Applied computing Books

264 products


  • Fundamentals of Business Process Management

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Fundamentals of Business Process Management

    15 in stock

    Book SynopsisThis textbook covers the entire Business Process Management (BPM) lifecycle, from process identification to process monitoring, covering along the way process modelling, analysis, redesign and automation. Concepts, methods and tools from business management, computer science and industrial engineering are blended into one comprehensive and inter-disciplinary approach. The presentation is illustrated using the BPMN industry standard defined by the Object Management Group and widely endorsed by practitioners and vendors worldwide.In addition to explaining the relevant conceptual background, the book provides dozens of examples, more than 230 exercises – many with solutions – and numerous suggestions for further reading. This second edition includes extended and completely revised chapters on process identification, process discovery, qualitative process analysis, process redesign, process automation and process monitoring. A new chapter on BPM as an enterprise capability has been added, which expands the scope of the book to encompass topics such as the strategic alignment and governance of BPM initiatives.The textbook is the result of many years of combined teaching experience of the authors, both at the undergraduate and graduate levels as well as in the context of professional training. Students and professionals from both business management and computer science will benefit from the step-by-step style of the textbook and its focus on fundamental concepts and proven methods. Lecturers will appreciate the class-tested format and the additional teaching material available on the accompanying website.Table of Contents1 Introduction to Business Process Management.- 2 Process Identification.- 3 Essential Process Modeling.- 4 Advanced Process Modeling.- 5 Process Discovery.- 6 Qualitative Process Analysis.- 7 Quantitative Process Analysis.- 8 Process Redesign.- 9 Process-Aware Information Systems.- 10 Process Implementation with Executable Models.- 11 Process Monitoring.- 12 BPM as an Enterprise Capability.

    15 in stock

    £52.24

  • Applied Machine Learning and AI for Engineers

    O'Reilly Media Applied Machine Learning and AI for Engineers

    15 in stock

    Book SynopsisWhile many introductory guides to AI are calculus books in disguise, this one mostly eschews the math. Instead, author Jeff Prosise helps engineers and software developers build an intuitive understanding of AI to solve business problems.

    15 in stock

    £47.99

  • Technology and the Historian

    University of Illinois Press Technology and the Historian

    15 in stock

    Book SynopsisTrade Review"Crymble seamlessly integrates print, digital, oral history, and interactive source material to document the ways historians have responded, both individually and as an imagined community, to the social contexts that have shaped our interactions with technology." --Journal of American History "Crymble gives me a greater appreciation for how my own course in ‘digital history’ fits within and reflects broader patterns of discourse about technology and the past." --Corinthian Matters "This book explodes many of the foundation myths upon which digital history has been built; and replaces them with a clear-eyed account that melds historiography, technology, and pedagogy. In beautiful prose Crymble has identified the streams of influence that have shaped the field."--Tim Hitchcock, University of SussexTable of ContentsCoverTItleCopyrightContentsAcknowledgmentsIntroduction1. The Origin Myths of Computing in Historical Research2. The Archival Revisionism of Mass Digitization3. Digitizing the History Classroom4. Building the Invisible College5. The Rise and Fall of the Scholarly Blog6. The Digital Past and the Digital FutureAppendix: Digital History Syllabus Corpus (2002–2017)Glossary: A New VocabularyNotesBibliographyIndexBack cover

    15 in stock

    £77.35

  • Technology and the Historian

    University of Illinois Press Technology and the Historian

    1 in stock

    Book SynopsisTrade Review"Crymble seamlessly integrates print, digital, oral history, and interactive source material to document the ways historians have responded, both individually and as an imagined community, to the social contexts that have shaped our interactions with technology." --Journal of American History"Crymble gives me a greater appreciation for how my own course in ‘digital history’ fits within and reflects broader patterns of discourse about technology and the past." --Corinthian Matters"This book explodes many of the foundation myths upon which digital history has been built; and replaces them with a clear-eyed account that melds historiography, technology, and pedagogy. In beautiful prose Crymble has identified the streams of influence that have shaped the field."--Tim Hitchcock, University of Sussex"Crymble's work provides an insightful historiographical examination of how computer technology has been impacted in various practices pertaining to the field of history. This book merits attention from students, researchers, and practitioners of the historical profession, as it serves as a salient reminder that technology has long pervaded, transformed, and continually shaped every dimension of our discipline." --Middle Ground Journal

    1 in stock

    £19.79

  • Wiley Pathways EBusiness

    John Wiley & Sons Inc Wiley Pathways EBusiness

    10 in stock

    Book SynopsisFor anyone thinking about starting an online business, this resource provides all the steps needed to take an idea and turn it into reality. Wiley Pathways E-Business begins by discussing the legal considerations involved in launching the business as well as tips for acquiring the necessary financing.Table of ContentsPart 1 Getting Started in E-Business Chapter 1 An Introduction to E-Business 1 Introduction 2 1.1 The History of the Internet and E-Businesses 2 1.2 The Power of Selling on the Internet 5 1.3 What Can You Sell Online 8 1.4 Popular E-Business Models 14 Chapter 2 The Law, Ethics, and Consumer Policies 23 Introduction 24 2.1 Legal Organization Options 24 2.2 Identification Numbers, Licenses, and Zoning 30 2.3 Understanding Copyrights and Trademarks 35 2.4 The Basics of Business Ethics 39 2.5 Establishing Online Policies 42 Chapter 3 Planning an E-Business 63 Introduction 64 3.1 Developing a Business Idea 64 3.2 Analyzing a Business Idea 69 3.3 Identifying a Target Market 75 3.4 The Value of a Business Plan 79 3.5 The Elements of an Effective Business Plan 83 Chapter 4 Financing and Launching an E-Business 97 Introduction 98 4.1 Launching a Business on a Tight Budget 98 4.2 Common Sources of Financing 104 4.3 Hiring Employees 112 4.4 Purchasing an Existing Web Site 116 Chapter 5 Accounting and Taxes 133 Introduction 134 5.1 The Basics of E-Business Accounting 134 5.2 Income Taxes for E-Businesses 142 5.3 Employment and Sales Taxes 145 5.4 Professional Accounting Support 148 Part 2 Operating an E-Business Chapter 6 Online Payments and Shopping Carts 163 Introduction 164 6.1 Accepting Payments with Credit CRDS 164 6.2 Alternative Payments Options 172 6.3 An Introduction to Shopping Carts 177 6.4 Exploring Shopping Cart Solutions 182 Chapter 7 Products, Inventory, and Fulfillment 191 Introduction 192 7.1 Selecting and Pricing Products 192 7.2 Building and Managing Inventory 198 7.3 Successful Fulfillment Strategies 202 7.4 Shipping Products 209 Chapter 8 Marketing and E-Business 219 8.1 Marketing Basics: Branding and Budgeting 220 8.2 E-Business Advertising 224 8.3 Marketing to Newsgroups and Mailing Lists 230 8.4 Creative Promotional Strategies 234 Chapter 9 Effectively Using Search Engines 251 Introduction 252 9.1 An Introduction to Search Engines 252 9.2 Signing Up with Search Engines 256 9.3 and Keywords 264 9.4 Search-Engine Rankings 269 Chapter 10 E-Business Customer Service 279 Introduction 280 10.1 Understanding and Serving Online Customers 280 10.2 Sharing Product Information Online 288 10.3 Effectively Using Email for Customer Service 293 10.4 Advanced Customer Service Strategies 298 Part 3 Creating and Operating a Web Site Chapter 11 Equipment, Software, and Web Hosting 307 Introduction 308 11.1 Basic Office Equipment 308 11.2 Essential Software 316 11.3 Internet Service Providers 321 11.4 Selecting a Web Host 325 Chapter 12 Successful Web Site Design 337 Introduction 338 12.1 Choosing and Registering Domain Names 338 12.2 Planning and Designing an Effective Web Site 346 12.3 Working with a Professional Web Designer 355 12.4 Launching a New Web Site 361 Chapter 13 Tracking and Analyzing Customer Data 371 Introduction 372 13.1 Assessing Web Site Traffic 372 13.2 Traffic Analysis with Software 380 13.3 Collecting Customer Information 386 13.4 Putting Customer Data to Work 392 Chapter 14 E-Business Security 401 Introduction 402 14.1 E-Commerce Risks and Security 402 14.2 Internet Security Threats 409 14.3 Security Planning 418 14.4 Advanced Topics in E-Business Security 423 Glossary 433 Index 443

    10 in stock

    £88.30

  • Landing Page Optimization

    John Wiley & Sons Inc Landing Page Optimization

    15 in stock

    Book SynopsisA fully updated guide to making your landing pages profitable Effective Internet marketing requires that you test and optimize your landing pages to maximize exposure and conversion rate. This second edition of a bestselling guide to landing page optimization includes case studies with before-and-after results as well as new information on web site usability. It covers how to prepare all types of content for testing, how to interpret results, recognize the seven common design mistakes, and much more. Included is a gift card for Google AdWords. Features fully updated information and case studies on landing page optimization Shows how to use Google''s Website Optimizer tool, what to test and how to prepare your site for testing, the pros and cons of different test strategies, how to interpret results, and common site design mistakes Provides a step-by-step implementation plan and advice on getting support and resources Landing PagTable of ContentsIntroduction xv Part I Understanding Landing Page Optimization 1 Chapter 1 Setting the Stage 3 What Is a Landing Page? 4 A Few Precious Moments Online 4 Your Baby Is Ugly 6 Your Website Visitors: The Real Landing Page Experts 6 Understanding the Bigger Online Marketing Picture 8 The Myth of Perfect Conversion 17 Chapter 2 Understanding Your Landing Pages 19 Landing Page Types 20 What Parts of Your Site Are Mission Critical? 22 What Is Your Business Model? 28 The Types of Conversion Actions 30 Chapter 3 The Matrix—Moving People to Act 35 The Matrix Overview 36 Roles 36 Tasks 38 The Decision-Making Process 39 Awareness 40 Interest 43 Desire 45 Action 53 Part II Finding Opportunities for Site Improvement 63 Chapter 4 Common Problems—The Seven Deadly Sins of Landing Page Design 65 A Sober Look 66 Unclear Call-to-Action 66 Too Many Choices 73 Visual Distractions 76 Not Keeping Your Promises 83 Too Much Text 86 Asking for Too Much Information 87 Lack of Trust and Credibility 93 Real-World Case Study: CREDO Mobile 106 Chapter 5 Conversion Ninja Toolbox—Diagnosing Site Problems 111 You Are Not as Good as You Would Like to Believe 112 Focus on the Negative 113 Web Analytics Tools 114 Visual Analysis Tools 125 Feedback and Survey Tools 131 Website Performance Tools 133 Competitive Analysis Tools 135 Usability Testing Tools 136 E-mail Enhancement Tools 139 Chapter 6 Misunderstanding Your Visitors—Looking for Psychological Mismatches 141 Empathy: The Key Ingredient 142 Researching the Whole Story 143 Demographics and Segmentation 144 Welcome to Your Brain 148 Cognitive Styles 152 Persuasion Frameworks 157 Cultural Differences 165 Part III Fixing Your Site Problems 169 Chapter 7 Conversion Improvement Basics 171 Web Usability Overview 172 Visual Presentation 173 Writing for the Web 192 Usability Checks 197 Chapter 8 Best Practices for Common Situations 201 Homepages 202 Information Architecture and Navigation 205 E-commerce Catalogs 211 Registration and Multiple-Step Flows 234 Direct Response Pages 243 Mobile Websites 246 Chapter 9 The Strategy of What to Test 251 How to Think About Test Elements 252 Selecting Elements to Test 261 Testing Multiple-Page Flows 264 Timeless Testing Themes 267 Price Testing 273 Part IV The Mechanics of Testing 279 Chapter 10 Common Testing Questions 281 Lies, Damn Lies, and Statistics 282 Crash Course in Probability and Statistics 286 Have I Found Something Better? 293 How Sure Do I Need to Be? 295 How Much Better Is It? 298 How Long Should My Test Run? 300 Chapter 11 Preparing for Testing 305 Overview of Content Management and Testing 306 Content Management Configurations 308 Common Testing Issues 313 Chapter 12 Testing Methods 325 Introduction to Testing Terminology 326 Overview of Testing Methods 331 A-B Split Testing 332 Multivariate Testing 335 Variable Interactions 350 Part V Organization and Planning 359 Chapter 13 Assembling Your Team and Getting Buy-in 361 The Usual Suspects 362 Little Company, Big Company 372 The Company Politics of Tuning 375 Strategies for Getting Started 378 Insource or Outsource? 380 Chapter 14 Developing Your Action Plan 387 Before You Begin 388 Understand Your Business Objectives 389 What Is the Lifetime Value of the Conversion Action? 390 Assemble Your Team 401 Determine Your Landing Pages and Traffic Sources 403 Decide What Constitutes Success 405 Uncover Problems and Decide What to Test 407 Select an Appropriate Tuning Method 410 Implement and Conduct QA 412 Collect the Data 416 Analyze the Results and Verify Improvement 418 Chapter 15 Avoiding Real-World Pitfalls 421 Ignoring Your Baseline 422 Collecting Insufficient Data 422 Not Accounting for Seasonality 424 Assuming That Testing Has No Costs 424 Not Factoring In Delayed Conversions 426 Becoming Paralyzed by Search Engine Considerations 433 Failing to Act 436 Appendix Landing Page Testing Tools 437 Enterprise Tools 438 Free or Inexpensive Tools 440 Glossary 443 Index 451

    15 in stock

    £18.39

  • Information Systems  A Business Approach 3e

    John Wiley & Sons Australia Ltd Information Systems A Business Approach 3e

    1 in stock

    Book Synopsis

    1 in stock

    £37.79

  • Inverse Problems and Data Assimilation

    Cambridge University Press Inverse Problems and Data Assimilation

    1 in stock

    Book SynopsisThis concise introduction covers inverse problems and data assimilation, before exploring their inter-relations. Suitable for both classroom teaching and self-guided study, it is aimed at advanced undergraduates and beginning graduate students in mathematical sciences, together with researchers in science and engineering.Table of ContentsIntroduction; Part I. Inverse Problems: 1. Bayesian inverse problems and well-posedness; 2. The linear-Gaussian setting; 3. Optimization perspective; 4. Gaussian approximation; 5. Monte Carlo sampling and importance sampling; 6. Markov chain Monte Carlo; Exercises for Part I; Part II. Data Assimilation: 7. Filtering and smoothing problems and well-posedness; 8. The Kalman filter and smoother; 9. Optimization for filtering and smoothing: 3DVAR and 4DVAR; 10. The extended and ensemble Kalman filters; 11. Particle filter; 12. Optimal particle filter; Exercises for Part II; Part III. Kalman Inversion: 13. Blending inverse problems and data assimilation; References; Index.

    1 in stock

    £37.88

  • Natural Language Processing in the Real World

    Taylor & Francis Ltd Natural Language Processing in the Real World

    1 in stock

    Book SynopsisNatural Language Processing in the Real World is a practical guide for applying data science and machine learning to build Natural Language Processing (NLP) solutions. Where traditional, academic-taught NLP is often accompanied by a data source or dataset to aid solution building, this book is situated in the real world where there may not be an existing rich dataset. This book covers the basic concepts behind NLP and text processing and discusses the applications across 15 industry verticals. From data sources and extraction to transformation and modelling, and classic Machine Learning to Deep Learning and Transformers, several popular applications of NLP are discussed and implemented.This book provides a hands-on and holistic guide for anyone looking to build NLP solutions, from students of Computer Science to those involved in large-scale industrial projects.Trade Review"This book does a phenomenal job capturing the real-world techniques employed by industry experts to address complex problems with remarkable finesse and effectiveness. From foundational techniques to cutting-edge models, this book seamlessly blends practical code examples and insightful applications to provide a comprehensive understanding. Whether you're a novice or an experienced practitioner, this book will take you on a journey through the entire NLP landscape, providing the knowledge and skills needed to tackle any linguistic challenge and enhance your grasp of NLP. " - Sumanik Singh, Software Engineer at Amazon (Alexa Smart Home)"This book does an exceptional job of covering a wide range of NLP applications, making it a must-read for anyone interested in understanding the potential of this rapidly evolving field. It introduces the fundamental concepts of NLP in a clear and concise manner, ensuring that readers without a strong technical background can grasp the subject matter. It then delves deeper into advanced techniques and algorithms, providing readers with the necessary tools to implement NLP solutions effectively." - Neha Tiwari, Senior Data Scientist at Nielsen"This book does a phenomenal job capturing the real-world techniques employed by industry experts to address complex problems with remarkable finesse and effectiveness. From foundational techniques to cutting-edge models, this book seamlessly blends practical code examples and insightful applications to provide a comprehensive understanding. Whether you're a novice or an experienced practitioner, this book will take you on a journey through the entire NLP landscape, providing the knowledge and skills needed to tackle any linguistic challenge and enhance your grasp of NLP. " - Sumanik Singh, Software Engineer at Amazon (Alexa Smart Home)"This book does an exceptional job of covering a wide range of NLP applications, making it a must-read for anyone interested in understanding the potential of this rapidly evolving field. It introduces the fundamental concepts of NLP in a clear and concise manner, ensuring that readers without a strong technical background can grasp the subject matter. It then delves deeper into advanced techniques and algorithms, providing readers with the necessary tools to implement NLP solutions effectively." - Neha Tiwari, Senior Data Scientist at Nielsen"Often there is a gap between Education and Practice. This book is an essential resource to cover the gap and must-have for beginners as well as experienced professionals. As a researcher in academia and professor of machine learning, I find this book to be an eye opener for approaching NLP in a practical sense. Not only a great resource of people in academia, it is all you need to build NLP solutions in the real world regardless of the industry vertical you work in." - Dr. V. Kalaichelvi, Professor and Head, Department of EEE, Birla Institute of Technology & Science (BITS)"If you’re stuck before you even start your NLP project, this book is just what you need. From key data storage tools for text, to visualization techniques that make sense with language data, to practical use cases in many verticals, "Natural Language Processing in the Real World" will serve as your map, trailguide, and companion on your journey from fresh text dataset to prototype NLP app." - Rebecca Bilbro, Ph.D, Founder and CTO at Rotational Labs, Applied Text Analytics book author, Data Science faculty at Georgetown University"Natural Language Processing in the Real-World is a praiseworthy book that tackles a highly important subject. It provides an accurate representation of real-world applications and solutions, effectively bridging the gap between theory and practice. By exploring NLP across 15 different industry verticals, this book offers readers a comprehensive understanding of how NLP is implemented in practical scenarios. The inclusion of Python code for implementing NLP applications further enhances its worth, as it allows readers to apply their theoretical knowledge to real-world projects. As a researcher and academician, I consider this book to be an invaluable resource, and I believe it holds immense value for my students who are pursuing degrees in ML-related subjects and aspire to build careers in Data Science." - Vwani P. Roychowdhury, Professor, University of California, Los Angeles (UCLA)"The true value of natural language processing lies in its ability to quickly solve real-world business problems. While theory is important, it is the practical application of NLP and its connection to a company's mission that drives meaningful innovation and impact. This book provides a practical playbook, offering insights and techniques that bridge the gap between theory and practice. Data Science often carries the perception of being methodical and slow, but this book focuses on leveraging prototyping, stakeholder interaction, and iteration to integrate data science into the core of value delivery for companies. Whether you're an experienced practitioner or new to the field, this book empowers you to harness the power of NLP and transform the way we interact with language in the real world."- Joey McCord, Founder, CTO and Adjunct Professor"This exceptional guide offers profound insights into the various industries that leverage NLP, its alignment with business objectives, and practical guidance on developing Python-based applications. Whether you are a novice or an expert, this book is an invaluable resource. It comprehensively covers essential knowledge and has become an indispensable tool for enhancing my expertise and proficiency in NLP. I consider it an immensely valuable asset and a frequent reference in my work." - Dishant Banga, Sr. Data Analyst , BridgetreeTable of ContentsTable of Contents:List of FiguresList of TablesContributorsPrefaceAcknowledgements Chapter 1: NLP BasicsChapter 2: Data Sources and ExtractionChapter 3: Data Preprocessing and TransformationChapter 4: Data ModelingChapter 5: NLP Applications – Active UsageChapter 6: NLP Applications – Developing UsageChapter 7: Information Extraction and Text Transforming ModelsChapter 8: Text Categorisation and AffinitiesChapter 9: ChatbotsChapter 10: Customer Review AnalysisChapter 11: Recommendations and PredictionsChapter 12: More Real-World Scenarios and TipsBibliographyIndex

    1 in stock

    £56.99

  • Cyber Security and Business Intelligence

    Taylor & Francis Ltd Cyber Security and Business Intelligence

    1 in stock

    Book SynopsisTo cope with the competitive worldwide marketplace, organizations rely on business intelligence to an increasing extent. Cyber security is an inevitable practice to protect the entire business sector and its customer. This book presents the significance and application of cyber security for safeguarding organizations, individuals' personal information, and government.The book provides both practical and managerial implications of cyber security that also supports business intelligence and discusses the latest innovations in cyber security. It offers a roadmap to master degree students and PhD researchers for cyber security analysis in order to minimize the cyber security risk and protect customers from cyber-attack. The book also introduces the most advanced and novel machine learning techniques including, but not limited to, Support Vector Machine, Neural Networks, Extreme Learning Machine, Ensemble Learning, and Deep Learning Approaches, with a goal to apply those to cyber Table of Contents1. Leveraging Business Intelligence to Enhance Cyber Security InnovationSarika Faisal, Syed Far Abid Hossain, Saba Fahmida and Rayisa Rayhana2. Cyber Risk and the Cost of Unpreparedness of Financial InstitutionsNaveenan R.V and Suresh G 3. Cyber Security in Banking SectorMohammad Zoynul Abedin, Petr Hajek and Nusrat Afrin Shilpa4. Is the Application of Blockchain Technology in Accounting Feasible? A Developing Nation PerspectiveEmon Kalyan Chowdhury5. Empirical Analysis of Regression Techniques to Predict the Cybersecurity SalaryMahmudul Hasan, Md. Mahedi Hassan, Md. Faisal-E-Alam, and Nazrin Akter6. Test Plan for Immersive Technology-Based Medical Support SystemMohammad Nasfikur R Khan, Bhushan Lohar, Robert Cloutier and Kari J. Lippert 7. Current Challenges of Hand-Based Biometric SystemsKaterina Prihodova, and Miloslav Hub8. Investigating Machine Learning Algorithms with Model Explainability for Network Intrusion DetectionSad Wadi Sajid, K.M. Rashid Anjum, Md. Al-Shahariar and Mahmudul Hasan9. How Much Do the Features Affect the Classifiers on UNSW-NB15? An XAI Equipped Model InterpretabilityMahmudul Hasan, Abdullah Haque, Md Mahmudul Islam and Md Al Amin10. On the Selection of Suitable Dimensionality Reduction and Data Balancing Techniques to Classify DarkNet Access on CICDarknet2020Mahmudul Hasan, Ashraful Islam and Ashrafuzzaman Shohag11. An Effective Three-Layer Network Security to Prevent Distributed Denial of Service (DDoS) Attacks in Early StagesMahmudul Hasan, Sad Wadi Sajid and Md. Al Amin12. Information Hiding Through a Novel DNA Steganography Technique to Secure Text CommunicationNahid Binte Sadia, Mahmudul Hasan and Md. Rashedul Islam13. An Explainable AI-Driven Machine Learning Framework for Cybersecurity Anomaly DetectionMd. Mahedi Hassan, Md. Fahim Abrar and Mahmudul Hasan

    1 in stock

    £128.25

  • Killer Facebook Ads

    John Wiley & Sons Inc Killer Facebook Ads

    15 in stock

    Book SynopsisExpert Facebook advertising techniques you won''t find anywhere else! Facebook has exploded to a community of more than half a billion people around the world, making it a deliciously fertile playground for marketers on the cutting edge. Whether you want to leverage Facebook Ads to generate Likes, promote events, sell products, market applications, deploy next-gen PR, ,this unique guide is the ultimate resource on Facebook''s wildly successful pay-per-click advertising platform. Featuring clever workarounds, unprecedented tricks, and little-known tips for triumphant Facebook advertising, it's a must-have on the online marketer's bookshelf. Facebook advertising expert Marty Weintraub shares undocumented how-to advice on everything from targeting methods, advanced advertising techniques, writing compelling ads, launching a campaign, monitoring and optimizing campaigns, and tons more. Killer Facebook Ads serves up immediately actionable tips & tactics that span the gambiTrade Review'Weintraub hits a home run with this book, and if you advertise anywhere online, you will definitely benefit from reading it . Management-Issues.com, 23/11/11.Table of ContentsIntroduction xix Chapter 1 Marketing and the Facebook Revolution 1 Facebook's Reach 2 Understanding the Social Graph 7 What Marketers Can and Can't Do With Facebook Ads 10 The Ethical Marketer’s Rules of Engagement 14 Chapter 2 Key Performance Indicators (KPIs) 19 Setting Expectations 20 Defining KPIs 21 Facebook Ads and Attribution 33 Chapter 3 The Facebook Ad Creation UI 35 Web UI and Power Editor 36 Module 1: Design Your Ad 36 Module 2: Facebook’s Powerful Targeting 37 Module 3: Campaigns, Pricing, and Scheduling 63 Chapter 4 Facebook Ads Production Workflow 65 Power Editor 66 Understanding Account Structure 66 First Step: Wireframe Demographic Research 69 Second Step: Create Your First Ads 69 Structural Best Practices 72 Chapter 5 Guerilla User Targeting Checklist 77 Literal, Competitive, and Inferred Targeting 78 Occupations and Employment 86 Real-Life Groups and Affiliations 90 Online, Off Facebook . 99 Product Categories . 102 Classic Mainstream Interests 104 Chapter 6 Mastering Compound Targeting 111 Age, Interest, and Gender Mashups 112 Workplace and Precise Interest Amalgamations . 115 Education and Interest Amalgamations 119 Sexuality, Relationship Status, and Interests . 121 Country + Language + Interest Combinations 123 Chapter 7 Creating Killer Facebook Ads 127 The Five Levels of Brand Clarity 128 Headlines 130 Ad Images 140 Putting It All Together with Body Copy 147 Chapter 8 Deploying Your Facebook Ads Campaign 155 Facebook Ads Finances 156 Landing Page Considerations 163 Final Prelaunch Checklist 172 Chapter 9 Field Guide to Optimization and Reporting 173 Introducing Ads Manager 174 Navigating Facebook Ads Manager 174 Optimization 184 Facebook Reports 194 Wrapping Up and Looking Forward 201 Appendix A Facebook Ads Preflight Pocket Checklist 205 Appendix B The Great Big Search & Social Media Marketing Twitter Follow List 209 Appendix C Facebook Targeting Segments 219 Fortune 500 Companies 220 Job Titles 222 Weapons 225 Tech and Gaming 226 Interests Bucket Family Roles 228 Health 229 Outdoor Activities 231 Winter Sports and Activities 234 Sports 236 Green Living 238 Wine 239 Home/Garden 239 Discount 240 Tough Times 240 Music 241 Hobbies 242 Business 242 Chatting/RPG 243 Media with Cult Followings 244 Index 249

    15 in stock

    £18.39

  • Advanced Google AdWords 3e

    John Wiley & Sons Inc Advanced Google AdWords 3e

    15 in stock

    Book SynopsisThe ultimate guide to Google AdWords is fully updated for its third edition This is the ultimate guide for those who want to quickly get beyond AdWords basics to learn and apply the advanced techniques and tactics that are used by Fortune 500 companies.Table of ContentsForeword xxxi Introduction xxxiii Chapter 1 Understanding Search Theory 1 The Origins of Google AdWords 2 Google Enters the Arena 5 Google AdWords Select Revolutionizes PPC 6 The Psychology of Search 7 Turning Concepts into Words 8 Understanding Search Results 10 The Purpose of Ad Copy 11 Landing Pages Lead to New Customers 12 Advertising Is Not Advertising When It Is Information 14 Goal Alignment: Google vs. You vs. the Searcher 15 Best Practices for Applying Search Theory 17 Chapter 2 Performing Keyword Research 19 Understanding the Buying Funnel 20 Examining the Buying Funnel Phases 21 How Do Consumers Flow Through Your Buying Funnel? 22 Understanding Keywords 23 Types of Commercial Keywords 24 Finding Keyword Ideas 26 How Many Keywords Should You Have in Your Account? 29 Creating Keyword Lists 31 Using Long-Tail Keywords 33 Wide vs. Deep Keywords 35 Discerning Keyword Match Types 36 Broad Match 37 Modified Broad Match 38 When Should You Use Broad Match? 40 Phrase Match 40 Exact Match 42 Variation Match 43 Which Match Type Is Best? 44 Using Negative Match 46 Implementing Negative Keywords 46 Negative Broad Match 49 Negative Phrase Match 50 Negative Exact Match 51 Putting Negative and Positive Keywords Together 52 Researching Negative Keywords 53 Using Advanced Organizational Techniques 55 Adding Multiple Match Types to the Same Ad Group 55 Restricting Match Types by Ad Group 56 Restricting Match Types by Campaign 56 Taking Control of Your Ad Display 57 Best Practices for Conducting Keyword Research 58 Chapter 3 Keyword Tools: Extracting Valuable Data from Google 59 AdWords Keyword Planner 60 Generating Keyword Ideas 61 Advanced Options and Filters 65 Ad Group and Keyword Ideas 69 Traffic Estimates 76 AdWords Keyword Planner vs Third-Party Keyword Tools 82 Google Trends 83 What Services Should You Offer? 85 Determining Your Messaging 87 Determining Consumer Interest 88 Bing Ads Intelligence 89 Best Practices for Using Keyword Tools 90 Chapter 4 Writing Compelling Ads 93 Do Your Ads Reflect the Search Query? 94 Writing Effective Ads 96 Calls to Action 97 Touching the Emotional Core 98 Following Google’s Editorial Guidelines 99 Character Lengths 99 Editorial Requirements 100 Developing Unique Selling Propositions 102 Distinguishing Features and Benefits 103 Benefits, Features, and the Buying Funnel 104 When to Use a Feature vs. a Benefit 105 Employing Themes That Get Clicks 106 Utilizing Numbers in Ads 107 How Strong Is Your Call to Action? 110 Writing Informational Ad Copy 111 Utilizing Negative Ad Copy 114 Do Not Forget the Display URL 114 Controlling Your Mobile Ads 116 Spicing Up Your Ads with Ad Extensions 118 Sitelink Extensions 118 Call Extensions 125 Additional Extensions 127 Limited Betas for New Extensions 129 Showcasing Your Products with PLAs 129 Following the Law: Trademarks 131 Trademark Exceptions 134 The Quest for the Holy Grail of Advertising 135 Best Practices for Writing Compelling Ads 136 Chapter 5 Creating Landing Pages That Convert Searchers into Buyers 139 Does Your Landing Page Answer the Searcher’s Question? 140 Everything about Destination URLs 142 Using Destination URLs for Tracking 144 Complying with Destination URL Editorial Policies 151 Choosing Landing Pages That Increase Conversion Rates 152 Choosing Landing Pages Based on the Type of Query 153 Differentiating Local Business Queries 157 Using Segmentation Pages 159 Using Forms as Landing Pages 160 Thanking Your Customers 162 Crafting Perfect Landing Pages 164 Employing Usability, Trust, and Web Technology 164 Using Web Technology to Implement Usability and User Security 165 Psychological Factors That Increase Conversion Rates 173 Your Website’s Usability Goals 180 Best Practices for Landing Pages 181 Chapter 6 Learning Advanced Optimization Techniques 183 Optimizing for Traffic 184 Exploring Strategies to Show Your Ads More Often 184 Taking Advantage of Dynamic Keyword Insertion 190 Increasing Page Views 194 Optimizing for Conversions 198 Writing Ad Copy That Sells 199 Creating Landing Pages That Increase Conversions 200 Making Additional Conversions to Increase Your Profits 210 Best Practices for Advanced Optimization Techniques 213 Chapter 7 Demystifying Quality Score 215 What Is Quality Score? 216 How Quality Score Affects Ad Rank 218 Quality Score Factors for Search 221 Viewing Your Quality Score 225 Landing Page Quality: Making Your Pages Relevant 228 Spiderability 228 Relevance 229 Transparency 230 Navigation 230 Estimating Your First Page Bid 231 Understanding the Display Network Quality Score 233 Quality Score for Managed Placements 234 Diagnosing Your Quality Scores 235 Ignoring Quality Score 240 Increasing Quality Scores 243 Creating Highly Relevant Ad Groups 244 Ad Testing to Increase Quality Scores 246 Landing Page Fixes 248 What to Do if Your Quality Score Drops 249 Quality Score FAQs 251 Best Practices for Optimizing Quality Scores 254 Chapter 8 Beyond Text: Employing Image, Video, and Mobile Ads 257 Beyond the Desktop: Creating Mobile Ads 258 Reaching Smartphone Users 258 Smartphone Extensions 261 Reaching Other Mobile Users: WAP Mobile Ads 262 Ad Preview and Diagnosis Tool 264 Beyond Static Text: Creating Rich Media Ads 266 Creating Effective Image Ads 266 Developing Profitable Video Ads 272 AdWords Ad Gallery 275 Best Practices for Employing Image, Video, Mobile Ads 278 Chapter 9 Understanding the Display Network 279 What Is the Display Network? 280 Advantages of the Display Network 281 Display Targeting Methods 282 Automatic vs. Managed Placements 283 Creating Search- and Display-Only Campaigns 284 Managing Ad Group Targeting 285 Creating a Successful Display Network Campaign 286 Creating Keyword-Based Display Ad Groups 287 Display Network Topic Targeting 292 Targeting Ads Based on a User’s Interest 296 Placement Targeting: Choose the Actual Sites Where Your Ads Are Displayed 298 Blocking Your Ads from Being Shown across the Display Network 305 Determining Negative Display Keywords 309 Smart Pricing: Measure Success with Cost per Conversion 310 Choosing CPM or CPC Bidding 312 Using the Display Planner Tool 314 Best Practices for the Display Network 320 Chapter 10 Utilizing Advanced Display Network Techniques 323 Remarketing: Bringing Visitors Back to Your Site 324 Define an Audience 324 Place the Script on Your Site 328 Create a Remarketing Ad Group 330 The 100 Cookie Rule 332 Remarketing Strategies 332 Don’t Creep Out Your Customers 340 Flexible Targeting: Mixing and Matching Every Display Targeting Option 341 Flexible Targeting Options 342 Bid Modifiers for Display 344 Flexible Bidding Examples 345 Optimizing Your Display Campaigns 351 Organizing Your Display Campaigns 353 Creating Scenarios to Understand and Reach Your Target Audience 357 Writing Effective Display Ads 359 Best Practices for Advanced Display Network Advertising 361 Chapter 11 Utilizing Advanced Geographic Targeting Techniques 363 What Is Geographic Targeting? 364 The Technology behind Location Targeting 364 How Accurate Is Location Targeting? 366 Reaching Users in Specific Locations 369 Finding Locations to Target 370 Radius Targeting 374 Location Groups and Bid Modifiers 375 Advanced Location Targeting Options 376 Location Targeting Considerations 378 Targeting Multiple Countries 378 Reaching Users in an Area Smaller than a Country 380 Treating Locals and Nonlocals Differently in Your Ad Copy 385 Automatically Inserting Your Address into the Ad Copy 387 A Case Study into Local Belief Systems 390 Viewing Geographic Results 391 Geographic Performance Reports 393 Best Practices for Geographic Targeting 396 Chapter 12 Saving Time and Scaling Accounts with AdWords Editor 399 AdWords Editor Overview 400 Choosing Your Viewpoint 400 Viewing Your Account in AdWords Editor 404 Scaling Your Account 408 Importing Keywords 409 Creating Thousands of Keywords and Ad Groups 411 Easily Creating Thousands of Ads 414 Optimizing Display with AdWords Editor 420 Best Practices for Using AdWords Editor 421 Chapter 13 Devising Profitable Bid Strategies 423 Setting Your Marketing Goals 424 Measuring Results with Google’s Conversion-Tracking Code 425 AdWords Conversion-Tracking Code 426 Google Analytics Tracking 430 Accessing Valuable Conversion Data in AdWords Reports 432 Tracking Phone Calls 434 Exploring AdWords Bidding Options 435 Focus on Clicks, Option 1 435 Focus on Clicks, Option 2 435 Enhanced CPC 436 Conversion Optimizer 437 Focus on Impressions 443 Flexible Bidding 443 Profitable Bidding Strategies 448 ROAS vs Profit 449 Revenue per Click 450 Taking Margins into Account 453 How Can Publishers Determine Revenue per Click? 455 Tracking Long Sales Cycles with Conversion Funnels 457 Calculating Your Max CPC 460 Setting Bids Based on ROAS 460 Bidding for Exposure 461 Bid Modifiers: Automatically Changing Bids by Time, Geography, Devices, and More 464 Location Bid Modifiers 467 Ad Scheduling: Automatically Changing Bids by Time Periods 471 Finding Conversion Information by Time Frames 473 Examples of Ad Scheduling Success 476 Creating Time-Sensitive Offers 479 Device Modifiers 480 Understanding Attribution Management 481 Examining AdWords Reports to Make ROAS Bid Decisions 484 Best Practices for Utilizing Profitable Bid Strategies 487 Chapter 14 Organizing Accounts Successfully 489 What Is an AdWords Account? 490 What Are the Limits of an AdWords Account? 490 Managing Multiple Accounts the Easy Way 491 Becoming a Google Partner 494 Developing a Successful Campaign Structure 496 Reasons to Create New Campaigns 496 Structuring Campaigns to Achieve Business Goals 497 Organizing an Ad Group to Increase CTR and Conversion Rates 513 Ad Group Organization for Mobile Bid Modifiers 515 Best Practices for Account Organization Strategies 516 Chapter 15 Implementing Testing Techniques That Will Increase Profits 519 Testing Is Essential to Increasing Profits 520 Testing Ad Copy to Increase Conversions 520 Ad Copy Messages You Should Test 521 Ad Copy Themes to Spark Your Creativity 521 Test Discounts Instead of Prices 522 Creating the Ad Copy Test 525 General Guidelines for Statistical Significance 527 Measuring the Results of Your Ad Test 529 Multi-Ad Group Testing 532 Testing Mobile Ads 534 Testing Landing Pages to Increase Conversions 535 Testing Where to Send Traffic 536 Landing Page Testing Factors 541 Making Ads and Landing Pages Work Together 547 Essential Items to Test First 553 Creating a Landing Page Test 553 Testing Profit per Click and Profit per Impression 556 AdWords Campaign Experiments 559 Best Practices for Testing Techniques That Will Increase Profits 561 Chapter 16 AdWords Reports: Extracting Actionable Information 563 Choosing General AdWords Report Settings 564 Customizing the Interface 564 Downloading Your Data 568 Using Reports to Optimize Your Account 571 Campaign Reports 571 Ad Group Performance Report 573 Ad Performance Report 573 Keyword Report 576 Display Network Reports 579 Dimensions Reports 581 Creating Custom Alerts 585 Best Practices for Using AdWords Reports 587 Chapter 17 Step by Step: Creating and Monitoring Your AdWords Account 589 Before You Create Your Account 590 Creating Campaigns 592 Creating Search Campaigns 593 Creating Display-Targeted Campaigns 597 Creating Managed Placements Campaigns 598 Other Campaign Types 600 Optimizing Ongoing Campaigns 601 Optimizing Search Campaigns 601 Managing Maximize Clicks Campaigns 605 Optimizing Display Campaigns 606 Optimizing Managed Placements Campaigns 608 Optimizing CPM Campaigns 609 Optimizing Other Campaign Types 611 Creating an Optimization Schedule 612 Best Practices for Creating and Managing Your AdWords Account 615 Glossary 619 Index 627

    15 in stock

    £25.60

  • JMP Connections

    John Wiley & Sons Inc JMP Connections

    4 in stock

    Book SynopsisAchieve best-in-class metrics and get more from your data with JMP JMP Connections is the small- and medium-sized business owner''s guide to exceeding customer expectations by getting more out of your data using JMP. Uniquely bifunctional, this book is divided into two parts: the first half of the book shows you what JMP can do for you. You''ll discover how to wring every last drop of insight out of your data, and let JMP parse reams of raw numbers into actionable insight that leads to better strategic decisions. You''ll also discover why it works so well; clear explanations break down the Connectivity platform and metrics in business terms to demystify data analysis and JMP while giving you a macro view of the benefits that come from optimal implementation. The second half of the book is for your technical team, demonstrating how to implement specific solutions relating to data set development and data virtualization. In the end, your organizationTable of ContentsPreface xv Chapter 1 Generalized Context for Decision Process Improvement 1 1.1 Situational Assessment (Current State) 3 1.2 Problem Statement 11 1.3 Visualizing State Transition 15 1.4 Metrics On-Demand 20 Chapter 2 Real-Time Metrics Business Case 25 2.1 Project Description and Objectives—A Case Study 27 2.2 Solution Description 31 2.3 Cost and Benefit Analysis 34 2.4 Financial Assessment 37 2.5 Implementation Timeline 42 2.5.1 Contemplating Startup 42 2.5.2 Skills Dependencies and Timeline Consideration 44 2.5.3 Implementation Starting Point 46 2.5.4 Implementation to Deployment 49 2.6 Critical Assumptions and Risk Assessment 50 2.6.1 Critical Assumptions 50 2.6.2 Risk Assessment 51 2.7 Recommendations: Transmigrate the Enterprise 58 Chapter 3 Technical Details and Practical Implementation 63 3.1 Hardware Foundations 69 3.2 Solution Stack 70 3.3 Integration of Hardware and Software Infrastructure 72 3.4 Build Out 72 3.5 The Construction of a Metric 79 3.6 Metric Case Study 80 Chapter 4 Harvesting Benefits and Extensibility 99 4.1 Benefits Example 100 4.2 Extensibility 101 4.3 Configuration Management Version Control 102 Chapter 5 So What About a Bad Economy? 107 5.1 Overachievement—Data Virtualization 110 5.2 JMP Connection as the Universal Server 114 5.3 Well-Formed Data 117 5.4 Linked Data 120 Chapter 6 Decision Streams 133 Chapter 7 Delivery and Presentations 139 7.1 Push Versus Pull Delivery 140 7.2 Presentation 143 7.3 DIY, But Leave the Poor Bi Person Alone! 156 7.4 Advanced Presentation Method 157 Chapter 8 In Closing (As-Built) 163 Glossary 169 Appendix A Server-Side PHP Code 173 Appendix B JMP JSL Time Constant Learning Curve Script 175 Appendix C JMP GUI User Interface Code Example 181 Appendix D Resource Description Framework File Example 185 Appendix E Sample Hardware Requirements 191 Appendix F Early Warning Deliverable 193 Appendix G JMP PRO Connections: The Transversality of the Capability Maturity Model 203 G.1 Tangential Concept 204 G.2 Transversal Concept 205 G.3 Univariate to Multivariate Process Control 206 G.4 JMP Process Screening 208 G.5 Transversal Maturity Space in Relation to JMP PRO Features 210 G.6 Summary 212 References 213 Suggested Reading 217 Index 219

    4 in stock

    £28.49

  • Text as Data

    John Wiley & Sons Inc Text as Data

    3 in stock

    Book SynopsisText As Data: Combining qualitative and quantitative algorithms within the SAS system for accurate, effective and understandable text analytics The need for powerful, accurate and increasingly automatic text analysis software in modern information technology has dramatically increased. Fields as diverse as financial management, fraud and cybercrime prevention, Pharmaceutical R&D, social media marketing, customer care, and health services are implementing more comprehensive text-inclusive, analytics strategies. Text as Data: Computational Methods of Understanding Written Expression Using SAS presents an overview of text analytics and the critical role SAS software plays in combining linguistic and quantitative algorithms in the evolution of this dynamic field. Drawing on over two decades of experience in text analytics, authors Barry deVille and Gurpreet Singh Bawa examine the evolution of text mining and cloud-based solutions, and the development of SAS VTable of ContentsPreface xi Acknowledgments xiii About the Authors xv Introduction 1 Chapter 1 Text Mining and Text Analytics 3 Chapter 2 Text Analytics Process Overview 15 Chapter 3 Text Data Source Capture 33 Chapter 4 Document Content and Characterization 43 Chapter 5 Textual Abstraction: Latent Structure, Dimension Reduction 73 Chapter 6 Classification and Prediction 103 Chapter 7 Boolean Methods of Classification and Prediction 125 Chapter 8 Speech to Text 139 Appendix A Mood State Identification in Text 157 Appendix B A Design Approach to Characterizing Users Based on Audio Interactions on a Conversational AI Platform 175 Appendix C SAS Patents in Text Analytics 189 Glossary 197 Index 203

    3 in stock

    £42.75

  • Reviews in Computational Chemistry Volume 31

    John Wiley & Sons Inc Reviews in Computational Chemistry Volume 31

    15 in stock

    Book SynopsisThe Reviews in Computational Chemistry series brings together leading authorities in the field to teach the newcomer and update the expert on topicscentered on molecular modeling, such ascomputer-assisted molecular design (CAMD), quantum chemistry, molecular mechanics and dynamics, and quantitative structure-activity relationships (QSAR). This volume, like those prior to it, features chapters by experts in various fields of computational chemistry. Topics in Volume31 include:Lattice-Boltzmann Modeling of Multicomponent Systems: An IntroductionModeling Mechanochemistry from First PrinciplesMapping Energy Transport Networks in ProteinsThe Role of Computations in CatalysisThe Construction of Ab Initio Based Potential Energy SurfacesUncertainty Quantification for Molecular DynamicsTable of ContentsList of Contributors ix Preface xi Contributors to Previous Volumes xv 1 Lattice-Boltzmann Modeling of Multicomponent Systems: An Introduction 1Ulf D. Schiller and Olga Kuksenok Introduction 1 The Lattice Boltzmann Equation: A Modern Introduction 4 A Brief History of the LBM 5 The Lattice Boltzmann Equation 7 The Fluctuating Lattice Boltzmann Equation 23 Boundary Conditions 25 Fluid–Particle Coupling 30 LBM for Multiphase Fluids 37 Governing Continuum Equations 37 Lattice Boltzmann Algorithm for Binary Fluid: Free-Energy Approach 42 Minimizing Spurious Velocities 47 Conclusions 50 References 51 2 Mapping Energy Transport Networks in Proteins 63David M. Leitner and Takahisa Yamato Introduction 63 Thermal and Energy Flow in Macromolecules 65 Normal Modes of Proteins 65 Simulating Energy Transport in Terms of Normal Modes 69 Energy Diffusion in Terms of Normal Modes 70 Energy Transport from Time Correlation Functions 73 Energy Transport in Proteins is Inherently Anisotropic 75 Locating Energy Transport Networks 77 Communication Maps 77 CURrent calculations for Proteins (CURP) 80 Applications 83 Communication Maps: Illustrative Examples 83 CURP: Illustrative Examples 89 Future Directions 98 Summary 99 Acknowledgments 100 References 100 3 Uncertainty Quantification for Molecular Dynamics 115Paul N. Patrone and Andrew Dienstfrey Introduction 115 From Dynamical to Random: An Overview of MD 118 System Specification 119 Interatomic Potentials 121 Hamilton’s Equations 123 Thermodynamic Ensembles 128 Where Does This Leave Us? 131 Uncertainty Quantification 131 What is UQ? 132 Tools for UQ 136 UQ of MD 143 Tutorial: Trajectory Analysis 143 Tutorial: Ensemble Verification 148 Tutorial: UQ of Data Analysis for the Glass-Transition Temperature 151 Concluding Thoughts 161 References 162 4 The Role of Computations in Catalysis 171Horia Metiu, Vishal Agarwal, and Henrik H. Kristoffersen Introduction 171 Screening 172 Sabatier Principle 173 Scaling Relations 175 BEP Relationship 176 Volcano Plots 180 Some Rules for Oxide Catalysts 189 Let Us Examine Some Industrial Catalysts 191 Sometimes Selectivity is More Important than Rate 191 Sometimes We Want a Smaller Rate! 191 Sometimes Product Separation is More Important than the Reaction Rate 193 Some Reactions are Equilibrium-limited 193 The Cost of Making the Catalyst is Important 194 The Catalyst Should Contain Abundant Elements 194 A Good Catalyst Should not be Easily Poisoned 195 Summary 195 References 196 5 The Construction of Ab Initio-Based Potential Energy Surfaces 199Richard Dawes and Ernesto Quintas-Sánchez Introduction and Overview 199 What is a PES? 199 Significance and Range of Applications of PESs 204 Challenges for Theory 207 Terminology and Concepts 209 The Schrödinger Equation 209 The BO Approximation 210 Mathematical Foundations of (Linear) Fitting 215 Quantum Chemistry Methods 221 General Considerations 221 Single Reference Methods 223 Multireference Methods 225 Compound Methods or Protocols 227 Fitting Methods 229 General Considerations and Desirable Attributes of a PES 229 Non-Interpolative Fitting Methods 231 Interpolative Fitting Methods 239 Applications 242 The Automated Construction of PESs 242 Concluding Remarks 248 Acknowledgements 250 Acronyms/Abbreviations 250 References 251 6 Modeling Mechanochemistry from First Principles 265Heather J. Kulik Introduction and Scope 265 Potential Energy Surfaces and Reaction Coordinates 266 Theoretical Models of Mechanochemical Bond Cleavage 268 Linear Model (Kauzmann, Eyring, and Bell) 268 Tilted Potential Energy Profile Model 270 First-Principles Models for Mechanochemical Bond Cleavage 271 Constrained Geometries Simulate External Force (COGEF) 271 Force-Modified Potential Energy Surfaces 273 Covalent Mechanochemistry 278 Overview of Characterization Methods 278 Representative Mechanophores 280 Representative Mechanochemistry Case Studies 281 Benzocyclobutene 281 gem-Difluorocyclopropane 285 PPA: Heterolytic Bond Cleavage 288 Mechanical Force for Sampling: Application to Lignin 292 Best Practices for Mechanochemical Simulation 296 Conclusions 298 Acknowledgments 299 References 300 Index 313

    15 in stock

    £220.46

  • Visualizing Health and Healthcare Data

    John Wiley & Sons Inc Visualizing Health and Healthcare Data

    5 in stock

    Book SynopsisTable of ContentsPreface xiii Section I Establishing a Framework and Process 1 Chapter 1 Health and Healthcare Data Visualizations of Historical Importance 3 Chapter 2 Stop Hunting Unicorns and Start Building Teams and Know The Data 9 Search for Characteristics and Core Competencies 10 Get to Know the Data 11 Classifications, Intent, Purpose, and Lineage 12 Two Types of Data 14 Qualitative/Categorical Data 14 Quantitative/Numerical Data 14 Scales/Levels of Measure 15 Nominal 15 Ordinal 16 Interval 17 Ratio 18 Summary 19 Chapter 3 Requirements-Gathering and Design Methods 21 Design Thinking Foundational Concepts 22 Design Methods 23 Contextual Inquiry 23 Mental Models 24 Personas 26 Persona Creation Guide 27 Graphic Organizers 29 Guided Analytics Framework 29 Summary Overview Dashboard 30 Supporting Focused Reports 30 Details 31 Multidimensional Exploratory Displays (MEDs™) 31 Sketching 32 Prototyping 33 Testing 34 Summary 36 Section II Perceiving the Best Practices of Data Visualization 37 Chapter 4 The Research 39 Research Informs Data Visualization Best Practices 39 Preattentive Attributes 41 Preattentive Attributes at Work 43 Gestalt Principles 46 Color Theory 48 The Power of White Space 53 Where People Look 54 Summary 54 Chapter 5 Table Design Checklist 55 Fundamentals of Table Design 55 Organization/Categorization 55 Non-Data Ink 56 Fonts 56 Number Alignment and Formatting 56 Labels 58 Summary 58 Chapter 6 Powerful Visualizations in Four Shapes 59 Bars, Lines, Points, and Boxes 59 Shape One: Bars 61 Bar Basics 61 Using Bars To: See How You’re Doing 63 Distributions 63 Histograms 63 Population Pyramid (Paired Bars) 65 Ranking 67 Change over Time 68 Comparing Multiple Data Points 70 Proportions | Part-to-Whole 71 Challenging the 100% Myth 73 Deviation (Difference, Variation) 73 Ranges and Comparative Values 74 Displaying the Vital Few: Pareto Charts 77 Bars Are Not Boring 78 Shape Two: Lines 79 Line Basics 79 Using Lines To: See How You’re Doing 83 As a Reference | Comparison 83 Change over Time 84 Change over Time | Sparklines 86 Change over Time | Deviation Graphs 87 Distributions 88 Distributions | The Empirical Rule and Control Charts 88 Statistical Process Control Charts (SPCs) and Geometric (G) Charts 90 Relationships | Correlations 91 Shape Three: Points 92 Point Basics 92 Using Points To: See How You’re Doing 94 Distributions 94 Revealing Details 95 Change over Time 96 Correlation 96 Hierarchy Quadrant 97 Location Details 98 Shape Four: Boxes 98 Box Basics 99 Using Boxes To: See How You’re Doing 99 Distribution 99 Multiple Values 100 Change over Time and Utilization Rates 101 Hierarchical Data 101 Other Shapes 102 Summary 103 Chapter 7 Maps 105 Using Maps to Gain Insights 105 Geographic Maps 105 Choropleth Maps 106 Hex-Tile Maps 109 Symbol/Dot-Density Maps 110 Proportional Symbol Maps 112 When Not to Use a Map 113 Summary 114 Chapter 8 Graphs and Charts to Never Use or Use with Caution 115 When “Cool Displays” Are Anything But 115 Pie and Donut Charts 117 Why People Use Them 117 Characteristics 118 Challenges 118 Best Practice Alternative 119 Multiples of Several-Part Stacked Bar Charts (MSPSBCs) 121 Why People Use Them 121 Characteristics 121 Challenges 121 Best Practice Alternative 124 Bubble Charts 124 Why People Use Them 124 Characteristics 125 Challenges 125 Best Practice Alternative 126 Treemaps 128 Why People Use Them 128 Characteristics 129 Challenges 129 Best Practice Alternative 130 Marimekko (Mekko or Mosaic) Charts 132 Why People Use Them 132 Characteristics 132 Challenges 134 Best Practice Alternative 134 Radial Bar and Petal Charts 134 Why People Use Them 134 Characteristics 135 Challenges 135 Best Practice Alternative 136 Radar Charts 138 Why People Use Them 138 Characteristics 138 Challenges 138 Best Practice Alternative 139 Sankey Diagrams 141 Why People Use Them 141 Characteristics 141 Challenges 142 Best Practice Alternative 144 One More Thing: 3-D 145 Summary 146 Chapter 9 Making Accessible Visualizations 149 Accessible Design is Good Design 149 Accessibility in Data Visualization 150 Ways to Make Accessible Data Visualizations 151 Summary 158 Section III Creating Compelling Data Displays 159 Chapter 10 Dashboards, Reports, and Multidimensional Exploratory Displays (MEDs™) 161 Definitions Matter 161 Dashboards 162 Dashboards Defined 162 Purpose/Objective 162 Data/Information 163 Design 164 Example Dashboards 165 Dashboard Summary 169 Reports 170 Reports Defined 170 Purpose/Objective 170 Design 170 Example Reports 171 Report Summary 176 Multidimensional Exploratory Displays (MEDs™) 176 MEDs™ Defined 177 Purpose/Objective 177 Design 177 Example MED™ 177 MEDs™ Summary 184 Summary 184 Chapter 11 Infographics 185 "No Tobacco Day" Infographic 186 Measles and Vaccinations Infographic 188 Infographic vs. Infoposter 191 Summary 194 Section IV Closing Thoughts and Recommended Reading and Resources 195 Closing Thoughts 197 Fluency and Mastery 197 Bitten by the Viz Bug | Recommended Reading and Resources 199 Recommended Reading 199 Resources 201 Accessibility Resources 202 Author Bios 203 References 207 Index 211

    5 in stock

    £25.60

  • Information Technology for Management

    John Wiley & Sons Inc Information Technology for Management

    15 in stock

    Book SynopsisTable of Contents1 Digital Transformation Disrupts Companies, Competition, and Careers Case 1.1 Opening Case: China's Digitization Expands Business Opportunities and GDP 1.1 Doing Business in the On-Demand Economy 1.2 Business Process Improvement and Competition 1.3 IT Innovation and Disruption 1.4 IT and You Case 1.2 Business Case: The IoT Comes to Sports Case 1.3 Business Case: Retail Digital Transformation in Singapore Case 1.4 Video Case: Creating a Digital Vision to Transform a Company and Improve the Customer Experience 2 Information Systems, IT Infrastructure, and the Cloud Case 2.1 Opening Case: The Amazing Story of Tommy Flowers-Creator of the First Programmable Computer 2.1 IS Concepts and Classification 2.2 IT Infrastructure, IT Architecture, and Enterprise Architecture 2.3 Data Centers and Cloud Computing 2.4 Virtualization and Virtual Machines Case 2.2. Business Case: BMW Becomes More Competitive with Private and Hybrid Clouds Case 2.3 Video Case: Cloud Computing at Coca-Cola Is Changing Everything 3 Data Management, Data Warehouses, and Data Governance Case 3.1 Opening Case: Asia Capital Reinsurance Leverages Data Analytics Platforms 3.1 Data Management 3.2 Data Warehouses and Data Marts 3.3 Data Governance and Master Data Management (MDM) 3.4 Information Management 3.5 Electronic Document, Record, and Content Management Case 3.2 Business Case: AgriDigital, Australia. Blockchain Supported Insights for Farmers 4 Networks, the Internet of Things (IoT), and Edge Computing Case 4.1 Opening Case: Sony Builds an IPv6 Network to Fortify Competitive Edge 4.1 Network Fundamentals 4.2 Wireless Networks and Standards 4.3 Mobile Computing and the Internet of Things (IoT) 4.4 Network Quality of Service Case 4.2 Business Case: Carnival Seeks to Keep Passengers Happier at Sea with IoT, NFC, and Edge Computing 5 Data Privacy and Cyber Security Case 5.1 Opening Case: Yahoo Is Fined $117.5 Million for Worst Data Hacks in History 5.1 Data Privacy Concerns and Regulations 5.2 Extent and Cost of Cyberattacks and Cyber Threats 5.3 Cyberattack Targets and Consequences 5.4 Defending Against Cyberattacks and Managing Risk 5.5 Regulatory Controls, Frameworks, and Models Case 5.2 Business Case: LinkedIn Hack: Lessons Learned and Hidden Dangers 6 Business Intelligence, Data Science, and Data Analytics Case 6.1 Financial Intelligence Fights Fraud 6.1 Business Intelligence and Data Science 6.2 Big Data and Advanced Data Analytics 6.3 Descriptive Data Analytics Methods and Techniques 6.4 Predictive and Prescriptive Data Analytics Methods and Techniques Case 6.2 Business Case: London Heathrow Airport Launches BI and Machine Learning to Improve Airfield Management, Predict Passenger Flow, and Transform Airport Security Case 6.3 Video Case: The Beauty of Data Visualization 7 Social Media and Semantic Web Technology Case 7.1 Opening Case: The Darkside of Digital Campaigns: Disinformation and Foreign Influence 7.1 Web 2.0 Technologies 7.2 Social Web Tools and Applications 7.3 Using Search Technology for Business Success 7.4 A Search for Meaning-Web 3.0 and Semantic Technology 7.5 Recommendation Engines Case 7.2 Recommending Wine to Online Customers Case 7.3 Video Case: Power Searching with Google 8 Omnichannel Retailing, E-commerce, and Mobile Commerce Technology Case 8.1 Opening Case: Amazon Pioneers New In-Store Retail Concept 8.1 Omnichannel Retailing 8.2 In-Store Retail Technology 8.3 E-commerce-Online Retailing 8.4 Mobile Commerce 8.5 Mobile Payment and Financial Services Case 8.2 Business Case: eBay-An E-commerce Pioneer Faces New Challenges Case 8.3 Video Case: Searching with Pictures Using Mobile Visual Search 9 Functional Business Systems Case 9.1 Opening Case: Business Case: Equifax Data Breach Highlights Need for Regulatory Compliance Changes in Financial Management 9.1 Functional and Cross-Functional Business Processes 9.2 Production and Operations Management Systems 9.3 Sales and Marketing Management Systems 9.4 Accounting, Finance, and Regulatory Compliance Systems 9.5 Human Resource Information Systems (HRIS) Case 9.2 Business Case: MAHLE GmbH Partners with SAP and MHP to Digitalize Its Logistics and Product Development Processes Case 9.3 Video Case: Fuze Increases Its Sales and Marketing Success with an Account-Based Marketing System 10 Enterprise Systems Case 10.1 Opening Case: High-profile Food Recalls Prompt Walmart to Create a Safer, More Transparent, and More Efficient Global Food Supply Chain 10.1 Intro to Enterprise Systems 10.2 Enterprise Resource Planning 10.3 Supply Chain Management 10.4 Customer Relationship Management 10.5 Communicating and Collaborating with Knowledge Management, Content Management, and Enterprise Social Platforms Case 10.2 Business Case: Lowe's Integrates Augmented Reality and Robot Assistants into Its SCM and CRM Programs Case 10.3 Video Case: P&G-Creating Conversations with Global Consumers 11 Artificial Intelligence, Robotics, and Quantum Computing Technology Case 11.1 Opening Case: HSBC Adopts Machine Learning Artificial Intelligence to Fight Money Laundering 11.1 How AI Works 11.2 AI Applications in Business and Society 11.3 AI and Society (Ethics) 11.4 Robotics Case 11.2 Business Case: Recommendation Systems Powered by AI-Still Room for Improvement 12 IT Strategy, Sourcing, and Strategic Technology Trends Case 12.1 Opening Case: San Diego County's 20-Year Outsourcing Journey (to be checked for change) 12.1 IT Strategy and Competitive Advantage 12.2 IT Strategic Planning, Process, and Tools 12.3 IT Sourcing Strategies and IT Service Management 12.4 Strategic Technology Trends Case 12.2 Business Case: Optimization with Cloud Management Platform 13 Systems Development and Project, Program and Portfolio Management Case 13.1 Opening Case: Keeping Your Project on Track, Knowing When It Is Doomed 13.1 Systems Development 13.2 Software Development Methodologies 13.3 Project, Program, and Portfolio Management 13.4 Initiating, Planning, and Executing Projects 13.5 Monitoring/ Controlling and Closing Projects Case 13.2 Business Case: DevOps for Agile Innovation in Travel Services Case 13.3 Demo Case: Mavenlink Project Management and Planning Software 14 IT Ethics and Local and Global Sustainability Case 14.1 Opening Case: Royal Bank of Scotland Leverages Technology to Fulfill Its Strategy to Build a More Sustainable Bank 14.1 An Introduction to Ethics 14.2 ICT and Local Sustainability 14.3 ICT and Global Sustainability Case 14.2 Business Case: Green Digital Transformation Case 14.3 Video Case: IT Ethics in the Workplace

    15 in stock

    £48.59

  • Decision Intelligence for Dummies

    John Wiley & Sons Inc Decision Intelligence for Dummies

    10 in stock

    Book SynopsisLearn to use, and not be used by, datato make more insightful decisions The availability of data and various forms of AI unlock countless possibilities forbusiness decision makers.But what do you do when youfeelpressuredto cede yourposition in the decision-making process altogether? Decision IntelligenceForDummiespumps the brakes onthe growing trend to take human beings out of the decision loop and walks you through the best way to make data-informed but human-driven decisions.The book shows you how toachieve maximum flexibilitybyusingeveryavailable resource, and not just raw data, to make the most insightful decisions possible. In this timely book, you'll learn to: Make data a means to an end, rather thananend in itself, by expanding yourdecision-making inquiriesFind a new path to solid decisionsthat includes, but isn't dominated, by quantitative dataMeasure the results of your newframeworkto prove its effectiveness and efficiencyand expand it to a whole team or company Perfect forbusiness leaders in technology and finance,Decision IntelligenceForDummiesis ideal for anyone who recognizes that data isnot the only powerful tool in your decision-making toolbox.This book shows you how to be guided, and not ruled, by the data.Table of ContentsIntroduction 1 About This Book 2 Conventions Used in This Book 3 Foolish Assumptions 3 What You Don’t Have to Read 4 How This Book Is Organized 5 Part 1: Getting Started with Decision Intelligence 5 Part 2: Reaching the Best Possible Decision 5 Part 3: Establishing Reality Checks 5 Part 4: Proposing a New Directive 6 Part 5: The Part of Tens 6 Icons Used in This Book 6 Beyond the Book 7 Where to Go from Here 7 Part 1: Getting Started with Decision Intelligence 9 Chapter 1: Short Takes on Decision Intelligence 11 The Tale of Two Decision Trails 12 Pointing out the way 13 Making a decision 16 Deputizing AI as Your Faithful Sidekick 18 Seeing How Decision Intelligence Looks on Paper 20 Tracking the Inverted V 21 Estimating How Much Decision Intelligence Will Cost You 22 Chapter 2: Mining Data versus Minding the Answer 25 Knowledge Is Power — Data Is Just Information 26 Experiencing the epiphany 26 Embracing the new, not-so-new idea 28 Avoiding thought boxes and data query borders 29 Reinventing Actionable Outcomes 32 Living with the fact that we have answers and still don’t know what to do 32 Going where humans fear to tread on data 34 Ushering in The Great Revival: Institutional knowledge and human expertise 36 Chapter 3: Cryptic Patterns and Wild Guesses 39 Machines Make Human Mistakes, Too 40 Seeing the Trouble Math Makes 42 The limits of math-only approaches 42 The right math for the wrong question 43 Why data scientists and statisticians often make bad question-makers 46 Identifying Patterns and Missing the Big Picture 48 All the helicopters are broken 48 MIA: Chunks of crucial but hard-to-get real-world data 49 Evaluating man-versus-machine in decision-making 51 Chapter 4: The Inverted V Approach 53 Putting Data First Is the Wrong Move 54 What’s a decision, anyway? 55 Any road will take you there 56 The great rethink when it comes to making decisions at scale 57 Applying the Upside-Down V: The Path to the Output and Back Again 59 Evaluating Your Inverted V Revelations 60 Having Your Inverted V Lightbulb Moment 61 Recognizing Why Things Go Wrong 63 Aiming for too broad an outcome 63 Mimicking data outcomes 64 Failing to consider other decision sciences 64 Mistaking gut instincts for decision science 64 Failing to change the culture 65 Part 2: Reaching the Best Possible Decision 67 Chapter 5: Shaping a Decision into a Query 69 Defining Smart versus Intelligent 70 Discovering That Business Intelligence Is Not Decision Intelligence 71 Discovering the Value of Context and Nuance 72 Defining the Action You Seek 73 Setting Up the Decision 74 Decision science versus data science 75 Framing your decision 77 Heuristics and other leaps of faith 78 Chapter 6: Mapping a Path Forward 81 Putting Data Last 82 Recognizing when you can (and should) skip the data entirely 83 Leaning on CRISP-DM 84 Using the result you seek to identify the data you need 85 Digital decisioning and decision intelligence 85 Don’t store all your data — know when to throw it out 87 Adding More Humans to the Equation 88 The shift in thinking at the business line level 90 How decision intelligence puts executives and ordinary humans back in charge 92 Limiting Actions to What Your Company Will Actually Do 94 Looking at budgets versus the company will 95 Setting company culture against company resources 98 Using long-term decisioning to craft short-term returns 99 Chapter 7: Your DI Toolbox 101 Decision Intelligence Is a Rethink, Not a Data Science Redo 102 Taking Stock of What You Already Have 103 The tool overview 104 Working with BI apps 105 Accessing cloud tools 106 Taking inventory and finding the gaps 107 Adding Other Tools to the Mix 108 Decision modeling software 109 Business rule management systems 110 Machine learning and model stores 110 Data platforms 112 Data visualization tools 112 Option round-up 113 Taking a Look at What Your Computing Stack Should Look Like Now 113 Part 3: Establishing Reality Checks 115 Chapter 8: Taking a Bow: Goodbye, Data Scientists — Hello, Data Strategists 117 Making Changes in Organizational Roles 118 Leveraging your current data scientist roles 120 Realigning your existing data teams 121 Looking at Emerging DI Jobs 122 Hiring data strategists versus hiring decision strategists 125 Onboarding mechanics and pot washers 127 The Chief Data Officer’s Fate 127 Freeing Executives to Lead Again 129 Chapter 9: Trusting AI and Tackling Scary Things 131 Discovering the Truth about AI 132 Thinking in AI 133 Thinking in human 136 Letting go of your ego 137 Seeing Whether You Can Trust AI 138 Finding out why AI is hard to test and harder to understand 140 Hearing AI’s confession 142 Two AIs Walk into a Bar 144 Doing the right math but asking the wrong question 146 Dealing with conflicting outputs 147 Battling AIs 148 Chapter 10: Meddling Data and Mindful Humans 151 Engaging with Decision Theory 152 Working with your gut instincts 153 Looking at the role of the social sciences 155 Examining the role of the managerial sciences 156 The Role of Data Science in Decision Intelligence 157 Fitting data science to decision intelligence 157 Reimagining the rules 159 Expanding the notion of a data source 161 Where There’s a Will, There’s a Way 163 Chapter 11: Decisions at Scale 165 Plugging and Unplugging AI into Automation 167 Dealing with Model Drifts and Bad Calls 168 Reining in AutoML 170 Seeing the Value of ModelOps 173 Bracing for Impact 174 Decide and dedicate 174 Make decisions with a specific impact in mind 175 Chapter 12: Metrics and Measures 179 Living with Uncertainty 180 Making the Decision 182 Seeing How Much a Decision Is Worth 185 Matching the Metrics to the Measure 187 Leaning into KPIs 188 Tapping into change data 191 Testing AI 193 Deciding When to Weigh the Decision and When to Weigh the Impact 195 Part 4: Proposing A New Directive 197 Chapter 13: The Role of DI in the Idea Economy 199 Turning Decisions into Ideas 200 Repeating previous successes 201 Predicting new successes 202 Weighing the value of repeating successes versus creating new successes 202 Leveraging AI to find more idea patterns 203 Disruption Is the Point 205 Creative problem-solving is the new competitive edge 205 Bending the company culture 207 Competing in the Moment 207 Changing Winds and Changing Business Models 209 Counting Wins in Terms of Impacts 210 Chapter 14: Seeing How Decision Intelligence Changes Industries and Markets 213 Facing the What-If Challenge 214 What-if analysis in scenarios in Excel 216 What-if analysis using a Data Tables feature 217 What-if analysis using a Goal Seek feature 218 Learning Lessons from the Pandemic 220 Refusing to make decisions in a vacuum 221 Living with toilet paper shortages and supply chain woes 222 Revamping businesses overnight 224 Seeing how decisions impact more than the Land of Now 226 Rebuilding at the Speed of Disruption 228 Redefining Industries 230 Chapter 15: Trickle-Down and Streaming-Up Decisioning 231 Understanding the Who, What, Where, and Why of Decision-Making 232 Trickling Down Your Upstream Decisions 234 Looking at Streaming Decision-Making Models 236 Making Downstream Decisions 238 Thinking in Systems 240 Taking Advantage of Systems Tools 241 Conforming and Creating at the Same Time 244 Directing Your Business Impacts to a Common Goal 245 Dealing with Decision Singularities 246 Revisiting the Inverted V 248 Chapter 16: Career Makers and Deal-Breakers 251 Taking the Machine’s Advice 252 Adding Your Own Take 255 Mastering your decision intelligence superpowers 257 Ensuring that you have great data sidekicks 257 The New Influencers: Decision Masters 259 Preventing Wrong Influences from Affecting Decisions 262 Bad influences in AI and analytics 262 The blame game 265 Ugly politics and happy influencers 266 Risk Factors in Decision Intelligence 268 DI and Hyperautomation 270 Part 5: The Part of Tens 273 Chapter 17: Ten Steps to Setting Up a Smart Decision 275 Check Your Data Source 275 Track Your Data Lineage 276 Know Your Tools 277 Use Automated Visualizations 278 Impact = Decision 279 Do Reality Checks 280 Limit Your Assumptions 280 Think Like a Science Teacher 281 Solve for Missing Data 282 Partial versus incomplete data 282 Clues and missing answers 282 Take Two Perspectives and Call Me in the Morning 283 Chapter 18: Bias In, Bias Out (and Other Pitfalls) 285 A Pitfalls Overview 285 Relying on Racist Algorithms 286 Following a Flawed Model for Repeat Offenders 287 Using A Sexist Hiring Algorithm 287 Redlining Loans 287 Leaning on Irrelevant Information 288 Falling Victim to Framing Foibles 288 Being Overconfident 288 Lulled by Percentages 289 Dismissing with Prejudice 289 Index 291

    10 in stock

    £21.59

  • Theory and Practice of Online Therapy

    Taylor & Francis Ltd Theory and Practice of Online Therapy

    1 in stock

    Book SynopsisThis innovative new resource outlines the process of conducting individual, family and group therapy online with the use of video conferencing tools, and explores the unique concerns associated with this increasingly popular and convenient approach to treatment.Offering mental health practitioners a definitive presentation on how to use online tools to facilitate psychological intervention, the book will also enable readers to learn about the processes of virtual individual, couple, family and group therapy, specific concerns related to online group dynamics, as well as the responsibilities of the therapist and group leader in online sessions.This is the perfect companion for counselors of all backgrounds and disciplines who are interested in offering or improving their approach to virtual services.Table of ContentsAcknowledgmentsIntroduction to the book Haim Weinberg and Arnon Rolnick Section 1 General considerations for online therapy edited by Haim Weinberg and Arnon Rolnick Chapter 1 Intoduction to the general consideration section: principles of internet-based treatment Arnon Rolnick Chapter 2 Interview with Lewis Aron and Galit Atlas Chapter 3 Empathy in Cyberspace: the genie is out of the bottle Lou Agosta Chapter 4 Sensorimotor psychotherapy from a distance: engaging the body, creating presence, and building relationship in videoconferencing Pat Ogden and Bonnie Goldstein Chapter 5 The clinic offers no advantage over the screen, for relationship is everything: video psychotherapy and its dynamic Gily AgarChapter 6 Cybersupervision in psychotherapy Michael Pennington, Rikki Patton and Heather Katafiasz Chapter 7 Practical considerations for online individual therapy Haim Weinberg and Arnon Rolnick Secion 2 Online couple and family therapy edited by Shoshana Hellman and Arnon Rolnick Chapter 8 Introduction to the online couple and family therapy section Shoshana Hellman and Arnon Rolnick Chapter 9 Interview with Julie and John Gottman Chapter 10 Internet-delivered therapy in couple and family work Katherine M. Hertlein and Ryan M. Earl Chapter 11 Digital dialectics: navigating technology's paradoxes in online treatment Leora Trub and Danielle Magaldi Chapter 12 Practical considerations for online couple and family therapy Arnon Rolnick and Shoshana Hellman Section 3 Online group therapy edited by Haim Weinberg Chapter 13 Introduction to the online group therapy section Haim Weinberg Chapter 14 Interview with Molyn Leszcz Chapter 15 Oline group therapy: in search of a new theory? Haim Weinberg Chapter 16 Transformations through the technological mirror Raúl Vaimberg and Lara Vaimberg Chapter 17 Practical considerations for online group therapy Haim Weinberg Section 4 Online organizational consultancy edited by Rakefet Keret-Karavani and Arnon Rolnick Chapter 18 Introduction to the online organizational consultancy section Rakefet Keret-Karavani and Arnon Rolnick Chapter 19 Interview with Ichak Kalderon Adizes Chapter 20 All together, now: videoconferencing in organizational work Ivan Jensen and Donna Dennis Chapter 21 A relexive account: group consultation via video conference Nuala Dent Chapter 22 Practical considerations for online organizational consultancy Rakefet Keret-Karavani and Arnon Rolnick Epilogue Arnon Rolnick and Haim Weinberg

    1 in stock

    £27.54

  • Digital Forensics Investigation and Response

    Jones and Bartlett Publishers, Inc Digital Forensics Investigation and Response

    15 in stock

    Book Synopsis

    15 in stock

    £74.70

  • Machine Learning Applications

    John Wiley & Sons Inc Machine Learning Applications

    15 in stock

    Book SynopsisMachine Learning Applications Practical resource on the importance of Machine Learning and Deep Learning applications in various technologies and real-world situations Machine Learning Applications discusses methodological advancements of machine learning and deep learning, presents applications in image processing, including face and vehicle detection, image classification, object detection, image segmentation, and delivers real-world applications in healthcare to identify diseases and diagnosis, such as creating smart health records and medical imaging diagnosis, and provides real-world examples, case studies, use cases, and techniques to enable the reader's active learning. Composed of 13 chapters, this book also introduces real-world applications of machine and deep learning in blockchain technology, cyber security, and climate change. An explanation of AI and robotic applications in mechanical design is also discussed, including robot-assisted surgeries, security, and space explor

    15 in stock

    £88.65

  • AI for Good

    John Wiley & Sons Inc AI for Good

    15 in stock

    Book Synopsis

    15 in stock

    £17.59

  • Starting an Online Business AllinOne For Dummies

    John Wiley & Sons Inc Starting an Online Business AllinOne For Dummies

    15 in stock

    Book Synopsis

    15 in stock

    £24.79

  • Beginning iPhone 3 Development

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Beginning iPhone 3 Development

    1 in stock

    Book Synopsis1. Welcome to the Jungle.- 2. Appeasing the Tiki Gods.- 3. Handling Basic Interaction.- 4. More User Interface Fun.- 5. Autorotation and Autosizing.- 6. Multiview Applications.- 7. Tab Bars and Pickers.- 8. Introduction to Table Views.- 9. Navigation Controllers and Table Views.- 10. Application Settings and User Defaults.- 11. Introduction to Core Data.- 12. Basic Data PersistenceBeyond SQLite.- 13. Drawing with Quartz and OpenGL.- 14. Taps, Touches, and Gestures.- 15. Where Am I? Finding Your Way with Core Location.- 16. Whee!.- 17. iPhone Camera and Photo Library.- 18. Application Localization.- 19. Where to Next?Table of Contents Welcome to the Jungle Appeasing the Tiki Gods Handling Basic Interaction More User Interface Fun Autorotation and Autosizing Multiview Applications Tab Bars and Pickers Introduction to Table Views Navigation Controllers and Table Views Application Settings and User Defaults Basic Data Persistence Drawing with Quartz and OpenGL Taps, Touches, and Gestures Where Am I? Finding Your Way with Core Location Whee! Accelerometer! iPhone Camera and Photo Library Application Localization Where to Next?

    1 in stock

    £31.50

  • Advanced BlackBerry Development

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Advanced BlackBerry Development

    1 in stock

    Book SynopsisBlackBerry devices and applications are selling by the millions. As a BlackBerry developer, you need an advanced skill set to successfully exploit the most compelling features of the platform. This book will help you develop that skill set and teach you how to create the most sophisticated BlackBerry programs possible.With Advanced BlackBerry Development, you''ll learn you how to take advantage of BlackBerry media capabilities, including the camera and video playback. The book also shows you how to send and receive text and multimedia messages, use powerful cryptography libraries, and connect with the user''s personal and business contacts and calendar.Not only will you be learning how to use these application programming interfaces, but you''ll also be building a program that takes full advantage of them: a wireless media-sharing app. Each chapter''s lessons will be applied by enhancing the app from a prototype to a fully polished program. Along the way, yo''Table of Contents Getting Started Media Capture Media Playback Wireless Messaging Cryptography Personal Information Browser Digging in Deep RIM Security Porting Your App Advanced Build Techniques Conclusion

    1 in stock

    £23.62

  • Pro Android 5

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Pro Android 5

    1 in stock

    Book SynopsisPro Android 5 shows you how to build real-world and fun mobile apps using the Android 5 SDK. This book updates the best-selling Pro Android and covers everything from the fundamentals of building apps for smartphones, tablets, and embedded devices to advanced concepts such as custom components, multi-tasking, sensors/augmented reality, better accessories support and much more. Using the tutorials and expert advice, you''ll quickly be able to build cool mobile apps and run them on dozens of Android-based smartphones. You''ll explore and use the Android APIs, including those for media and sensors. And you''ll check out what''s new in Android, including the improved user interface across all Android platforms, integration with services, and more. By reading this definitive tutorial and reference, you''ll gain the knowledge and experience to create stunning, cutting-edge Android apps that can make you money, while keepTable of Contents1 Hello, World2 Introduction to Android Applications 3 Basic User Interface Controls 4 Adapters and List Controls 5 Making Advanced UI Layouts 6 Adding Menus and ActionBar 7 Styles and Themes 8 Fragments 9 Responding to Configuration Changes 10 Dialogs: Regular and Fragment 11 Working with Preferences and Saving State 12 Compatibility Library 13 Exploring Packages, Processes, Components, Threads and Handlers 14 Working with Services 15 Advanced Async Task & Progress Dialogs 16 Exploring Broadcast Receivers and Long Running Services 17 Exploring the Alarm Manager 18 Unveiling 2D Animation 19 Exploring Maps and Location Services 20 Understanding the Media Frameworks 21 Home Screen Widgets 22 Touchscreens 23 Drag and Drop 24 Using Sensors25 Understanding Content Providers26 Understanding the Contacts API 27 Loaders 28 Security and Permissions 29 Google Cloud messaging and services30 Deploying Your Application: Google Play Store and Beyond

    1 in stock

    £49.49

  • The Business of Android Apps Development

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG The Business of Android Apps Development

    1 in stock

    Book SynopsisThe growing but still evolving success of the Android platform has ushered in a second mobile technology gold rush for app developers. Google Play and Amazon Appstore for Android apps has become the second go-to apps eco for today''s app developers. While not yet as large in terms of number of apps as iTunes, Google Play and Amazon Appstore have so many apps that it has become increasingly difficult for new apps to stand out in the crowd. Achieving consumer awareness and sales longevity for your Android app requires a lot of organization and some strategic planning. Written for today''s Android apps developer or apps development shop, this new and improved book from Apress, The Business of Android Apps Development, Second Edition, tells you today''s story on how to make money on Android apps. This book shows you how to take your app from idea to design to development to distribution and marketing your app on Google Play or Amazon Appstore. <Table of Contents1. The Android Market: A Background 2. Making Sure Your App Will Succeed 3. Legal Issues: Better Safe Than Sorry 4. A Brief Introduction to Android Development 5. Develop Apps Like a Pro 6. Making Money with Ads on Your Application 7. In-App Billing: Putting A Store in Your Application 8. Making App Marketplaces Work for You 9. Getting The Word Out 10. After You Have A User Base

    1 in stock

    £26.59

  • Android on x86 An Introduction to Optimizing for Intel Architecture

    Apress Android on x86 An Introduction to Optimizing for Intel Architecture

    15 in stock

    Table of ContentsChapter 1: History & Evolution of Android OS Chapter 2: Mobile Device Applications – Uses and Trends Chapter 3: Why x86 on Android? Chapter 4: Android Development – Business Overview andConsiderations Chapter 5: Android Devices with Intel Processors Chapter 6: Installing the Android SDK for IntelApplication Development Chapter 7: The Intel Mobile Processor Chapter 8: Creating and Porting NDK-based AndroidApplications Chapter 9: Debugging Android Chapter 10: Performance Optimization for AndroidApplications on x86 Chapter 11: x86 NDK and C++ Optimizations Chapter 12: Intel Hardware Accelerated Execution ManagerAppendix: References

    15 in stock

    £29.99

  • Learn Sprite Kit For Ios Game Development

    Apress Learn Sprite Kit For Ios Game Development

    15 in stock

    Book SynopsisWith Learn Sprite Kit for iOS Game Development, you'll discover how easy it is to create 2D games using the new Sprite Kit framework from Apple.Table of Contents1. Hello World2. SKActions and SKTexture: Your First Animated Sprite3. Sprite Movement with User Input4. Edges, Boundaries, and Ledges5. More Animated Sprites: Enemies and Bonuses6. Creating a Cast of Characters7. Points and Scoring8. Contacts and Collisions9. Adding More Scenes and Levels10. Where to Go from Here

    15 in stock

    £29.50

  • MMOs from the Inside Out

    APress MMOs from the Inside Out

    15 in stock

    Book SynopsisThe ideas, information and instruction of a pioneer of MassivelyMultiplayer Online RolePlaying Games speak to designers and players, taking it that the games are inspirational and boundless forces for good, and aiming to enthuse an upcoming generation, inspire and educate players and designerstobe, and reinvigorate those already in the field.Table of Contents

    15 in stock

    £58.49

  • Integrating Serverless Architecture

    APress Integrating Serverless Architecture

    1 in stock

    Book Synopsis Design, develop, build, and deliver an end-to-end serverless architecture by leveraging Azure services, frameworks, and tools. This book offers a holistic approach, guiding you through the design and development of a Twitter Bot application, while leveraging Azure Functions. Integrating Serverless Architecture begins with an overview of serverless computing and getting started with Azure Functions. Here, you will create a Twitter bot function which scans Twitter for the latest tweets and makes use of dependency injection. Further, you will learn about Azure Cosmos DB where you will cover its change feed mechanism and the repository pattern. You will create a Cosmos DB trigger-based tweet notifier function, which will broadcast the latest tweets to connected clients. You will explore the basics of Azure Service Bus and create a tweet scheduler function, which will prioritize different keywords for the Twitter bot function. Along the way, you will debug, deliverTable of Contents 1. New Era of Serverless Computing · Introduction to Serverless Computing · Introduction to Twitter Bot application · Scope of Work · Technologies to be Used · Logical Architecture · Physical Architecture · Software Prerequisites · Summary · References 2. Getting Started with Azure Functions · Understanding Azure Functions · Explore Tweetinvi Library and interact with Twitter · Create a Tweet Bot Function · Debug the Azure Function · Logging support in Azure Function · Deploy the Function to Azure · Exercises · Summary · References 3. Explore Azure Cosmos DB and its Change feed mechanism · Introduction to Azure Cosmos DB · Azure Cosmos DB Repository Pattern · Sample CRUD Operations · Integrate with Tweet Bot Function · Understand Change Feed mechanism · Implement Azure Cosmos DB Trigger Function · Exercises · Summary · References 4. Secure Secrets in Azure Key Vault · Introduction to Azure Key Vault · Store Secrets in Key Vault · Access Secrets in Azure Functions from Key Vault · Summary · References 5. Getting Started with Azure SignalR Service · Introduction to Azure SignalR Service · Create a SignalR Service · Integrate with Azure Cosmos DB Trigger Function · Summary · References 6. Create Tweet Bot Web Application · Getting started with .NET Core · Create a Web application with Materialize CSS · Integrate with Tweetinvi to display list of Hashtags · Save User Preference to Cosmos DB · Display latest tweets from Cosmos DB · Integrate with Azure SignalR Service and display real-time notifications · Deploy to Azure Web App Service · Exercises · Summary · References 7. Enable App Service Authentication on Azure Functions · Introduction to App Service Authentication · Enable App Service Authentication on Azure Web App · Enable App Service Authentication on Azure Functions · Integrate Authentication flow from Web app to Azure Functions · Exercises · Summary · References 8. Configuring Continuous Integration and Continuous Deployment to Azure Environment · Design a Continuous Integration and Deployment pipeline · Create VSTS and Check-in the Source Code · Create Build Definition · Create Release Definition · Testing the CI/CI Pipeline · Provisioning and configuring our Azure Function infrastructure (optional) · Extending Twitter Bot Exercises 9. Setup Continuous Integration and Continuous Deployment pipeline for Azure Functions

    1 in stock

    £49.49

  • Modern Arm Assembly Language Programming

    APress Modern Arm Assembly Language Programming

    1 in stock

    Book SynopsisGain the fundamentals of Armv8-A 32-bit and 64-bit assembly language programming. This book emphasizes Armv8-A assembly language topics that are relevant to modern software development. It is designed to help you quickly understand Armv8-A assembly language programming and the computational resources of Arm''s SIMD platform. It also contains an abundance of source code that is structured to accelerate learning and comprehension of essential Armv8-A assembly language constructs and SIMD programming concepts. After reading this book, you will be able to code performance-optimized functions and algorithms using Armv8- A 32-bit and 64-bit assembly language. Modern Arm Assembly Language Programming accentuates the coding of Armv8-A 32-bit and 64-bit assembly language functions that are callable from C++. Multiple chapters are also devoted to Armv8-A SIMD assembly language programming. These chapters discuss how to code functions that are used in computationally inTable of ContentsModern Arm Assembly Language ProgrammingF:\ModArmAsm\Chapters\Outline\ModernArmAsm_Outline (V2).docx Page 1 of 6Daniel KusswurmIntroductionBook overviewTarget audienceContent overviewSource codeTerminology and conventionsAdditional resourcesChapter 1 – Armv8-32 ArchitectureArmv8-32 OverviewData typesFundamental data typesNumerical data typesSIMD data typesInternal architectureGeneral-purpose register fileApplication Program Status Register (APSR)Instruction set overviewInstruction operandsMemory addressing modesChapter 2 – Armv8-32 Core Programming – Part 1Integer arithmeticAddition and subtraction (Ch02_01)Multiplication (Ch02_02)Division (Ch02_03)Integer operationsLoad instructions (Ch02_04)Move instructions (Ch02_05, Ch02_06)Logical operations (Ch02_07)Chapter 3 – Armv8-32 Core Programming – Part 2Basic stack argumentsStack arguments (Ch03_01)Stack arguments using mixed data types (Ch03_02)Advanced stack use Modern Arm Assembly Language ProgrammingF:\ModArmAsm\Chapters\Outline\ModernArmAsm_Outline (V2).docx Page 2 of 6Daniel KusswurmStack use with local storage (Ch03_03)Stack use with frame pointer (Ch03_04)Using the APSR condition flagsCompare instructions (Ch03_05)Looping (Ch03_06)Chapter 4 – Armv8-32 Core Programming – Part 3Integer arrays Array arithmetic (Ch04_01) Array arithmetic using mixed-type integers (Ch04_02)Integer matrices Matrix example #1 (Ch04_03) Matrix example #2 (Ch04_04)Advanced programming Advanced array operations (Ch04_05) Structures (Ch04_06)Chapter 5 – Armv8-32 Floating-Point ArchitectureFloating-point programming conceptsBinary encodingsNaNsDenormalsFlush to zeroFloating-point registersSingle-precision registersDouble-precision registersFPSCR (floating-point status and control register)Rounding modesExceptionsChapter 6 – Armv8-32 Floating-Point ProgrammingFloating-point arithmeticFP arithmetic example #1 (Ch06_01)FP arithmetic example #2 (Ch06_02)FP arithmetic example #3 (Ch06_03)Floating-point compares and conversionsFP compares (Ch06_04)FP conversions (Ch06_05)Floating-point arrays and matrices Modern Arm Assembly Language ProgrammingF:\ModArmAsm\Chapters\Outline\ModernArmAsm_Outline (V2).docx Page 3 of 6Daniel KusswurmFP arrays (Ch06_06)FP matrices (Ch06_07)Advanced floating-point programmingUsing C++ floating-point library functions (Ch06_08)Chapter 7 – Armv8-32 SIMD ArchitectureArmv8-32 SIMD Architecture OverviewSIMD programming conceptsWraparound and saturated arithmeticSIMD architectureRegister setsData typesSIMD arithmetic operationsPacked integer arithmeticPacked floating-point arithmeticChapter 8 – Armv8-32 SIMD Integer ProgrammingPacked integer arithmeticAddition and subtraction (Ch08_01)Multiplication (Ch08_02)Shift and logical operations (Ch08_03)Packed integer image processingPixel minimum and maximum (Ch08_04)Mean intensity (Ch08_05)Image thresholding (Ch08_06)Chapter 9 – Armv8-32 SIMD Floating-Point ProgrammingPacked floating-point arithmeticAddition, subtraction, multiplication, division (Ch09_01)Compares (Ch09_02)Conversions (Ch09_03)Packed floating-point arraysMinimum and maximum (Ch09_04)Least squares (Ch09_05)Packed floating-point matrices4x4 matrix transposition (Ch09_06)4x4 matrix multiplication (Ch09_07) Modern Arm Assembly Language ProgrammingF:\ModArmAsm\Chapters\Outline\ModernArmAsm_Outline (V2).docx Page 4 of 6Daniel KusswurmChapter 10 – Armv8-64 ArchitectureArmv8-64 OverviewData typesNumerical data typesSIMD data typesInternal architectureGeneral-purpose register fileFloating-point and SIMD registersStatus flags and condition codesInstruction set overviewOperandsMemory addressing modesChapter 11 – Armv8-64 Core Programming – Part 1Integer arithmeticAddition & subtraction (Ch11_01)Multiplication (Ch11_02)Division (Ch11_03)Integer operationsLoad and store instructions (Ch11_04)Move instructions (Ch11_05)Logical instructions (Ch11_06)Shift instructions (Ch11_07)Chapter 12 – Armv8-64 Core Programming – Part2Stack arguments and local storageStack arguments using mixed data types (Ch12_01)Stack arguments with local storage (Ch12_02)Using condition codesCompare instructions (Ch12_03)Looping (Ch12_04)Integer arrays and matricesArray programming example (Ch12_05)Matrix programming example (Ch12_06)Chapter 13 – Armv8-64 Floating-Point ProgrammingFloating-point arithmeticSingle-precision arithmetic (Ch13_01) Modern Arm Assembly Language ProgrammingF:\ModArmAsm\Chapters\Outline\ModernArmAsm_Outline (V2).docx Page 5 of 6Daniel KusswurmDouble-precision arithmetic example #1 (Ch13_02)Double-precision arithmetic example #2 (Ch13_03)Floating-point compares and conversionsCompare instructions (Ch13_04)Conversion instructions (Ch13_05)Floating-point arrays and matricesArray programming example (Ch13_06)Matrix programming example (Ch13_07)Advanced floating-point programmingUsing C++ floating-point library functions (Ch13_08)Chapter 14 – Armv8-64 SIMD Integer ProgrammingPacked integer arithmeticAddition and subtraction (Ch14_01)Shift operations (Ch14_02)Multiplication (Ch14_03)Packed integer image processingPixel min/max (Ch14_04)Gray-scale pixel clipping (Ch14_05)Image statistics (Ch14_06)Chapter 15 – Armv8-64 SIMD Floating-Point ProgrammingPacked floating-point arithmeticAddition subtraction, multiplication, division (Ch15_01)Compares (Ch15_02)Conversions (Ch15_03)Packed floating-point arrays Correlation coefficient (Ch15_04) Image conversion – RGB to grayscale (Ch15_05)Packed floating-point matrices 4x4 matrix multiplication (Ch15_06) 4x4 matrix-vector multiplication (Ch15_07)Chapter 16 – Armv8-64 Advanced SIMD ProgrammingArmv8 microarchitecture overviewOptimization guidelinesSignal processingFMA convolution (Ch16_01) Modern Arm Assembly Language ProgrammingF:\ModArmAsm\Chapters\Outline\ModernArmAsm_Outline (V2).docx Page 6 of 6Daniel KusswurmVector and matrix operationsVector cross products (Ch16_02)Matrix-vector products (Ch16_03)Matrix inversion (Ch16_04)Appendix A – Source Code and Software Development ToolsSource codeHardware platformHost operating systemsSetup and configurationSoftware toolsg++gasmakeBuilding and executing the source code projectsAppendix B – References and Additional ResourcesArmv8 programming referencesAlgorithm referencesSoftware development resourcesAdditional resources

    1 in stock

    £49.49

  • Patterns in the Machine

    APress Patterns in the Machine

    1 in stock

    Book SynopsisDiscover how to apply software engineering patterns to develop more robust firmware faster than traditional embedded development approaches. In the authors'' experience, traditional embedded software projects tend towards monolithic applications that are optimized for their target hardware platforms. This leads to software that is fragile in terms of extensibility and difficult to test without fully integrated software and hardware. Patterns in the Machine focuses on creating loosely coupled implementations that embrace both change and testability.This book illustrates how implementing continuous integration, automated unit testing, platform-independent code, and other best practices that are not typically implemented in the embedded systems world is not just feasible but also practical for today''s embedded projects.After reading this book, you will have a better idea of how to structure your embedded software projects. You will recognize that while writing unit tests, creating simulators, and implementing continuous integration requires time and effort up front, you will be amply rewarded at the end of the project in terms of quality, adaptability, and maintainability of your code. What You Will Learn Incorporate automated unit testing into an embedded project Design and build functional simulators for an embedded project Write production-quality software when hardware is not available Use the Data Model architectural pattern to create a highly decoupled design and implementation Understand the importance of defining the software architecture before implementation starts and how to do it Discover why documentation is essential for an embedded project Use finite state machines in embedded projects Who This Book Is ForMid-level or higher embedded systems (firmware) developers, technical leads, software architects, and development managers.Table of Contents1: Introduction2: Core Concepts3: Design Theory For Embedded Programming4: Persistent Storage Example5: Software Architecture6: Automated Unit Testing7: Functional Simulator8: Continuous Integration9: Data Model10: Finite State Machines11: Documentation12: File Organization and Naming13: More About Late Bindings14: Main and Initialization15: More Best Practices16: Example Code17: Rules For DevelopmentAppendix A: TerminologyAppendix B: UML Cheat SheetAppendix C: Notation for State MachinesAppendix D: Coding ConventionsAppendix E: Why C++

    1 in stock

    £35.99

  • Blockchain Enabled Applications

    APress Blockchain Enabled Applications

    1 in stock

    Book SynopsisLearn all about blockchain and its applications in cryptocurrency, healthcare, Internet of Things, finance, decentralized organizations, and more. Featuring case studies and practical insights, this book covers a unique mix of topics and offers insight into how to overcome hurdles that arise as the market and consumers grow accustomed to blockchain-based organizations and services.The book is divided into three major sections. The first section provides a historical background to blockchain technology. You will start with a historical context to financial capital markets when Bitcoin was invented, followed by mining protocols, the need for consensus, hardware mining, etc. Next, a formal introduction to blockchain is provided covering transaction workflow, role of decentralized network, and payment verification. Then, we dive deep into a different implementation of a blockchain: Ethereum. The main technical features, such as Ethereum Virtual Machine, are presented aTable of ContentsChapter 1: Behold the DeamersChapter Goal: Provide a backdrop for introducing blockhain and the basics of a decentralized appSub -Topics:1. Financial crisis of 2008, the origins of bitcoin2. Basics of private-public keys3. What is a block, how is a block created4. What's a blockchain-enabled application? What is a decentralized application?Chapter 2: Gold Rush: Mining BitcoinChapter Goal: Provide a technical introduction to mining and the mathematical background to hashes, block headers, and consensusSub -Topics:1. Overview of mining, why is mining necessary for Bitcoin2. What is consensus3. Components of a block and a block header (mining components)4. What are hashes and how are they used in Bitcoin5. Hardware for mining (the gold rush part refers to the arms race that happened in hardware mining field).Chapter 3: Foundations of a BlockchainChapter Goal: Provide a technical introduction to transaction workflow, a blockchain network, simple payment verification, merkel roots, and block identifiersSub -Topics:1. What is a block header (block identifiers)2. How does the network participate3. A transaction workflow 4. Unspent transaction outputs, transaction propagation5. Simple payment verification6. Merkel roots, blockchain forksChapter 4: Unpacking EthereumChapter Goal: Provide a technical introduction to Ethereum, the differences between a Bitcoin blockchain and Ethereum blockchain, internal states, Ethereum Virtual Machine, and dAppsSub -Topics:1. Overview of Ethereum 2. Proof of stake3. Accounts and contract model in Ethereum4. Global state, gas, internal storage5. Ethereum Virtual Machine6. Solidity programming language + Smart Contracts7. World Computer Model and components8. Blockchain as a service9. Decentralized apps10. Geth, MistChapter 5: Decentralized Organizations (DAOs)Chapter Goal: Provide a technical introduction to DAOs and Aragon for setting up a DAO, including updates to new implementations of decentralized organizations in 2020. Sub -Topics:1. What is a DAO 2. What is a blockchain organizations/companies3. Aragon-core and Kernel4. How do you make DAOs and other blockchain organizations using Aragon?5. How do you operate DAOs?Chapter 6: The DAO HackedChapter Goal: Provide an overview to the vulnerabilities in the original DAO model, the conditions that led up to the hack, and the consequences to security hardening since. Sub -Topics:1. Concept of a DAO building on Vitalik’s concepts2. Slock.it and its involvement in making the DAO 3. The Smart Contract for DAO4. The code vulnerability responsible for the hack5. Consequences of the hack6. Ethereum splitting into ETCChapter 7: Ethereum Tokens: High Performance Computing (HPC)Chapter Goal: Provide an introduction to token in Ethereum by highlighting applications in HPC. Particularly, focus on Golem, SONM, and iEx.ec grid computing for off-chain computations and conflict resolution.Sub -Topics:1. Why tokens and what’s the value of using tokens2. Introduction to tokens, ERC 20 compatibility3. Token layer and an app layer4. Prototype for tokens and HPC – Ethereum Computation Markets5. Golem network, app registry, transaction framework, use-cases initially, and how the Smart Contract system ties them together6. SONM network and fog computing, use-cases, Smart Contract system, buyer-miner-hub interactions, purchasing computational power, Superglobal architecture, and OS7. iEx.ec, grid computing, sidechains, and how iEx.ec works Chapter 8: Blockchain in HealthcareChapter Goal: Provide an introduction to areas in healthcare where using a blockchain can provide benefit - Patient workflows, insurance claims processing, lightning network, verifiable data auditSub -Topics:1. Payer-provider-patient model, how claims work within this framework, and how will that change in the future2. Patient workflow based on permissions, blockchain-based workflow of a simple EHR, how permissions are passed as a patient moves from a general physician to a specialist 3. Show how permissions work in blockchain insurance claims processing4. Waste management in healthcare and claims processing5. Concept of hotswitching, mentioning lightning network6. How can blockchain be used to reduce economic waste 7. DeepMind’s Verifiable Data Audit as an alternative to blockchain8. Blockchain to streamline business processesChapter 9: Blockchain in ScienceChapter Goal: Provide an introduction to major topics in science where blockchain can be beneficial – Reputation markets, reproducibility crisis, drug tracking, digital clinical trialsSub -Topics:1. Reproducibility crisis in science2. Prediction markets in science – Augur and Gnosis3. Initiatives to fix reproducibility traditionally4. Clinical trials using the blockchain, colored coins to demonstrate workflow5. Reputation systems using Blockchain6. Pharma drug tracking using blockchainChapter 10: Building Healthcare Companies on BlockchainChapter Goal: Interview with John Bass on how to build a healthcare company on the blockchain and lessons learned along the way.Sub -Topics:1. The makings of Hashed Health2. Collaborative and consortium models3. Working groups for high-risk, high-reward technologies4. Governance models for Hashed Health consortia5. Member participationChapter 11: Rise of ConsortiumsChapter Goal: Provide an overview of consortium models that have become popular in the blockchain industry, the challenges consortiums hope to solve, and advantages to individual membersSub -Topics:1. Collaborative and consortium models2. Working groups for high-risk, high-reward technologies3. Governance models for Hashed Health consortiaChapter 12: The Hyperledger ProjectChapter Goal: Provide a broad overview of the Hyperledger Project and cover the rapid pace of developments since 2018 to the new products launched.Sub -Topics:1. Updates to all the components under Hyperledger umbrella including Fabric and Sawtooth2. New consensus algorithm (PBFT)3. Demo of Hyperledger Fabric Constructor4. Does your business need a blockchain (flowcharts)?5. Security in enterprise-grade Blockchains6. Smart Contracts in FabricChapter 13: Recent Advances in BlockchainChapter Goal: Provide a review of three major networks shaping the future of Blockchain – EOS.io with parallel processing virtual machine, chain-core with asset management, and Ivy Playground and Quorum with private–public transaction interfacesSub -Topics:1. EOS.io, how the tech works, the new advances such as parallel processing of smart contracts and instructions2. Chain Core, managing assets on blockchain, Ivy Playground as the new programming language to manage assets3. Quorum by JP Morgan, how the consensus works, how private transactions work, zero-knowledge proofs, Ethereum Enterprise AllianceChapter 14: Blockchain GamesChapter Goal: Provide a review of the educational games and APIs that have been released to teach the basic concepts of a blockchain networkSub -Topics:1. Components of a blockchain game2. Formal education and training in blockchain3. Formalization of blockchain study with journals and research articles4. Review of major blockchain games (3)Chapter 15: Cloud BlockchainsChapter Goal: Provide an overview of how to click and deploy a blockchain using cloud services and give a visual tutorial on how to set it upSub -Topics:1. Demo of Hyperledger Fabric Constructor on IBM Bluemix 2. Azure blockchain deployment3. Amazon ECS cloud blockchain deployment4. Setting up your own blockchain test-lab and budget itChapter 16: Technological Revolutions and Financial CapitalChapter Goal: Provide an overview of the financial markets and ICOs, focusing particularly on how to set up ICOs, how to manage them, advances to financial regulation technology based on blockchainSub -Topics:1. Dr. Hooper’s chapter focused on ICOs and financial capital markets2. Setting up ICOs, major pitfalls to avoid, and challenges to overcome during an ICO3. Major tech advances in financial markets using blockchain4. Reg TechAfterword – Call to Action and The Future of Blockchain

    1 in stock

    £37.49

  • Digital Fluency

    APress Digital Fluency

    1 in stock

    Book Synopsis If you are curious about the basics of artificial intelligence, blockchain technology, and quantum computing as key enablers for digital transformation and innovation, Digital Fluency is your handy guide. The real-world applications of these cutting-edge technologies are expanding rapidly, and your daily life will continue to be affected by each of them. There is no better time than now to get started and become digitally fluent. You need not have previous knowledge of these versatile technologies, as author Volker Lang will expertly guide you through this digital age. He illustrates key concepts and applications in numerous practical examples and more than 48 catchy figures throughout Digital Fluency. The end of each chapter presents you with a helpful implementation checklist of central lessons before proceeding to the next. This book gets to the heart of digital buzzwords and concepts, and tells you what they truly mean. Table of ContentsPreface1 Digitalization & Digital Transformation1.1 Historical Business Transformations1.2 Innovation & Disruption Theory1.3 The Digital Ecosystem1.3.1 Major Driving Forces1.3.2 Digital Transformation Strategy1.3.3 The Role of Qubits, Blocks and Neurons1.3.4 Innovation Models of Google, Amazon & Co.1.4 Classical Data Processing1.4.1 The Digital Code1.4.2 Principles of Operation1.4.3 Computers & Other Digital DevicesReferences2 Quantum Computing2.1 Setting the Quantum Computing Scene2.2 The Strange World of Quantum Computing2.2.1 Spooky Quantum Reality2.2.2 How Quantum Computers Operate2.2.3 The Fussy Search after the Perfect Qubit2.3 Quantum Computers Today2.3.1 Current Business Applications2.3.2 Commercially Available Systems2.3.3 Next Challenges2.4 Summary & Implementation FrameworkReferences3 Blockchain Technology3.1 Setting the Blockchain Scene3.1.1 The Role of Transactions & Money in History3.1.2 Basic Functions of Money in Society3.2 Blockchain Fundamentals3.2.1 Decentralization and the Arrival of Trust3.2.2 The Immutable Data Structure3.2.3 Digital Value Transfer3.2.4 The Authorization of Transactions by Digital Signatures3.2.5 Deploying Trust by Consensus and Mining3.2.6 Smart Business Contracts3.3 Blockchain Technology Today3.3.1 Implementation Challenges for Enterprises3.3.2 Current Business Applications3.3.3 Further Use Cases3.4 Summary & Implementation FrameworkReferences4 Artificial Intelligence4.1 Setting the Artificial Intelligence Scene4.1.1 The Symbiosis of Neurobiology & Information Theory4.1.2 The Conference that Started it All4.1.3 IBM’s Legendary Projects DeepBlue & Watson4.2 Central Ideas behind Artificial Intelligence4.2.1 The Cost Function4.2.2 Minimization of the Cost Function4.3 The Five Categories of Learning4.3.1 Supervised Learning4.3.2 Unsupervised Learning4.3.3 Deep Learning4.3.4 Ensemble Methods4.3.5 Reinforcement Learning4.4 Top Use Cases and Business Applications4.4.1 Computer Vision4.4.2 Healthcare4.4.3 Natural Language Processing4.4.4 Energy Efficiency4.4.5 Drug Discovery4.4.6 Financial Services & Insurance4.5 Summary & Implementation FrameworkReferences5 Your Digital Action Plan5.1 Envision a Digital Business & Operating Model5.2 Select the Right Technology Stack5.3 Digitize the Core5.4 Identify Pilot Projects5.5 Empower Employees5.6 Shape the Organization & Structure5.7 Establish an Open Innovation Culture5.8 Leverage the EcosystemReferencesGlossary

    1 in stock

    £44.99

  • Mastering VMware Horizon 8

    APress Mastering VMware Horizon 8

    1 in stock

    Book SynopsisLearn all about designing, installing, configuring, and managing VMware Horizon, with a core focus on how to deliver virtual desktops using Horizon. This book allows you to follow the complete process for deploying VMware Horizon and covers the design, deployment, and management of solutions. You''ll start by reviewing remote solutions, from virtual desktops to published applications, including the benefits and what the different solutions deliver. Once through the high-level technology you''ll then look at the VMware Horizon solution focusing on the architecture and the components that make up the solution and how to design a production-ready environment.  Other VMware EUC technologies that complement the core Horizon solution will also be incorporate into it. Armed with the knowledge of how to design a solution, you''ll move onto the installation phase and start to build a test lab environment. Once your lab is installed, you''ll move onto the configurTable of ContentsChapter 1: What Are Remote Desktop Solutions?Chapter 2: Getting Started with VMware HorizonChapter 3: Architecting Horizon for DeploymentChapter 4: Installing and Configuring Your Horizon EnvironmentChapter 5: Creating Virtual Desktop Images for DeploymentChapter 6: Building and Configuring Desktop PoolsChapter 7: Managing Horizon with Active Directory GPOsChapter 8: Horizon Computer GPOs Settings (split from chapter 7)Chapter 9: Horizon User GPO Settings (split from chapter 7)Chapter 10: Managing the End User Environments (former chapter 8)Chapter 11: Horizon Apps (former chapter 9)Chapter 12: Horizon Published Desktop (former chapter 10) Chapter 13: Connecting End Users (former chapter 11)Chapter 14: Horizon Enterprise Edition (former chapter 12)Chapter 15: Upgrading Horizon (former chapter 13)Chapter 16: Running Horizon in the Cloud (former chapter 14)Chapter 17: Horizon Troubleshooting (former chapter 15) Online Resource: Advanced Configuration and Management (former chapter 16)

    1 in stock

    £52.24

  • Beginning Java 17 Fundamentals

    APress Beginning Java 17 Fundamentals

    3 in stock

    Book SynopsisLearn the fundamentals of the Java 17 LTS or Java Standard Edition version 17 Long Term Support release, including basic programming concepts and the object-oriented fundamentals necessary at all levels of Java development.Table of Contents1. Programming Concepts 2. Setting Up the Environment 3. Writing Java Programs 4. Data Types 5. Operators 6. Statements 7. Classes and Objects 8. Methods 9. Constructors 10. Modules11. Object and Objects Classes 12. Wrapper Classes 13. Execution Handling 14. Assertions 15. Strings 16. Dates and Times 17. Formatting Data 18. Regular Expressions 19. Arrays 20. Inheritance 21. Interfaces 22. Enum Types 23. Java Shell Appendix A: Character Encodings Appendix B: Documentation Comments

    3 in stock

    £46.74

  • Build Your Own IoT Platform

    APress Build Your Own IoT Platform

    3 in stock

    Book SynopsisEvery solution that is in some way related to the IoT needs a platform; learn how to create that platform with us. This book is about being agile and reducing your time to market without breaking the bank. It is about designing something that can scale incrementally without rework and potentially disrupting the current work.So, the key questions are: What does it take? How long does it take? And, how much does it take to build your own IoT platform? This book answers these questions and provides you with step-by-step guide to building your own IoT platform. In this book, the author highlights what the core of an IoT platform looks like. There are always some must-haves and some nice-to-haves. This book distinguishes the two and focuses on building the must-haves. Building your IoT platform is not only the most significant cost-saver but can also be a satisfying learning experience. This edition will extend your work with a sample project to clarify the concepts Table of Contents Chapter 1: So… You Want to Build Your Own! · The Background of IoT and Our Focus · How Many Platforms Are Out There? · Platforms Supporting Network Servicing · Platforms Sitting Between Networks and Applications · Application-Layer Development Platforms · What Should a Good IoT Platform Have? · Why Should You Build Your Own IoT Platform? · Summary Chapter 2: The Building Blocks of an IoT Solution · The Functional Blocks of an IoT Solution · The Detailed Block Diagram of an IoT Platform · Is Everything from this Block Architecture Mandatory? · What Is the Proposed Approach? · Summary Chapter 3: The Essentials for Building Your Own Platform · Deciding Cloud Instance Specifics · Additional Specifications · Where Do We Get this Cloud Instance? · What About Our Own Machine? · Expanding on the IoT Platform Block Diagram · Edge Interface, Message Broker, and Message Bus · Message Router and Communications Management · Time-Series Storage and Data Management · REST API Interface · Microservices · Rule Engine · Device Manager and Application Manager · Our Own IoT Platform Block Diagram · Summary Chapter 4: Let’s Create Our Platform Wish List · Connecting with the Platform in Real Time · Using MQTT as the Message Broker · How Do We Want to Store the Data? · Data Storage Schema · Accessing Platform Resources Through APIs · Data Accessing APIs · Elementary Microservices and Utilities · Routing and Filtering Data and Messages · Updated Block Diagram of Our IoT Platform · Summary Chapter 5: Here We Go! · Initializing the Cloud Instance · Register and Create · Choosing an Operating System Image · Choosing the Size · Choosing a Datacenter Region · Finalizing and Creating the Instance · Connecting to Our Cloud Instance · Installing Basic Software Stacks · Installing Apache · Installing MySQL · Installing PHP · Securing the Instance and Software · It’s Easier with a Domain Name · Add Virtual Hosts to Our Web Server · Installing SSL Certificates · Installing Node.js and Node-RED · Modifying Node-RED Settings · Securing our Node-RED Editor · Summary Chapter 6: The Message Broker · What Is MQTT? · Publish and Subscribe Paradigm · Other Features of a Message Broker and MQTT · Quality of Service · Keep Alive Period · Last Will and Testament · The Retained Message · The Best Part: WebSocket · Are We Using the Best Message Broker Option? · When to Utilize a Message Broker and When Not To · Installing a Message Broker · Securing a Message Broker · Summary Chapter 7: Building the Critical Components · Creating a Time-Series Core Database · Installing Required Nodes in Node-RED · Creating First Flow for Our Platform · Adding MQTT Publish Capability · REST API Message Publisher · Creating the Database Listener · REST API Message Retriever · Verifying that Everything Is Working as Expected · Running Node-RED in the Background Continuously · Summary Chapter 8: Configuring the Message Broker · The Difference Between WebSocket and Normal MQTT · Why Is WebSocket Important? · Adding WebSocket to Our MQTT Configuration · Testing WebSocket · Let’s Add User Access Controls · Let’s Check If This Is Working · Using the Forever Tool with the Message Broker · Summary Chapter 9: Creating a REST Interface · Data Access APIs · Adding Time-Based Filters · Data Deletion APIs · Removing Data Records Completely · Adding Microservices to the Platform · Getting the Current Timestamp · Random Code Generator · Adding New Modules to Node-RED · UUID Generator · Email and Text Message Microservice APIs · Configuration of Nodes · SMS Sending Utility · Email-Sending Utility · Summary Chapter 10: Rule Engine and Authentication · Start with the Rule Engine Logic · Creating a Database · Building the Flow Sequence · Testing the Rule Engine · Rule Management APIs · Enable and Disable a Specific Rule · Enable and Disable All Rules · Create a New Rule · Building Another Rule Engine with Node-RED · Adding Authentication to the Data API · What Are Our Options? · What Is the Plan? · Adding Authentication Middleware · Enable and Test Authentication · Our Core Platform Is Ready Now · Summary Chapter 11: Documentation and Testing · Preparing a Valid OpenAPI Specification Document · Platform API Specification File Explained · Preparing Distribution Package for Final Upload · Upload API Docs and Make It Live · Authorize and Test API · Summary Chapter 12: Connecting Your Hardware · Why learn hardware alongwith IoT platform? · Available hardware options · Creating bespoke designs · Choosing the best option for your project · Connectivity options and suitability for project · Various topologies and arrangements § The “why” behind each topology and arrangement · Connecting our hardware to the platform § Two possible modes o Using REST API o Using MQTT o Can you use both? Why and when? § Requirements for each mode o Circuit specific o Firmware specific § How to incorporate them in hardware o Circuit specific o Firmware specific · Other considerations for connecting the hardware · Summary Chapter 13: Let's Build a Better Mousetrap · Backstory of better mousetrap case study § How I got this opportunity § What does “better” mean? § How I decided to approach this problem § Importance of top-down approach · System architecture § High level system design process § Block diagram and explanation · Hardware selection § What are different scenarios § What are potential options § What is on our shortlist · Connectivity choice § What are different scenarios § What are potential options § What is on our shortlist · Front-end application § What are different scenarios § What are potential options § What is on our shortlist · Hardware arrangement § Hardware construction (overview) § How it works § Testing the hardware · Backend buildup on the platform § What additions we need on the platform side § How to build them (details) § Testing the backend · Dashboard for visualization § Building a basic dashboard § How to pool the data · Additional services I built in the mousetrap application § Workflow for CRM § Client alert mechanism § Operator Scheduling § Compliance reporting § Machine learning provision for intelligent pest management § Other business benefits · Project takeaways – real life and for you (as a reader) · Summary Chapter 14: Unlimited Possibilities · What do I mean by unlimited possibilities? · Why is this platform so capable? · Five ideas you can work on § One button – based on my 1btn project o The concept o Block diagram o Key ideas and things to work on o Potential applications § Smart street lamps o The concept o Block diagram o Key ideas and things to work on o Potential applications § Council garbage collection management o The concept o Block diagram o Key ideas and things to work on o Potential applications § Datacenter climate control o The concept o Block diagram o Key ideas and things to work on o Potential applications § People counter for Covid-19 gathering compliance in shops & stores o The concept o Block diagram o Key ideas and things to work on o Potential applications · Summary Chapter 15: What We Built and the Takeaways · Increasing Security for the Cloud Instance · What About SQL Injection Through APIs? · Should We Have Used MongoDB Instead of MySQL? · Some Experts Might Still Try to Talk You Out of This · How Is Our Platform Different from AWS, Google, and Azure? · There Is a New Version of MQTT · My Platform Is Ready. Now What? · The Next Big Thing · If You Need to Find More Resources · Finally

    3 in stock

    £46.74

  • Software Development with Go

    APress Software Development with Go

    1 in stock

    Book SynopsisGain insights into the different challenges that can be solved using Go, with a focus on containers, Linux, security, networking, user interfaces and other relevant cloud based topics. This book reviews the necessary tools to create container-based cloud solutions with Go, a programming language that was born out of the need to address scalable, high availability cloud computing architecture needs inside Google. Go, also known as Golang, has been adopted across different industries and products with many popular Open Source projects that power cloud computing technologies such as Docker and Kubernetes being written with Go. As the complexity of cloud technology increases, so does the need for people to understand how things work under-the-hood and to fix them when they''re broken. What You Will Learn Understand how the various components of a container-based system works Tackle complex technical isTable of ContentsSoftware Development with Go Part 1: System Programming Chapter 1 - System Calls Chapter 2 - System Calls Using Go Chapter 3 - Accessing proc File System Part 2: Containers Chapter 4 - Simple Containers Chapter 5 - Containers with Networking Chapter 6 - Docker Security Part 3: Application Security Chapter 7 - Gosec and AST Chapter 8 – Scorecard Part 4: Networking Chapter 9 - Simple Networking Chapter 10 - System Networking Chapter 11 - Google gopacket Chapter 12 - Epoll Library Part 5: Securing Linux Chapter 13 - Vulnerability Scanner Chapter 14 – CrowdSec Part 6: Terminal User Interface Chapter 15 - ANSI and UI Chapter 16 - TUI Framework Part 7: Linux System Chapter 17 – systemd Chapter 18 – cadvisor

    1 in stock

    £22.49

  • Distributed Machine Learning Patterns

    Manning Publications Distributed Machine Learning Patterns

    10 in stock

    Book SynopsisPractical patterns for scaling machine learning from your laptop to a distributed cluster. In Distributed Machine Learning Patterns you will learn how to: Apply distributed systems patterns to build scalable and reliable machine learning projects Construct machine learning pipelines with data ingestion, distributed training, model serving, and more Automate machine learning tasks with Kubernetes, TensorFlow, Kubeflow, and Argo Workflows Make trade offs between different patterns and approaches Manage and monitor machine learning workloads at scale Scaling up models from standalone devices to large distributed clusters is one of the biggest challenges faced by modern machine learning practitioners. Distributed Machine Learning Patterns teaches you how to scale machine learning models from your laptop to large distributed clusters. In Distributed Machine Learning Patterns, you'll learn how to apply established distributed systems patterns to machine learning projects, and explore new ML-specific patterns as well. Firmly rooted in the real world, this book demonstrates how to apply patterns using examples based in TensorFlow, Kubernetes, Kubeflow, and Argo Workflows. Real-world scenarios, hands-on projects, and clear, practical DevOps techniques let you easily launch, manage, and monitor cloud-native distributed machine learning pipelines Distributed Machine Learning Patterns teaches you how to scale machine learning models from your laptop to large distributed clusters. In it, you'll learn how to apply established distributed systems patterns to machine learning projects, and explore new ML-specific patterns as well. Firmly rooted in the real world, this book demonstrates how to apply patterns using examples based in TensorFlow, Kubernetes, Kubeflow, and Argo Workflows. Real-world scenarios, hands-on projects, and clear, practical DevOps techniques let you easily launch, manage, and monitor cloud-native distributed machine learning pipelines. about the technology Scaling up models from standalone devices to large distributed clusters is one of the biggest challenges faced by modern machine learning practitioners. Distributing machine learning systems allow developers to handle extremely large datasets across multiple clusters, take advantage of automation tools, and benefit from hardware accelerations. In this book, Kubeflow co-chair Yuan Tang shares patterns, techniques, and experience gained from years spent building and managing cutting-edge distributed machine learning infrastructure. about the book Distributed Machine Learning Patterns is filled with practical patterns for running machine learning systems on distributed Kubernetes clusters in the cloud. Each pattern is designed to help solve common challenges faced when building distributed machine learning systems, including supporting distributed model training, handling unexpected failures, and dynamic model serving traffic. Real-world scenarios provide clear examples of how to apply each pattern, alongside the potential trade offs for each approach. Once you've mastered these cutting edge techniques, you'll put them all into practice and finish up by building a comprehensive distributed machine learning system.Trade Review'This is a really well thought out book on the problem of dealing with machine learning in a distributed environment.' Richard Vaughan 'A sound introduction to the exciting field of distributed ml for practitioners.' Pablo Roccat 'I came away with a greater familiarity with distributed training ideas, problems, and solutions.' Matt SarmientoTable of Contentstable of contents PART 1: BASIC CONCEPTS AND BACKGROUND READ IN LIVEBOOK 1INTRODUCTION TO DISTRIBUTED MACHINE LEARNING SYSTEMS PART 2: PATTERNS OF DISTRIBUTED MACHINE LEARNING SYSTEMS READ IN LIVEBOOK 2DATA INGESTION PATTERNS READ IN LIVEBOOK 3DISTRIBUTED TRAINING PATTERNS READ IN LIVEBOOK 4MODEL SERVING PATTERNS READ IN LIVEBOOK 5WORKFLOW PATTERNS READ IN LIVEBOOK 6OPERATION PATTERNS PART 3: BUILDING A DISTRIBUTED MACHINE LEARNING PIPELINE 7 OVERVIEW OF PROJECT ARCHITECTURE 8 OVERVIEW OF RELEVANT TECHNOLOGIES 9 A COMPLETE IMPLEMENTATION

    10 in stock

    £45.99

  • Balanced Website Design: Optimising Aesthetics, Usability and Purpose

    Springer London Ltd Balanced Website Design: Optimising Aesthetics, Usability and Purpose

    15 in stock

    Book SynopsisReal Website Design is a new methodology that fuses traditional strengths of structured, stepped, and iterative approaches to design and implementation, sharply focused throughout a project on defining and achieving the desired purpose, usability and aesthetic characteristics – which are essential requirements of any website. This book offers practical discussion of new perspectives on usability and aesthetics, and a down-to-earth, structured approach to designing a website or teaching website design.Trade ReviewFrom the reviews: "‘Balanced Website Design (BWD) is a new methodology that fuses the strengths of traditional structured, stepped, and iterative approaches with … the desired characteristics of purpose, usability and aesthetics.’ … Throughout the book, there are many helpful figures and tables to support the methodology. The structure of the book makes it appropriate for academic use. In addition, practitioners looking for ways to improve or broaden their skills, to serve clients with varying needs and interests, will be interested in reading the book." (M. G. Murphy, ACM Computing Reviews, Vol. 49 (3), March, 2008)Table of ContentsGrounding.- Balanced Website Design (BWD): The Context Explained.- The World of Website Design.- Website Usability.- Aesthetics and Websites.- Methodology Process.- Requirements – Initial Acquisition.- Design Needs – Building the Picture.- Designing the Solution.- Creating the Website.- Implementation Issues.- Software Tools.- Website Hosting and Website Management.

    15 in stock

    £42.74

  • Computer Graphics for Artists II: Environments and Characters

    Springer London Ltd Computer Graphics for Artists II: Environments and Characters

    1 in stock

    Book SynopsisIn this second volume of Computer Graphics for Artists the author, Andrew Paquette, guides the reader through the creation of realistic computer-generated backgrounds and characters. Rather than teach using a specific program, the author focuses on the theory required to ensure that the artist can create a convincing landscape, building, person or whatever they turn their attention to. Part One covers the core areas of background generation, such as CG terrain, plant life and architecture, but also deals with specific concepts such as photo-texturing and lighting, explaining all the advantages and pitfalls involved. Part Two introduces the reader to the study of the body-shape and movement and their consequent effects upon successful digital-recreation, as well as addressing some of the fundamental elements of appearance; hair, skin and fat. It is assumed that readers will be familiar with the terms and concepts described in the first volume of this work. Table of Contents3D3/Environments.- Real-World Terrain.- CG Terrain.- Plant Life.- Civil Engineering.- Architecture.- Texturing.- Lighting.- Project, Grading, and Conclusion.- 3D4/Anatomy for Characters.- Anatomy.- The Skeleton/Axial.- Appendicular Skeleton.- Musculature.- Musculature (Continued).- Joints.- CG Anatomy.- Projects and Conclusion.

    1 in stock

    £40.49

  • Digital Media: The Future

    Springer London Ltd Digital Media: The Future

    1 in stock

    Book SynopsisThis volume presents state-of-the-art research from a wide area of subjects brought about by the digital convergence of computing, television, telecommunications and the World-Wide Web. It represents a unique snapshot of trends across a wide range of subjects including virtual environments; virtual reality; telepresence; human-computer interface design; interactivity; avatars; and the Internet. Both researchers and practitioners will find it an invaluable source of reference.Table of ContentsNew Media Technologies: The European Perspective (Eric Badiqu).- From Web-Site to On-Line Presence: From Internet to Information Society (Peter Thomas).- Human Computer Interaction with Global Information Spaces - Beyond Data Mining (Jim Thomas et al).- Transparent Access to Video Over the Web: A Review of Current Approaches (Peter J. Macer).- Ubiquitous Communications and Media: Steps Towards a Wearable Learning Tool (Nick Dyer et al).- Grafting the User Interface onto Reality (David Johnston et al).- Challenges for the World-Wide Web Graphics Web - FRA Hopgood Watermarking of Digital Images - Current Techniques and Future Prospects (Roger Green et al).- An Evolving Vision of Sound: An Intuitive User Interface for Creative Control of Complex Musical Objects (P.J. Comerford et al).- Integrating Paper and Digital Documents (Heather Brown).- Smart Documents with ActiveX 3D Data Visualisation Components (Michael Jern).- 3D Fashion Design and The Virtual Catwalk (Pascal Volino et al).- Artificial Garments for Synthetic Humans in Global Retailing (G.K. Stylios).- CATS: A Multimedia Tool for Scenographic Simulation in Theatre and TV - (F. Martinez et al).- Interpretation and Performance Assessment of Actors Representations in Virtual Rehearsals (I.J. Palmer).- Real-Time Virtual Humans (Norman Badler et al).- Dialogue Design for a Virtual Interactive Presenter (Marc Cavazza).- Virtual Humans Behaviour: Individuals, Groups and Crowds (Daniel Thalmann et al).- An Inhabited 3D Oil Platform for Immersive CSCW (Roland M. Banks).- 3D Virtual Community Building Applications in the PANAIVE Architecture (Chris Flerackers et al).- Telepresence - The Future of Telephony (Graham Walker).- A Journey to the Hemispheric User Interface - Creative and Technical Achievements (Janice Webster).

    1 in stock

    £67.49

  • A Practical Guide for Nurse Practitioner Faculty

    Wolters Kluwer Health A Practical Guide for Nurse Practitioner Faculty

    5 in stock

    Book SynopsisAuthored by expert simulation researchers, educators, nurse practitioner faculty, and clinicians, A Practical Guide for Nurse Practitioner Faculty Using Simulation in Competency-Based Education looks at topics related to simulation design, development, and implementation for nurse practitioner and other graduate-level nursing programs. The new educational requirements based on the AACN Essentials and move to competency-based outcomes require nursing graduates to provide documented skill competencies to care for all types of patients in all types of diverse healthcare settings. Whether a graduate is working in acute care, primary care, or within the community, clinical simulations serve as a vital approach to creating student-centered, experiential learning that engages and prepares the graduate for real-world practice. Once the exception, clinical simulations are becoming more commonplace in nurse practitioner programs. This book supports nurse practitioner faculty as they learn new pedagogy and teaching strategies using clinical simulations. It focuses on developing and preparing nurse educators and superusers of simulations as they create, implement, and evaluate this pedagogy in nurse practitioner education. Table of Contents CHAPTER 1 State of the Science of Clinical Simulations in NP Education CHAPTER 2 Theoretical Frameworks for Simulation Design, Development, and Implementation CHAPTER 3 Competency-Based Nursing Education CHAPTER 4 Student-Centered Learning in NP Education CHAPTER 5 Integration of Simulation in the NP Curriculum CHAPTER 6 Healthcare Simulation Standards of Best Practice™ and Nurse Practitioner Education CHAPTER 7 Attainment of Competency Through Simulation: The ACTS Model CHAPTER 8 Simulation Operations CHAPTER 9 Methods and Models for Debriefing in Graduate Clinical Education CHAPTER 10 Working with Standardized and Simulated Patients CHAPTER 11 Assessment and Evaluations in Simulation CHAPTER 12 Simulation to Prepare Nurse Practitioner Students for Role Transition CHAPTER 13 The Future of Graduate Nurse Practitioner Education: A Case for Simulation

    5 in stock

    £47.49

  • Internet Science: INSCI 2018 International Workshops, St. Petersburg, Russia, October 24–26, 2018, Revised Selected Papers

    Springer Nature Switzerland AG Internet Science: INSCI 2018 International Workshops, St. Petersburg, Russia, October 24–26, 2018, Revised Selected Papers

    1 in stock

    Book SynopsisThis book constitutes the refereed post-conference proceedings of 4 workshops, held at the 5th International Conference on Internet Science, St. Petersburg, Russia, in October 2018: Workshop 1 : Detecting Social Problems in Online Content, Workshop 2: CONVERSATIONS, Workshop 3: The Future of Decentralized Governance: A Workshop on Encryption,Blockchains, and Personal Data, and Workshop 4: Internet as an issue: An international workshop on governmentand media narratives. The 20 full papers presented together with 4 short papers were carefully reviewed and selected from 38 submissions. The contributions of the Workshop 1: Detecting Social Problems in Online Content has united Russian scholars who work upon Russian-language datasets. Workshop 2: CONVERSATIONS: An international workshop on chatbot research and design regularly discusses the novel issues in their research and production area. Workshop 3: The Future of Decentralized Governance: A Workshop on Encryption, Blockchains, and Personal Data. At this workshop scholars and industry representatives from France, the Netherlands, the UK, and Russia have discussed distributed governance technologies based on blockchain and other privacy-protecting technologies. Workshop 4: Internet as an issue: An international workshop on government and media narratives took a rare approach and regarded Internet as a focus for public discussion. Table of ContentsDetecting Social Problems in Online Content.- CONVERSATIONS 2018 - 2nd International Workshop on Chatbot Research.- The Future of Decentralized Governance Workshop.- Internet as an Issue: an International Workshop on Government andMedia Narratives.

    1 in stock

    £44.99

  • Software Product Management: Finding the Right

    Springer Nature Switzerland AG Software Product Management: Finding the Right

    1 in stock

    Book SynopsisThis book is for product managers, product owners, product marketing managers, VPs and Heads of Product, CEOs, and start-up founders. In short, it serves anyone interested personally or professionally in software product management. You’ll learn how to plan, coordinate and execute all activities required for software product success. It enables you to find the right balance for delivering customer value and long-term product success.The book offers a comprehensive introduction for beginners as well as proven practices and a novel, holistic approach for experienced product managers. It provides much-needed clarity regarding the numerous tasks and responsibilities involved in the professional and successful management of software products. Readers can use this book as a reference book if they are interested in or have the urgent need to improve one of the following software product management dimensions: Product Viability, Product Development, Go-to-Market / Product Marketing, Software Demonstrations and Training, The Market / Your Customers, or Organizational Maturity.The book helps product people to maximize their impact and effectiveness. Whether you’re a seasoned practitioner, new to software product management, or just want to learn more about the best-of-all disciplines and advance your skills, this book introduces a novel and “business” tested approach to structure and orchestrate the vital dimensions of software product management. You will learn how to create focus and alignment on the things that matter for product success.The book describes a holistic framework to keep the details that matter for product success in balance, taking into consideration the limiting factors, strategies and responsibilities that determine the overall product yield potential. It explains how to leverage and adapt the framework with regard to aspects like product viability, product development, product marketing and software demonstrations and training, as well as more general aspects like markets, customers and organizational maturity.The book focuses on the unique challenges of software product managers or any related roles, whether you are a founder of a small to mid-sized software company or working in the complex ecosystems of large software enterprises or corporate IT departments.Trade Review“This book is recommended for readers who are looking for a way to assess their own product management practices or who are interested in learning about how software product management can be introduced to an organization.” (Julia Yousefi, Computing Reviews, April 29, 2021)Table of ContentsPart I: Setting the Scene and Introducing the Product Yield Potential Radar.- Part II: PYPR Software Product Management Dimensions in Detail.- Part III: Case Studies Applying PYPR.

    1 in stock

    £62.99

  • Advanced Information Systems Engineering: 31st

    Springer Nature Switzerland AG Advanced Information Systems Engineering: 31st

    1 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 31st International Conference on Advanced Information Systems Engineering, CAiSE 2019, held in Rome, Italy, in June 2019. The 41 full papers presented in this volume were carefully reviewed and selected from 206 submissions. The book also contains one invited talk in full paper length. The papers were organized in topical sections named: information system engineering; requirements and modeling; data modeling and analysis; business process modeling and engineering; information system security; and learning and mining in information systems. Abstracts on the CAiSE 2019 tutorials can be found in the back matter of the volume. Table of ContentsInvited Talk.- Direct and reverse rewriting in data interoperability.- Information System Engineering.- Efficient Engineering Data Exchange in Multi-Disciplinary Systems Engineering Enterprises.- Bing-CF-IDF+: A Semantics-Driven News Recommender System.- Methodological Framework to Guide the Development of Continual Evolution Methods.- Inter-organizational integration in the AEC/FM industry: Exploring the "addressed" and "unaddressed" information exchange needs between stakeholders.- A Lightweight Framework for Multi-Device Integration and Multi-Sensor Fusion to Explore Driver Distraction.- Exhaustive Simulation and Test Generation Using fUML Activity Diagrams.- A Block-Free Distributed Ledger for P2P Energy Trading: Case with IOTA.- Profile Reconciliation through Dynamic Activities across Social Networks.- Requirements and Modeling.- Towards an Ontology-based Approach for Eliciting Possible Solutions to Non-Functional Requirements.- Using a Modelling Language to Describe the Quality of Life Goals of People Living with Dementia.- Multi-Platform Chatbot Modeling and Deployment with the Jarvis Framework.- Information Systems Modeling: Language, Verification, and Tool Support.- Expert2Vec: Experts Representation in Community Question Answering for Question Routing.- A Pattern Language for Value Modeling in ArchiMate.- Paving Ontological Foundation for Social Engineering Analysis.- Improving Traceability Links Recovery in Process Models through an Ontological Expansion of Requirements.- Requirements Engineering for Cyber Physical Production Systems.- Data modeling and Analysis.- A Fourth Normal Form for Uncertain Data.- Revealing the Conceptual Schemas of RDF Datasets.- Modeling and In-Database Management of Relational, Data-Aware Processes.- D2IA: Stream Analytics on User-Defined Event Intervals.- Business Process Modeling and Engineering.- Extracting Declarative Process Models from Natural Language.- From Process Models to Chatbots.- Dynamic Role Binding in Blockchain-Based Collaborative Business Processes.- 3D virtual world BPM training systems: process gateway experimental results.- Deriving and Combining Mixed Graphs from Regulatory Documents Based on Constraint Relations.- A Method to Improve the Early Stages of the Robotic Process Automation Lifecycle.- Generation and Transformation of Compliant Process Collaboration Models to BPMN.- GameOfFlows: Process Instance Adaptation in Complex, Dynamic and Potentially Adversarial Domains.- Information System Security.- Security Vulnerability Information Service with Natural Language Query Support.- Automated Interpretation and Integration of Security Tools Using Semantic Knowledge.- An Assessment Model for Continuous Security Compliance in Large Scale Agile Environments.- Learning and Mining in Information Systems.- Proactive Process Adaptation using Deep Learning Ensembles.- Using Machine Learning Techniques for Evaluating the Similarity of Enterprise Architecture Models.- Efficient Discovery of Compact Maximal Behavioral Patterns from Event Logs.- Discovering Responsibilities with Dynamic Condition Response Graphs.- Fifty Shades of Green: How Informative is a Compliant Process Trace.- Solution Patterns for Machine Learning.- Managing and Simplifying Cognitive Business Operations using Process Architecture Models.- A Constraint Mining Approach to Support Monitoring Cyber-Physical Systems.- Behavior-Derived Variability Analysis: Mining Views for Comparison and Evaluation.

    1 in stock

    £80.99

  • Designing Enterprise Information Systems: Merging

    Springer Nature Switzerland AG Designing Enterprise Information Systems: Merging

    1 in stock

    Book SynopsisThis book brings together enterprise modeling and software specification, providing a conceptual background and methodological guidelines that concern the design of enterprise information systems. In this, two corresponding disciplines (enterprise engineering and software engineering) are considered in a complementary way. This is how the widely recognized gap between domain experts and software engineers could be effectively addressed. The content is, on the one hand, based on a conceptual invariance (embracing concepts whose essence transcends the barriers between social and technical disciplines) while on the other, the book is featuring a modeling duality, by bringing together social theories (that are underlying with regard to enterprise engineering) and computing paradigms (that are underlying as it concerns software engineering). In addition, the proposed approach as well as its guidelines and related notations further foster such enterprise-software modeling, by facilitating modeling generations and transformations. Considering unstructured business information in the beginning, the modeling process would progress through the methodological construction of enterprise models, to reach as far as a corresponding derivation of software specifications. Finally, the enterprise-software alignment is achieved in a component-based way, featuring a potential for re-using modeling constructs, such that the modeling effectiveness and efficiency are further stimulated. For the sake of grounding the presented studies, a case study and illustrative examples are considered. They are not only justifying the idea of bringing together (in a component-based way) enterprise modeling and software specification but they are also demonstrating various strengths and limitations of the proposed modeling approach.The book was mainly written for researchers and graduate students in enterprise information systems, and also for professionals whose work involves the specification and realization of such systems. In addition, researchers and practitioners entering these fields will benefit from the blended view on enterprise modeling and software specification, for the sake of an effective and efficient design of enterprise information systems.Table of Contents1 Introduction.- 2 Systems.- 3 System Environment and Context-Awareness.- 4 Social Theories.- 5 Computing Paradigms.- 6 The SDBC Approach.- 7 Case Study and Examples.

    1 in stock

    £62.99

© 2026 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account