engine 4 About This Book Use the Physics Asset Tool within Unreal Engine 4 to develop game physics objects for your game world Explore the Collision mechanics within Unreal Engine 4 to create advanced, real-world physics A step-by-step guide to implementing the Physics concepts involved in Unreal Engine 4 to create a working Vehicle Blueprint Who This Book Is For This book is intended for beginner to intermediate users of Epic Games' Unreal Engine 4 who want to learn more about how to implement physics within their game-world. No matter what your knowledge base of Unreal Engine 4 is, this book contains valuable information on blueprint scripting, collision generation, materials, and the Physical Asset Tool (PhAT) for all users to create better games. What You Will Learn Get to know basic to intermediate topics in mathematics and physics Create assets using the Physics Asset Tool (PhAT) in Unreal Engine 4 Develop Collision Hulls, which are necessary to take advantage of Unreal Engine 4's physics and collision events Use constraints to create advanced physics-based assets for your game-world Working knowledge of physics bodies, physics damping, and friction within Unreal Engine 4 Develop physical materials to recreate real-world friction for substances such as glass and ice Create a working vehicle blueprint from scratch using assets provided by Unreal Engine 4 Gain knowledge about implementing advanced physics in Unreal Engine 4 using C++ programming In Detail Unreal Engine 4 is one of the leading game development tools used by both AAA and independent developers alike to create breathe-taking games. One of the key features of this tool is the use of Physics to create a believable game-world for players to explore. This book gives readers practical insight into the mathematical and physics principles necessary to properly implement physics within Unreal Engine 4. Discover how to manipulate physics within Unreal Engine 4 by learning basic real-world mathematical and physics concepts that assist in the implementation of physics-based objects in your game world. Then, you'll be introduced to PhAT (Physics Asset Tool) within Unreal Engine 4 to learn more about developing game physics objects for your game world. Next, dive into Unreal Engine 4's collision generation, physical materials, blueprints, constraints, and more to...
    Note: Includes index. - Description based on online resource; title from cover page (Safari, viewed October 20, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    ISBN: 9780128008003 , 0128008008
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Third edition
    DDC: 620.001/171
    RVK:
    RVK:
    Keywords: Systems engineering ; Computer simulation ; SysML (Computer science) ; Electronic books ; local ; Electronic books
    Abstract: A Practical Guide to SysML, Third Edition , fully updated for SysML version 1.4, provides a comprehensive and practical guide for modeling systems with SysML. With their unique perspective as leading contributors to the language, Friedenthal, Moore, and Steiner provide a full description of the language along with a quick reference guide and practical examples to help you use SysML. The book begins with guidance on the most commonly used features to help you get started quickly. Part 1 explains the benefits of a model-based approach, providing an overview of the language and how to apply SysML to model systems. Part 2 includes a comprehensive description of SysML that provides a detailed understanding that can serve as a foundation for modeling with SysML, and as a reference for practitioners. Part 3 includes methods for applying model-based systems engineering using SysML to specify and design systems, and how these methods can help manage complexity. Part 4 deals with topics related to transitioning MBSE practice into your organization, including integration of the system model with other engineering models, and strategies for adoption of MBSE. Learn how and why to deploy MBSE in your organization with an introduction to systems and model-based systems engineering Use SysML to describe systems with this general overview and a detailed description of the Systems Modeling Language Review practical examples of MBSE methodologies to understand their application to specifying and designing a system Includes comprehensive modeling notation tables as an appendix that can be used as a standalone reference
    Note: Includes bibliographical references and index. - Description based on online resource; title from title page (Safari, viewed November 25, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    ISBN: 9781783284801 , 1783284803
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Community experience distilled
    DDC: 001.6420151
    RVK:
    Keywords: Programming languages (Electronic computers) ; Application software ; Development ; Electronic books ; Electronic books ; local ; Lehrbuch
    Abstract: Enter the exciting world of Julia, a high-performance language for technical computing In Detail Julia is a new open source programming language that is used in the field of data science computing. It was created to solve the dilemma between high-level slow code and fast but low-level code, and the necessity to use both to achieve high performance. This book will give you a head start to tackle your numerical and data problems with Julia. Your journey will begin by learning how to set up a running Julia platform before exploring its various built-in types. You will then move on to cover the different functions and constructs in Julia. The book will then walk you through the two important collection types?arrays and matrices. Over the course of the book, you will also be introduced to homoiconicity, the meta-programming concept in Julia. Towards the concluding part of the book, you will also learn how to run external programs. This book will cover all you need to know about Julia to leverage its high speed and efficiency. What You Will Learn Set up your Julia environment to achieve the highest productivity Solve your tasks in a high-level dynamic language and use types for your data only when needed Create your own types to extend the built-in type system Visualize your data in IJulia with plotting packages Explore the use of built-in macros for testing, debugging, benchmarking, and more Apply Julia to tackle problems concurrently and in a distributed environment Integrate with other languages such as C, Python, and MATLAB
    Note: Includes index. - Description based on online resource; title from cover page (Safari, viewed March 20, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    ISBN: 9781785288869 , 1785288865
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Professional expertise distilled
    DDC: 005.43
    RVK:
    Keywords: Virtual computer systems ; Web applications ; Electronic books ; Electronic books ; local
    Abstract: Learn how to deploy and configure all the available Citrix NetScaler features with the best practices and techniques you need to know About This Book Implement and configure all the available NetScaler Application Delivery features and monitor NetScaler VPX performance in your environment Packed with real-word NetScaler deployment scenarios to help you see the configuration principles in action Integrate NetScaler with other Citrix technologies, including CloudBridge, Application Delivery Controller, HDX Insight, and Command Center Who This Book Is For If you're an administrator with prior experience using NetScaler then you have everything you need to make the most of this book. What You Will Learn Configure the more commonly used NetScaler VPX features such as basic load balancing, authentication, NetScaler Gateway, and StoreFront Configure the AppExpert features such as Responder, Rewrite, AppExpert templates, parsing HTTP, TCP, and UDP data Integrate NetScaler with other Citrix technologies such as CloudBridge, Insight Center, and Command Center Optimize traffic using caching, front-end optimization, and compression Dive deep in the security, caching, and compression enhancements Protect your environment with AAA and Application Firewall, or from HTTP DDoS attacks Troubleshoot an environment using tools such as TaaS and WireShark In Detail Citrix NetScaler is one of the best Application Delivery Controller products in the world. The Application Delivery Controllers are commonly used for load balancing purposes, to optimize traffic, and to perform extra security settings. This book will give you an insight into all the available features that the Citrix NetScaler appliance has to offer. The book will start with the commonly used NetScaler VPX features, such as load balancing and NetScaler Gateway functionality. Next, we cover features such as Responder, Rewrite, and the AppExpert templates, and how to configure these features. After that, you will learn more about the other available Citrix technologies that can interact with Citrix NetScaler. We also cover troubleshooting, optimizing traffic, caching, performing protection using Application Firewall, and denying HTTP DDoS attacks for web services. Finally, we will demonstrate the different configuration principles real-world Citrix NetScaler deployment scenarios. Style and approach This easy-to-follow guide explains as much as possible about each feature and its configuration. Each topic i...
    Note: Includes index. - Description based on online resource; title from cover (Safari, viewed December 4, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    ISBN: 9781784396084 , 1784396087
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Community experience distilled
    DDC: 658.4/0380285574
    RVK:
    Keywords: Data warehousing ; Database design ; Database management ; Management information systems ; Open source software ; Electronic books ; Electronic books ; local
    Abstract: Harness the power of Redis to integrate and manage your projects efficiently About This Book Learn how to use Redis's data types efficiently to manage large data sets Scale Redis to multiple servers with Twemproxy, Redis Sentinel, and Redis Cluster A fast-paced guide, full of real-world examples to help you get the best out of the features offered by Redis Who This Book Is For If you are a competent developer with experience of working with data structure servers and want to boost your project's performance by learning about features of Redis, then this book is for you. What You Will Learn Build analytics applications using Bitmaps and Hyperloglogs Enhance scalability with Twemproxy, Redis Sentinel, and Redis Cluster Build a Time Series implementation in Node.js and Redis Create your own Redis commands by extending Redis with Lua Get to know security techniques to protect your data (SSL encryption, firewall rules, basic authorization) Persist data to disk and learn the trade-offs of AOF and RDB Understand how to use Node.js, PHP, Python, and Ruby clients for Redis Avoid common pitfalls when designing your next solution In Detail Redis is the most popular in-memory key-value data store. It's very lightweight and its data types give it an edge over the other competitors. If you need an in-memory database or a high-performance cache system that is simple to use and highly scalable, Redis is what you need. Redis Essentials is a fast-paced guide that teaches the fundamentals on data types, explains how to manage data through commands, and shares experiences from big players in the industry. We start off by explaining the basics of Redis followed by the various data types such as Strings, hashes, lists, and more. Next, Common pitfalls for various scenarios are described, followed by solutions to ensure you do not fall into common traps. After this, major differences between client implementations in PHP, Python, and Ruby are presented. Next, you will learn how to extend Redis with Lua, get to know security techniques such as basic authorization, firewall rules, and SSL encryption, and discover how to use Twemproxy, Redis Sentinel, and Redis Cluster to scale infrastructures horizontally. At the end of this book, you will be able to utilize all the essential features of Redis to optimize your project's performance. Style and approach A practical guide that offers the foundation upon which you can begin to understand the capabilities of Redis using a s...
    Note: Includes index. - Description based on online resource; title from cover (Safari, viewed September 20, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    ISBN: 9781783982554 , 1783982551
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Community experience distilled
    DDC: 519.50285/5133
    RVK:
    Keywords: R (Computer program language) ; Electronic books ; Electronic books ; local
    Abstract: Harness the power of RStudio to create web applications, R packages, markdown reports and pretty data visualizations About This Book Discover the multi-functional use of RStudio to support your daily work with R code Learn to create stunning, meaningful, and interactive graphs and learn to embed them into easy communicable reports using multiple R packages Develop your own R packages and Shiny web apps to share your knowledge and collaborate with others. Who This Book Is For This book is aimed at R developers and analysts who wish to do R statistical development while taking advantage of RStudio's functionality to ease their development efforts. R programming experience is assumed as well as being comfortable with R's basic structures and a number of functions. What You Will Learn Discover the RStudio IDE and details about the user interface Communicate your insights with R Markdown in static and interactive ways Learn how to use different graphic systems to visualize your data Build interactive web applications with the Shiny framework to present and share your results Understand the process of package development and assemble your own R packages Easily collaborate with other people on your projects by using Git and GitHub Manage the R environment for your organization with RStudio and Shiny server Apply your obtained knowledge about RStudio and R development to create a real-world dashboard solution In Detail RStudio helps you to manage small to large projects by giving you a multi-functional integrated development environment, combined with the power and flexibility of the R programming language, which is becoming the bridge language of data science for developers and analyst worldwide. Mastering the use of RStudio will help you to solve real-world data problems. This book begins by guiding you through the installation of RStudio and explaining the user interface step by step. From there, the next logical step is to use this knowledge to improve your data analysis workflow. We will do this by building up our toolbox to create interactive reports and graphs or even web applications with Shiny. To collaborate with others, we will explore how to use Git and GitHub with RStudio and how to build your own packages to ensure top quality results. Finally, we put it all together in an interactive dashboard written with R. Style and approach An easy-to-follow guide full of hands-on examples to master RStudio. Beginning from explaining the basics, eac...
    Note: Includes index. - Description based on online resource; title from cover page (Safari, viewed December 22, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    ISBN: 9781783555147 , 1783555149
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Community experience distilled
    DDC: 005.13/3
    RVK:
    Keywords: Python (Computer program language) ; Machine learning ; Electronic books ; Electronic books ; local
    Abstract: Unlock deeper insights into Machine Leaning with this vital guide to cutting-edge predictive analytics About This Book Leverage Python's most powerful open-source libraries for deep learning, data wrangling, and data visualization Learn effective strategies and best practices to improve and optimize machine learning systems and algorithms Ask - and answer - tough questions of your data with robust statistical models, built for a range of datasets Who This Book Is For If you want to find out how to use Python to start answering critical questions of your data, pick up Python Machine Learning - whether you want to get started from scratch or want to extend your data science knowledge, this is an essential and unmissable resource. What You Will Learn Explore how to use different machine learning models to ask different questions of your data Learn how to build neural networks using Pylearn 2 and Theano Find out how to write clean and elegant Python code that will optimize the strength of your algorithms Discover how to embed your machine learning model in a web application for increased accessibility Predict continuous target outcomes using regression analysis Uncover hidden patterns and structures in data with clustering Organize data using effective pre-processing techniques Get to grips with sentiment analysis to delve deeper into textual and social media data In Detail Machine learning and predictive analytics are transforming the way businesses and other organizations operate. Being able to understand trends and patterns in complex data is critical to success, becoming one of the key strategies for unlocking growth in a challenging contemporary marketplace. Python can help you deliver key insights into your data - its unique capabilities as a language let you build sophisticated algorithms and statistical models that can reveal new perspectives and answer key questions that are vital for success. Python Machine Learning gives you access to the world of predictive analytics and demonstrates why Python is one of the world's leading data science languages. If you want to ask better questions of data, or need to improve and extend the capabilities of your machine learning systems, this practical data science book is invaluable. Covering a wide range of powerful Python libraries, including scikit-learn, Theano, and Pylearn2, and featuring guidance and tips on everything from sentiment analysis to neural networks, you'll soon be able to answer som...
    Note: Includes index. - Description based on online resource; title from cover page (Safari, viewed October 12, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    Online Resource
    Online Resource
    Boca Raton : CRC Press
    ISBN: 9781466503298 , 1466503297 , 9781466503281
    Language: English
    Pages: 1 online resource (xix, 455 pages)
    Edition: Second edition.
    Parallel Title: Erscheint auch als
    RVK:
    RVK:
    Keywords: Information storage and retrieval systems Geography ; Geographic information systems ; TECHNOLOGY & ENGINEERING ; Remote Sensing & Geographic Information Systems ; SCIENCE ; Earth Sciences ; Geography ; TRAVEL ; Budget ; TRAVEL ; Hikes & Walks ; TRAVEL ; Museums, Tours, Points of Interest ; TRAVEL ; Parks & Campgrounds ; Geographic information systems ; Information storage and retrieval systems ; Geography ; Geografie ; Datenverarbeitung ; Geoinformatik ; Electronic books ; Geographic information systems ; Geographic information systems ; Electronic books
    Abstract: "This newly updated edition covers cutting-edge topics in computational geography, addressing a domain in both geographic and computer sciences. With an extended introduction that reviews directional changes and major advances in the field since the first edition, this book includes ten new topics as well as substantial modifications to existing chapters. Written by recognized international experts and up-and-coming researchers, the text introduces the subject matter by providing readable accounts of current developments. In addition, the authors examine possibilities for future developments through the year 2061"--
    Note: Includes bibliographical references and index. - Print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    ISBN: 9783864901362
    Language: German
    Pages: 1 Online-Ressource
    Edition: 5., überarbeitete Auflage
    Parallel Title: Erscheint auch als Saake, Gunter, 1960 - Algorithmen und Datenstrukturen
    DDC: 005.133
    RVK:
    RVK:
    RVK:
    Keywords: Algorithms ; Java (Computer program language) ; Data structures (Computer science) ; Java (Computer program language) ; Data structures (Computer science) ; Algorithms ; Electronic books ; Electronic books ; local ; Lehrbuch ; Datenstruktur ; Algorithmus ; Java ; Algorithmus ; Datenstruktur
    Abstract: Solides Lehrbuch - grundlegend und umfassend * Java als Implementierungssprache, unter Berücksichtigung der Spezifika von Java mit Netzanschluss: Programmbeispiele/Animationen Autoren sind sehr angesehen und kompetent
    Note: Includes bibliographical references and index. - Description based on online resource; title from title page (Safari, viewed Feb. 12, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    ISBN: 130645199X , 9781118608654 , 9781306451994
    Language: English
    Pages: Online-Ressource (224 pages)
    Parallel Title: Druckausg.
    Parallel Title: Druckausg. Hadnagy, Christopher Unmasking the social engineer
    DDC: 303.3/72
    RVK:
    Keywords: Christian sociology ; Social problems ; Computer hackers ; Computer security ; Social engineering ; Christian sociology ; Social problems ; Electronic books ; Electronic books ; Soziologie ; Körpersprache ; Datenschutz ; Soziologie ; Körpersprache ; Datenschutz
    Abstract: Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of trust and rapport in their targets. The author helps readers understand how to identify and detect social engineers and scammers by analyzing their non-verbal behavior. Unmasking the Social Engineer shows how attacks work, explains nonverbal communications, and demonstrates with visuals the connection of non-verbal behavior to social engineering and scamming. Clearly combines both the practical and technical aspects of social engineering securityReveals the various dirty tricks that scammers usePinpoints what to look for on the nonverbal side to detect the social engineer Sharing proven scientific methodology for reading, understanding, and deciphering non-verbal communications, Unmasking the Social Engineer arms readers with the knowledge needed to help protect their organizations.
    Abstract: Cover -- Title Page -- Copyright -- Contents -- Foreword -- Acknowledgments and Preface -- Introduction -- The Scholar and the Student -- Using This Book as a Social Engineer -- Part I Building the Foundation -- Chapter 1 What Is Nonverbal Communication? -- The Different Aspects of Nonverbal Communication -- Kinesics -- Proxemics -- Touch -- Eye Contact -- Olfactics -- Adornment -- Facial Expressions -- How to Use This Information -- Summary -- Chapter 2 What Is Social Engineering? -- Information Gathering -- Pretexting -- Elicitation -- Rapport -- Influence/Manipulation -- Framing -- Nonverbal Communications -- The Three Basic Forms of Social Engineering -- Become Phishers of Men -- When The Phone Is More Dangerous Than Malware -- I Am Not the Social Engineer You Are Looking For -- Using Social Engineering Skills -- The Good -- The Bad -- The Ugly -- Summary -- Part II Decoding the Language of the Body -- Chapter 3 Understanding the Language of the Hands -- Communicating with Your Hands -- Origin -- Coding -- Usage -- High-Confidence Hand Displays -- Low-Confidence and Stress Hand Displays -- Getting a Handle on the Hands -- Summary -- Chapter 4 The Torso, Legs, and Feet -- Legs and Feet -- Torso and Arms -- Summary -- Chapter 5 The Science Behind the Face -- Just the FACS -- What Is a Truth Wizard? -- Emotions versus Feelings -- Fear -- Surprise -- Sadness -- Contempt -- Disgust -- Anger -- Happiness -- Perfect Practice Makes Perfect -- Summary -- Chapter 6 Understanding Nonverbal Displays of Comfort and Discomfort -- Neck and Face Pacifying -- What to Watch For -- Mouth Covers -- What to Watch For -- Lips -- What to Watch For -- Eye Blocking -- What to Watch For -- Self-Comforting and Head Tilts -- What to Watch For -- Summary -- Part III Deciphering the Science -- Chapter 7 The Human Emotional Processor -- Introducing the Amygdala.
    Description / Table of Contents: Cover; Title Page; Copyright; Contents; Foreword; Acknowledgments and Preface; Introduction; The Scholar and the Student; Using This Book as a Social Engineer; Part I Building the Foundation; Chapter 1 What Is Nonverbal Communication?; The Different Aspects of Nonverbal Communication; Kinesics; Proxemics; Touch; Eye Contact; Olfactics; Adornment; Facial Expressions; How to Use This Information; Summary; Chapter 2 What Is Social Engineering?; Information Gathering; Pretexting; Elicitation; Rapport; Influence/Manipulation; Framing; Nonverbal Communications
    Description / Table of Contents: The Three Basic Forms of Social EngineeringBecome Phishers of Men; When The Phone Is More Dangerous Than Malware; I Am Not the Social Engineer You Are Looking For; Using Social Engineering Skills; The Good; The Bad; The Ugly; Summary; Part II Decoding the Language of the Body; Chapter 3 Understanding the Language of the Hands; Communicating with Your Hands; Origin; Coding; Usage; High-Confidence Hand Displays; Low-Confidence and Stress Hand Displays; Getting a Handle on the Hands; Summary; Chapter 4 The Torso, Legs, and Feet; Legs and Feet; Torso and Arms; Summary
    Description / Table of Contents: Chapter 5 The Science Behind the FaceJust the FACS; What Is a Truth Wizard?; Emotions versus Feelings; Fear; Surprise; Sadness; Contempt; Disgust; Anger; Happiness; Perfect Practice Makes Perfect; Summary; Chapter 6 Understanding Nonverbal Displays of Comfort and Discomfort; Neck and Face Pacifying; What to Watch For; Mouth Covers; What to Watch For; Lips; What to Watch For; Eye Blocking; What to Watch For; Self-Comforting and Head Tilts; What to Watch For; Summary; Part III Deciphering the Science; Chapter 7 The Human Emotional Processor; Introducing the Amygdala
    Description / Table of Contents: How the Amygdala Processes InformationHijacking the Amygdala; Human See, Human Do; Reading Other People's Expressions; Your Own Emotional Content; Nonverbal Social Proof; Using Amygdala Hijacking as a Social Engineer; Summary; Chapter 8 The Nonverbal Side of Elicitation; Artificial Time Constraints; Sympathy/Assistance Themes; Ego Suspension; Ask How, When, and Why Questions; Conversational Signals; Action Unit 1: Inner Brow Raiser; Action Unit 2: Outer Brow Raiser; Action Unit 4: Brow Lowerer; Conversational Signals of Emotions; Breaking Down Conversational Signals; Batons; Underliner
    Description / Table of Contents: PunctuationQuestion Mark; Word Search; Nonverbal Conversational Signals; Conversational Signals as a Social Engineer; Summary; Part IV Putting It All Together; Chapter 9 Nonverbal Communication and the Human Being; Applying This Information as a Professional Social Engineer; Using This Book to Defend; Becoming a Critical Thinker; Summary; Index
    Note: Description based upon print version of record
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    ISBN: 9781482244946 , 1482244942 , 1482244934 , 9781482244939 , 9781322637754 , 132263775X
    Language: English
    Pages: 1 online resource (340 pages)
    Series Statement: Emerging directions in database systems and applications
    Parallel Title: Erscheint auch als
    DDC: 005.74/1
    RVK:
    Keywords: LogiQL (Compuer program language) ; Query languages (Computer science) ; Querying (Computer science) ; Databases ; Database searching ; Langages d'interrogation ; Bases de données ; Interrogation ; online searching ; COMPUTERS ; Programming Languages ; General ; Database searching ; Databases ; Query languages (Computer science) ; Querying (Computer science) ; Electronic books
    Abstract: "This book introduces readers to programming in LogiQL which is a subset of Prolog, a general purpose logic programming language associated with AI and computational linguistics. The book shows how LogiQL deals with large data sets while avoiding low-level implementation details found in other relational database languages. It also explores the application of LogiQL programming in data warehousing, data mining, data quality, business rules, and more"--
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    ISBN: 9781783558759 , 178355875X
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Community experience distilled
    DDC: 005.13
    RVK:
    Keywords: Scala (Computer program language) ; Machine learning ; Regression analysis ; Data processing ; Electronic books ; Electronic books ; local
    Abstract: Leverage Scala and Machine Learning to construct and study systems that can learn from data In Detail The discovery of information through data clustering and classification is becoming a key differentiator for competitive organizations. Machine learning applications are everywhere, from self-driving cars, engineering designs, biometrics, and trading strategies, to detection of genetic anomalies. The book begins with an introduction to the functional capabilities of the Scala programming language that are critical to the creation of machine learning algorithms such as dependency injection and implicits. Next, you'll learn about data preprocessing and filtering techniques. Following this, you'll move on to clustering and dimension reduction, Naïve Bayes, regression models, sequential data, regularization and kernelization, support vector machines, neural networks, generic algorithms, and re-enforcement learning. A review of the Akka framework and Apache Spark clusters concludes the tutorial. What You Will Learn Build dynamic workflows for scientific computing Leverage open source libraries to extract patterns from time series Write your own classification, clustering, or evolutionary algorithm Perform relative performance tuning and evaluation of Spark Master probabilistic models for sequential data Experiment with advanced techniques such as regularization and kernelization Solve big data problems with Scala parallel collections, Akka actors, and Apache Spark clusters Apply key learning strategies to a technical analysis of financial markets
    Note: Includes index. - Description based on online resource; title from cover (Safari, viewed January 22, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    ISBN: 9781782173304 , 1782173307
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Professional expertise distilled
    DDC: 005.758
    RVK:
    Keywords: Management information systems ; Business intelligence ; Computer programs ; Electronic books ; Electronic books ; local
    Abstract: Unleash the power of QlikView and Qlik Sense to make optimum use of data for Business Intelligence In Detail QlikView and its new sister product, Qlik Sense, are the leading tools for BI and data discovery. They both feature the ability to consolidate relevant data from multiple sources into a single application, an associative data model to allow you to explore the data the way your brain works, and state-of-the-art visualizations, dashboards, analysis, and reports. The book starts by reviewing the best performance-tuning techniques and then advances to help you discover strategies to improve performance and test scalability with JMeter. You will also learn dimensional data modeling and creating best-practice ETL techniques using the QlikView script and QlikView's graphical ETL tool, Expressor. Following this, you will deploy QlikView Governance Dashboard to import multiple data sources and view all the information in a single location. Finally, you will learn why virtualization is important and what are the best practices for virtualization in QlikView. What You Will Learn Tune your Qlik applications and review basic performance-tuning techniques for scalability Model your data correctly using industry best approaches Get to know the best practices for data loading and understand QVDs to implement an ETL approach Discover a range of techniques to manage metadata including the QlikView Governance Dashboard Use advanced expression techniques to get the right answers Write great scripts to load data in different ways Visualize data using a set of analytical and advanced charting techniques
    Note: Includes index. - Description based on online resource; title from cover page (Safari, viewed December 17, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    ISBN: 9780124186668 , 0124186661
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    DDC: 621.39
    RVK:
    RVK:
    Keywords: Biosensors ; Electronic books ; local ; Electronic books
    Abstract: Written by industry experts, this book aims to provide you with an understanding of how to design and work with wearable sensors. Together these insights provide the first single source of information on wearable sensors that would be a valuable addition to the library of any engineer interested in this field. Wearable Sensors covers a wide variety of topics associated with the development and application of various wearable sensors. It also provides an overview and coherent summary of many aspects of current wearable sensor technology. Both industry professionals and academic researchers will benefit from this comprehensive reference which contains the most up-to-date information on the advancement of lightweight hardware, energy harvesting, signal processing, and wireless communications and networks. Practical problems with smart fabrics, biomonitoring and health informatics are all addressed, plus end user centric design, ethical and safety issues. Provides the first comprehensive resource of all currently used wearable devices in an accessible and structured manner. Helps engineers manufacture wearable devices with information on current technologies, with a focus on end user needs and recycling requirements. Combines the expertise of professionals and academics in one practical and applied source.
    Note: Includes bibliographical references and index. - Description based on online resource; title from title page (Safari, viewed Oct. 1, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    ISBN: 9781783286621 , 1783286628
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 3rd ed.
    Series Statement: Community experience distilled
    DDC: 670.427
    RVK:
    Keywords: JBoss ; Process control ; Electronic books ; Electronic books ; local
    Abstract: Learn about the components, tooling, and integration points that are part of the JBoss Business Process Management (BPM) framework In Detail jBPM6 Developer Guide will guide you through each level of the jBPM6 platform, allowing you to model and build applications that will automate your business scenarios. This book will provide you with the knowledge that you need to get up and running with developing applications that use Business Processes (BPM) as a foundation. This book will help you understand the pieces and components inside a Business Process Management System (BPMS). Furthermore, you will learn about the shared mechanisms that the Drools and jBPM projects use to store information and define transaction boundaries. By the end of the book, you will know how to use the KIE Workbench extension points to communicate external systems with it, and also how to use these extension points to configure the KIE Workbench in a distributed environment. What You Will Learn Leverage the power of business rules to simplify business processes Use jBPM6's configuration and architecture for different environments and scenarios Define your environment in a user-friendly, extensible, and configurable way with the tooling provided in jBPM6 Understand how the framework handles information that flows through your business processes Integrate practical examples of automating with different enterprise technologies in Java and non-Java environments Demonstrate the benefits of running the inference power of the Drools engine together with process executions Discover how to use the KIE Workbench extension points to communicate with external systems
    Note: Includes index. - Description based on online resource; title from cover (Safari, viewed Sept. 2, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    ISBN: 9781783989133 , 1783989130
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Community experience distilled
    DDC: 005.75
    RVK:
    Keywords: Apache Cassandra ; Database management ; Computer programs ; Electronic books ; Electronic books ; local
    Abstract: Harness the power of Apache Cassandra to build scalable, fault-tolerant, and readily available applications In Detail Apache Cassandra is a massively scalable, peer-to-peer database designed for 100 percent uptime, with deployments in the tens of thousands of nodes supporting petabytes of data. This book offers readers a practical insight into building highly available, real-world applications using Apache Cassandra. The book starts with the fundamentals, helping you to understand how the architecture of Apache Cassandra allows it to achieve 100 percent uptime when other systems struggle to do so. You'll have an excellent understanding of data distribution, replication, and Cassandra's highly tunable consistency model. This is followed by an in-depth look at Cassandra's robust support for multiple data centers, and how to scale out a cluster. Next, the book explores the domain of application design, with chapters discussing the native driver and data modeling. Lastly, you'll find out how to steer clear of common antipatterns and take advantage of Cassandra's ability to fail gracefully. What You Will Learn Understand the core architecture of Cassandra that enables highly available applications Use replication and tunable consistency levels to balance consistency, availability, and performance Set up multiple data centers to enable failover, load balancing, and geographic distribution Add capacity to your cluster with zero downtime Take advantage of high availability features in the native driver Create data models that scale well and maximize availability Understand how to avoid common antipatterns Keep your system working well even during failure scenarios
    Note: Includes index. - Description based on online resource; title from cover page (Safari, viewed January 23, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    ISBN: 9781783987313 , 1783987316
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Series Statement: Community experience distilled
    DDC: 005.2/762
    RVK:
    RVK:
    Keywords: Node.js ; MongoDB ; Database management ; Data warehousing ; Management information systems ; Application software ; Development ; Electronic books ; Electronic books ; local
    Abstract: Build an interactive and full-featured web application from scratch using Node.js and MongoDB In Detail Node.js and MongoDB are quickly becoming the most popular technologies in the world of full stack JavaScript development. Powered by Google's V8 JavaScript runtime, Node.js caters to easily building fast, scalable network applications while MongoDB is the perfect fit as a scalable, high-performance, open source NoSQL database solution. Using these two technologies together, web applications can be built quickly and easily and deployed to the cloud with very little difficulty. This book will enable you to leverage the key features of both MongoDB and Node.js in web and mobile app development. Starting with setting up your development environment, it will guide you through how to write your first Node.js web server application from scratch. Along the way, you will learn about best practices and common mistakes while mastering the core concepts of web development. What You Will Learn Set up a development environment and install Node.js and MongoDB Write and configure a web server using Node.js powered by the Express.js framework Build dynamic HTML pages using the Handlebars template engine Persist application data using MongoDB and Mongoose ODM Create and consume RESTful APIs Test your code using automated testing tools Deploy to the cloud using services such as Heroku, Amazon Web Services, and Microsoft Azure Explore Single Page Application frameworks to take your web applications to the next level
    Note: Includes index. - Description based on online resource; title from cover page (Safari, viewed Oct. 24, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    ISBN: 9781783982417 , 1783982411
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Series Statement: Community experience distilled
    DDC: 005.365
    RVK:
    Keywords: Application software ; Development ; Internet programming ; Open source software ; Electronic books ; Electronic books ; local
    Abstract: An intuitive guide to creating easy-to-build scalable web applications using the Play framework In Detail Play is a framework to write web applications using Scala or Java. It provides a productive development environment, allowing you to just hit the "refresh" button in your browser to compile your changes and reload the application. Because of its stateless nature, the framework makes it easy to build applications that scale. Play provides a reactive programming model to harness the event-driven HTTP layer. This book provides a step-by-step walkthrough of how to build a complete web application following best application development practices using Play framework 2. All aspects specific to web-oriented architectures are covered: the HTTP layer, JSON manipulation, HTML templating, asset compression and concatenation, form submission, content negotiation, security, and HTTP streaming. The book will also provide detailed architectural insights into Play framework to give you a better understanding in order to successfully build scalable applications. What You Will Learn Set up a unified development environment for both the client-side and server-side code Understand the challenges of building a scalable web application and master the solutions provided by Play framework Integrate the framework with existing client-side or server-side technologies such as persistence systems Harness the reactive programming model to process data streams Design robust, maintainable, and testable code Be proficient in manipulating JSON data blobs Deploy your application on a PaaS platform
    Note: Includes index. - Description based on online resource; title from cover page (Safari, viewed Oct. 23, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    ISBN: 9781849689779 , 1849689776
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Series Statement: Professional expertise distilled
    DDC: 004.6
    RVK:
    Keywords: Citrix XenDesktop ; Computer networks ; Remote access ; Virtual computer systems ; Electronic books ; Electronic books ; local
    Abstract: Deliver desktops and applications to your end users, anywhere, anytime, with XenDesktop 7.x In Detail Citrix® is an established name in today's Bring Your Own Device (BYOD) era by virtue of their desktop and application virtualization platforms, with the capability to assign applications and contents in a secure manner. Getting Started with XenDesktop® 7.x provides the best way to learn how to build your own virtual desktop and application Site. You may not have a lot of time to read the Citrix® documentation, or attend a class, so this step-by-step guide is distilled into fast, concise chapters to quickly lead you through all of the important information to get your XenDesktop® 7.x deployment done. What You Will Learn Create a completely functioning VDI implementation Manage XenDesktop® using Studio, including machine catalogs, delivery groups, and Personal vDisks Customize user sessions using policies Learn how printing and USB redirection work and how to configure them Explore High Definition User Experience (HDX) and how it affects usability Deliver virtual applications with VM hosted apps Plug in to the different XenDesktop® services using the XenDesktop® SDK Use the Citrix® Receiver® to receive and run the virtual desktop on the client device Manage and monitor XenDesktop® using Studio and Director Secure the XenDesktop® Site using the NetScaler Gateway Build and deliver VDI from the cloud
    Note: Includes index. - Description based on online resource; title from cover (Safari, viewed Apr. 28, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley
    ISBN: 9780133440706 , 0133440702
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 3rd ed.
    Parallel Title: Erscheint auch als DeMarco, Tom, 1940 - Peopleware
    DDC: 658.4/022
    RVK:
    RVK:
    RVK:
    Keywords: Management ; Projektmanagement ; Software ; Management ; Organizational behavior ; Organizational effectiveness ; Project management ; Electronic books ; Electronic books ; local ; Softwareentwicklung ; Projektmanagement ; Führung ; Arbeitsgestaltung
    Abstract: Few books in computing have had as profound an influence on software management as Peopleware . The unique insight of this longtime best seller is that the major issues of software development are human, not technical. They're not easy issues; but solve them, and you'll maximize your chances of success. " Peopleware has long been one of my two favorite books on software engineering. Its underlying strength is its base of immense real experience, much of it quantified. Many, many varied projects have been reflected on and distilled; but what we are given is not just lifeless distillate, but vivid examples from which we share the authors' inductions. Their premise is right: most software project problems are sociological, not technological. The insights on team jelling and work environment have changed my thinking and teaching. The third edition adds strength to strength." - Frederick P. Brooks, Jr., Kenan Professor of Computer Science, University of North Carolina at Chapel Hill, Author of The Mythical Man-Month and The Design of Design " Peopleware is the one book that everyone who runs a software team needs to read and reread once a year. In the quarter century since the first edition appeared, it has become more important, not less, to think about the social and human issues in software development. This is the only way we're going to make more humane, productive workplaces. Buy it, read it, and keep a stock on hand in the office supply closet." -Joel Spolsky, Co-founder, Stack Overflow "When a book about a field as volatile as software design and use extends to a third edition, you can be sure that the authors write of deep principle, of the fundamental causes for what we readers experience, and not of the surface that everyone recognizes. And to bring people, actual human beings, into the mix! How excellent. How rare. The authors have made this third edition, with its additions, entirely terrific." -Lee Devin and Rob Austin, Co-authors of The Soul of Design and Artful Making For this third edition, the authors have added six new chapters and updated the text throughout, bringing it in line with today's development environments and challenges. For example, the book now discusses pathologies of leadership that hadn't previously been judged to be pathological; an evolving culture of meetings; hybrid teams made up of people from seemingly incompatible generations; and a growing awareness that some of our most common tools are more like anc...
    Note: Includes index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    ISBN: 9789400751705 , 9781283865654
    Language: English
    Pages: Online-Ressource (XI, 440 p. 26 illus., 20 illus. in color)
    Edition: Online-Ausg. Springer eBook Collection. Humanities, Social Sciences and Law Electronic reproduction; Available via World Wide Web
    DDC: 341
    RVK:
    Keywords: Law ; Philosophy of law ; Technology Philosophy ; Computer science ; Computersicherheit
    Abstract: On 25 January 2012, the European Commission presented its long awaited new Data protection package. With this proposal for a drastic revision of the data protection framework in Europe, it is fair to say that we are witnessing a rebirth of European data protection, and perhaps, its passage from an impulsive youth to a more mature state. Technology advances rapidly and mobile devices are significantly changing the landscape. Increasingly, we carry powerful, connected, devices, whose location and activities can be monitored by various stakeholders. Very powerful social network sites emerged in the first half of last decade, processing personal data of many millions of users. Updating the regulatory framework was imminent and the presentation of the new package will initiate a period of intense debate in which the proposals will be thoroughly commented upon and criticized, and numerous amendments will undoubtedly be proposed. This volume brings together some 19 chapters offering conceptual analyses, highlighting issues, proposing solutions, and discussing practices regarding privacy and data protection. In the first part of the book, conceptual analyses of concepts such as privacy and anonymity are provided. The second section focuses on the contrasted positions of digital natives and ageing users in the information society. The third section provides four chapters on privacy by design, including discussions on roadmapping and concrete techniques. The fourth section is devoted to surveillance and profiling, with illustrations from the domain of smart metering, self-surveillance and the benefits and risks of profiling. The book concludes with case studies pertaining to communicating privacy in organisations, the fate of a data protection supervisor in one of the EU member states and data protection in social network sites and online media
    Abstract: On 25 January 2012, the European Commission presented its long awaited new “Data protection package”. With this proposal for a drastic revision of the data protection framework in Europe, it is fair to say that we are witnessing a rebirth of European data protection, and perhaps, its passage from an impulsive youth to a more mature state. Technology advances rapidly and mobile devices are significantly changing the landscape. Increasingly, we carry powerful, connected, devices, whose location and activities can be monitored by various stakeholders. Very powerful social network sites emerged in the first half of last decade, processing personal data of many millions of users. Updating the regulatory framework was imminent and the presentation of the new package will initiate a period of intense debate in which the proposals will be thoroughly commented upon and criticized, and numerous amendments will undoubtedly be proposed. This volume brings together some 19 chapters offering conceptual analyses, highlighting issues, proposing solutions, and discussing practices regarding privacy and data protection. In the first part of the book, conceptual analyses of concepts such as privacy and anonymity are provided. The second section focuses on the contrasted positions of digital natives and ageing users in the information society. The third section provides four chapters on privacy by design, including discussions on roadmapping and concrete techniques. The fourth section is devoted to surveillance and profiling, with illustrations from the domain of smart metering, self-surveillance and the benefits and risks of profiling. The book concludes with case studies pertaining to communicating privacy in organisations, the fate of a data protection supervisor in one of the EU member states and data protection in social network sites and online media.
    Description / Table of Contents: European Data Protection:Coming of Age; Foreword; Contents; Part I: Concepts; Chapter 1: Seven Types of Privacy; 1.1 Introduction; 1.2 Defining and Conceptualising Privacy; 1.3 Seven Types of Privacy; 1.4 Privacy Impacts of New and Emerging Technologies; 1.4.1 Whole Body Imaging Scanners; 1.4.2 RFID-Enabled Travel Documents; 1.4.3 Unmanned Aircraft Systems; 1.4.4 Second-Generation DNA Sequencing Technologies; 1.4.5 Human Enhancement; 1.4.6 Second-Generation Biometrics; 1.4.7 Filling in the Gaps; 1.5 The Merit of Elusiveness; 1.6 Conclusion; References
    Description / Table of Contents: Chapter 2: The Internet as Surveilled Workplayplace and Factory2.1 Introduction; 2.2 Workplace Surveillance; 2.3 The Rise of Play Labour; 2.4 Internet Playbour; 2.5 Internet Surveillance; 2.6 Conclusion: The Surveilled Workplayplace Factory; References; Chapter 3: From Market-Making Tool to Fundamental Right: The Role of the Court of Justice in Data Protection's Identity Crisis; 3.1 Introduction; 3.2 A Critical Analysis of the 'Market-Making' Vocation of European Data Protection Law; 3.2.1 The Emergence of the Dual Objectives of European Data Protection Law
    Description / Table of Contents: 3.2.2 The Competence Question: The Legitimacy of EU Legislation in the Human Rights Sphere3.3 Loosening the Links Between Data Protection and Market Harmonisation?; 3.3.1 The Broad Conception of the Directive's Scope of Application; 3.3.2 The Margin of Discretion Left to National Authorities; 3.4 The Rights-Based Approach to Data Protection in the EU and the Residual Impact of Market Integration Restraints; 3.4.1 Data Protection as a Fundamental Right Pre-Lisbon; 3.4.2 The Right to Data Protection in the Post-Lisbon Era; 3.5 Conclusion: Casting Our Eyes on the Future; References
    Description / Table of Contents: Case Law of the Court of JusticeChapter 4: Anonymity: A Comparison Between the Legal and Computer Science Perspectives; 4.1 Introduction; 4.2 The Notion of Anonymity in European Legislation on Personal Data; 4.2.1 The Notion of Anonymity in Common Language; 4.2.2 The Definition of Personal Data; 4.2.3 The Concept of Anonymous Data; 4.2.4 A Case Study: The Definition of Anonymous Data in the Italian Personal Protection Code; 4.3 Anonymity in Data Disclosure; 4.3.1 Anonymity in Data Publication; 4.3.1.1 Problem Definition and Characterization; 4.3.1.2 k -Anonymity
    Description / Table of Contents: 4.3.1.3 k -Anonymity with Multiple QI4.3.1.4 l -Diversity; 4.3.1.5 t -Closeness; 4.3.2 Anonymity When Disclosing Spatio-Temporal Information; 4.3.2.1 Problem Description; 4.3.2.2 Privacy Models for LBS Anonymity; 4.4 Discussion; 4.4.1 The Role of Anonymity in Privacy Preservation; 4.4.2 Identifying Information and Personal Data; 4.4.3 Anonymity Measurement; 4.4.4 Anonymity and the Principle of Minimization; 4.5 Conclusions and Future Work; References; Part II: Digital Natives and Ageing Users
    Description / Table of Contents: Chapter 5: Digital Natives and the Metamorphosis of the European Information Society. The Emerging Behavioral Trends Regarding Privacy and Their Legal Implications
    Description / Table of Contents: Foreword -- I. Concepts -- 1. Seven types of privacy; Rachel Finn, David Wright and Michael Friedewald -- 2. The Internet as Surveilled Workplayplace and Factory; Christian Fuchs and Daniel Trottier -- 3. From Market-Making Tool to Fundamental Right: the Role of the Court of Justice in Data Protection’s Identity Crisis; Orla Lynskey -- 4. Anonymity: a Comparison between the Legal and Computer Science Perspectives; Sergio Mascetti, Anna Monreale, Annarita Ricci and Andrea Gerino -- II. Digital natives and ageing users -- 5. Digital Natives and the Metamorphosis of European Society. The emerging behavioral trends regarding privacy and their legal implications; Norberto Andrade and Shara Monteleone -- 6. Autonomy in ICT for older persons at the crossroads between legal and care practices; Daniel Lopez Gomez, Eugenio Mantovani and Paul De Hert -- 7. Ethical implications of technologies that "support" ageing with dementia at home; Unai Díaz-Orueta and Elena Urdaneta -- III. Privacy by design -- 8. Privacy by Design: Enhanced Privacy Leadership, Methods, and Results; Ann Cavoukian -- 9. Roadmap for Privacy Protection in Mobile Sensing Applications; Delphine Christin, Matthias Hollick -- 10. Privacy enhancing techniques for the protection of mobility patterns in LBS: research issues and trends; Maria Luisa Damiani -- 11. Privacy by Design through social requirements analysis of social network sites from a user perspective; Ralf De Wolf, Rob Heyman and Jo Pierson -- IV. Surveillance, profiling and smart metering -- 12. Smart metering and privacy in Europe: lessons from the Dutch case; Colette Cuijpers and Bert-Jaap Koops -- 13. User Choice, Privacy Sensitivity, and Acceptance of Personal Information Collection; Joshua B. Hurwitz -- 14. Beyond Gut Level - Some Critical Remarks on the German Privacy Approach to Smart Metering; Frank Pallas -- 15. Surveillance as a Service? On the Use of Surveillance Data for Administrative Purposes; Martin Pekárek, Arnold Roosendaal and Jasper Sluijs -- 6. Computers Reading Our Minds? The benefits and risks of profiling; Jorg Polakiewicz -- Case studies -- 17. Communicating Privacy in Organisations. Catharsis and Change in the Case of the Deutsche Bahn; Daniel Guagnin, Carla Ilten and Leon Hempel -- 18. The end of independent data protection supervision in Hungary - a case study;  András Jóri -- 19. Data Protection, Social Networks and Online Mass Media; Artemi Rallo and Ricard Martínez..
    Note: Description based upon print version of record , Electronic reproduction; Available via World Wide Web
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    Online Resource
    Online Resource
    Shelter Island, NY : Manning Publications
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als Jones, Don, 1971 - Learn PowerShell toolmaking in a month of lunches
    DDC: 005.2/82
    RVK:
    Keywords: Windows PowerShell (Computer program language) ; Scripting languages (Computer science) ; Electronic books ; Electronic books ; local ; Windows PowerShell
    Abstract: Summary Packed with hands-on labs to reinforce what you're learning, Learn PowerShell Toolmaking in a Month of Lunches is the best way to learn PowerShell scripting and toolmaking. Just set aside one hour a day-lunchtime would be perfect-for each self-contained lesson. You'll move quickly through core scripting concepts and start working on four real-world, practical tools. Each chapter adds more functionality, including custom formatting, error handling, parameterized input, input validation, help files and documentation, and more. About this Book You don't have to be a software developer to build PowerShell tools. With this book, a PowerShell user is a step away from becoming a proficient toolmaker. Learn PowerShell Toolmaking in a Month of Lunches is the best way to learn PowerShell scripting and toolmaking in just one hour a day. It's packed with hands-on labs to reinforce what you're learning. It's an easy-to-follow guide that covers core scripting concepts using four practical examples. Each chapter builds on the previous one as you add custom formatting, error handling, input validation, help files, and more. What's Inside Build your own administrative tools Learn by doing with hands-on labs Make scripts that feel like native PowerShell cmdlets This book does not assume you are a programmer. Experience using PowerShell as a command-line interface is helpful but not required. About the Authors Don Jones is a PowerShell MVP, speaker, and trainer. Jeffery Hicks is a PowerShell MVP and an independent consultant, trainer, and author. Don and Jeff coauthored Learn Windows PowerShell 3 in a Month of Lunches, Second Edition (Manning 2012) and PowerShell in Depth (Manning 2013).
    Note: Includes index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    Online Resource
    Online Resource
    Oxford : Oxford University Press
    ISBN: 9780191750373
    Language: English
    Pages: 1 Online-Ressource (xx, 607 p.) , Ill.
    Series Statement: Oxford handbooks in business and management
    DDC: 303.4833
    RVK:
    RVK:
    Keywords: Electronic books ; Handbuch ; Electronic books ; Handbuch ; Electronic books ; Handbuch
    Abstract: This handbook is a landmark in the dynamic and rapidly expanding field of Internet studies, bringing together leading international scholars to strengthen research on how the Internet has been studied and the discipline's fundamental questions, and shape research, policy, and practice for the future.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    Online Resource
    Online Resource
    Chichester, West Sussex, U.K. : Wiley
    ISBN: 9781118425152 , 1118425154
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Parallel Title: Erscheint auch als
    DDC: 006.7/4
    RVK:
    Keywords: Cascading style sheets ; Web sites ; Authoring programs ; Electronic books ; Electronic books ; local
    Abstract: Master innovative and eye-catching website design with the exciting new Treehouse Series of books Turn plain words and images into stunning websites with CSS3 and this beautiful, full-color guide. Taking web designers beyond the constraints of prebuilt themes and simple site-building tools, this new Treehouse book combines practicality with inspiration to show you how to create fully customized, modern websites that make viewers stop and stay. The exciting new Treehouse Series of books is authored by Treehouse experts and packed with innovative design ideas and practical skill-building. If you're a web developer, web designer, hobbyist, or career-changer, every book in this practical new series should be on your bookshelf. Part of the new Treehouse Series of books, teaching you effective and compelling website development and design, helping you build practical skills Provides career-worthy information from Treehouse industry pros and trainers Explains the basics of cascading style sheets (CSS), such as how to structure with CSS, use CSS syntax, how to manipulate text, and visual formatting Also covers the box model, how to animate page elements, cross-browser compatibility, and more Leverage pages of dazzling website design ideas and expert instruction with a new Treehouse Series book.
    Note: Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    Online Resource
    Online Resource
    Hoboken, N.J. : Wiley
    ISBN: 1118460847 , 9781118460849
    Language: English
    Pages: 1 online resource (xviii, 388 p.) , ill.
    Edition: 3rd ed.
    Series Statement: --For dummies
    Parallel Title: Erscheint auch als
    DDC: 005.54
    RVK:
    Keywords: Microsoft Excel (Computer file) ; Business ; Computer programs ; Electronic spreadsheets ; Computer programs ; Electronic books ; Electronic books ; local
    Abstract: Learn to use Excel for practical, day-to-day calculations Excel is a powerful program with more than 300 built-in functions that can be used to perform an almost infinite number of calculations. This friendly book shows you how to use the 150 most valuable ones in real-world situations: to compare the cost of buying vs. leasing a car, calculate classroom grades, or evaluate investment performance, for example. Another 85 specialized functions are also described. Detailed, step-by-step instructions help you understand how functions work within formulas and how you can use them to solve everyday problems. Excel is a complex tool, making it a perfect subject for the straightforward, plain-English approach of this book Formulas and functions are explained in classic For Dummies fashion, with examples of how to apply the 150 most commonly used functions in real-world situations Discover how to use Excel to compare the cost of 15 and 30-year mortgages, decide whether to buy or lease a car, calculate the actual cost of credit card purchases, forecast college expenses, design a database for your own use, and much more Serves as an excellent resource for all versions of Excel, including the latest version 2013 Excel Formulas and Functions For Dummies, 3rd Edition helps you put the power of Excel to work in your daily life.
    Note: Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...