Norges billigste bøker

Data og IT

Her finner du spennende bøker om Data og IT. Nedenfor er et flott utvalg på over 89.058 bøker om emnet.
Vis mer
Filter
Filter
Sorter etterSorter Populære
  •  
    580,-

    This edited volume explores how artificial intelligence (AI) is transforming international conflict in cyberspace.

  •  
    658,-

    This book focuses on different algorithms and models related to AI, big data, and IoT used for various domains. It enables the reader to have a broader and deep understanding of several perspectives, about the dynamics, challenges, and opportunities regarding sustainable development using artificial intelligence, big data, and IoT.

  •  
    839,-

    This book is about how to manage innovation, sustainability, and business necessary to make BRI works, and how to handle the issues, problems and crisis that may arise thereof. Participants of BRI projects can take many different roles but ultimately it is team effort and leadership for each project.

  • av Laura (University College London) Dietz
    1 383,-

    On any given day, millions of people will read e-books. Yet many of us will do so while holding them apart from 'real books'. The fact that a book can be worthy - of our time, money, respect, even love - without being 'real' is a fascinating paradox of twenty-first century reading. Drawing on original data from a longitudinal study, Laura Dietz investigates how movement between conceptions of e-books as ersatz, digital proxy, and incomplete books serves readers in unexpected ways. The cultural value of e-books remains an area of intense debate in publishing studies. Exploring the legitimacy of e-books in terms of their 'realness' and 'bookness', Dietz enriches our understanding of what e-books are, while also opening up new ways of thinking about how we imagine, how we use, and what we want from books of every kind. This title is also available as Open Access on Cambridge Core.

  • av Andrei (Linnaeus University) Khrennikov
    1 681,-

    This book re-establishes the topic of locality in quantum mechanics, coupling the ideas of Bohr and Einstein with the modern quantum information framework. This accessible approach to quantum foundations will be of interest to graduates, Ph.D. students and researchers in fields ranging from quantum information to philosophy.

  • av Taylan (Goteborgs Universitet Mavruk
    710 - 1 677,-

  • av Jerome R. (Indiana University) Busemeyer
    515 - 1 293,-

  • av Jingsheng (JSJ Corporation Yu
    658 - 1 207,-

  • av Michiel Benda
    800,-

    More than 100,000 organizations throughout the European Union have to comply with the NIS2 Directive. Is your organization one of them? If so, what do you need to do to become compliant? Two questions that are easy to ask, but the answers are never as straightforward. With 46 articles, 144 provisions, and over 140 references to other documents, the NIS2 is anything but easy to read, let alone interpret. This book provides an answer to your questions in a straightforward, easy-to-understand way. The NIS2 Navigator's Handbook is written in plain English terms to help members of management bodies (including security and IT management) understand the Directive and its intentions. An extensive analysis of the scope specifications, with a clear Annex to support it, provides insight into the NIS2's scope and an answer to the first question.For the second question, the book walks you through the different requirements that organizations must comply with. A GAP assessment included in the Annexes of the book, that can be used at a high level or in depth, provides you with an understanding of your level of compliance and the steps you need to take to become compliant. The book also comes with access to an assessment tool that allows you to perform the assessment in a number of languages.If you need to understand the impact of the NIS2 Directive on your organization, this book provides you the ultimate answer.

  • Spar 10%
     
    698,-

    This thoroughly updated edition reports on the current state of human computer interaction (HCI) in biomedicine and healthcare, focusing on the cognitive underpinnings of human interactions with people and technology. With health information technologies becoming increasingly vital tools for the practice of clinical medicine, this book draws from key theories, models and evaluation frameworks, and their application in biomedical contexts to apply this to current research in HCI. However, numerous challenges remain in order to fully realize their potential as instruments for advancing clinical care and enhancing patient safety.There is a general consensus that health IT has not realized its potential as a tool to facilitate clinical decision-making, the coordination of care and improvements in patient safety. Embracing sound principles of iterative design can yield significant dividends. It can also enhance practitioner¿s abilities to meet ¿meaningful use¿ requirements. The purpose of the book is two-fold: to address key gaps on the applicability of theories, models and evaluation frameworks of HCI and human factors for research in biomedical informatics. It highlights the state of the art, drawing from the current research in HCI. It also serves as a graduate level textbook highlighting key topics in HCI relevant for biomedical informatics, computer science and social science students working in the healthcare domain.Cognitive Informatics for Biomedicine: Human Computer Interaction in Healthcare is indispensable to those who want to ensure that the systems they build, and the interactive environments that they promote, will reflect the rigor and dedication to human-computer interaction principles that will ultimately enhance both the user¿s experience and the quality and safety of the care that is offered to patients. It is an essential reference to all who are interested in the application of these new techniques within healthcare, from students of informatics through to clinicians, informatics researchers and developers of health IT looking to incorporate them into their day-to-day workflow.

  •  
    2 005,-

    Shows how artificial intelligence and machine learning can be used in every aspect of business and as a foundation for complex decision-making. Overviews AI techniques used in business, like, use of AI in employee training, in stock market prediction, in traffic detection, in opinion mining, in fraud detection, and more.

  •  
    2 005,-

    Agriculture, a cornerstone of human survival, is undergoing a transformative era where intelligence, innovation, and sustainability converge. "Intelligent Designs, Innovations and Sustainability in Agriculture 4.0" guides readers through this revolution, exploring technologies like AI and IoT that are reshaping farming.

  • av Dalia (Department of Mathematics Chakrabarty
    1 616,-

    This book discusses the relevance of probabilistic supervised learning, to the pursuit of automated and reliable prediction of an unknown that is in a state of relationship with another variable. This book is valuable for students across disciplines, including students of computational sciences, statistics, and mathematics.

  • av Peng Wang
    658,-

    This book provides a complete overview of subpixel image processing methods, basic principles, and different subpixel mapping techniques based on single or multi-shift remote sensing images. Real-life applications are a great resource for understanding how and where to use subpixel mapping with different remote sensing imaging data.

  • av Isaac Faber & John Vail Farr
    658 - 1 681,-

  •  
    697,-

    The text covers applications, algorithms, and tools of distributed information processing in the healthcare sector. It will serve as an ideal reference text for graduate students and academic researchers in the fields of electrical engineering, electronics and communication engineering, computer engineering, and biomedical engineering.

  • av Sergios (Professor of Machine Learning and Signal Processing Theodoridis
    1 089 - 1 209,-

  • av Mukesh Choudhary
    425

    DESCRIPTION Honeypots are like digital traps designed to lure malicious attackers away from your real systems. Imagine setting up a fake store to attract thieves while your real store is safe and hidden. Honeypots work in a similar way, drawing the attention of cybercriminals and allowing you to study their tactics and potentially prevent future attacks.This book simplifies the concept of honeypots, which are important tools in cybersecurity. The book explains their history, types, and how to design and use them effectively. It includes practical advice on setting up honeypots, monitoring them, and analyzing attacks. It also offers strategies for blue team professionals, like SOC analysts, to improve defenses and serves as a helpful resource for purple team members to practice detecting attacks. Additionally, it discusses how honeypots contribute to threat intelligence and cybersecurity training, including new ideas like quantum honeypots, preparing professionals to face modern cyber threats.By the end of this book, you will be able to effectively deploy and manage honeypots, analyze attack data, and implement strategies to protect your organization from malicious attacks.KEY FEATURES ¿ Design and deployment of honeypot to trap hackers.¿ Step-by-step guide for implementation with best practices.¿ Quantum insights and threat anticipation for future-proof defense.WHAT YOU WILL LEARN¿ Acquire an understanding of honeypot technology, from foundational concepts to advanced techniques.¿ Learn how to design and implement honeypots tailored to specific security needs and threat landscapes.¿ Effectively monitor and analyze honeypot data to detect and respond to attacks.¿ Explore advanced honeypot techniques, such as honeypot farms and distributed honeypot networks.WHO THIS BOOK IS FORThis book is a vital resource for CTOs, CISOs, InfoSec managers, InfoSec analysts, and network admins. This book will help students and researchers who are working in the domain of cybersecurity.

  • Spar 22%
    av Seryun (Research Professor Lee
    995,-

    Explores translation as a means of self-expression and social networking in transnational settings on YouTube.

  • av Peter Hoffmann
    641,-

    The development of the internet, particularly the World Wide Web, is currently hitting its limits-both technically and socio-culturally, as well as economically. A new internet is promised as a solution, one that aims to overcome the boundaries between the real and the virtual world, merging reality and digitality-the metaverse. Technical, semantic, and organizational details are closely intertwined in this context.But what does this mean upon closer examination? What technical and technological challenges must be overcome to achieve such a merging? What economic opportunities arise-and which ones may be precluded? How can we ensure that an open and universally accessible metaverse is created? And how can we prevent a few large providers from imposing their proprietary ideas in this new metaverse? This book aims to provide answers to these questions.The AuthorDr. Peter Hoffmann, on one hand a professor of business informatics and on the other a passionate Media Computer Scientist, has been exploring for over 20 years the questions of what "digital media" and "virtual worlds" actually are and how users can interact with them.The translation was done with the help of artificial intelligence. A subsequent human revision was done primarily in terms of content.This book is a translation of an original German edition. The translation was done with the help of artificial intelligence (machine translation by the service DeepL.com). A subsequent human revision was done primarily in terms of content, so that the book will read stylistically differently from a conventional translation.

  • - Models and Algorithms for Intelligent Data Analysis
    av Thomas A. Runkler
    386 - 637,-

    This book is a comprehensive introduction to the methods and algorithms of modern data analytics. It provides a sound mathematical basis, discusses advantages and drawbacks of different approaches, and enables the reader to design and implement data analytics solutions for real-world applications. This book has been used for more than ten years in the Data Mining course at the Technical University of Munich. Much of the content is based on the results of industrial research and development projects at Siemens.

  • av Christian Maurer
    444

  •  
    1 552,-

    In summary, addressing security issues in communication devices, networks, and computing models is fundamental to the successful implementation of Industry 5.0. It not only protects the assets and operations of organizations but also contributes to the overall safety, reliability, and sustainability of advanced industrial systems.

  • av Witold Srokosz
    1 940

    There is currently no comprehensive scientific study that addresses the problem of financing projects using Distributed Ledger (blockchain) Technology (DLT) that are not themselves embedded in the blockchain ecosystem, particularly in the context of long-term and capital-intensive investments. This book fills this gap.

  •  
    467

    This book provides an interdisciplinary analysis of the sharenting phenomena, while discussing the various stakeholders involved, e.g., the portrayed children and adolescents, (grand)parents and other family members. Sharenting, i.e. parents' disclosure of personal information related to their children on social media, is increasingly the subject of public debate. Moreover, some parents participate in influencer sharenting, where they generate revenue by featuring their children in professionalised and commercialised social media content, often in collaboration with brands. However, while sharing personal information of children has become common practice, concerns arise regarding its risks. Consequently, sharenting has been studied in several disciplines, including communication studies, psychology, marketing, criminology, law, sociology, and health sciences. This interdisciplinary approach, adopted by this book, generates several suggestions for future research, alongside practical implications for parents and policy makers. Michel Walrave is Full Professor at the Department of Communication Studies of the University of Antwerp, Belgium, and head of the research group MIOS. His research is centred on online self-disclosure and privacy. One of the topics of his research examines (grand)sharenting motives and consequences,  as well as how children and adolescents are impacted by and respond to these sharing practices.   Liselot Hudders is Associate Professor in marketing communication and ethics at Ghent University, department of Communication Sciences and director of the Center for Persuasive Communication, Belgium. Her research focuses on the role of digital media in the formation of consumer socialisation processes, especially among young consumers.Ini Vanwesenbeeck is Assistant Professor in the Research Group Centre for Social Influence, Department of Communication and Cognition, Tilburg University, the Netherlands. Her research is dedicated to the desired and adverse effects of social media on children and young adults.Emma Beuckels is working on a FWO (research foundation Flanders) postdoctoral fellowship at the department of Communication Sciences, Ghent University, Belgium. Her research centers on the interactions of children and parents with digital media, with a specific emphasis on influencer content and its impact on their daily decision-making processes.

  •  
    583,-

    This book makes a novel contribution to the literature by examining the intersection of social media, conflict and peacebuilding. It challenges traditional state-centric and Eurocentric approaches to international relations and peace and conflict studies by examining the role of social media in peacebuilding beyond a simplistic tech-solutionist versus tech-skeptical duality. The book explains why the impact of social media on peacebuilding is complex and depends on the political context and strategies of the actors involved in it. It uses an interdisciplinary lens to explore the potential and limitations of social media in peacebuilding, thereby contributing to a theoretical and empirical understanding of the role of digital technology in shaping conflict and promoting peace.Chapter “Fighting Hate Speech on Social Media: The Challenge of “Deep Work” in Digital Peacebuilding” is available open access under a Creative Commons Attribution BY 4.0 International license via link.springer.com.Anna Reuss is Lecturer and Researcher at the Chair of International Politics and Conflict Studies, University of the Bundeswehr Munich. At the Centre for Digitalisation and Technology Research of the German Armed Forces, she studies the potential of digitalisation in conflicts and its influence on peacebuilding.Stephan Stetter is Professor of International Politics and Conflict Studies at the University of the Bundeswehr Munich. His research focuses on theories of world society and global modernity in relation to international politics, as well as politics and society in the Middle East. He was editor of the leading German international relations journal Zeitschrift für Internationale Beziehungen.

Gjør som tusenvis av andre bokelskere

Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.