Products related to Directorie:
-
Information Systems Reengineering, Integration and Normalization : Heterogeneous Database Connectivity
Database technology is an important subject in Computer Science.Every large company and nation needs a database to store information.The technology has evolved from file systems in the 60’s, to Hierarchical and Network databases in the 70’s, to relational databases in the 80’s, object-oriented databases in the 90’s, and to XML documents and NoSQL today.As a result, there is a need to reengineer and update old databases into new databases.This book presents solutions for this task. In this fourth edition, Chapter 9 - Heterogeneous Database Connectivity (HDBC) offers a database gateway platform for companies to communicate with each other not only with their data, but also via their database.The ability of sharing a database can contribute to the applications of Big Data and surveys for decision support systems.The HDBC gateway solution collects input from the database, transfers the data into its middleware storage, converts it into a common data format such as XML documents, and then distributes them to the users.HDBC transforms the common data into the target database to meet the user’s requirements, acting like a voltage transformer hub.The voltage transformer converts the voltage to a voltage required by the users.Similarly, HDBC transforms the database to the target database required by the users. This book covers reengineering for data conversion, integration for combining databases and merging databases and expert system rules, normalization for eliminating duplicate data from the database, and above all, HDBC connects all legacy databases to one target database for the users. The authors provide a forum for readers to ask questions and the answers are given by the authors and the other readers on the Internet.
Price: 48.99 £ | Shipping*: 0.00 £ -
Redefining Information Security : How to Build a Security-Driven Organization
Redefining Information Security shows security and technology leaders how to build a security-driven culture that not only safeguards but actively propels businesses forward, enabling innovation and growth in the face of an evolving digital business and threat landscape. This book pioneers a transformative approach that shields organizations from risks but also actively leverages them to drive competitive advantages.Redefining Information Security addresses the technical aspects of cybersecurity in addition to the organizational culture, leadership, communication, education and human factors that make up the integral components of a successful security strategy.It offers a strong emphasis on practical implementation, providing actionable guidance and tools to apply proactive security strategies. Redefining Information Security offers insights on integrating security into technology roadmaps and leveraging it as a growth catalyst.It introduces innovative risk management strategies, allowing organizations to navigate uncertainties while maintaining a robust security posture.This guide presents a wealth of real-word examples and exclusive interviews with industry leaders, providing insights into how organizations at the forefront of security innovation integrate and embed security within their strategic vision and explores how security can evolve to meet the challenges of tomorrow's digital landscape.
Price: 34.99 £ | Shipping*: 0.00 £ -
Redefining Information Security : How to Build a Security-Driven Organization
Redefining Information Security shows security and technology leaders how to build a security-driven culture that not only safeguards but actively propels businesses forward, enabling innovation and growth in the face of an evolving digital business and threat landscape. This book pioneers a transformative approach that shields organizations from risks but also actively leverages them to drive competitive advantages.Redefining Information Security addresses the technical aspects of cybersecurity in addition to the organizational culture, leadership, communication, education and human factors that make up the integral components of a successful security strategy.It offers a strong emphasis on practical implementation, providing actionable guidance and tools to apply proactive security strategies. Redefining Information Security offers insights on integrating security into technology roadmaps and leveraging it as a growth catalyst.It introduces innovative risk management strategies, allowing organizations to navigate uncertainties while maintaining a robust security posture.This guide presents a wealth of real-word examples and exclusive interviews with industry leaders, providing insights into how organizations at the forefront of security innovation integrate and embed security within their strategic vision and explores how security can evolve to meet the challenges of tomorrow's digital landscape.
Price: 117.00 £ | Shipping*: 0.00 £ -
Information and Self-Organization : A Macroscopic Approach to Complex Systems
The widespread interest this book has found among professors, scientists and stu dents working in a variety of fields has made a new edition necessary.I have used this opportunity to add three new chapters on recent developments.One of the most fascinating fields of modern science is cognitive science which has become a meet ing place of many disciplines ranging from mathematics over physics and computer science to psychology.Here, one of the important links between these fields is the concept of information which, however, appears in various disguises, be it as Shan non information or as semantic information (or as something still different).So far, meaning seemed to be exorcised from Shannon information, whereas meaning plays a central role in semantic (or as it is sometimes called "pragmatic") information.In the new chapter 13 it will be shown, however, that there is an important interplay between Shannon and semantic information and that, in particular, the latter plays a decisive role in the fixation of Shannon information and, in cognitive processes, al lows a drastic reduction of that information.A second, equally fascinating and rapidly developing field for mathematicians, computer scientists and physicists is quantum information and quantum computa tion.The inclusion of these topics is a must for any modern treatise dealing with in formation.It becomes more and more evident that the abstract concept of informa tion is inseparably tied up with its realizations in the physical world.
Price: 89.99 £ | Shipping*: 0.00 £ -
Modern Information Retrieval : The Concepts and Technology behind Search
This is a rigorous and complete textbook for a first course on information retrieval from the computer science perspective.It provides an up-to-date student oriented treatment of information retrieval including extensive coverage of new topics such as web retrieval, web crawling, open source search engines and user interfaces. From parsing to indexing, clustering to classification, retrieval to ranking, and user feedback to retrieval evaluation, all of the most important concepts are carefully introduced and exemplified.The contents and structure of the book have been carefully designed by the two main authors, with individual contributions coming from leading international authorities in the field, including Yoelle Maarek, Senior Director of Yahoo!Research Israel; Dulce Poncele´on IBM Research; and Malcolm Slaney, Yahoo Research USA. This completely reorganized, revised and enlarged second edition of Modern Information Retrieval contains many new chapters and double the number of pages and bibliographic references of the first edition, and a companion website www.mir2ed.org with teaching material.It will prove invaluable to students, professors, researchers, practitioners, and scholars of this fascinating field of information retrieval.
Price: 70.99 £ | Shipping*: 0.00 £ -
The Consciousness’ Drive : Information Need and the Search for Meaning
What is the uniquely human factor in finding and using information to produce new knowledge?Is there an underlying aspect of our thinking that cannot be imitated by the AI-equipped machines that will increasingly dominate our lives?This book answers these questions, and tells us about our consciousness – its drive or intention in seeking information in the world around us, and how we are able to construct new knowledge from this information.The book is divided into three parts, each with an introduction and a conclusion that relate the theories and models presented to the real-world experience of someone using a search engine.First, Part I defines the exceptionality of human consciousness and its need for new information and how, uniquely among all other species, we frame our interactions with the world.Part II then investigates the problem of finding our real information need during information searches, and how our exceptional ability to frameour interactions with the world blocks us from finding the information we really need.Lastly, Part III details the solution to this framing problem and its operational implications for search engine design for everyone whose objective is the production of new knowledge. In this book, Charles Cole deliberately writes in a conversational style for a broader readership, keeping references to research material to the bare minimum.Replicating the structure of a detective novel, he builds his arguments towards a climax at the end of the book.For our video-game, video-on-demand times, he has visualized the ideas that form the book’s thesis in over 90 original diagrams. And above all, he establishes a link between information need and knowledge production in evolutionary psychology, and thus bases his arguments in our origins as a species: how we humans naturally think, and how we naturally search for new information because our consciousness drives us to need it.
Price: 64.99 £ | Shipping*: 0.00 £ -
The Database Hacker's Handbook : Defending Database Servers
Databases are the nerve center of our economy. Every piece of your personal information is stored there-medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy.Database attacks are potentially crippling-and relentless. In this essential follow-up to The Shellcoder's Handbook, four of the world's top security experts teach you to break into and defend the seven most popular database servers.You'll learn how to identify vulnerabilities, how attacks are carried out, and how to stop the carnage.The bad guys already know all this. You need to know it too. * Identify and plug the new holes in Oracle and Microsoft(r) SQL Server * Learn the best defenses for IBM's DB2(r), PostgreSQL, Sybase ASE, and MySQL(r) servers * Discover how buffer overflow exploitation, privilege escalation through SQL, stored procedure or trigger abuse, and SQL injection enable hacker access * Recognize vulnerabilities peculiar to each database * Find out what the attackers already know Go to www.wiley.com/go/dbhackershandbook for code samples, security alerts , and programs available for download.
Price: 31.99 £ | Shipping*: 0.00 £ -
Bimonoidal Categories, $E_n$-Monoidal Categories, and Algebraic $K$-Theory
Bimonoidal categories are categorical analogues of rings without additive inverses.They have been actively studied in category theory, homotopy theory, and algebraic $K$-theory since around 1970.There is an abundance of new applications and questions of bimonoidal categories in mathematics and other sciences.The three books published by the AMS in the Mathematical Surveys and Monographs series under the general title Bimonoidal Categories, $E_n$-Monoidal Categories, and Algebraic $K$-Theory (Volume I: Symmetric Bimonoidal Categories and Monoidal Bicategories-this book, Volume II: Braided Bimonoidal Categories with Applications, and Volume III: From Categories to Structured Ring Spectra) provide a unified treatment of bimonoidal and higher ring-like categories, their connection with algebraic $K$-theory and homotopy theory, and applications to quantum groups and topological quantum computation.With ample background material, extensive coverage, detailed presentation of both well-known and new theorems, and a list of open questions, this work is a user-friendly resource for beginners and experts alike. Part 1 of this book proves in detail Laplaza's two coherence theorems and May's strictification theorem of symmetric bimonoidal categories, as well as their bimonoidal analogues.This part includes detailed corrections to several inaccurate statements and proofs found in the literature.Part 2 proves Baez's Conjecture on the existence of a bi-initial object in a 2-category of symmetric bimonoidal categories.The next main theorem states that a matrix construction, involving the matrix product and the matrix tensor product, sends a symmetric bimonoidal category with invertible distributivity morphisms to a symmetric monoidal bicategory, with no strict structure morphisms in general.
Price: 112.00 £ | Shipping*: 0.00 £
Similar search terms for Directorie:
-
Do you buy TV listings magazines?
No, I do not buy TV listings magazines. I usually use online TV guides or streaming platforms to check the TV schedule and find out what's on. It's more convenient for me to access this information digitally rather than purchasing a physical magazine.
-
Why are listings deactivated on Immobilienscout?
Listings on Immobilienscout may be deactivated for various reasons, such as if the property has been sold or rented, if the listing has expired, if the user has requested to deactivate the listing, or if the listing does not comply with Immobilienscout's terms and conditions. Deactivating listings helps ensure that users are viewing accurate and up-to-date information on the platform. It also helps maintain the quality and reliability of the listings available on Immobilienscout.
-
What does zkndb mean in apartment listings?
ZKNDb in apartment listings typically stands for "zero kitchen, no dining room, and balcony." This means that the apartment does not have a separate kitchen area, dining room, or balcony. It is important to pay attention to these details when looking at apartment listings to ensure that the space meets your specific needs and preferences.
-
How can one see deleted listings on eBay?
To see deleted listings on eBay, you can use the "Advanced Search" feature and select the option to show completed listings. This will allow you to see listings that have ended, including those that have been deleted. You can also use third-party websites or tools that archive eBay listings, which may still have deleted listings available for viewing. Keep in mind that while you can see deleted listings, you won't be able to make a purchase or bid on them.
-
How can one view deleted listings on eBay?
Unfortunately, once a listing is deleted on eBay, it cannot be viewed again. eBay does not provide a way for users to access or view deleted listings. It is important to keep track of any important information or details from listings before they are deleted.
-
What does 1.5 rooms mean in apartment listings?
In apartment listings, 1.5 rooms typically refers to a living space that is larger than a studio apartment but does not have a separate bedroom. It may have a main living area that also serves as a sleeping area, with a separate kitchen and bathroom. The "half" room could be a small alcove or den that can be used as a sleeping area or home office. This type of layout is often found in smaller apartments in urban areas.
-
When do apartment listings appear in Berlin newspapers?
Apartment listings typically appear in Berlin newspapers towards the end of the week, with Thursday and Friday being popular days for these listings to be published. This timing allows potential renters to plan their apartment viewings over the weekend. Additionally, many newspapers have dedicated real estate sections where apartment listings are prominently featured. It is advisable to check the newspapers regularly during the week to stay updated on the latest listings.
-
What size are the banners in Geocaching listings?
The banners in Geocaching listings are typically 320 pixels wide by 100 pixels tall. This size allows for a prominent display of the banner while maintaining a good balance with the rest of the listing information. Geocachers often use banners to add a personal touch to their listings or to provide additional information about the cache. The size of the banners ensures they are easily visible and do not overwhelm the rest of the listing.
* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.