Genrer
Pris
DKK
Formater
  • 999+
  • 999+
  • 504
  • 101
  • 6
  • 4
  • 1
Sprog
  • 25
  • 999+
  • 999+
  • 12
  • 7
  • 7
  • 6
  • 3
  • 2

Datalogi og netværk

  • Intranet - sådan! af Vibeke Thøis Madsen Spar 13%
    - Inspiration og værktøj til de ansvarlige
    af Vibeke Thøis Madsen

    Intranettet skal være stedet, hvor arbejdsdagen begynder. Det skal tage udgangspunkt i medarbejderne og deres opgaver. De tager tid, og det skal gøres rigtigt. Her er eksempler, tommelfingerregler, gode eksempler. Fra planlægning til vedligeholdelse og udvikling. Konkret.

  • Computer Networking: A Top-Down Approach, Global Edition af Keith Ross
    af Keith Ross & James Kurose

    For courses in Networking/Communications. Motivate your students with a top-down, layered approach to computer networkingUnique among computer networking texts, the Seventh Edition of the popular Computer Networking: A Top Down Approach builds on the authors long tradition of teaching this complex subject through a layered approach in a top-down manner. The text works its way from the application layer down toward the physical layer, motivating students by exposing them to important concepts early in their study of networking. Focusing on the Internet and the fundamentally important issues of networking, this text provides an excellent foundation for students in computer science and electrical engineering, without requiring extensive knowledge of programming or mathematics. The Seventh Edition has been updated to reflect the most important and exciting recent advances in networking. MasteringComputerScience not included. Students, if MasteringComputerScience is a recommended/mandatory component of the course, please ask your instructor for the correct ISBN and course ID. MasteringComputerScience should only be purchased when required by an instructor. Instructors, contact your Pearson representative for more information. MasteringComputerScience is an online homework, tutorial, and assessment program designed to work with this text to engage students and improve results. Interactive, self-paced tutorials provide individualized coaching to help students stay on track. With a wide range of activities available, students can actively learn, understand, and retain even the most difficult concepts.

  • Digital Disruption af Claus Rosenstand Spar 17%
    - Faretruende og fascinerende forandringer
    af Claus Rosenstand

    Disruption var i Danmark frem til slutningen af 2016 et ord, som kun få kendte og endnu færre havde en holdning til. Nu er der imidlertid sat fokus på begrebet fra allerhøjeste nationale sted, idet regeringen med Statsminister Lars Løkke Rasmussen har etableret et “disruption-råd”. Rådet er skrevet ind i 2016- regeringsgrundlagetfor VLK-regeringen. Disruption af organisationer er ikke et nyt fænomen:, men hastigheden, hvormed det sker, er stadig accelererende. Årsagen er den globale mega-trend: Digitalisering. Og derfor er specielt digital disruption en sag for os alle. Derfor er det også for vigtigt et emne til, at det udelukkende behandles i elitære videnskabelige, industrielle og politiske kredse. Der er behov for en bredere samfundsdebat; og bogen er et forskningsbaseret bidrag ind i denne debat.For at kvalificere debatten om disruption i det digitale domæne ud over det niveau, der kendetegner den nuværende debat, præsenteres der i bogen ny viden om digital disruption. Som noget særligt udlægges Clayton Christensens teori om disruptiv innovation med et specielt fokus på små organisationers mulighed for eksponentiel vækst. Der fokuseres især på forholdet mellem disruption og den stadigt accelererende digitale udvikling i konturerne til en ny teoridannelse om digital disruption.Bogens undertitel “faretruende og fascinerende forandringer” peger på, at der er behov for en nuanceret debat om digital disruption i modsætning til den tone, der er slået an i pressen og på diverse erhvervskonferencer om emnet, hvor der overordnet tegnes et dystopisk billede med “bål og brand”.Der er behov for en debat, der både ser på de muligheder og de trusler, som digital disruption byder på.

  • Sociale medier, sociale dilemmaer af Jacob Brøndum Pedersen
    af Jacob Brøndum Pedersen, Claus Petersen & Anders Skov

    Hvordan sætter man de rigtige digitale fodspor? Hvad er social identitet? Kan man stole på Wikipedia? Bliver man afhængig af Facebook? Er sociale medier godt for demokratiet?Selvom man som ung i dag kaldes ’digital indfødt’, kan man godt mangle digital dannelse. Digital dannelse i form af at kunne analysere og forstå oplysninger fra internettet, men også i form af at kunne varetage sin ’digitale identitet’ og kende de uskrevne regler for hensigtsmæssig opførsel og kommunikation på internettet.I denne bog fortæller forfatterne i korte og letlæste kapitler, hvad der er op og ned på web 2.0, Wikipedia, sociale medier som Facebook, og hvad vi skal være opmærksomme på

  • Hands-On Full-Stack Web Development with ASP.NET Core af Shay Friedman Spar 13%
    - Learn end-to-end web development with leading frontend frameworks, such as Angular, React, and Vue
    af Shay Friedman, Tamir Dresher & Amir Zuker

    Become a full-stack developer by learning popular Microsoft technologies and platforms such as .NET Core, ASP.NET Core, Entity Framework, and AzureKey FeaturesBring static typing to web development with features compatible in TypeScript 3Implement a slim marketplace single page application (SPA) in Angular, React, and VueModernize your web apps with Microsoft Azure, Visual Studio, and GitBook DescriptionToday, full-stack development is the name of the game. Developers who can build complete solutions, including both backend and frontend products, are in great demand in the industry, hence being able to do so a desirable skill. However, embarking on the path to becoming a modern full-stack developer can be overwhelmingly difficult, so the key purpose of this book is to simplify and ease the process.This comprehensive guide will take you through the journey of becoming a full-stack developer in the realm of the web and .NET. It begins by implementing data-oriented RESTful APIs, leveraging ASP.NET Core and Entity Framework. Afterward, it describes the web development field, including its history and future horizons. Then, you'll build webbased Single-Page Applications (SPAs) by learning about numerous popular technologies, namely TypeScript, Angular, React, and Vue. After that, you'll learn about additional related concerns involving deployment, hosting, and monitoring by leveraging the cloud; specifically, Azure. By the end of this book, you'll be able to build, deploy, and monitor cloud-based, data-oriented, RESTful APIs, as well as modern web apps, using the most popular frameworks and technologies.What you will learnBuild RESTful APIs in C# with ASP.NET Core, web APIs, and Entity FrameworkSee the history and future horizons of the web development fieldBring static-typing to web apps using TypeScriptBuild web applications using Angular, React, and VueDeploy your application to the cloudWrite web applications that scale, can adapt to changes, and are easy to maintainDiscover best practices and real-world tips and tricksSecure your backend server with Authentication and Authorization using OAuth 2.0Who this book is forThis book is for developers who are keen on strengthening their skills in the field of cloud-based full-stack web development. You need basic knowledge of web-related pillars, including HTML, CSS, and JavaScript, as well as C# and REST.This book targets novice developers in the realm of Web development and ASP.NET who desire to advance to modern Web and ASP.NET Core development and leverage the Cloud to manage and bring everything together.

  • Cognitive Computing with IBM Watson af High Rob High Spar 12%
    - Build smart applications using artificial intelligence as a service
    af High Rob High & Bakshi Tanmay Bakshi

    Understand, design, and create cognitive applications using Watson's suite of APIs.Key FeaturesDevelop your skills and work with IBM Watson APIs to build efficient and powerful cognitive appsLearn how to build smart apps to carry out different sets of activities using real-world use casesGet well versed with the best practices of IBM Watson and implement them in your daily workBook DescriptionCognitive computing is rapidly infusing every aspect of our lives riding on three important fields: data science, machine learning (ML), and artificial intelligence (AI). It allows computing systems to learn and keep on improving as the amount of data in the system grows.This book introduces readers to a whole new paradigm of computing - a paradigm that is totally different from the conventional computing of the Information Age. You will learn the concepts of ML, deep learning (DL), neural networks, and AI through the set of APIs provided by IBM Watson. This book will help you build your own applications to understand, plan, and solve problems, and analyze them as per your needs. You will learn about various domains of cognitive computing, such as NLP, voice processing, computer vision, emotion analytics, and conversational systems, using different IBM Watson APIs.From this, the reader will learn what ML is, and what goes on in the background to make computers "e;do their magic,"e; as well as where these concepts have been applied. Having achieved this, the readers will then be able to embark on their journey of learning, researching, and applying the concept in their respective fields.What you will learnGet well versed with the APIs provided by IBM Watson on IBM CloudLearn ML, AI, cognitive computing, and neural network principlesImplement smart applications in fields such as healthcare, entertainment, security, and moreUnderstand unstructured content using cognitive metadata with the help of Natural Language UnderstandingUse Watson's APIs to create real-life applications to realize their capabilitiesDelve into various domains of cognitive computing, such as media analytics, embedded deep learning, computer vision, and moreWho this book is forThis book is for beginners and novices; having some knowledge about artificial intelligence and deep learning is an advantage, but not a prerequisite to benefit from this book. We explain the concept of deep learning and artificial intelligence through the set of tools IBM Watson provides.

  • Blockchain By Example af Wu Xun (Brian) Wu Spar 13%
    - A developer's guide to creating decentralized applications using Bitcoin, Ethereum, and Hyperledger
    af Wu Xun (Brian) Wu, Badr Bellaj Badr & Horrocks Richard Horrocks

    Implement decentralized blockchain applications to build scalable DappsKey FeaturesUnderstand the blockchain ecosystem and its terminologiesImplement smart contracts, wallets, and consensus protocolsDesign and develop decentralized applications using Bitcoin, Ethereum, and HyperledgerBook DescriptionThe Blockchain is a revolution promising a new world without middlemen. Technically, it is an immutable and tamper-proof distributed ledger of all transactions across a peer-to-peer network. With this book, you will get to grips with the blockchain ecosystem to build real-world projects.This book will walk you through the process of building multiple blockchain projects with different complexity levels and hurdles. Each project will teach you just enough about the field's leading technologies, Bitcoin, Ethereum, Quorum, and Hyperledger in order to be productive from the outset. As you make your way through the chapters, you will cover the major challenges that are associated with blockchain ecosystems such as scalability, integration, and distributed file management. In the concluding chapters, you'll learn to build blockchain projects for business, run your ICO, and even create your own cryptocurrency. Blockchain by Example also covers a range of projects such as Bitcoin payment systems, supply chains on Hyperledger, and developing a Tontine Bank Every is using Ethereum.By the end of this book, you will not only be able to tackle common issues in the blockchain ecosystem, but also design and build reliable and scalable distributed systems.What you will learnGrasp decentralized technology fundamentals to master blockchain principlesBuild blockchain projects on Bitcoin, Ethereum, and HyperledgerCreate your currency and a payment application using BitcoinImplement decentralized apps and supply chain systems using HyperledgerWrite smart contracts, run your ICO, and build a Tontine decentralized app using EthereumImplement distributed file management with blockchainIntegrate blockchain into existing systems in your organizationWho this book is forIf you are keen on learning how to build your own blockchain decentralized applications from scratch, then this book is for you. It explains all the basic concepts required to develop intermediate projects and will teach you to implement the building blocks of a blockchain ecosystem.

  • Machine Learning in Java af Bostjan Kaluza Spar 13%
    - Helpful techniques to design, build, and deploy powerful machine learning applications in Java, 2nd Edition
    af Bostjan Kaluza & AshishSingh Bhatia

    Leverage the power of Java and its associated machine learning libraries to build powerful predictive modelsKey FeaturesSolve predictive modeling problems using the most popular machine learning Java libraries Explore data processing, machine learning, and NLP concepts using JavaML, WEKA, MALLET librariesPractical examples, tips, and tricks to help you understand applied machine learning in JavaBook DescriptionAs the amount of data in the world continues to grow at an almost incomprehensible rate, being able to understand and process data is becoming a key differentiator for competitive organizations. Machine learning applications are everywhere, from self-driving cars, spam detection, document search, and trading strategies, to speech recognition. This makes machine learning well-suited to the present-day era of big data and Data Science. The main challenge is how to transform data into actionable knowledge.Machine Learning in Java will provide you with the techniques and tools you need. You will start by learning how to apply machine learning methods to a variety of common tasks including classification, prediction, forecasting, market basket analysis, and clustering. The code in this book works for JDK 8 and above, the code is tested on JDK 11.Moving on, you will discover how to detect anomalies and fraud, and ways to perform activity recognition, image recognition, and text analysis. By the end of the book, you will have explored related web resources and technologies that will help you take your learning to the next level.By applying the most effective machine learning methods to real-world problems, you will gain hands-on experience that will transform the way you think about data.What you will learnDiscover key Java machine learning librariesImplement concepts such as classification, regression, and clusteringDevelop a customer retention strategy by predicting likely churn candidatesBuild a scalable recommendation engine with Apache MahoutApply machine learning to fraud, anomaly, and outlier detectionExperiment with deep learning concepts and algorithmsWrite your own activity recognition model for eHealth applicationsWho this book is forIf you want to learn how to use Java's machine learning libraries to gain insight from your data, this book is for you. It will get you up and running quickly and provide you with the skills you need to successfully create, customize, and deploy machine learning applications with ease. You should be familiar with Java programming and some basic data mining concepts to make the most of this book, but no prior experience with machine learning is required.

  • Machine Learning with the Elastic Stack af Collier Rich Collier Spar 13%
    - Expert techniques to integrate machine learning with distributed search and analytics
    af Collier Rich Collier & Azarmi Bahaaldine Azarmi

    Leverage Elastic Stack's machine learning features to gain valuable insight from your dataKey FeaturesCombine machine learning with the analytic capabilities of Elastic StackAnalyze large volumes of search data and gain actionable insight from themUse external analytical tools with your Elastic Stack to improve its performanceBook DescriptionMachine Learning with the Elastic Stack is a comprehensive overview of the embedded commercial features of anomaly detection and forecasting. The book starts with installing and setting up Elastic Stack. You will perform time series analysis on varied kinds of data, such as log files, network flows, application metrics, and financial data.As you progress through the chapters, you will deploy machine learning within the Elastic Stack for logging, security, and metrics. In the concluding chapters, you will see how machine learning jobs can be automatically distributed and managed across the Elasticsearch cluster and made resilient to failure.By the end of this book, you will understand the performance aspects of incorporating machine learning within the Elastic ecosystem and create anomaly detection jobs and view results from Kibana directly.What you will learnInstall the Elastic Stack to use machine learning featuresUnderstand how Elastic machine learning is used to detect a variety of anomaly typesApply effective anomaly detection to IT operations and security analyticsLeverage the output of Elastic machine learning in custom views, dashboards, and proactive alertingCombine your created jobs to correlate anomalies of different layers of infrastructureLearn various tips and tricks to get the most out of Elastic machine learningWho this book is forIf you are a data professional eager to gain insight on Elasticsearch data without having to rely on a machine learning specialist or custom development, Machine Learning with the Elastic Stack is for you. Those looking to integrate machine learning within their search and analytics applications will also find this book very useful. Prior experience with the Elastic Stack is needed to get the most out of this book.

  • Machine Learning with R af Lantz Brett Lantz Spar 12%
    - Expert techniques for predictive modeling, 3rd Edition
    af Lantz Brett Lantz

    Solve real-world data problems with R and machine learningKey FeaturesThird edition of the bestselling, widely acclaimed R machine learning book, updated and improved for R 3.6 and beyondHarness the power of R to build flexible, effective, and transparent machine learning modelsLearn quickly with a clear, hands-on guide by experienced machine learning teacher and practitioner, Brett LantzBook DescriptionMachine learning, at its core, is concerned with transforming data into actionable knowledge. R offers a powerful set of machine learning methods to quickly and easily gain insight from your data.Machine Learning with R, Third Edition provides a hands-on, readable guide to applying machine learning to real-world problems. Whether you are an experienced R user or new to the language, Brett Lantz teaches you everything you need to uncover key insights, make new predictions, and visualize your findings.This new 3rd edition updates the classic R data science book to R 3.6 with newer and better libraries, advice on ethical and bias issues in machine learning, and an introduction to deep learning. Find powerful new insights in your data; discover machine learning with R.What you will learnDiscover the origins of machine learning and how exactly a computer learns by examplePrepare your data for machine learning work with the R programming languageClassify important outcomes using nearest neighbor and Bayesian methodsPredict future events using decision trees, rules, and support vector machinesForecast numeric data and estimate financial values using regression methodsModel complex processes with artificial neural networks - the basis of deep learningAvoid bias in machine learning modelsEvaluate your models and improve their performanceConnect R to SQL databases and emerging big data technologies such as Spark, H2O, and TensorFlowWho this book is forData scientists, students, and other practitioners who want a clear, accessible guide to machine learning with R.

  • California Consumer Privacy Act (CCPA) af Preston Bukaty Spar 10%
    - An implementation guide
    af Preston Bukaty

    Understand the CCPA (California Consumer Privacy Act) and how to implement strategies to comply with this privacy regulation.Established in June 2018, the CCPA was created to remedy the lack of comprehensive privacy regulation in the state of California. When it comes into effect on January 1, 2020, the CCPA will give California residents the right to:Learn what personal data a business has collected about themUnderstand who this data has been disclosed toFind out whether their personal data has been sold to third parties, and who these third parties areOpt out of such data transactions, or request that the data be deleted.Many organizations that do business in the state of California must align to the provisions of the CCPA. Much like the EU's GDPR (General Data Protection Regulation), businesses that fail to comply with the CCPA will face economic penalties.Prepare your business for CCPA compliance with our implementation guide that:Provides the reader with a comprehensive understanding of the legislation by explaining key termsExplains how a business can implement strategies to comply with the CCPADiscusses potential developments of the CCPA to further aid complianceYour guide to understanding the CCPA and how you can implement a strategy to comply with this legislation - buy this book today to get the guidance you need!About the authorPreston Bukaty is an attorney and consultant. He specializes in data privacy GRC projects, from data inventory audits to gap analyses, contract management, and remediation planning. His compliance background and experience operationalizing compliance in a variety of industries give him a strong understanding of the legal issues presented by international regulatory frameworks. Having conducted more than 3,000 data mapping audits, he also understands the practical realities of project management in operationalizing compliance initiatives.Preston's legal experience andenthusiasmfor technology make him uniquely suited to understanding the business impact of privacy regulations such as theGeneral Data Protection Regulation (GDPR)andthe California Consumer Privacy Act (CCPA).He has advised more than 250 organizations engaged in businesses as varied as SaaS platforms, mobile geolocation applications, GNSS/telematics tools, financial institutions, fleet management software, architectural/engineering design systems, and web hosting. He also teaches certification courses on GDPR compliance and ISO 27001implementation, andwrites on data privacy law topics.Preston lives in Denver, Colorado. Prior to working as a data privacy consultant, he worked for an international GPS software company, advising business areas on compliance issues across 140 countries. Preston holds a juris doctorate from the University of Kansas School of Law, along with a basketball signed by Hall of Fame coach Bill Self.

  • concise introduction to the NIS Directive af Alan Calder
    - A pocket guide for digital service providers
    af Alan Calder

    This pocket guide is an introduction to the EU's NIS Directive (Directive on security of network and information systems). It outlines the key requirements, details which digital service providers are within scope, and explains how the security objectives from ENISA's Technical Guidelines and international standards can help DSPs achieve compliance. This pocket guide is a primer for any DSP that needs to comply with the NIS Directive.The pocket guide helps DSPs:Gain insight into the NIS Directive and who is regulating it;Identify if they are within the scope of the Directive;Understand the key requirements; andUnderstand how guidance from international standards and ENISA can help them comply.Your essential guide to understanding the EU's NISDirective - buy this book today and get the help and guidance you need.

  • concise introduction to the NIS Directive af Alan Calder
    - A pocket guide for digital service providers
    af Alan Calder

    This pocket guide is an introduction to the EU's NIS Directive (Directive on security of network and information systems). It outlines the key requirements, details which digital service providers are within scope, and explains how the security objectives from ENISA's Technical Guidelines and international standards can help DSPs achieve compliance. This pocket guide is a primer for any DSP that needs to comply with the NIS Directive.The pocket guide helps DSPs:Gain insight into the NIS Directive and who is regulating it;Identify if they are within the scope of the Directive;Understand the key requirements; andUnderstand how guidance from international standards and ENISA can help them comply.Your essential guide to understanding the EU's NISDirective - buy this book today and get the help and guidance you need.

  • Network and Information Systems (NIS) Regulations - A pocket guide for operators of essential services af Alan Calder
    af Alan Calder

    This pocket guide is a primer for any OES (operators of essential services) that needs to comply with the NIS Regulations, and explores who they are, and why the NIS Regulations are different for them.An introduction to the new NIS Regulations 2018 that bring the EU's NIS Directive and Implementing Regulation into UK law.This guide outlines the requirements for operators of essential services based on the Cyber Assessment Framework established by the National Cyber Security Centre (NCSC), including an explanation of the objectives, principles and indicators of good practice, and offers implementation guidance.This guide will help you:Understand how to comply with NIS Regulations, and avoid penalties associated with non-complianceUnravel the key definitions, authorities and points of contactLearn the benefits of a good Cyber Resilience planInterpret and ensure compliance with the Cyber Assessment FrameworkEstablish the NCSC's cyber security objectives, principles and indicators of good practiceYour essential guide to understanding the NIS Regulations - buy this book today and get the help and guidance you need.

  • Network and Information Systems (NIS) Regulations - A pocket guide for operators of essential services af Alan Calder
    af Alan Calder

    This pocket guide is a primer for any OES (operators of essential services) that needs to comply with the NIS Regulations, and explores who they are, and why the NIS Regulations are different for them.An introduction to the new NIS Regulations 2018 that bring the EU's NIS Directive and Implementing Regulation into UK law.This guide outlines the requirements for operators of essential services based on the Cyber Assessment Framework established by the National Cyber Security Centre (NCSC), including an explanation of the objectives, principles and indicators of good practice, and offers implementation guidance.This guide will help you:Understand how to comply with NIS Regulations, and avoid penalties associated with non-complianceUnravel the key definitions, authorities and points of contactLearn the benefits of a good Cyber Resilience planInterpret and ensure compliance with the Cyber Assessment FrameworkEstablish the NCSC's cyber security objectives, principles and indicators of good practiceYour essential guide to understanding the NIS Regulations - buy this book today and get the help and guidance you need.

  • Network and Information Systems (NIS) Regulations - A pocket guide for digital service providers af Alan Calder
    af Alan Calder

    This pocket guide is a primer for any DSPs (digital service providers) that needs to comply with the NIS Regulations, and explores who they are, and why the NIS Regulations are different for them.An introduction to the new NIS Regulations 2018 that bring the EU's NIS Directive and Implementing Regulation into UK law. This guide outlines the key requirements, details exactly which digital service providers are within scope, and explains how the security objectives from ENISA's Technical Guidelines and international standards can help DSPs achieve compliance.This guide will help you:Clarify how to identify if you are within the scope of the NIS RegulationsGain an insight into the NIS DirectiveUnravel the key definitions, authorities and points of contactUnderstand the benefits of a good cyber resilience planYour essential guide to understanding the NIS Regulations - buy this book today and get the help and guidance you need.

  • Network and Information Systems (NIS) Regulations - A pocket guide for digital service providers af Alan Calder
    af Alan Calder

    This pocket guide is a primer for any DSPs (digital service providers) that needs to comply with the NIS Regulations, and explores who they are, and why the NIS Regulations are different for them.An introduction to the new NIS Regulations 2018 that bring the EU's NIS Directive and Implementing Regulation into UK law. This guide outlines the key requirements, details exactly which digital service providers are within scope, and explains how the security objectives from ENISA's Technical Guidelines and international standards can help DSPs achieve compliance.This guide will help you:Clarify how to identify if you are within the scope of the NIS RegulationsGain an insight into the NIS DirectiveUnravel the key definitions, authorities and points of contactUnderstand the benefits of a good cyber resilience planYour essential guide to understanding the NIS Regulations - buy this book today and get the help and guidance you need.

  • Data Protection and the Cloud - Are you really managing the risks? af Paul Ticher
    - Second edition
    af Paul Ticher

    With a view to helping managers ask the right questions, Data Protection and the Cloud explains how you can effectively manage the risks associated with the Cloud and meet regulatory requirements. This book discusses:The controller-processor relationship and what you should pay attention to;How to mitigate security risks in the Cloud to comply with Article 32 of the EU GDPR (General Data Protection Regulation);How to comply with Chapter V of the GDPR when transferring data to third countries; andThe implications of the NIS Directive (Directive on security of network and information systems) for Cloud providers.One of the most dramatic recent developments in computing has been the rapid adoption of Cloud applications. According to the Bitglass Cloud Adoption Report, more than 81% of organisations have now adopted the Cloud in some form, compared with only 24% in 2014. And there are no signs that this is slowing down.The GDPR was enforced on 25 May 2018, superseding the 1995 Data Protection Directive and all local implementations. Bringing data protection into the 21st century, the Regulation expands the rights of individuals, but also introduces new, stricter requirements for organisations. This pocket guide discusses the GDPR requirements relating to Cloud sourcing and the risks involved.With a view to helping managers ask the right questions, Data Protection and the Cloud explains how you can effectively manage the risks associated with the Cloud and meet regulatory requirements. This book discusses:The controller-processor relationship and what you should pay attention to;How to mitigate security risks in the Cloud to comply with Article 32 of the EU GDPR (General Data Protection Regulation);How to comply with Chapter V of the GDPR when transferring data to third countries; andThe implications of the NIS Directive (Directive on security of network and information systems) for Cloud providers.One of the most dramatic recent developments in computing has been the rapid adoption of Cloud applications. According to the Bitglass Cloud Adoption Report, more than 81% of organisations have now adopted the Cloud in some form, compared with only 24% in 2014. And there are no signs that this is slowing down.The GDPR was enforced on 25 May 2018, superseding the 1995 Data Protection Directive and all local implementations. Bringing data protection into the 21st century, the Regulation expands the rights of individuals, but also introduces new, stricter requirements for organisations. This pocket guide discusses the GDPR requirements relating to Cloud sourcing and the risks involved.Buy today and learn how to meet your data protection obligations when using Cloud services.

  • Data Protection and the Cloud - Are you really managing the risks? af Paul Ticher
    - Second edition
    af Paul Ticher

    With a view to helping managers ask the right questions, Data Protection and the Cloud explains how you can effectively manage the risks associated with the Cloud and meet regulatory requirements. This book discusses:The controller-processor relationship and what you should pay attention to;How to mitigate security risks in the Cloud to comply with Article 32 of the EU GDPR (General Data Protection Regulation);How to comply with Chapter V of the GDPR when transferring data to third countries; andThe implications of the NIS Directive (Directive on security of network and information systems) for Cloud providers.One of the most dramatic recent developments in computing has been the rapid adoption of Cloud applications. According to the Bitglass Cloud Adoption Report, more than 81% of organisations have now adopted the Cloud in some form, compared with only 24% in 2014. And there are no signs that this is slowing down.The GDPR was enforced on 25 May 2018, superseding the 1995 Data Protection Directive and all local implementations. Bringing data protection into the 21st century, the Regulation expands the rights of individuals, but also introduces new, stricter requirements for organisations. This pocket guide discusses the GDPR requirements relating to Cloud sourcing and the risks involved.With a view to helping managers ask the right questions, Data Protection and the Cloud explains how you can effectively manage the risks associated with the Cloud and meet regulatory requirements. This book discusses:The controller-processor relationship and what you should pay attention to;How to mitigate security risks in the Cloud to comply with Article 32 of the EU GDPR (General Data Protection Regulation);How to comply with Chapter V of the GDPR when transferring data to third countries; andThe implications of the NIS Directive (Directive on security of network and information systems) for Cloud providers.One of the most dramatic recent developments in computing has been the rapid adoption of Cloud applications. According to the Bitglass Cloud Adoption Report, more than 81% of organisations have now adopted the Cloud in some form, compared with only 24% in 2014. And there are no signs that this is slowing down.The GDPR was enforced on 25 May 2018, superseding the 1995 Data Protection Directive and all local implementations. Bringing data protection into the 21st century, the Regulation expands the rights of individuals, but also introduces new, stricter requirements for organisations. This pocket guide discusses the GDPR requirements relating to Cloud sourcing and the risks involved.Buy today and learn how to meet your data protection obligations when using Cloud services.

  • Advances in Human Factors in Training, Education, and Learning Sciences
    - Proceedings of the AHFE 2018 International Conference on Human Factors in Training, Education, and Learning Sciences, July 21-25, 2018, Loews Sapphire Falls Resort at Universal Studios, Orlando, Florida, USA
     

    This book focuses on the importance of human factors in optimizing the learning and training process. It reports on the latest research and best practices and discusses key principles of behavioral and cognitive science, which are extremely relevant to the design of instructional content and new technologies to support mobile and multimedia learning, virtual training and web-based learning, among others, as well as performance measurements, social and adaptive learning and many other types of educational technologies, with a special emphasis on those important in the corporate, higher education, and military training contexts. Based on the AHFE 2018 Conference on Human Factors in Training, Education, and Learning Sciences, held July 21-25, 2018 in Orlando, Florida, USA on July 21-25, 2018, the book offers a timely perspective on the role of human factors in education. It highlights important new ideas and will fosters new discussions on how to optimally design learning experiences.

  • Biomechanics of Anthropomorphic Systems
     

    Mechanical laws of motion were applied very early for better understanding anthropomorphic action as suggested in advance by Newton For from hence are easily deduced the forces of machines, which are compounded of wheels, pullies, levers, cords, and weights, ascending directly or obliquely, and other mechanical powers; as also the force of the tendons to move the bones of animals In the 19th century E.J. Marey and E. Muybridge introduced chronophotography to scientifically investigate animal and human movements. They opened the field of motion analysis by being the first scientists to correlate ground reaction forces with kinetics.Despite of the apparent simplicity of a given skilled movement, the organization of the underlying neuro-musculo-skeletal system remains unknown. A reason is the redundancy of the motor system: a given action can be realized by different muscle and joint activity patterns, and the same underlying activity may give rise to several movements. After the pioneering work of N. Bernstein in the 60's on the existence of motor synergies, numerous researchers walking on the border of their disciplines tend to discover laws and principles underlying the human motions and how the brain reduces the redundancy of the system. These synergies represent the fundamental building blocks composing complex movements.In robotics, researchers face the same redundancy and complexity challenges as the researchers in life sciences. This book gathers works of roboticists and researchers in biomechanics in order to promote an interdisciplinary research on anthropomorphic systems at large and on humanoid robotics in particular.

  • Artificial Intelligence in Education
    - 19th International Conference, AIED 2018, London, UK, June 27-30, 2018, Proceedings, Part II
     

    This two volume set LNAI 10947 and LNAI 10948 constitutes the proceedings of the 19th International Conference on Artificial Intelligence in Education, AIED 2018, held in London, UK, in June 2018.The 45 full papers presented in this book together with 76 poster papers, 11 young researchers tracks, 14 industry papers and 10 workshop papers were carefully reviewed and selected from 192 submissions. The conference provides opportunities  for the cross-fertilization of approaches, techniques and ideas from the  many fields that comprise AIED, including computer science, cognitive and learning sciences, education, game design, psychology, sociology, linguistics as well as many domain-specific areas.

  • Artificial Intelligence in Education
    - 19th International Conference, AIED 2018, London, UK, June 27-30, 2018, Proceedings, Part I
     

    This two volume set LNAI 10947 and LNAI 10948 constitutes the proceedings of the 19th International Conference on Artificial Intelligence in Education, AIED 2018, held in London, UK, in June 2018.The 45 full papers presented in this book together with 76 poster papers, 11 young researchers tracks, 14 industry papers and 10 workshop papers were carefully reviewed and selected from 192 submissions. The conference provides opportunities  for the cross-fertilization of approaches, techniques and ideas from the  many fields that comprise AIED, including computer science, cognitive and learning sciences, education, game design, psychology, sociology, linguistics as well as many domain-specific areas.

  • Advances in Human Error, Reliability, Resilience, and Performance
    - Proceedings of the AHFE 2018 International Conference on Human Error, Reliability, Resilience, and Performance, July 21-25, 2018, Loews Sapphire Falls Resort at Universal Studios, Orlando, Florida, USA
     

    This book brings together studies broadly addressing human error from different disciplines and perspectives. It discusses topics such as human performance; human variability and reliability analysis; medical, driver and pilot error, as well as automation error; root cause analyses; and the cognitive modeling of human error. In addition, it highlights cutting-edge applications in safety management, defense, security, transportation, process controls, and medicine, as well as more traditional fields of application.Based on the AHFE 2018 International Conference on Human Error, Reliability, Resilience, and Performance, held on July 21-25, 2018, in Orlando, Florida, USA, the book includes experimental papers, original reviews, and reports on case studies, as well as meta-analyses, technical guidelines, best practice and methodological papers. It offers a timely reference guide for researchers and practitioners dealing with human error in a diverse range of fields.

  • Services Computing - SCC 2018
    - 15th International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings
     

    This book constitutes the proceedings of the International Conference on Services Computing, SCC 2018, as part of SCF 2018, held in Seattle, WA, USA, in June 2018. The 12 papers presented in this volume were carefully reviewed and selected from numerous submissions. The papers cover the science and technology of leveraging computing and information technology to model, create, operate, and manage business services.

  • Advances in Human Factors and Ergonomics in Healthcare and Medical Devices
    - Proceedings of the AHFE 2018 International Conference on Human Factors and Ergonomics in Healthcare and Medical Devices, July 21-25, 2018, Loews Sapphire Falls Resort at Universal Studios, Orlando, Florida, USA
     

    This book shows how human factors and ergonomic principles have been transforming healthcare. It reports on the design of systems and devices to improve quality, safety, efficiency, and effectiveness in patient care, and discusses findings related to improving organizational outcomes in a healthcare setting, as well as approaches for analyzing and modeling those work aspects that are unique to healthcare. Based on the AHFE 2018 International Conference on Human Factors and Ergonomics in Healthcare and Medical Devices, held on July 21-25, 2018, in Orlando, Florida, USA, the book highlights the physical, cognitive and organizational aspects of human factors and ergonomic applications, presenting various perspectives, including those of clinicians, patients, health organizations, and insurance providers. The book is intended as a timely reference guide for researchers involved in the design of medical systems, healthcare professionals managing healthcare settings, as well as healthcare counselors and international health organizations.

  • Internet of Things - ICIOT 2018
    - Third International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings
     

    This book constitutes the proceedings of the International Conference on Internet of Things, ICIOT 2018, held in Seattle, WA, USA, in June 2018. The 13 full papers and 1 short paper presented in this volume was carefully reviewed and selected for inclusion in this book. The contributions are organized in topical sections named: Research Track - Architecture; Research Track - Smart IoT; Application and Industry Track; and Short Paper Track. They deal with research and application innovations in the internet of things services. 

  • Artificial Intelligence and Mobile Services - AIMS 2018
    - 7th International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings
     

    This book constitutes the proceedings of the International Conference on Artificial Intelligence and Mobile Services, AIMS 2018, held as part of SCF 2018, in Seattle, WA, USA, in June 2018. The 20 papers presented in this volume were carefully reviewed and selected from numerous submissions. The papers cover different aspects of mobile services from business management to computing systems, algorithms and applications. They promote technological technological innovations in research and development of mobile services, including, but not limited to, wireless and sensor networks, mobile and wearable computing, mobile enterprise and eCommerce, ubiquitous collaborative and social services, machine-to-machine and Internet-of-things, clouds, cyber-physical integration, and big data analytics for mobility-enabled services

  • Edge Computing - EDGE 2018
    - Second International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings
     

    This book constitutes the proceedings of the International Conference on Edge Computing, EDGE 2018, held in Seattle, WA, USA, in June 2018. The 9 full papers and 3 short paper presented in this volume were carefully reviewed and selected from 29 submissions. The contributions are organized in topical sections named: Research Track; Application and Industry Track; and Short Paper Track. They deal with the latest fundamental advances in the state of the art and practice of edge computing.

  • Advances in Human Factors and Systems Interaction
    - Proceedings of the AHFE 2018 International Conference on Human Factors and Systems Interaction, July 21-25, 2018, Loews Sapphire Falls Resort at Universal Studios, Orlando, Florida, USA
     

    This book reports on cutting-edge research into innovative system interfaces, highlighting both lifecycle development and human-technology interaction, especially in virtual, augmented and mixed-reality systems. It describes advanced methodologies and tools for evaluating and improving interface usability and discusses new models, as well as case studies and good practices. The book addresses the human, hardware, and software factors in the process of developing interfaces for optimizing total system performance, particularly innovative computing technologies for teams dealing with dynamic environments, while minimizing total ownership costs. It also highlights the forces currently shaping the nature of computing and systems, including the need for decreasing hardware costs; the importance of portability, which translates to the modern tendency toward hardware miniaturization and technologies for reducing power requirements; the necessity of a better assimilation of computation in the environment; and social concerns regarding access to computers and systems for people with special needs. The book, which is based on the AHFE 2018 International Conference on Human Factors and Systems Interaction, held on July 21-25, 2018, in Orlando, Florida, USA, offers a timely survey and practice-oriented guide for systems interface users and developers alike.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.