Angebote zu "Informations" (207 Treffer)

Information Retrieval
72,99 € *
ggf. zzgl. Versand

Interested in how an efficient search engine works? Want to know what algorithms are used to rank resulting documents in response to user requests? The authors answer these and other key information retrieval design and implementation questions. This book is not yet another high level text. Instead, algorithms are thoroughly described, making this book ideally suited for both computer science students and practitioners who work on search-related applications. As stated in the foreword, this book provides a current, broad, and detailed overview of the field and is the only one that does so. Examples are used throughout to illustrate the algorithms. The authors explain how a query is ranked against a document collection using either a single or a combination of retrieval strategies, and how an assortment of utilities are integrated into the query processing scheme to improve these rankings. Methods for building and compressing text indexes, querying and retrieving documents in multiple languages, and using parallel or distributed processing to expedite the search are likewise described. This edition is a major expansion of the one published in 1998. Besides updating the entire book with current techniques, it includes new sections on language models, cross-language information retrieval, peer-to-peer processing, XML search, mediators, and duplicate document detection.

Anbieter: buecher.de
Stand: 05.04.2018
Zum Angebot
Introduction to Information Retrieval
47,99 € *
ggf. zzgl. Versand

Class-tested and up-to-date textbook for introductory courses on information retrieval.

Anbieter: buecher.de
Stand: 14.06.2018
Zum Angebot
Information Systems Security and Privacy
61,99 € *
ggf. zzgl. Versand

This book constitutes the revised selected papers of the Third International Conference on Information Systems Security and Privacy, ICISSP 2017, held in Porto, Portugal, in February 2017. The 13 full papers presented were carefully reviewed and selected from a total of 100 submissions. They are dealing with topics such as vulnerability analysis and countermeasures, attack patterns discovery and intrusion detection, malware classification and detection, cryptography applications, data privacy and anonymization, security policy analysis, enhanced access control, and socio-technical aspects of security.

Anbieter: buecher.de
Stand: 15.06.2018
Zum Angebot
The Design Process in Information System Research
21,99 € *
ggf. zzgl. Versand

Bachelor Thesis from the year 2009 in the subject Computer Science - Commercial Information Technology, grade: 1,3, University of Frankfurt (Main) (Institute of Information Systems), language: English, abstract: The Information Systems (IS) research discipline is undergoing a serious identity crisis, seeking its sphere of activity to be relevant in practice and rigorous in scientific considerations. One reason for this is the strengthening of the Design Science approach. This new discipline developed as a synergy from aspects of engineering, architecture, and industrial design and is employed in the design of IT artifacts and software systems. Design Science is becoming a powerful trend in IS research (Vahidov 2006). It gives the IS discipline a new and more detailed focal point as pertains to the application of software and IT artifact development which is growing in importance in IS research over the time (Weber 2003; Orlikowski and Iacono 2001; Cross 2001). IS practitioners ask for new and innovative design approaches, dealing with the evolving organizational and inter-organizational tasks. The way these tasks are executed, in close cooperation with the practical business world, seems to be insufficiently considered. The debate in IS research is carried out between traditional scientists and the knowledge-producing researchers/practitioners and ´´it could be argued that research aimed at developing IT systems, at improving IT practice, has been more successful and important than traditional scientific attempts to understand it´´ (March and Smith 1995, p. 252). IS researchers are mainly focused on the behavioral impact of new IT solutions within a business unit. These concepts are needed to describe the relationship between the humans and the technology. However, this way of conducting research is descriptive and evaluative. Instead of telling ´´what is´´ or ´´what will be´´, Design Science is giving guidance as to ´´how to do´´ things (Walls et al. 1992). The importance of this new approach is given through the rapid development of business needs and the increased necessity to solve business problems through the implementation of IT solutions. The knowledge base for designing new solutions has not yet been fully developed. IT consultants borrow knowledge from reference disciplines and apply this knowledge to present problems. This way of providing solutions is not compatible with Design Science as an area of research. A relevant design approach needs to give new answers to phenomena thus far unsolved. However, the IS discipline has not yet established a solid groundwork for Design Science within its discipline.

Anbieter: buecher.de
Stand: 05.04.2018
Zum Angebot
A Mind at Play: How Claude Shannon Invented the...
14,99 € *
ggf. zzgl. Versand
Anbieter: buecher.de
Stand: 18.05.2018
Zum Angebot
Security Information and Event Management (SIEM...
47,99 € *
ggf. zzgl. Versand

Shows how to implement SIEM to efficiently analyze and report data, respond to inside and outside threats, and follow compliance regulations

Anbieter: buecher.de
Stand: 13.04.2018
Zum Angebot
Principles of Imprecise-Information Processing:...
208,99 € *
ggf. zzgl. Versand
Anbieter: buecher.de
Stand: 17.06.2018
Zum Angebot
Foundations of Information Security Based on IS...
25,99 € *
ggf. zzgl. Versand

This book is intended for everyone in an organization who wishes to have a basic understanding of information security. Knowledge about information security is important to all employees. It makes no difference if you work in a profit- or non-profit organization because the risks that organizations face are similar for all organizations. It clearly explains the approaches that most organizations can consider and implement which helps turn Information Security management into an approachable, effective and well-understood tool. It covers:- The quality requirements an organization may have for information; - The risks associated with these quality requirements;- The countermeasures that are necessary to mitigate these risks;- Ensuring business continuity in the event of a disaster;- When and whether to report incidents outside the organization. The information security concepts in this revised edition are based on the ISO/IEC27001:2013 and ISO/IEC27002:2013 standards. But the text also refers to the other relevant international standards for information security. The text is structured as follows:- Fundamental Principles of Security and Information security and Risk management. - Architecture, processes and information, needed for basic understanding of what information security is about. - Business Assets are discussed. - Measures that can be taken to protect information assets. (Physical measures, technical measures and finally the organizational measures.) The primary objective of this book is to achieve awareness by students who want to apply for a basic information security examination. It is a source of information for the lecturer who wants to question information security students about their knowledge. Each chapter ends with a case study. In order to help with the understanding and coherence of each subject, these case studies include questions relating to the areas covered in the relevant chapters. Examples of recent events that illustrate the vulnerability of information are also included. This book is primarily developed as a study book for anyone who wants to pass the ISFS (Information Security Foundation) exam of EXIN. In an appendix an ISFS model exam is given, with feedback to all multiple choice options, so that it can be used as a training for the ´real´ ISFS exam.

Anbieter: buecher.de
Stand: 06.06.2018
Zum Angebot
Grundlagen der Informatik 1. Programmierung, Al...
49,95 € *
ggf. zzgl. Versand

Dieser erste Band der Informatik erklärt die grundlegenden Konzepte: Programmierung, Algorithmen und Datenstrukturen. Nach einer Einführung zum Aufbau von Rechnersystemen und zur Darstellung von Informationen folgt ein Einstieg in die Programmierung mit der Sprache Python. Dabei werden grundsätzliche Prinzipien von Programmiersprachen erläutert, darunter Schleifen, Rekursion, imperative, funktionale und objektorientierte Programmierkonzepte. Einige konkrete Projekte werden in Python realisiert, so etwa zur Datenbeschaffung im Internet und deren Aufbereitung oder zum Umgang mit diversen Sensoren und zur Steuerung externer Geräte mit dem Raspberry-Pi. Dem Objektorientierten Programmieren und insbesondere der Programmiersprache Java ist ein eigenes Kapitel gewidmet. Diese Sprache und ihre Infrastruktur unterstützen besonders die professionelle Entwicklung großer Projekte. Auch die neuesten Konzepte von Java (Lambdas, Ströme und Funktionale) werden anschaulich erläutert. Das letzte Kapitel behandelt klassische Algorithmen und Datenstrukturen: Such- und Sortieralgorithmen, Listen, Bäume, Graphen, Maps, und diverse andere Datentypen zum effi zienten Speichern, Wiederauffi nden und Transformieren von Daten. Diese werden mit ihren Vor- und Nachteilen und anhand von Java-Programmen dargestellt. Das Buch richtet sich an alle Einsteiger, die sich ernsthaft mit Informatik beschäftigen wollen, sei es zum Selbststudium oder zur Begleitung von Vorlesungen. In den folgenden Bänden dieses Buches werden die Themen, Rechnerarchitektur, Betriebssysteme, Rechnernetze, Internet, Compilerbau und Theoretische Informatik vertieft. Prof. Dr. Heinz-Peter Gumm ist Professor für Theoretische Informatik in Marburg. Nach dem Studium in Darmstadt und Winnipeg (Kanada) von 1970 bis 1975 und der Habilitation 1981 folgten Professuren in Hawaii, Kalifornien und New York. Seine Forschungsgebiete sind Formale Methoden, Allgemeine Algebren und Coalgebren. Prof. Dr. Manfred Sommer ist emeritierter Professor für Praktische Informatik in Marburg. Nach dem Studium in Göttingen und München von 1964 bis 1969, war er Assistent am ersten Informatik-Institut in Deutschland an der TU München. Es folgten zehn Jahre bei Siemens in München und von 1984 bis 2014 war er Informatik-Professor in Marburg.

Anbieter: buecher.de
Stand: 12.04.2018
Zum Angebot
Angewandte Kryptographie
32,00 € *
ggf. zzgl. Versand

Sichere Informations- und Kommunikationssysteme - Verbindet kryptographische Grundlagen mit aktuellen Anwendungen - Keine Vorkenntnisse nötig - Auch für Nicht-Informatiker geeignet Die angewandte Kryptographie spielt eine zentrale Rolle beim Schutz von vertraulichen Daten und persönlicher Identität. Sie umfasst die Themen Verschlüsselung, Public Key Kryptographie, Authentifikation, digitale Signatur, elektronisches Bargeld und sichere Netze. Ziel des Buches ist es, Grundwissen über Algorithmen und Protokolle zu vermitteln und kryptographische Anwendungen aufzuzeigen. Mit so wenig Mathematik wie nötig, aber vielen Beispielen, Übungsaufgaben und Musterlösungen wird dem Leser der Schritt von der Theorie zur Praxis vereinfacht. Für die 5. Auflage wurde das Kapitel über elektronische Zahlungssysteme komplett überarbeitet. Ganz neu in dem Buch ist eine Beschreibung der für viele Anwendungen wichtigen Blockchain-Technologie. Anhand von praktischen Beispielen wird gezeigt, wie kryptographische Algorithmen, zum Beispiel Hash-Funktionen, bei der Blockchain eingesetzt werden.

Anbieter: buecher.de
Stand: 14.06.2018
Zum Angebot