You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 13th Colombian Conference on Computing, CCC 2018, held in Cartagena, Colombia, in September 2018. The 46 revised full papers presented were carefully reviewed and selected from 194 submissions. The papers deal with the following topics: information and knowledge management, software engineering and IT architectures, educational informatics, intelligent systems and robotics, human-computer interaction, distributed systems and large-scale architectures, image processing, computer vision and multimedia, security of the information, formal methods, computational logic, and theory of computation.
This book constitutes the proceedings of the 9th Workshop on Engineering Applications on Applied Computer Sciences in Engineering, WEA 2022, which took place in Bogotá, Colombia, in November/December 2022. The 39 papers presented in this volume were carefully reviewed and selected from 143 submissions. They were organized in topical sections as follows: Artificial Intelligence; Optimization; Simulation; and Applications.
Sound investment decisions require an in-depth knowledge of the financial markets and available financial instruments. This book provides students and professionals with an understanding of the role and activities of an equity security analyst within the investment process. Emphasis is on understanding the process of analyzing companies; the valuation process; and the challenges of achieving success in a highly competitive capital market. The authors present a comprehensive compendium on the financial theory, the empirical evidence and the mathematical tools that form the underlying principles of investment decisions.
In recent years, industries have shifted into the digital domain, as businesses and organizations have used various forms of technology to aid information storage and efficient production methods. Because of these advances, the risk of cybercrime and data security breaches has skyrocketed. Fortunately, cyber security and data privacy research are thriving; however, industry experts must keep themselves updated in this field. Exploring Cyber Criminals and Data Privacy Measures collects cutting-edge research on information security, cybercriminals, and data privacy. It proposes unique strategies for safeguarding and preserving digital information using realistic examples and case studies. Covering key topics such as crime detection, surveillance technologies, and organizational privacy, this major reference work is ideal for cybersecurity professionals, researchers, developers, practitioners, programmers, computer scientists, academicians, security analysts, educators, and students.
Substance, Judgment and Evaluation: Seeking the Worth of a Liberal Arts, Core Text Education selectively presents the thoughts of scholars and teachers of liberal arts, core text education on how their programs formulate and advance a "value-centered" education. What emerges from this selection is the wide scope of core text programs underlying the semantic intention of words such as "value-centered," "judgment," or even "liberal arts" or "collegiate" and "colleague." This volume records the cooperation and thoughtful consideration of faculty from a wide range of higher education institutions - research universities, comprehensive universities, colleges, and community colleges - who have chosen to come together to form such programs across North America. This volume should be of value to any dean, director, or faculty member who seeks to work with colleagues and texts across disciplines to form a coherent undergraduate program of study within general education.
This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems. This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of, and trust in, modern society’s microelectronic-supported infrastructures.
Crises present significant challenges for organizations. But, while critical events are inevitable, not every business is sufficiently equipped for when things don’t go according to plan. This book focuses on business under crisis conditions, along with organizational responses and adaptation. Adaptation can be seen as a learning process. It encompasses meaningful ways that help companies sustain their viability over the long term. Companies that respond quickly, often achieve more than just surviving. Some organizations will learn from a crisis, develop reactive resilience, and emerge stronger from the period of turbulence. They will be able to explore possibilities and create new pattern...
This textbook presents worked-out exercises on game theory with detailed step-by-step explanations. While most textbooks on game theory focus on theoretical results, this book focuses on providing practical examples in which students can learn to systematically apply theoretical solution concepts to different fields of economics and business. The text initially presents games that are required in most courses at the undergraduate level and gradually advances to more challenging games appropriate for masters level courses. The first six chapters cover complete-information games, separately analyzing simultaneous-move and sequential-move games, with applications in industrial economics, law, a...