Service Alert
Delay in delivery of Direct to Player materials
You may experience a delay in delivery of Direct to Player materials. All requests for materials will be delivered as soon as possible. Thank you for your patience.
You may experience a delay in delivery of Direct to Player materials. All requests for materials will be delivered as soon as possible. Thank you for your patience.
Showing 1 - 20 of 52258 items
By Bob Reeves. 2015
Exam Board: AQALevel: AS/A-levelSubject: Computer ScienceFirst Teaching: September 2015First Exam: June 2016This title has been approved by AQA for use…
with the AS and A-level AQA Computer Science specifications. AQA A-level Computer Science gives students the chance to think creatively and progress through the AQA AS and A-level Computer Science specifications. Detailed coverage of the specifications will enrich understanding of the fundamental principles of computing, whilst a range of activities help to develop the programming skills and computational thinking skills at A-level and beyond. - Enables students to build a thorough understanding of the fundamental principles in the AQA AS and A-Level Computer Science specifications, with detailed coverage of programming, algorithms, data structures and representation, systems, databases and networks, uses and consequences.- Helps to tackle the various demands of the course confidently, with advice and support for programming and theoretical assessments and the problem-solving or investigative project at A-level.- Develops the programming and computational thinking skills for A-level and beyond - frequent coding and question practice will help students apply their knowledge of the principles of computer science, and design, program and evaluate problem-solving computer systems. Bob Reeves is an experienced teacher with examining experience, and well-respected author of resources for Computing and ICT across the curriculum.By Klaus-Dieter Gronwald. 2024
Dieses Lehrbuch betrachtet Data Management als interdisziplinäres Konzept mit Fokus auf den Zielen datengetriebener Unternehmen. Im Zentrum steht die interaktive Entwicklung eines Unternehmensdatenmodells für ein virtuelles…
Unternehmen mit Unterstützung eines online Learning Games unter Einbeziehung der Aufgaben, Ziele und Grundsätze des Data Managements, typischer Data-Management-Komponenten und Frameworks wie Datenmodellierung und Design, Metadaten Management, Data Architecture, und Data Governance, und verknüpft diese mit datengetriebenen Anwendungen wie Business Warehousing, Big Data, In-Memory Data Management, und Machine Learning im Data Management Kontext.Das Buch dient als Lehrbuch für Studierende der Informatik, der Wirtschaft und der Wirtschaftsinformatik an Universitäten, Hochschulen und Fachschulen und zur industriellen Aus- und Weiterbildung.By Sandeep Kumar, K. Balachandran, Joong Hoon Kim, Jagdish Chand Bansal. 2024
This book is a collection of selected papers presented at the Fourth Congress on Intelligent Systems (CIS 2023), organized by…
CHRIST (Deemed to be University), Bangalore, India, under the technical sponsorship of the Soft Computing Research Society, India, during September 4–5, 2023. It includes novel and innovative work from experts, practitioners, scientists, and decision-makers from academia and industry. It covers topics such as the Internet of Things, information security, embedded systems, real-time systems, cloud computing, big data analysis, quantum computing, automation systems, bio-inspired intelligence, cognitive systems, cyber-physical systems, data analytics, data/web mining, data science, intelligence for security, intelligent decision-making systems, intelligent information processing, intelligent transportation, artificial intelligence for machine vision, imaging sensors technology, image segmentation, convolutional neural network, image/video classification, soft computing for machine vision, pattern recognition, human-computer interaction, robotic devices and systems, autonomous vehicles, intelligent control systems, human motor control, game playing, evolutionary algorithms, swarm optimization, neural network, deep learning, supervised learning, unsupervised learning, fuzzy logic, rough sets, computational optimization, and neuro-fuzzy systems.By Nur Syazreen Ahmad, Junita Mohamad-Saleh, Jiashen Teh. 2024
This book presents selected papers from the Proceedings of the International Conference 12th International Conference on Robotics, Vision, Signal Processing,…
and Power Applications ROVISP 2023, held in Penang, Malaysia, covering topic areas divided into the following tracks: (1) Robotics, Control, Mechatronics, and Automation; (2) Vision, Image and Signal Processing; (3) Telecommunication Systems and Applications; (4) Electronic Design and Applications; (5) Electrical Power, Energy, and Industrial Applications. Its content highlights state-of-the-art technologies adopted by the relevant industries which appeal to researchers and industrial practitioners working in the field.Die Digitalisierung und Entwicklungen im Gebiet der künstlichen Intelligenz haben in den letzten Jahren erhebliche Veränderungen in der Gesellschaft und…
der Unternehmenspraxis hervorgerufen. Aufkommende Technologien in den Feldern Big Data und Advanced Analytics werden auch im Controlling zunehmend diskutiert oder bereits eingesetzt. Dabei befinden sich der Wissensstand, inwieweit Big Data und Advanced Analytics das Controlling beeinflussen und verändern können, und die praktische Anwendung noch in einem frühen Stadium. Diese Arbeit befasst sich deshalb mit der Untersuchung der möglichen Auswirkungen von Big Data und Advanced Analytics im Controlling. Vor diesem Hintergrund werden die Einflüsse dieser digitalen Trends auf den Informationsversorgungsprozess des Controllings, auf die Erfüllung Controlling-spezifischer Anforderungen an Informationen und auf das Forecasting, die Budgetierung und die strategische Planung analysiert. Ferner werden praxisrelevante Herausforderungen, Grenzen und Risiken bei der Implementierung und Nutzung identifiziert sowie Implikationen zu deren Umgang zur Ausschöpfung der Potenziale abgeleitet.This book constitutes the refereed post proceedings of the Third International Scientific and Practical Conference on Information Technologies and Intelligent…
Decision Making Systems, ITIDMS 2023, held in Moscow, Russia, during December, 12-14, 2023. The 18 full papers included in this book were carefully reviewed and selected from 54 submissions. The papers presented in this volume focus on topics such as digital, intellectual and information transformation, the development of computer models and the improvement of automated and computing processes.By Guoxiang Hou, Caikan Chen, Shenglei Qin, Yuan Gao, Kai Wang. 2024
This book provides a concise and comprehensive introduction to several basic methods with more attention to their theoretical basis and…
applications in fluid dynamics. Furthermore, some new ideas are presented in this book, for example, a method to solve the transition matrix by difference operator transformation. For this method, the book gives the definition of Fourier integral transformation of translation operator, and proves the transition matrix equaling to the differential operator transformation, so that it is extended to general situations of explicit, implicit, multi-layer difference equations, etc. This flexible approach is also used in the differential part. In addition, the book also includes six types of equivalent stability definitions in two ways and deeply analyzes their errors, stabilities and convergences of the difference equations. What is more important, some new scientific contributions on lattice Boltzmann method (LBM) in recent years are presented in the book as well. The authors write the book combining their ten years teaching experience and research results and this book is intended for graduate students who are interested in the area of computational fluid dynamics (CFD). Authors list some new research achievements, such as simplified lattice Boltzmann method, the simplified lattice Boltzmann flux solver and discrete unified gas kinetic scheme, and expect that this new information could give readers possible further investigating ideas in their future research on CFD area.By Obaid Ur-Rehman, Natasa Zivic. 2024
Dieses Buch gibt einen Einblick in die Herausforderungen der Datenauthentifizierung über drahtlose Kommunikationskanäle. Die Autoren gehen davon aus, dass die…
etablierten Standard-Authentifizierungsmechanismen nicht ausreichen, um Daten wie Sprache, Bilder und Videos über drahtlose Kanäle zu authentifizieren, da die drahtlose Kommunikation durch zahlreiche Störungen gekennzeichnet ist. Die Autoren schlagen neue Mechanismen vor, die auf so genannten Soft-Authentifizierungsalgorithmen basieren, die einige Änderungen an den zu schützenden Daten tolerieren. Die Autoren erklären, dass das Ziel dieser Algorithmen darin besteht, tolerant gegenüber inhaltlichen Änderungen auf Grund von Übertragungsfehler zu sein, aber dennoch in der Lage zu sein, Fälschungen zu erkennen. Ein weiterer Vorteil der Soft-Authentifizierungsalgorithmen besteht darin, dass sie in der Lage sind, die veränderten Stellen zu identifizieren und sie nach Möglichkeit zu korrigieren. Die Autoren zeigen, wie man dies erreicht, indem man die Datenmerkmale mit Hilfe von fehlerkorrigierenden Codes schützt. · Erörtert Methoden zur Authentifizierung von Daten (insbesondere von Bildern) bei Übertragungsstörungen, die bei der drahtlosen Kommunikation auftreten; · Stellt eine neue Klasse von Soft-Authentifizierungsmethoden vor, die anstelle der üblichen Hard-Authentifizierungsmethoden verwendet werden, um geringfügige Änderungen der Bilddaten zu tolerieren; · Verfügt über Authentifizierungsmethoden, die auf der Verwendung von Authentifizierungscodes und digitalen Wasserzeichen basierenBy Tin-Chih Toly Chen, Yun-Ju Lee. 2024
This book examines smart technologies and their invaluable role in augmenting the walking experience of mobile users. From meticulously planned…
walking routes to precise footprint detection and analysis, as well as cutting-edge fall detection and prevention mechanisms, these intelligent technologies have the potential to revolutionize healthy and smart walking. Against the backdrop of the post-COVID-19 era, where unrestricted mobility has become pivotal for restoring normalcy, the demand for smart healthcare solutions has soared. The book explores latest advances in sensor technology, cloud computing, deep learning, and networking and related innovative applications that can leverage smart technologies to enhance healthy walking.By Aleksei V. Bogoviz, Alexander E. Suglobov, Alexandr N. Maloletko, Olga V. Kaurova, Svetlana V. Lobova. 2021
This book is the very first book-length study devoted to the advances in technological development and systems research in cooperative…
economics. The chapters provide, first of all, a coherent framework for understanding and applying the concepts and approaches of complexity and systems science for the advanced study of cooperative networks and particular cooperative enterprises and communities. Second, the book serves as a unique source of reliable information on the frontier information technologies available for the production, consumer, credit, and agricultural cooperative enterprises, discussing predominant strategies, potential drivers of change, and responses to complex problems. Given the diverse range of backgrounds and advanced research results, researchers, decision-makers, and stakeholders from all fields of cooperative economics in any country of the world will undoubtedly benefit from this book.If you haven't modernized your data cleaning and reporting processes in Microsoft Excel, you're missing out on big productivity gains.…
And if you're looking to conduct rigorous data analysis, more can be done in Excel than you think. This practical book serves as an introduction to the modern Excel suite of features along with other powerful tools for analytics.George Mount of Stringfest Analytics shows business analysts, data analysts, and business intelligence specialists how to make bigger gains right from your spreadsheets by using Excel's latest features. You'll learn how to build repeatable data cleaning workflows with Power Query, and design relational data models straight from your workbook with Power Pivot. You'll also explore other exciting new features for analytics, such as dynamic array functions, AI-powered insights, and Python integration.Learn how to build reports and analyses that were previously difficult or impossible to do in Excel. This book shows you how to:Build repeatable data cleaning processes for Excel with Power QueryCreate relational data models and analysis measures with Power PivotPull data quickly with dynamic arraysUse AI to uncover patterns and trends from inside ExcelIntegrate Python functionality with Excel for automated analysis and reportingBy Sarah Horton, David Sloan. 2024
Accessibility is a core quality of digital products to be deliberately addressed throughout the development lifecycle. What Every Engineer Should…
Know About Digital Accessibility will prepare readers to integrate digital accessibility into their engineering practices. Readers will learn how to accurately frame accessibility as an engineering challenge so they are able to address the correct problems in the correct way.Illustrated with diverse perspectives from accessibility practitioners and advocates, this book describes how people with disabilities use technology, the nature of accessibility barriers in the digital world, and the role of engineers in breaking down those barriers. Accessibility competence for current, emerging, and future technologies is addressed through a combination of guiding principles, core attributes and requirements, and accessibility‑informed engineering practices.FEATURES Discusses how technology can support inclusion for people with disabilities and how rigorous engineering processes help create quality user experiences without introducing accessibility barriers Explains foundational principles and guidelines that build core competency in digital accessibility as they are applied across diverse and emerging technology platforms Highlights practical insights into how engineering teams can effectively address accessibility throughout the technology development lifecycle Uses international standards to define and measure accessibility quality Written to be accessible to non‑experts in the subject area, What Every Engineer Should Know About Digital Accessibility is aimed at students, professionals, and researchers in the field of software engineering.The Internet of Things (IoT) has numerous applications, including smart cities, industries, cloud-based apps, smart homes, and surveillance.The Internet of…
Things (IoT) enables smarter living by connecting devices, people, and objects. As networking became a crucial aspect of the Internet, rigorous design analysis led to the development of new research areas.The Internet of Things has revolutionized daily living in countless ways. It enables communication between buildings, people, portable gadgets, and vehicles, facilitating mobility. Smart cities and cloud-based data have transformed corporate practices. With billions of connected gadgets, everything will soon be able to communicate remotely. IoT networks, whether public or private, rely significantly on machine learning and software-defined networking. Indian and other governments have approved various research projects on IoT-based networking technologies. This field of study will significantly impact society in the future.Researchers are concerned about the many application areas and driving forces behind smart cities. The authors aim to provide insights into software-defined networking, artificial intelligence, and machine learning technologies used in IoT and networking. The framework focuses on practical applications and infrastructures. The book includes practical challenges, case studies, innovative concepts, and other factors that impact the development of realistic scenarios for smart surveillance. It also highlights innovative technology, designs, and algorithms that can accelerate the creation of smart city concepts.This resource includes real-world applications and case studies for smart city technology, enormous data management, and machine learning prediction, all with confidentiality and safety problems.Does the current celibate, semi-monastic, and all-male seminary formation contribute to the persistence of clerical sexual abuse in the Roman…
Catholic Church?Applying sociological theories on socialization, total institutions, and social resistance as the primary conceptual framework, and drawing on secondary literature, media reports, the author’s experience, interviews, and Church documents, this book argues that the Catholic Church’s institution of the celibate seminary formation as the only mode of clerical training for Catholic priests has resulted in negative unintended consequences to human formation such as the suspension of normal human socialization in society, psychosexual immaturity, and weak social control against clerical sexual abuse. The author thus contends that celibate training, while suitable for those who do live in religious or monastic communities, is inappropriate for those who are obliged to live alone and work in parishes. As such, an alternative model for diocesan clerical formation is advanced.A fresh look at the aptness – and effects – of celibate formation for diocesan clergy, this volume is the first to relate the persistence of Catholic clerical sexual abuse to celibate seminary formation, exploring the structural links between the two using sociological arguments and proposing an apprenticeship-based model of formation, which has numerous advantages as a form of clerical training. It will therefore appeal to scholars and students of religion, sociology, and theology, as well as those involved with seminary formation.By Roderick S. Graham, 'Shawn K. Smith. 2024
Cybercrime and Digital Deviance, Second Edition, combines insights from sociology, criminology, psychology, and cybersecurity to explore cybercrimes such as hacking,…
identity theft, and romance scams, along with forms of digital deviance such as pornography addiction, trolling, and “canceling” people for perceived violations of norms.Other issues are explored including cybercrime investigations, nation-state cybercrime, the use of algorithms in policing, cybervictimization, and expanded discussion of the theories used to explain cybercrime. Graham and Smith conceptualize the online space as a distinct environment for social interaction, framing their work with assumptions informed by their respective work in urban sociology and spatial criminology, and offering an engaging entry point for understanding what may appear to be a technologically complex course of study. The authors apply a modified version of a typology developed by David Wall: cybertrespass, cyberfraud, cyberviolence, and cyberpornography. This typology is simple enough for students just beginning their inquiry into cybercrime, while its use of legal categories of trespassing, fraud, violent crimes against persons, and moral transgressions provides a solid foundation for deeper study. In this edition each chapter includes a new “Current Events and Critical Thinking” section, using concepts from the chapter to explore a specific event or topic like the effect of disinformation on social cohesion and politics.Taken together, Graham and Smith’s application of a digital environment and Wall’s cybercrime typology makes this an ideal upper-level text for students in sociology and criminal justice. It is also an ideal introductory text for students within the emerging disciplines of cybercrime and cybersecurity.Power up your Windows security skills with expert guidance, in-depth technical insights, and dozens of real-world vulnerability examples from Google…
Project Zero&’s most renowned researcher! Learn core components of the system in greater depth than ever before, and gain hands-on experience probing advanced Microsoft security systems with the added benefit of PowerShell scripts.Windows Security Internals is a must-have for anyone needing to understand the Windows operating system&’s low-level implementations, whether to discover new vulnerabilities or protect against known ones. Developers, devops, and security researchers will all find unparalleled insight into the operating system&’s key elements and weaknesses, surpassing even Microsoft&’s official documentation.Author James Forshaw teaches through meticulously crafted PowerShell examples that can be experimented with and modified, covering everything from basic resource security analysis to advanced techniques like using network authentication. The examples will help you actively test and manipulate system behaviors, learn how Windows secures files and the registry, re-create from scratch how the system grants access to a resource, learn how Windows implements authentication both locally and over a network, and much more.You&’ll also explore a wide range of topics, such as:Windows security architecture, including both the kernel and user-mode applicationsThe Windows Security Reference Monitor (SRM), including access tokens, querying and setting a resource&’s security descriptor, and access checking and auditingInteractive Windows authentication and credential storage in the Security Account Manager (SAM) and Active DirectoryMechanisms of network authentication protocols, including NTLM and KerberosIn an era of sophisticated cyberattacks on Windows networks, mastering the operating system&’s complex security mechanisms is more crucial than ever. Whether you&’re defending against the latest cyber threats or delving into the intricacies of Windows security architecture, you&’ll find Windows Security Internals indispensable in your efforts to navigate the complexities of today&’s cybersecurity landscape.This book constitutes the refereed proceedings of the 15th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2024,…
held in Gardanne, France, during April 9–10, 2024. The 14 full papers included in this book were carefully reviewed and selected from 42 submissions. They were organized in topical sections as follows: Analyses and Tools; Attack Methods; Deep-Learning-Based Side-Channel Attacks; PUF/RNG; and Cryptographic Implementations.By Aram Sinnreich, Jesse Gilbert. 2024
How data surveillance, digital forensics, and generative AI pose new long-term threats and opportunities—and how we can use them to…
make better decisions in the face of technological uncertainty.In The Secret Life of Data, Aram Sinnreich and Jesse Gilbert explore the many unpredictable, and often surprising, ways in which data surveillance, AI, and the constant presence of algorithms impact our culture and society in the age of global networks. The authors build on this basic premise: no matter what form data takes, and what purpose we think it&’s being used for, data will always have a secret life. How this data will be used, by other people in other times and places, has profound implications for every aspect of our lives—from our intimate relationships to our professional lives to our political systems.With the secret uses of data in mind, Sinnreich and Gilbert interview dozens of experts to explore a broad range of scenarios and contexts—from the playful to the profound to the problematic. Unlike most books about data and society that focus on the short-term effects of our immense data usage, The Secret Life of Data focuses primarily on the long-term consequences of humanity&’s recent rush toward digitizing, storing, and analyzing every piece of data about ourselves and the world we live in. The authors advocate for &“slow fixes&” regarding our relationship to data, such as creating new laws and regulations, ethics and aesthetics, and models of production for our data-fied society.Cutting through the hype and hopelessness that so often inform discussions of data and society, The Secret Life of Data clearly and straightforwardly demonstrates how readers can play an active part in shaping how digital technology influences their lives and the world at large.By Maria Papadaki, Marinos Themistocleous, Khalid Al Marri, Marwan Al Zarouni. 2024
This book constitutes selected papers from the 20th European, Mediterranean, and Middle Eastern Conference, EMCIS 2023, which was held in…
Dubai, UAE, during December 11-12, 2023. EMCIS covers technical, organizational, business, and social issues in the application of information technology and is dedicated to the definition and establishment of Information Systems (IS) as a discipline of high impact for IS professionals and practitioners. It focuses on approaches that facilitate the identification of innovative research of significant relevance to the IS discipline following sound research methodologies that lead to results of measurable impact. The 43 papers presented in this volume were carefully reviewed and selected from a total of 126 submissions. They were organized in topical sections as follows: Part I: Metaverse; blockchain technology and applications; digital governance; healthcare information systems; artificial intelligence; Part II: Big data and analytics; digital services and social media; innovative research projects; managing information systems; smart cities.This book constitutes the refereed proceedings of CVM 2024, the 12th International Conference on Computational Visual Media, held in Wellington,…
New Zealand, in April 2024.The 34 full papers were carefully reviewed and selected from 212 submissions. The papers are organized in topical sections as follows:Part I: Reconstruction and Modelling, Point Cloud, Rendering and Animation, User Interations.Part II: Facial Images, Image Generation and Enhancement, Image Understanding, Stylization, Vision Meets Graphics.