The Digital Da Vinci book series opens with the interviews of music mogul Quincy Jones, MP3 inventor Karlheinz Brandenburg, Tommy Boy founder Tom Silverman and entertainment attorney Jay L.
Gain a broad understanding of how PCI DSS is structured and obtain a high-level view of the contents and context of each of the 12 top-level requirements.
Learn the psychological constrictions of attention, perception, memory, disposition, motivation, and social influence that determine whether customers will be receptive to your digital innovations.
This concise book shows you how experiential learning can be used to overcome the challenges posed in applying and delivering information technology (IT) to your business needs through an innovative, game-based approach.
Work with big data applications by using Spring Cloud Data Flow as a unified, distributed, and extensible system for data ingestion and integration, real-time analytics and data processing pipelines, batch processing, and data export.
Build anenterprise search engine using Apache Solr: index and search documents; ingestdata from varied sources; apply various text processing techniques; utilizedifferent search capabilities; and customize Solr to retrieve the desiredresults.
Big Data Analytics with Spark is a step-by-step guide for learning Spark, which is an open-source fast and general-purpose cluster computing framework for large-scale data analysis.
Pull back the curtain on making fun and innovative costumes and accessories incorporating technologies like low-cost microprocessors, sensors and programmable LEDs.
This book highlights the different types of data architecture and illustrates the many possibilities hidden behind the term "e;Big Data"e;, from the usage of No-SQL databases to the deployment of stream analytics architecture, machine learning, and governance.
One of the fast growing elements of the Internet is electronic commerce, which refers to the use of electronic means to conduct business transactions within or across business entities.
Knowledge-Based Information Retrieval and Filtering from the Web contains fifteen chapters, contributed by leading international researchers, addressing the matter of information retrieval, filtering and management of the information on the Internet.
Responding to the escalating demands placed on organizations and enterprises as they navigate the intricacies of cloud economics, this book offers pragmatic insights for establishing a sturdy foundation for cloud cost management.
This book combines a methodological guide with an extended case study to show how digital research methods can be used to explore how ethnicity, gender, and kinship shaped early modern Algerian society and politics.
This book constitutes the refereed proceedings of the 18th EPIA Conference on Artificial Intelligence, EPIA 2017, held in Porto, Portugal, in September 2017.
In order to establish technical prerequisites for efficient electronic business and education on the Internet, appropriate system support is needed as a vital condition for maximization of both short-term and long-term profits.
Foundations of Web Technology covers the basics of Web technology while being specialized enough to add value to experienced professionals working in this field.
Biometric Solutions for Authentication in an E-World provides a collection of sixteen chapters containing tutorial articles and new material in a unified manner.
Applications of Data Mining to Electronic Commerce brings together in one place important contributions and up-to-date research results in this fast moving area.
Synchronizing E-Security is a critical investigation and empirical analysis of studies conducted among companies that support electronic commerce transactions in both advanced and developing economies.
As a foreword, here we publish an email letter of Late Professor Herb Simon, Nobel Laureate, that he wrote on the occasion ofthe death of the fatherofa friend.
The Second International Workshop on Cooperative Internet Computing (CIC2002) has brought together researchers, academics, and industry practitioners who are involved and interested in the development of advanced and emerging cooperative computing technologies.
This volume addresses the emerging area of human computation, The chapters, written by leading international researchers, explore existing and future opportunities to combine the respective strengths of both humans and machines in order to create powerful problem-solving capabilities.