You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
"We wrote Business Analytics: Communicating with Numbers from the ground up to prepare students to understand, manage, and visualize the data; apply the appropriate analysis tools; and communicate the findings and their relevance. The text seamlessly threads the topics of data wrangling, descriptive analytics, predictive analytics, and prescriptive analytics into a cohesive whole. In the second edition of Business Analytics, we have made substantial revisions that meet the current needs of the instructors teaching the course and the companies that require the relevant skillset. These revisions are based on the feedback of reviewers and users of our first edition. The greatly expanded coverage of the text gives instructors the flexibility to select the topics that best align with their course objectives"--
Networking for Big Data supplies an unprecedented look at cutting-edge research on the networking and communication aspects of Big Data. Starting with a comprehensive introduction to Big Data and its networking issues, it offers deep technical coverage of both theory and applications.The book is divided into four sections: introduction to Big Data,
This book covers key concepts of cryptography, from encryption and digital signatures to cryptographic protocols, presenting techniques and protocols for key exchange, user ID, electronic elections and digital cash. Advanced topics include bit security of one-way functions and computationally perfect pseudorandom bit generators. Assuming no special background in mathematics, it includes chapter-ending exercises and the necessary algebra, number theory and probability theory in the appendix. This edition offers new material including a complete description of the AES, a section on cryptographic hash functions, new material on random oracle proofs, and a new section on public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks.
Long heralded as a seminal work on the history of Afghanistan, this book traces the evolution of the modern Afghan state by studying the politics of reform and modernization that started in 1880 through World War II. In this reissue, Vartan Gregorian offers a new introduction that places the key themes of the book in the context of contemporary events, addressing questions of tribalism, nationalism, Islam, and modernization, as well as the legacies of the Cold War and the various exit strategies of occupying powers. The book remains as distinctive today as when it was first published. It is the only broad work on Afghan history that considers ethnicity as the defining influence over the course of the country's history, rather than religion. In light of today's ongoing struggle to develop a coherent national identity, the question of Afghan nationalism remains a particularly significant issue.
First published in 2007. This title combines two volumes of work; fifty-eight chapters dissecting the history of Afghanistan with sketch maps and illustrations throughout. Sykes argues that few countries present problems of greater interest to the historian than landlocked Afghanistan, the counterpart in Asia of Switzerland in Europe. Their studies cover the prehistory in the Near East, going through the history of each dynasty up to the early 1900s. A key text for historians, students and those interested in the complex history of the country.
Even in the age of ubiquitous computing, the importance of the Internet will not change and we still need to solve conventional security issues. In addition, we need to deal with new issues such as security in the P2P environment, privacy issues in the use of smart cards, and RFID systems. Security and Privacy in the Age of Ubiquitous Computing addresses these issues and more by exploring a wide scope of topics. The volume presents a selection of papers from the proceedings of the 20th IFIP International Information Security Conference held from May 30 to June 1, 2005 in Chiba, Japan. Topics covered include cryptography applications, authentication, privacy and anonymity, DRM and content security, computer forensics, Internet and web security, security in sensor networks, intrusion detection, commercial and industrial security, authorization and access control, information warfare and critical protection infrastructure. These papers represent the most current research in information security, including research funded in part by DARPA and the National Science Foundation.