Skip to main content

Books in Data

31-40 of 75 results in All results

Introduction to Data Compression

  • 5th Edition
  • October 23, 2017
  • Khalid Sayood
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 9 4 7 4 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 9 7 0 5 - 2
Introduction to Data Compression, Fifth Edition, builds on the success of what is widely considered the best introduction and reference text on the art and science of data compression. Data compression techniques and technology are ever-evolving with new applications in image, speech, text, audio and video. This new edition includes all the latest developments in the field. Khalid Sayood provides an extensive introduction to the theory underlying today’s compression techniques, with detailed instruction for their applications using several examples to explain the concepts. Encompassing the entire field of data compression, the book includes lossless and lossy compression, Huffman coding, arithmetic coding, dictionary techniques, context based compression, and scalar and vector quantization. The book provides a comprehensive working knowledge of data compression, giving the reader the tools to develop a complete and concise compression package.

Misch's Avoiding Complications in Oral Implantology

  • 1st Edition
  • March 24, 2017
  • Carl E. Misch + 1 more
  • English
  • Hardback
    9 7 8 - 0 - 3 2 3 - 3 7 5 8 0 - 1
  • eBook
    9 7 8 - 0 - 3 2 3 - 3 9 0 1 5 - 6
See how to effectively manage ALL dental implant complications throughout ALL phases of treatment! Avoiding Complications in Oral Implantology provides evidence-based management protocols for a wide range of implant problems such as placement complications, malpositioning, bleeding, infection, and nerve injuries. Hundreds of high-quality, full-color photos and illustrations clearly demonstrate the complications and their resolution. Edited by Carl Misch and Randolph Resnik — both well-known names in dental implantology and prosthodontics — and with a team of expert contributors, this authoritative guide helps you handle the implant-related complications that can occur as more and more patients choose dental implants.

Big Data and Smart Service Systems

  • 1st Edition
  • November 22, 2016
  • Xiwei Liu + 4 more
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 8 1 2 0 1 3 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 8 1 2 0 4 0 - 8
Big Data and Smart Service Systems presents the theories and applications regarding Big Data and smart service systems, data acquisition, smart cities, business decision-making support, and smart service design. The rapid development of computer and Internet technologies has led the world to the era of Big Data. Big Data technologies are widely used, which has brought unprecedented impacts on traditional industries and lifestyle. More and more governments, business sectors, and institutions begin to realize data is becoming the most valuable asset and its analysis is becoming the core competitiveness.

Network Storage

  • 1st Edition
  • October 13, 2016
  • James O'Reilly
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 3 8 6 3 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 3 8 6 5 - 9
Network Storage: Tools and Technologies for Storing Your Company’s Data explains the changes occurring in storage, what they mean, and how to negotiate the minefields of conflicting technologies that litter the storage arena, all in an effort to help IT managers create a solid foundation for coming decades. The book begins with an overview of the current state of storage and its evolution from the network perspective, looking closely at the different protocols and connection schemes and how they differentiate in use case and operational behavior. The book explores the software changes that are motivating this evolution, ranging from data management, to in-stream processing and storage in virtual systems, and changes in the decades-old OS stack. It explores Software-Defined Storage as a way to construct storage networks, the impact of Big Data, high-performance computing, and the cloud on storage networking. As networks and data integrity are intertwined, the book looks at how data is split up and moved to the various appliances holding that dataset and its impact. Because data security is often neglected, users will find a comprehensive discussion on security issues that offers remedies that can be applied. The book concludes with a look at technologies on the horizon that will impact storage and its networks, such as NVDIMMs, The Hybrid Memory Cube, VSANs, and NAND Killers.

Data Hiding Techniques in Windows OS

  • 1st Edition
  • September 8, 2016
  • Nihad Ahmad Hassan + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 4 4 4 9 - 0
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 4 4 9 6 - 4
"This unique book delves down into the capabilities of hiding and obscuring data object within the Windows Operating System. However, one of the most noticeable and credible features of this publication is, it takes the reader from the very basics and background of data hiding techniques, and run’s on the reading-road to arrive at some of the more complex methodologies employed for concealing data object from the human eye and/or the investigation. As a practitioner in the Digital Age, I can see this book siting on the shelves of Cyber Security Professionals, and those working in the world of Digital Forensics – it is a recommended read, and is in my opinion a very valuable asset to those who are interested in the landscape of unknown unknowns. This is a book which may well help to discover more about that which is not in immediate view of the onlooker, and open up the mind to expand its imagination beyond its accepted limitations of known knowns." - John Walker, CSIRT/SOC/Cyber Threat Intelligence Specialist   Featured in Digital Forensics Magazine, February 2017   In the digital world, the need to protect online communications increase as the technology behind it evolves. There are many techniques currently available to encrypt and secure our communication channels. Data hiding techniques can take data confidentiality to a new level as we can hide our secret messages in ordinary, honest-looking data files. Steganography is the science of hiding data. It has several categorizations, and each type has its own techniques in hiding. Steganography has played a vital role in secret communication during wars since the dawn of history. In recent days, few computer users successfully manage to exploit their Windows® machine to conceal their private data. Businesses also have deep concerns about misusing data hiding techniques. Many employers are amazed at how easily their valuable information can get out of their company walls. In many legal cases a disgruntled employee would successfully steal company private data despite all security measures implemented using simple digital hiding techniques. Human right activists who live in countries controlled by oppressive regimes need ways to smuggle their online communications without attracting surveillance monitoring systems, continuously scan in/out internet traffic for interesting keywords and other artifacts. The same applies to journalists and whistleblowers all over the world. Computer forensic investigators, law enforcements officers, intelligence services and IT security professionals need a guide to tell them where criminals can conceal their data in Windows® OS & multimedia files and how they can discover concealed data quickly and retrieve it in a forensic way. Data Hiding Techniques in Windows OS is a response to all these concerns. Data hiding topics are usually approached in most books using an academic method, with long math equations about how each hiding technique algorithm works behind the scene, and are usually targeted at people who work in the academic arenas. This book teaches professionals and end users alike how they can hide their data and discover the hidden ones using a variety of ways under the most commonly used operating system on earth, Windows®. This is your hands-on guide to understand, detect and use today’s most popular techniques in hiding and exploring hidden data under Windows® machines, covering all Windows® versions from XP till Windows® 10. Starting with the Roman Emperor, Julius Caesar, and his simple cipher method to the surveillance programs deployed by NSA, to monitor communication and online traffic, this book will teach you everything you need to know to protect your digital data using steganographic & anonymity cryptographic techniques. Written in a simple style and requiring only basic knowledge of main Windows® functions, techniques are presented in a way to easily implement them directly on your computer.

Big Data

  • 1st Edition
  • June 3, 2016
  • Rajkumar Buyya + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 5 3 9 4 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 9 3 4 6 - 7
Big Data: Principles and Paradigms captures the state-of-the-art research on the architectural aspects, technologies, and applications of Big Data. The book identifies potential future directions and technologies that facilitate insight into numerous scientific, business, and consumer applications. To help realize Big Data’s full potential, the book addresses numerous challenges, offering the conceptual and technological solutions for tackling them. These challenges include life-cycle data management, large-scale storage, flexible processing infrastructure, data modeling, scalable machine learning, data analysis algorithms, sampling techniques, and privacy and ethical issues.

Data Simplification

  • 1st Edition
  • March 9, 2016
  • Jules J. Berman
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 3 7 8 1 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 3 8 5 4 - 3
Data Simplification: Taming Information With Open Source Tools addresses the simple fact that modern data is too big and complex to analyze in its native form. Data simplification is the process whereby large and complex data is rendered usable. Complex data must be simplified before it can be analyzed, but the process of data simplification is anything but simple, requiring a specialized set of skills and tools. This book provides data scientists from every scientific discipline with the methods and tools to simplify their data for immediate analysis or long-term storage in a form that can be readily repurposed or integrated with other data. Drawing upon years of practical experience, and using numerous examples and use cases, Jules Berman discusses the principles, methods, and tools that must be studied and mastered to achieve data simplification, open source tools, free utilities and snippets of code that can be reused and repurposed to simplify data, natural language processing and machine translation as a tool to simplify data, and data summarization and visualization and the role they play in making data useful for the end user.

Data Mapping for Data Warehouse Design

  • 1st Edition
  • December 8, 2015
  • Qamar Shahbaz
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 5 1 8 5 - 6
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 5 3 3 5 - 5
Data mapping in a data warehouse is the process of creating a link between two distinct data models’ (source and target) tables/attributes. Data mapping is required at many stages of DW life-cycle to help save processor overhead; every stage has its own unique requirements and challenges. Therefore, many data warehouse professionals want to learn data mapping in order to move from an ETL (extract, transform, and load data between databases) developer to a data modeler role. Data Mapping for Data Warehouse Design provides basic and advanced knowledge about business intelligence and data warehouse concepts including real life scenarios that apply the standard techniques to projects across various domains. After reading this book, readers will understand the importance of data mapping across the data warehouse life cycle.

The Art and Science of Analyzing Software Data

  • 1st Edition
  • August 27, 2015
  • Christian Bird + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 1 5 1 9 - 4
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 1 5 4 3 - 9
The Art and Science of Analyzing Software Data provides valuable information on analysis techniques often used to derive insight from software data. This book shares best practices in the field generated by leading data scientists, collected from their experience training software engineering students and practitioners to master data science. The book covers topics such as the analysis of security data, code reviews, app stores, log files, and user telemetry, among others. It covers a wide variety of techniques such as co-change analysis, text analysis, topic analysis, and concept analysis, as well as advanced topics such as release planning and generation of source code comments. It includes stories from the trenches from expert data scientists illustrating how to apply data analysis in industry and open source, present results to stakeholders, and drive decisions.

Bent Functions

  • 1st Edition
  • August 6, 2015
  • Natalia Tokareva
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 3 1 8 - 1
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 5 5 5 - 0
Bent Functions: Results and Applications to Cryptography offers a unique survey of the objects of discrete mathematics known as Boolean bent functions. As these maximal, nonlinear Boolean functions and their generalizations have many theoretical and practical applications in combinatorics, coding theory, and cryptography, the text provides a detailed survey of their main results, presenting a systematic overview of their generalizations and applications, and considering open problems in classification and systematization of bent functions. The text is appropriate for novices and advanced researchers, discussing proofs of several results, including the automorphism group of bent functions, the lower bound for the number of bent functions, and more.