AdHoc MeldungenAffiliate & PublisherAdvertiser & MerchantAcademyAntwortenArtikelsucheAdventskalender SuperClix - das Partner-Programm-NetzwerkAffilitivProduktdatenPreisvergleich
Artikelsuche & Preisvergleich:

Hardcover/Naturwissenschaften, Medizin, Informatik, Technik/Informatik, EDV


Beautiful Minecraft

für 8.28€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
With a bit of imagination and a heavy dose of artistic talent, Minecraft blocks can be used to build almost anything. But as you ll see, some artists are taking Minecraft building to a whole new level. Beautiful Minecraft is a compendium of stunning artwork built in Minecraft. Using millions of blocks and spending hundreds of hours, these artists have created floating steampunk cities, alien worlds, detailed classical sculptures, fantastical landscapes, architectural marvels, and more. The results are simply beautiful. ····· 1017645029

Beautiful Minecraft

für 8.28€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
With a bit of imagination and a heavy dose of artistic talent, Minecraft blocks can be used to build almost anything. But as you ll see, some artists are taking Minecraft building to a whole new level. Beautiful Minecraft is a compendium of stunning artwork built in Minecraft. Using millions of blocks and spending hundreds of hours, these artists have created floating steampunk cities, alien worlds, detailed classical sculptures, fantastical landscapes, architectural marvels, and more. The results are simply beautiful. ····· 1017645030

E-Recruiting in Deutschland: Grundlagen, Strategien, Perspektiven

für 32.93€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Inhaltlich unveränderte Neuauflage. Eine stetig wachsende Anzahl von Unternehmen in Deutschland nutzt die Möglichkeiten des E-Recruitings, der Personalrekrutierung über das Internet. Zahlreiche Job börsen, aber auch unternehmens eigene Internet seiten, belegen diesen Trend. Zeit- und Kosten ein sparung, effektive Evaluation der Bewerberdaten, gezielte Vor aus wahl sowie ein deutlicher Imagegewinn für das Unternehmen: E-Recruiting erweist sich als wert volles Tool für die effiziente Bewerberauswahl sowie als attraktives Mar ke tinginstrument. Dennoch wird das vielfältige Potenzial des E-Recruitings selten aus ge schöpft. Der Autor Oliver Sänger informiert in seiner detaillierten Studie über die aktu el le Bedeutung dieses Instrumentes in Deutschland und zeigt Strate gien für eine optimale Nutzung des Electronic Recruiting auf. Von der Corporate Recruiting Website über Jobbörsen, virtuelle Karriere messen bis zu Sicherheitsstandards und E-Recruiting-Software: Sänger bietet kompakte und verständliche Anregungen und Einblicke in Grund lagen und Anwendung. Eine Online-Analyse nimmt die Angebote nam haf ter Unter nehmen unter die Lupe, stellt innovative, gelungene Umset zun gen sowie Ideen zur Optimierung vor. ····· 101765183

EDV-gestützte Prozessoptimierung in der Automobilindustrie: Vermittlung und Darstellung von Kennzahlensystemen auf stationären und mobilen Endgeräten

für 36.89€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Der Markt der mobilen Datengeräte und die Prognosen der Analysten erzeugen nicht nur Interesse bei den Firmen und Konsumenten, sondern eröffnen dazu eine Vielzahl an neuen Möglichkeiten. Neben den Smartphones erobern die Tablet-PCs den Markt und nach den Marktforschern von BITKOM werden die Tablets die Verkaufszahlen von Netbooks in zwei Jahren überholen. Das steigende Interesse ist zum einen durch die flexiblen Einsetzmöglichkeiten der Datengeräte, als auch durch die steigende Komplexität der Arbeitsprozesse zu erklären. Zum Kompensieren der steigenden Komplexität in den Arbeitsprozessen wird besonders auf Automatisierung geachtet. Die Aufgaben von international agierenden Unternehmen wie die Daimler AG können dabei nicht mehr nur in der Büroetage bearbeitet werden, sondern werden zunehmend mit Geschäftsreisen verbunden. Ein mobiles Büro zum Lesen und Senden von E-Mail im Flugzeug oder das Bearbeiten von Unterlagen an einem anderen Standort als den eigentlichen Arbeitsplatz, erfordert Überlegungen wie der Mitarbeiter möglichst weitreichend mit mobilen Datengeräten unterstützt werden kann. Unter diesen Voraussetzungen entsteht die Fragestellung, welche Arbeitsprozesse mit mobilen Datengeräten unterstützt werden können und welche Geräte, unter Berücksichtigung der Arbeits- und Sicherheitsrichtlinien der Unternehmen, überhaupt verwendet werden können. ····· 101763033

Multicore Software Development Techniques: Applications, Tips, and Tricks (Newnes Pocket Books)

für 38.50€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
This book provides a set of practical processes and techniques used for multicore software development. It is written with a focus on solving day to day problems using practical tips and tricks and industry case studies to reinforce the key concepts in multicore software development. Coverage includes: The multicore landscape Principles of parallel computing Multicore SoC architectures Multicore programming models The Multicore development process Multicore programming with threads Concurrency abstraction layers Debugging Multicore Systems Practical techniques for getting started in multicore development Case Studies in Multicore Systems Development Sample code to reinforce many of the concepts discussed Presents the `nuts and bolts` of programming a multicore system Provides a short-format book on the practical processes and techniques used in multicore software development Covers practical tips, tricks and industry case studies to enhance the learning process ····· 1017675992

Measuring the factors influencing e-Commerce growth in Saudi Arabia: I.S. Success factors and Demographics measurements

für 38.52€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The construction of an evaluation mechanism for entrepreneurial e-Commerce projects can be foreseen as vital to help tolerate any obstacles or source of failure that might arise in the path of the new business. Establishing a framework that encapsulates all crucial factors is a mandatory requirement in this evaluation process in order to set standers by which a firm could measure its success ability and predict and reveal all bottlenecks by carrying a full proactive inspection rather than taken by surprise. This research investigates the factors that are acting as stimulators to expand entrepreneurial e-Commerce activity amongst Saudis in the Arabian market. Based on a quantitative survey by way of a structured questionnaire, this study identifies (through factor analysis) the important factors that are impacting on rapid growth/development among entrepreneurial e-Commerce business in Saudi Arabia. The study also uses descriptive statistics to establish the level of the gap between the importance of these factors, as perceived by consumers. ····· 101763034

Enabling Collaborative Network Security with Privacy-Preserving Data Aggregation (Berichte aus der Kommunikationstechnik)

für 41.57€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Today, there is a fundamental imbalance in cybersecurity. While attackers act more and more globally and coordinated, e.g., by using botnets, their counterparts trying to manage and defend networks are limited to examine local information only. Collaboration across network boundaries would substantially strengthen network defense by enabling collaborative intrusion and anomaly detection. Also, general network management tasks, such as multi-domain traffic engineering and collection of performance statistics, could substantially profit from collaborative approaches. Unfortunately, privacy concerns largely prevent collaboration in multi-domain networking. Data protection legislation makes data sharing illegal in certain cases, especially if PII (personally identifying information) is involved. Even if it were legal, sharing sensitive network internals might actually reduce security if the data fall into the wrong hands. Furthermore, if data are supposed to be aggregated with those of a competitor, sensitive business secrets are at risk. To address these privacy concerns, a large number of data anonymization techniques and tools have been developed. The main goal of these techniques is to sanitize a data set before it leaves an administrative domain. Sensitive information is obscured or completely stripped off the data set. Sanitized properly, organizations can safely share their anonymized data sets and aggregate information. However, these anonymization techniques are generally not lossless. Therefore, organizations face a delicate privacy-utility tradeoff. While stronger sanitization improves data privacy, it also severely impairs data utility. In the first part of this thesis, we analyze the effect of state-of-the-art data anonymization techniques on both data utility and privacy. We find that for some use cases only requiring highly aggregated data, it is possible to find an acceptable tradeoff. However, for anonymization techniques which do not destroy a significant portion of the original information, we show that attackers can easily de-anonymize data sets by injecting crafted traffic patterns into the network. The recovery of these patterns in anonymized traffic makes it easy to map anonymized to real data objects. We conclude that network trace anonymization does not properly protect the privacy of users, hosts, and networks. In the second part of this thesis we explore cryptographic alternatives to anonymization. In particular, we apply secure multiparty computation (MPC) to the problem of aggregating network data from multiple domains. Unlike anonymization, MPC gives information-theoretic guarantees for input data privacy. However, although MPC has been studied substantially for almost 30 years, building solutions that are practical in terms of computation and communication cost is still a major challenge, especially if input data are voluminous as in our scenarios. Therefore, we develop new MPC operations for processing high volume data in near real-time. The prevalent paradigm for designing MPC protocols is to minimize the number of synchronization rounds, i.e., to build constant-round protocols. However, the resulting protocols tend to be inefficient for large numbers of parallel operations. By challenging the constant-round paradigm, we manage to significantly reduce the CPU time and bandwidth consumption of parallel MPC operations. We then implement our optimized operations together with a complete set of basic MPC primitives in the SEPIA library. For parallel invocations, SEPIA`s operations are between 35 and several hundred times faster than those of comparable MPC frameworks. Using the SEPIA library, we then design and implement a number of privacy-preserving protocols for aggregating network statistics, such as time series, histograms, entropy values, and distinct item counts. In addition, we devise generic protocols for distributed event correlation and top-k reports. We extensively evaluate the performance of these protocols and show that they run in near real-time. Finally, we apply these protocols to real traffic data from 17 customers of SWITCH (the Swiss national research and education network). We show how these protocols enable the collaborative monitoring of network state as well as the detection and analysis of distributed anomalies, without leaking sensitive local information. ····· 1017646900

IT Business Alignment: Literature Review and AREVA T&D Case (Beiträge zur Informatik)

für 46.64€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The integration of IT into the business life imposes a ubiquitous problem upon IT-Managers. Since more than two decades IT-Business Alignment presents itself as a controversial and complex topic, much discussed among researchers and practitioners. For this reason, the author of this work provides a profound and high-quality literature review comprising more than 266 articles in A-rank journals, conference papers and practitioners examples. These papers are structured by a successfully applied framework in order to classify the identified literature. A handicap in IT-Business Alignment clearly derives from its lack of application in practice. On this account, the identified literature is applied at a practical case. In addition to this, the determined measures are evaluated in respect of their impact and practicability. At last, a summary, conclusion and outlook subsume the findings of the work and identify existing as well as potential future problems. ····· 1017646358

Merging Multiple Search Results Approach: for Meta Search Engines

für 48.93€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
Meta Search Engines are finding tools developed for enhancing the search performance by submitting user queries to multiple search engines and combining the search results in a unified ranked list. They utilized data fusion technique, which requires three major steps: databases selection, results combination, and results merging.This study tries to build a framework that can be used for merging the search results retrieved from any set of search engines ····· 1017631283

Foundations of Software and System Performance Engineering: Process, Performance Modeling, Requirements, Testing, Scalability, and Practice (Livelessons)

für 53.37€ kaufen ···· Rheinberg-Buch.de - Bücher, eBooks, DVD & Blu-ray
The absence of clearly written performance requirements is the cause of much confusion and bad software architectures this book`s coverage of performance requirements engineering and domain-specific performance metrics at every stage of the software process addresses the problem. Application of the principles in this book will considerably mitigate the risks that performance post to the success of a software system and lead to a better quality product with wider acceptance. ····· 1017673838