Buy srpc.eu ?

Products related to Computer:


  • Fashion and Environmental Sustainability : Entrepreneurship, Innovation and Technology
    Fashion and Environmental Sustainability : Entrepreneurship, Innovation and Technology

    The wide range of topics that the book covers are organised into sections reflecting a cradle to grave view of how entrepreneurial, innovative, and tech-savvy approaches can advance environmental sustainability in the fashion sector.These sections include: sustainable materials; innovation in design, range planning and product development; sustainable innovations in fashion supply chains; sustainable innovations in fashion retail and marketing; sustainable alternatives for end-of-life and circular economy initiatives; and more sustainable alternative fashion business models.

    Price: 90.50 £ | Shipping*: 0.00 £
  • The Future of Human-Computer Integration : Industry 5.0 Technology, Tools, and Algorithms
    The Future of Human-Computer Integration : Industry 5.0 Technology, Tools, and Algorithms

    The Future of Human-Computer Integration: Industry 5.0 Technology, Tools, and Algorithms provides a valuable insight into how Industry 5.0 technologies, tools, and algorithms can revolutionise industries and drive innovation. By emphasising the convergence of computer technology and human interaction, readers will learn the concepts of Industry 5.0, from the fundamentals to advanced techniques, with real-world examples and case studies in different industry sectors.The authors equip readers with the knowledge to mitigate risks to ensure success in this complex human and computer synchronisation in the era of Industry 5.0.This collection of writings by experts in their respective fields invites readers to journey through the transition from Industry 4.0 to Industry 5.0.Practical insights are offered alongside cutting-edge applications, such as blockchain, the Internet of Things (IoT), QR code, and augmented reality (AR), as well as the consideration of privacy, trust, and authentication through digital signatures.Such technologies and applications hold much promise to revolutionise industries and drive innovation. Topics in this book include the role of AI in human-computer interaction, efficient asset management using blockchain, computational thinking in program development, synergy of 5G and IoT in healthcare services, advances in increasing data capacity of QR codes, and personalised user experience with augmented reality.The authors also consider the challenges, risks, and concerns of such technologies and their applications in Industry 5.0.This book comprehensively explores Industry 5.0 from a computer science perspective as it delves into the technology aspects and tools for Industry 5.0.It offers readers a detailed understanding of how computer science intersects with Industry 5.0, how to humanise it, and its application to industry. This book has been written for technology professionals and practitioners, especially ones in healthcare, smart systems, and the oil and gas sectors.It will serve as a useful reference for students studying such advanced courses as digital technology, digital transformation, emergent technologies, and innovation through new technologies.

    Price: 44.99 £ | Shipping*: 0.00 £
  • Computer Security
    Computer Security

    Completely updated and up-to-the-minute textbook for courses on computer science. The third edition has been completely revised to include new advances in software and technology over the last few years.Provides sections on Windows NT, CORBA and Java which are not examined in comparable titles. No active previous experience of security issues is necessary making this accessible to Software Developers and Managers whose responsibilities span any technical aspects of IT security.Written for self-study and course use, this book will suit a variety of introductory and more advanced security programs for students of computer science, engineering and related disciplines.Technical and project managers will also find that the broad coverage offers a great starting point for discovering underlying issues and provides a means of orientation in a world populated by a bewildering array of competing security systems.

    Price: 53.95 £ | Shipping*: 0.00 £
  • Computer Speech Technology
    Computer Speech Technology

    Offers a non-technical overview of all the major areas in the computer processing of human speech: speech recognition; speech synthesis; speaker recognition; language identification, lip synchronisation; and co-channel separation.The text's intuitive approach uses illustrations, analogies, and both historical and state-of-the-art descriptions to explain relatively complex concepts.Specifically, it helps the reader learn the professional jargon used in different areas of speech processing, evaluate speech processing systems for specific applications, understand how the various technologies of speech processing actually work, identify practical applications for speech technology in the commercial world, and relate speech technology to actual spoken language.

    Price: 55.00 £ | Shipping*: 0.00 £

Similar search terms for Computer:


  • Computer Networking : Enterprise Network Infrastructure, Network Security & Network Troubleshooting Fundamentals
    Computer Networking : Enterprise Network Infrastructure, Network Security & Network Troubleshooting Fundamentals

    If you want to PASS the CompTIA Network+ Certification, this book is for you! BUY THIS BOOK NOW AND GET STARTED TODAY! In this book you will discover:Network Concepts and ProtocolsCompTIA Network+ Exam InformationOSI Model & Network OperationsEncapsulation and the OSI ModelNetwork Protocols and Port NumbersDHCP, DNS & NTPSQL Database ProtocolsHow to Subnet NetworksIPv6 Address FundamentalsIPv6 SLAAC & IPv6 DHCPNetwork Address TranslationDynamic Host Configuration ProtocolDomain Name SystemEthernet CablingCoax Cabling and Cable TerminationFiber OpticsMultiplexing Fiber OpticsEthernet FundamentalsCSMA/CDDuplex and SpeedEthernet Frame FundamentalsEthernet Layer 2 OperationSpanning Tree ProtocolVLANs and Port AggregationHow to Route IP TrafficAddress Resolution ProtocolHow to Send Ping to Default GatewayHow to Build Routing TablesWireless Networking FundamentalsWireless 802.11 ProtocolsWireless Ethernet OperationWireless Topologies and ManagementWireless EncryptionCellular WirelessLayer 2 Devices and ServicesTraffic ShapingNeighbor Device DiscoveryLoad Balancer FundamentalsFirewall FundamentalsVoiP & SCADA SystemsNetwork MonitoringLayer 2 ErrorsFacilities MonitoringCollecting Network Monitoring & BaseliningNetwork Security FundamentalsThreats, Vulnerabilities & ExploitsHow to Reduce Threat ExposureDefense in DepthAuthentication, Authorization, and AccountingMultifactor AuthenticationNetwork Access ControlSecurity AssessmentsHow to Assess RiskHuman & Technical ExploitsWiFi Attacks & Rogue DHCP ServersPassword AttacksHow to Secure Layer 2Rogue DHCP Servers & Dynamic ARP InspectionHow to Secure Layer 3, 4 and 7Virtual Private NetworksRemote Desktop & Virtual Desktops ConnectionsNetwork Management OptionsSAN & Cloud ComputingCloud ServicesNetwork Troubleshooting FundamentalsHow to Establish a Theory of CauseHow to Test the Theory & Establish a Plan of ActionHow to Test, Verify and Document the SolutionHow to Identify and Troubleshoot Cable IssuesFiber Optic Cables & ToolsHow to use Ping, ARP & TracerouteHow to Capture TrafficWireless Troubleshooting & WiFi ToolsCommon Wireless IssuesConfiguration IssuesHow to Troubleshoot Routing IssuesHow to use Simple Network Management ProtocolHow to use NetflowHow to use SyslogHow to Document IT Procedures and PlansSecurity and Device Policies BUY THIS BOOK NOW AND GET STARTED TODAY!

    Price: 31.38 £ | Shipping*: 0.00 £
  • Productivity Machines : German Appropriations of American Technology from Mass Production to Computer Automation
    Productivity Machines : German Appropriations of American Technology from Mass Production to Computer Automation

    How productivity culture and technology became emblematic of the American economic system in pre- and postwar Germany. The concept of productivity originated in a statistical measure of output per worker or per work-hour, calculated by the US Bureau of Labor Statistics.A broader productivity culture emerged in 1920s America, as Henry Ford and others linked methods of mass production and consumption to high wages and low prices.These ideas were studied eagerly by a Germany in search of economic recovery after World War I, and, decades later, the Marshall Plan promoted productivity in its efforts to help post-World War II Europe rebuild.In Productivity Machines, Corinna Schlombs examines the transatlantic history of productivity technology and culture in the two decades before and after World War II.She argues for the interpretive flexibility of productivity: different groups viewed productivity differently at different times.Although it began as an objective measure, productivity came to be emblematic of the American economic system; post-World War II West Germany, however, adapted these ideas to its own political and economic values.Schlombs explains that West German unionists cast a doubtful eye on productivity's embrace of plant-level collective bargaining; unions fought for codetermination-the right to participate in corporate decisions.After describing German responses to US productivity, Schlombs offers an in-depth look at labor relations in one American company in Germany-that icon of corporate America, IBM.Finally, Schlombs considers the emergence of computer technology-seen by some as a new symbol of productivity but by others as the means to automate workers out of their jobs.

    Price: 33.00 £ | Shipping*: 0.00 £
  • Innovation in Energy Security and Long-Term Energy Efficiency
    Innovation in Energy Security and Long-Term Energy Efficiency

    The sustainable development of our planet depends on the use of energy. The growing population of the world inevitably causes an increase in the demand for energy, which, on the one hand, threatens the potential for shortages of energy supply, and, on the other hand, causes the deterioration of the environment.Therefore, our task is to reduce this demand through different innovative solutions (i.e., both technological and social). Social marketing and economic policies can also play a role in affecting the behavior of households and companies, by causing behavioral change oriented to energy stewardship, and an overall switch to renewable energy resources. This book provides a platform for the exchange of a wide range of ideas, which, ultimately, would facilitate the driving of societies to long-term energy efficiency.

    Price: 36.30 £ | Shipping*: 0.00 £
  • Computer Security Fundamentals
    Computer Security Fundamentals

    ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY Clearly explains core concepts, terminology, challenges, technologies, and skills Covers today's latest attacks and countermeasures The perfect beginner's guide for anyone interested in a computer security career Dr. Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started.Drawing on 30 years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures.Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected. This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more.Its many tips and examples refl ect new industry trends and the state-of-the-art in both attacks and defense.Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you've learned. LEARN HOW TO Identify and prioritize potential threats to your networkUse basic networking knowledge to improve securityGet inside the minds of hackers, so you can deter their attacksImplement a proven layered approach to network securityResist modern social engineering attacksDefend against today's most common Denial of Service (DoS) attacksHalt viruses, spyware, worms, Trojans, and other malwarePrevent problems arising from malfeasance or ignoranceChoose the best encryption methods for your organizationCompare security technologies, including the latest security appliancesImplement security policies that will work in your environmentScan your network for vulnerabilitiesEvaluate potential security consultantsMaster basic computer forensics and know what to do if you're attackedLearn how cyberterrorism and information warfare are evolving

    Price: 66.99 £ | Shipping*: 0.00 £

* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.