Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.Ved tilmelding accepterer du vores persondatapolitik.
Du kan altid afmelde dig igen.
The bestseller in IT architecture. If you want to understand IT architecture, this book is for you. It covers many different areas, from strategy to business, technology, and software architecture. Are you working as an IT architect, student, developer, CTO, project manager, or IT professional? If so, this book will help you understand how IT architecture can help address the complexity in a modern organization. It will give you a deeper understanding of the concepts, methods, tools, models, organizations, and frameworks involved. It also covers the social and human aspects of working as an IT architect. Enterprise Architecture, The EA function, Strategy, Organization... Business Architecture, Understanding the business, Modeling, Practical advice… Solution Architecture, Integration, Infrastructure, Security…Software Architecture, Quality attributes, Agility and Lean, DevOps, cloud, AI…… and a lot more. Daniel Akenine is a physicist, technologist, writer, and former neuroscientist. He works as a National Technology Officer for Microsoft, specializing in the impact technology has on society. In 2015 he was appointed to IASA Fellow and ranked as one of the top IT-architects worldwide. He is a member of ISO’s international expert group for cloud standards, co-founder of two technology companies and holds patent applications in Europe and the United States in applied cryptography. Daniel is one of ten advisors to the Swedish Minister of Digitalization and a fiction writer with the latest novel 11 grams of truth about privacy and power in our modern society.
Why is Google Analytics 4 the most modern data model available for digital marketing analytics? Because rather than simply report what has happened, GA4's new cloud integrations enable more data activationlinking online and offline data across all your streams to provide end-to-end marketing data. This practical book prepares you for the future of digital marketing by demonstrating how GA4 supports these additional cloud integrations.Author Mark Edmondson, Google Developer Expert for Google Analytics and Google Cloud, provides a concise yet comprehensive overview of GA4 and its cloud integrations. Data, business, and marketing analysts will learn major facets of GA4's powerful new analytics model, with topics including data architecture and strategy, and data ingestion, storage, and modeling. You'll explore common data activation use cases and get guidance on how to implement them.You'll learn:How Google Cloud integrates with GA4The potential use cases that GA4 integrations can enableSkills and resources needed to create GA4 integrationsHow much GA4 data capture is necessary to enable use casesThe process of designing dataflows from strategy though data storage, modeling, and activation
If the carriers of information are governed by quantum mechanics, new principles for information processing apply. This graduate textbook introduces the underlying mathematical theory for quantum communication, computation, and cryptography. A focus lies on the concept of quantum channels, understanding fi gures of merit, e.g. fidelities and entropies in the quantum world, and understanding the interrelationship of various quantum information processing protocols.
Learn how and when to use the right data structures in any situation, strengthening your computational thinking, problem-solving, and programming skills in the process.This accessible and entertaining book provides an in-depth introduction to computational thinking through the lens of data structures - a critical component in any programming endeavor. You'll learn how to work with more than 15 key data structures, from stacks, queues, and caches to bloom filters, skip lists, and graphs. You'll also master linked lists by virtually standing in line at a cafe, hash tables by cataloging the history of the summer Olympics, and Quadtrees by neatly organizing your kitchen cabinets, all while becoming familiar with basic computer science concepts, like recursion and running time analysis.
Data storage has grown such that distributed storage over a number of systems is now commonplace. This has given rise to an increase in the complexity of ensuring data loss does not occur, particularly where failure is due to the failure of individual nodes within the storage system. Redundancy was the main tool to combat this, but with huge increases in data, minimization of the overhead associated with this technique caused major concern. In a large data center, a third concern arose, namely the need for efficient recovery from the failure of a single storage unit. In this monograph, the authors give a comprehensive overview of the role of differing types of codes in addressing the issues in large distributed storage systems. They introduce the reader to regenerative codes, locally recoverable codes and locally regenerative codes; the three main classes of codes used in such systems. They give an exhaustive overview of how these codes were created, their uses and the developments and improvements of the codes in the last decade. This in-depth review gives the reader an accessible and complete overview of the modern codes used in distributed storage systems today. It is a one-stop source for students, researchers and practitioners working on any such system.
Common information measures the amount of matching variables in two or more information sources. It is ubiquitous in information theory and related areas such as theoretical computer science and discrete probability. However, because there are multiple notions of common information, a unified understanding of the deep interconnections between them is lacking. In this monograph the authors fill this gap by leveraging a small set of mathematical techniques that are applicable across seemingly disparate problems. The reader is introduced in Part I to the operational tasks and properties associated with the two main measures of common information, namely Wyner's and Gács-Körner-Witsenhausen's (GKW). In the subsequent two Parts, the authors take a deeper look at each of these. In Part II they discuss extensions to Wyner's common information from the perspective of distributed source simulation, including the Rényi common information. In Part III, GKW common information comes under the spotlight. Having laid the groundwork, the authors seamlessly transition to discussing their connections to various conjectures in information theory and discrete probability. This monograph provides students and researchers in Information Theory with a comprehensive resource for understanding common information and points the way forward to creating a unified set of techniques applicable over a wide range of problems.
In Silico Chemistry and Biology: Current and Future Prospects provides a compact overview on recent advances in this highly dynamic branch of chemistry. Various methods of protein modelling and computer-assisted drug design are presented, including fragment- and ligand-based approaches. Many successful practical applications of these techniques are demonstrated. The authors also look to the future and describe the main challenges of the field.
Rank-metric codes date back to the 1970s and today play a vital role in many areas of coding theory and cryptography. In this survey the authors provide a comprehensive overview of the known properties of rank-metric codes and their applications. The authors begin with an accessible and complete introduction to rank-metric codes, their properties and their decoding. They then discuss at length rank-metric code-based quantum resistant encryption and authentication schemes. The application of rank-metric codes to distributed data storage is also outlined. Finally, the constructions of network codes based on MRD codes, constructions of subspace codes by lifting rank-metric codes, bounds on the cardinality, and the list decoding capability of subspace codes is covered in depth. Rank-Metric Codes and Their Applications provides the reader with a concise, yet complete, general introduction to rank-metric codes, explains their most important applications, and highlights their relevance to these areas of research.
A New York Times BestsellerAn audacious, irreverent investigation of human behavior-and a first look at a revolution in the making Our personal data has been used to spy on us, hire and fire us, and sell us stuff we don't need. In Dataclysm, Christian Rudder uses it to show us who we truly are. For centuries, we've relied on polling or small-scale lab experiments to study human behavior. Today, a new approach is possible. As we live more of our lives online, researchers can finally observe us directly, in vast numbers, and without filters. Data scientists have become the new demographers. In this daring and original book, Rudder explains how Facebook "likes" can predict, with surprising accuracy, a person's sexual orientation and even intelligence; how attractive women receive exponentially more interview requests; and why you must have haters to be hot. He charts the rise and fall of America's most reviled word through Google Search and examines the new dynamics of collaborative rage on Twitter. He shows how people express themselves, both privately and publicly. What is the least Asian thing you can say? Do people bathe more in Vermont or New Jersey? What do black women think about Simon & Garfunkel? (Hint: they don't think about Simon & Garfunkel.) Rudder also traces human migration over time, showing how groups of people move from certain small towns to the same big cities across the globe. And he grapples with the challenge of maintaining privacy in a world where these explorations are possible. Visually arresting and full of wit and insight, Dataclysm is a new way of seeing ourselves-a brilliant alchemy, in which math is made human and numbers become the narrative of our time.
This book constitutes the thoroughly refereed post-conference proceedings of the IFIP WG 11.4 International Workshop on Open Problems in Network Security, iNetSec 2011, held in Lucerne, Switzerland, in June 2011, co-located and under the auspices of IFIP SEC 2011, the 26th IFIP TC-11 International Information Security Conference. The 12 revised full papers were carefully reviewed and selected from 28 initial submissions; they are fully revised to incorporate reviewers' comments and discussions at the workshop. The volume is organized in topical sections on assisting users, malware detection, saving energy, policies, and problems in the cloud.
This book constitutes the refereed proceedings of the 12th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2010, held in Ghent, Belgium, in October 2011. The 26 revised papers presented were carefully reviewed and selected from 52 submissions. The papers are organized in topical sections on usability, architecture and framework security, mobile identity management, secure hardware platforms, biometrics, multimedia security, network security and authentication.
This book constitutes the refereed proceedings of the 31st Annual International Cryptology Conference, CRYPTO 2011, held in Santa Barbara, CA, USA in August 2011. The 42 revised full papers presented were carefully reviewed and selected from 230 submissions. The volume also contains the abstract of one invited talk. The papers are organized in topical sections on randomness and its use; computer-assisted cryptographic proofs; outsourcing and delegatin computation; symmetric cryptanalysis and constructions; secure computation: leakage and side channels; quantum cryptography; lattices and knapsacks; public-key encryption; symmetric schemes; signatures; obilvious transfer and secret sharing; and multivariate and coding-based schemes.