1 | Advanced Introduction to Cybersecurity Law

 

"Elgar Advanced Introductions are stimulating and thoughtful introductions to major fields in the social sciences, business, and law, expertly written by the world's leading scholars. Designed to be accessible yet rigorous, they offer concise and lucid surveys of the substantive and policy issues associated with discrete subject areas. This succinct Advanced Introduction delivers insights into the pressing technological, political, and legal challenges of cybersecurity. Exploring cybersecurity threats on both a national and global scale, it provides guidance on how countries use domestic and international law to counter crime, terrorism, espionage, and armed conflict in cyberspace. Key Features: - Centres cybersecurity law within the internet as a technology, cyberspace

 

Resource ID #66a35e9f22457 SCIT

2 | An Introduction To Artificial Intelligence By Janet Finlay, Alan Dix · 1996

 

An authoritative and accessible one-stop resource, An Introduction to Artificial Intelligence presents the first full examination of AI. Designed to provide an understanding of the foundations of artificial intelligence, it examines the central computational techniques employed by AI, including knowledge representation, search, reasoning, and learning, as well as the principal application domains of expert systems, natural language, vision, robotics, software agents and cognitive modeling. Many of the major philosophical and ethical issues of AI are also introduced.

Throughout the volume, the authors provide detailed, well-illustrated treatments of each topic with abundant examples and exercises. The authors bring this exciting field to life by presenting a substantial and robust introduction to artificial intelligence in a clear and concise coursebook form. This book stands as a core text for all computer scientists approaching AI for the first time.

 

Resource ID #66a38cfbab557 SCIT

3 | An Introduction to Cyber Security A Beginner’s Guide

 

Cybersecurity is undoubtedly one of the fastest-growing fields. However, there is an acute shortage of skilled workforce. The cybersecurity beginners guide aims at teaching security enthusiasts all about organizational digital assets’ security, give them an overview of how the field operates, applications of cybersecurity across sectors and industries, and skills and certifications one needs to build and scale up a career in this field.

 

Resource ID #66a35d401c525 SCIT

4 | Auditing Information Systems By Mario Piattini · 2000

 

Society's growing dependence on information technology for survival has elevated the importance of controlling and evaluating information systems. A sound plan for auditing information systems and the technology that supports them is a necessity for organizations to improve the IS benefits and allow the organization to manage the risks associated with technology. Auditing Information Systems gives a global vision of auditing and control, exposing the major techniques and methods. It provides guidelines for auditing the crucial areas of IT--databases, security, maintenance, quality, and communications.

 

Resource ID #66a368464d231 SCIT

5 | Big Data in Big Companies By Thomas H. Davenport Jill Dyché. 2013

 

In order to understand this coexistence, we interviewed 20 large organizations in the early months of 2013 about how big data fit in to their overall data and analytics environments. Overall, we found the expected co-existence; in not a single one of these large organizations was big data being managed separately from other types of data and analytics. The integration was in fact leading to a new management perspective on analytics, The integration was in fact leading to a new management perspective on analytics  3.0. In this paper, we will describe the  overall context for how organizations think about big data, the organizational structure and skills required for it..etc. We will conclude by describing the analytic of 3.0 era.

 

Resource ID #66a883d3e444b SCIT

6 | Challenges of Big Data analysis By Jianqing Fan, Fang Han, Han Liu. 2014

 

Big Data bring new opportunities to modern society and challenges to data scientists. On the one hand, Big Data hold great promises for discovering subtle population patterns and heterogeneities that are not possible with small-scale data. On the other hand, the massive sample size and high dimensionality of Big Data introduce unique computational and statistical challenges, including scalability and storage bottleneck, noise accumulation, spurious correlation, incidental endogeneity and measurement errors. These challenges are distinguished and require new computational and statistical paradigm. This paper gives overviews on the salient features of Big Data and how these features impact on paradigm change on statistical and computational methods as well as computing architectures. We also provide various new perspectives on the Big Data analysis and computation. In particular, we emphasize on the viability of the sparsest solution in high-confidence set and point out that exogenous assumptions in most statistical methods for Big Data cannot be validated due to incidental endogeneity. They can lead to wrong statistical inferences and consequently wrong scientific conclusions.

 

Resource ID #66a880e5c2186 SCIT

7 | CISA Certified Information Systems Auditor Study Guide By David L. Cannon, Timothy S. Bergmann, Brady Pamplin · 2006

 

Demand for qualified and certified information systems (IS) auditors has increased dramatically since the adoption of the Sarbanes-Oxley Act in 2002. Now you can prepare for CISA certification, the one certification designed specifically for IS auditors, and improve your job skills with this valuable book. Not only will you get the valuable preparation you need for the CISA exam, you?ll also find practical information to prepare you for the real world. This invaluable guide contains:

Authoritative coverage of all CISA exam objectives, including:

The IS Audit Process. IT Governance. Systems and Infrastructure Lifecycle Management. IT Service Delivery and Support. Protection of Information Assets. Disaster Recovery and Business Continuity.

Practical information that will prepare you for the real world such as:

Secrets of successful auditing. Government regulations at a glance. Incident handling checklist. Scenarios providing insight into professional audit systems and controls.

Additional exam and career preparation tools such as:

Challenging chapter review questions. A glossary of terms. Tips on preparing for exam day. Information on related certifications.

A free CD-ROM with:

Advanced testing software with challenging chapter review questions plus bonus practice exams so you can test your knowledge. Flashcards that run on your PC, Pocket PC, or Palm handheld. The entire book in searchable and printable PDF.

 

Resource ID #66a36a1978398 SCIT

8 | Computer Networking and Networks By Susan Shannon · 2006

 

Computer networks remain one of the central aspects of the computer world. This book examines crucial issues and research under the following rubrics: Communication Network Architectures; Communication Network Protocols; Network Services and Applications; Network Security and Privacy; Network Operation and Management; Discrete Algorithms and Discrete Modelling Algorithmic and discrete aspects in the context of computer networking as well as mobile and wireless computing and communications.

 

Resource ID #66a36cd71b630 SCIT

9 | Computer Networks 16th Conference, CN 2009, Wisla, Poland, June 16-20, 2009. Proceedings

 

The continuous and very intense development of IT has resulted in the fast development of computer networks. Computer networks, as well as the entire  subject to constant changes triggered by the general technological advancement and the influence of new IT technologies. These methods and tools of designing and modeling computer networks are becoming more advanced. Above all, the scope of their application is growing thanks to, for example, the results of new research and because of new proposals of application, which not long ago were not even taken into consideration. These new applications stimulate the development of scientist research, as the broader application of system solutions based on computer networks results in a wide range of both theoretical and practical problems. This book proves that and the contents of its chapters concern a variety of topics and issues. Generally speaking, the contents can be divided into several subject groups. The group of contributions concerns new technologies applied in computer networks, particularly those related to nanomolecular and quantum technology.

 

Resource ID #66a36be383854 SCIT

10 | Computer Networks A Systems Approach By Larry L. Peterson, Bruce S. Davie · 2011

 

Computer Networks: A Systems Approach, Fifth Edition, explores the key principles of computer networking, with examples drawn from the real world of network and protocol design. Using the Internet as the primary example, this best-selling and classic textbook explains various protocols and networking technologies. The systems-oriented approach encourages students to think about how individual network components fit into a larger, complex system of interactions.

This book has a completely updated content with expanded coverage of the topics of utmost importance to networking professionals and students, including P2P, wireless, network security, and network applications such as e-mail and the Web, IP telephony and video streaming, and peer-to-peer file sharing. There is now increased focus on application layer issues where innovative and exciting research and design is currently the center of attention. Other topics include network design and architecture; the ways users can connect to a network; the concepts of switching, routing, and internetworking; end-to-end protocols; congestion control and resource allocation; and end-to-end data.

Each chapter includes a problem statement, which introduces issues to be examined; shaded sidebars that elaborate on a topic or introduce a related advanced topic; What’s Next? discussions that deal with emerging issues in research, the commercial world, or society; and exercises.


 

Resource ID #66a36abb369df SCIT

11 | Concise Guide to Software Engineering From Fundamentals to Application Methods

 

This textbook presents a concise introduction to the fundamental principles of software engineering, together with practical guidance on how to apply the theory in a real-world, industrial environment. The wide-ranging coverage encompasses all areas of software design, management, and quality.

Topics and features: presents a broad overview of software engineering, including software lifecycles and phases in software development, and project management for software engineering; examines the areas of requirements engineering, software configuration management, software inspections, software testing, software quality assurance, and process quality; covers topics on software metrics and problem solving, software reliability and dependability, and software design and development, including Agile approaches; explains formal methods, a set of mathematical techniques to specify and derive a program from its specification, introducing the Z specification language; discusses software process improvement, describing the CMMI model, and introduces UML, a visual modelling language for software systems; reviews a range of tools to support various activities in software engineering, and offers advice on the selection and management of a software supplier; describes such innovations in the field of software as distributed systems, service-oriented architecture, software as a service, cloud computing, and embedded systems; includes key learning topics, summaries and review questions in each chapter, together with a useful glossary.

This practical and easy-to-follow textbook/reference is ideal for computer science students seeking to learn how to build high quality and reliable software on time and on budget. The text also serves as a self-study primer for software engineers, quality professionals, and software managers.

 

Resource ID #66a35873918ea SCIT

12 | Cybercrime and Digital Forensics : An Introduction By Thomas J. Holt, Adam M. Bossler, Kathryn C. Seigfried-Spellar · 2015

 

The emergence of the World Wide Web, smartphones, and Computer-Mediated Communications (CMCs) profoundly affect the way in which people interact online and offline. Individuals who engage in socially unacceptable or outright criminal acts increasingly utilize technology to connect with one another in ways that are not otherwise possible in the real world due to shame, social stigma, or risk of detection. As a consequence, there are now myriad opportunities for wrongdoing and abuse through technology.
This book offers a comprehensive and integrative introduction to cybercrime. It is the first to connect the disparate literature on the various types of cybercrime, the investigation and detection of cybercrime and the role of digital information, and the wider role of technology as a facilitator for social relationships between deviants and criminals. It includes coverage of:

This book includes lively and engaging features, such as discussion questions, boxed examples of unique events and key figures in offending, quotes from interviews with active offenders and a full glossary of terms. It is supplemented by a companion website that includes further students exercises and instructor resources. This text is essential reading for courses on cybercrime, cyber-deviancy, digital forensics, cybercrime investigation and the sociology of technology.

 

 

Resource ID #66a22863b5e07 SCIT

13 | Data Mining and Data Warehousing : Principles and Practical Techniques By Parteek Bhatia

 

Big Data concern large-volume, complex, growing data sets with multiple, autonomous sources. With the fast development of networking, data storage, and the data collection capacity, Big Data are now rapidly expanding in all science and engineering domains, including physical, biological and biomedical sciences. This paper presents a HACE theorem that characterizes the features of the Big Data revolution, and proposes a Big Data processing model, from the data mining perspective. This data-driven model involves demand-driven aggregation of information sources, mining and analysis, user interest modeling, and security and privacy considerations. We analyze the challenging issues in the data-driven model and also in the Big Data revolution.

 

Resource ID #66a8843549733 SCIT

14 | Data mining and data warehousing: principles and practical techniques

 

This book will give learners sufficient information to acquire mastery over the subject. It covers the practical aspects of data mining , data warehousing and machine learning in a simplified manner without compromising on the details of the subject. The main strength of the book is the illustration on concepts with practical examples so that the learners can grasp the contents easily. Another important future of this book is illustration of data mining algorithms with practical hands on sessions on Weka and R language (a major data mining tool and language, respectively). In this book every concept has been illustrated through a step by step approach in tutorial form for self practice in Weka and R. This textbook includes many pedagogical features such as chapter wise summary, exercises including probable problems, question bank and relevant references to provide sound knowledge to learners. 

 

Resource ID #66a888ea74e3f SCIT

15 | Digital Forensics Processing and Procedures : Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements By David Lilburn Watson, Andrew Jones · 2013

 

This is the first digital forensics book that covers the complete lifecycle of digital evidence and the chain of custody. This comprehensive handbook includes international procedures, best practices, compliance, and a companion web site with downloadable forms. Written by world-renowned digital forensics experts, this book is a must for any digital forensics lab. It provides anyone who handles digital evidence with a guide to proper procedure throughout the chain of custody--from incident response through analysis in the lab.

A step-by-step guide to designing, building and using a digital forensics lab A comprehensive guide for all roles in a digital forensics laboratory Based on international standards and certifications.

 

Resource ID #66a22711da68c SCIT

16 | Digital Forensics: Digital Evidence in Criminal Investigations By Angus McKenzie Marshall • 2009

 

The vast majority of modern criminal investigations involve some element of digital evidence, from mobile phones, computers, CCTV and other devices. Digital Forensics: Digital Evidence in Criminal Investigations provides the reader with a better understanding of how digital evidence complements “traditional” scientific evidence and examines how it can be used more effectively and efficiently in a range of investigations.

Taking a new approach to the topic, this book presents digital evidence as an adjunct to other types of evidence and discusses how it can be deployed effectively in support of investigations. The book provides investigators/SSMs/other managers with sufficient contextual and technical information to be able to make more effective use of digital evidence sources in support of a range of investigations. In particular, it considers the roles played by digital devices in society and hence in criminal activities. From this, it examines the role and nature of evidential data which may be recoverable from a range of devices, considering issues relating to reliability and usefulness of those data.


 

Resource ID #66a22cade541c SCIT

17 | Digital Marketing All-In-One For Dummies By Stephanie Diamond · 2023

 

Digital Marketing All-in-One For Dummies is the most comprehensive tool for marketers looking to beef up their online presence. In this edition, you’ll learn the latest trends in digital marketing strategies, including brand new insight on how to incorporate artificial intelligence into your marketing plans. You’ll also get the latest information on how to manage your customers’ experiences, create exceptional marketing content, get help from influencers, and leverage social accounts for more followers and greater profits. With the help of this friendly Dummies guide, you’ll accelerate your journey from traditional to digital marketing processes, uncover tips to prove ROI of marketing activities, and increase audience engagement.

Build and implement a winning digital plan for your brand Learn how to establish an online presence with social media Turn online prospects into loyal customers Target consumers in any market segment and age bracket

Dig into the latest marketing advice as you provide your potential and existing customers the kind of personal experience you look for as a customer.

 

Resource ID #66a365b0dad18 SCIT

18 | Digital marketing By Dave Chaffey Fiona Ellis-Chadwick. 2019

 

Digital marketing has transformed how businesses and other organisations communicate with their audiences. The 5Ds of digital marketing we introduce in Chapter 1 (digital devices, digital platforms, digital media, digital data and digital technology) can be used, alongside traditional marketing techniques, to get closer to audiences than ever before. Consumers now have access to a much wider choice of entertainment, products, services and prices from different suppliers and a more convenient way to select and purchase. items. Organisations have the opportunity to expand into new markets, offer new services, interact with audiences in new ways and compete on a more equal footing with larger businesses. Marketers working within these organisations have the opportunity to develop new skills and to use these new tools to improve the competitiveness of the company. At the same time, the Internet and related digital technology platforms give rise to many threats to organisations. For example, online companies such as ASOS.com and Zalando (clothing), Amazon.com (books and retail), iTunes and Spotify (music) and Booking.com and Expedia (travel) have captured a significant part of their market and struck fear into the existing players. Many consumers now regularly use social networks such as Facebook, Instagram, Linkedin, Snapchat and Twitter as part of their daily lives, with the majority of access via smartphones. Engaging these consumers is an ongoing challenge but, as we will see, companies like those above have taken advantage of these opportunities to interact with customers and this has helped them develop as worldwide brands.

 

Resource ID #66a876ae5de6d SCIT

19 | Digital Marketing Excellence Planning, Optimizing and Integrating Online Marketing By Dave Chaffey, PR Smith · 2022

 

In this sixth edition, the hugely popular Digital Marketing Excellence is a practical guide to creating and executing integrated digital marketing plans, combining established approaches to marketing planning with the creative use of new digital models and digital tools. Written by two highly experienced digital marketing consultants, the book shows you how to:

Draw up an outline integrated digital marketing plan

Evaluate and apply digital marketing principles and models

Integrate online and offline communications

Implement customer-driven digital marketing as part of digital transformation

Reduce costly trial and error

Measure and enhance your digital marketing

Learn best practices for reaching and engaging your audiences using the key digital marketing platforms.

This new edition has been streamlined to seamlessly integrate the latest developments in digital analytics, ethics and privacy, Predictive Analytics, Machine Learning and Artificial Intelligence. Including new international case studies and up-to-date examples throughout, this book cuts through the jargon to show marketers how to leverage data and digital technologies to their advantage.

Offering a highly structured and accessible guide to a critical and far-reaching subject, Digital Marketing Excellence, 6th edition, provides a vital reference point for all digital marketing students, and managers involved in digital marketing strategy and implementation.

Online resources have been fully updated for the new edition and include a new set of PowerPoint slides and a full test bank of questions and exercises.

 

Resource ID #66a3668e44c15 SCIT

20 | Digital Marketing For Dummies By Ryan Deiss, Russ Henneberry · 2020

 

Digital Marketing for Dummies has the tools you need to step into the digital world and bring your marketing process up to date. In this book, you’ll discover how digital tools can expand your brand’s reach and help you acquire new customers. Digital marketing is all about increasing audience engagement, and the proven strategy and tactics in this guide can get your audience up and moving!

One will learn how to identify the digital markets and media that work best for your business—no wasting your time or money! Discover how much internet traffic is really worth to you and manage your online leads to convert web visitors into paying clients. From anonymous digital prospect to loyal customer—this book will take you through the whole process!

Learn targeted digital strategies for increasing brand awareness Determine the best-fit online markets for your unique brand Access downloadable tools to put ideas into action Meet your business goals with proven digital tactics

Digital marketing is the wave of the business future, and you can get digital with the updated tips and techniques inside this book!

 

Resource ID #66a36788ee9cf SCIT

21 | Digital marketing: A framework, review and research agenda By P.K. Kannan. 2017

 

We develop and describe a framework for research in digital marketing that highlights the touchpoints in the marketing process as well as in the marketing strategy process where digital technologies are having and will have a significant impact. Using the framework, we organize the developments and extant research around the elements and touchpoints comprising the framework and review the research literature in the broadly defined digital marketing space. We outline the evolving issues in and around the touchpoints and associated questions for future research. Finally, we integrate these identified questions and set a research agenda for future research in digital marketing to examine the issues from the perspective of the firm.

 

Resource ID #66a8772f25a2b SCIT

22 | Digital Marketing: An Overview By Abms Academy · 2020

 

World is going through digital transformation era and customers are spending most of their times online. Now most of the people using online for the purchasing essentials items due to pandemic situation. People are spending time online for various purposes like spending time in social media networks, searching in the internet. It also helps them to take purchasing decisions at faster pace than before. Hence organization needs to have dynamic strategies to understand the needs of the users and covert them as their potential customers. Digital marketing is a broader term which also includes the e-marketing concepts. Digital marketing includes strategies which are related to digital media such as internet, social media, e-mail, digital display boards such as billboards, mobile applications, virtual reality, and databases. Digital media content includes audio, video, text and graphics. Digital marketing analytics plays an important role in the success of digital marketing strategies especially with the use of Machine Learning and Deep Learning models in predicting customer behaviors, purchasing patterns and customer loyalty and retention. This book starts with the introduction of digital marketing and discusses the different types of digital marketing strategies, its positives and areas of weakness. It also helps the users to develop and evaluate the effects of their digital marketing strategies. ABMS Academywww.abmsacademy.com

 

Resource ID #66a366108738d SCIT

23 | Digital marketing: strategy By Dr Dave Chaffey and Danyl Bosomworth. 2012

 

This book of the digital marketing planning is no different to any other marketing plan, in fact it’s increasingly strange to have separate plans for ‘digital’ and ‘offline’ since that’s not how your customers perceive your business. However, we’re often required to separate plans for “digital” only based on the way teams and reporting is structured and to help the transition to digital - before it becomes “business as usual”. A common format helps align your plan to other marketing plans!  

 

Resource ID #66a874bc7a2c3 SCIT

24 | Discrete Mathematics Using a Computer By Cordelia Hall, John O'Donnell · 2013

 

Several areas of mathematics find application throughout computer science, and all students of computer science need a practical working understanding of them. These core subjects are centred on logic, sets, recursion, induction, relations and functions. The material is often called discrete mathematics, to distinguish it from the traditional topics of continuous mathematics such as integration and differential equations. The central theme of this book is the connection between computing and discrete mathematics. This connection is useful in both directions: • Mathematics is used in many branches of computer science, in applications including program specification, data structures, design and analysis of algorithms, database systems, hardware design, reasoning about the correctness of implementations, and much more; • Computers can help to make the mathematics easier to learn and use, by making mathematical terms executable, making abstract concepts more concrete, and through the use of software tools such as proof checkers. These connections are emphasized throughout the book. Software tools (see Appendix A) enable the computer to serve as a calculator, but instead of just doing arithmetic and trigonometric functions, it will be used to calculate with sets, relations, functions, predicates and inferences. There are also special software tools, for example a proof checker for logical proofs using natural deduction.

 

Resource ID #66a36eaa8e673 SCIT

25 | Effectiveness of Digital Marketing in the Challenging Age: An Empirical Study By Afrina Yasmin, Sadia Tasneem, Kaniz Fatema. 2015

 

Marketers are faced with new challenges and opportunities within this digital age. Digital marketing is the utilization of electronic media by the marketers to promote the products or services into the market. The main objective of digital marketing is attracting customers and allowing them to interact with the brand through digital media. This article focuses on the importance of digital marketing for both marketers and consumers. We examine the effect of digital marketing on the firms’ sales. Additionally the differences between traditional marketing and digital marketing in this paper are presented. This study has described various forms of digital marketing, effectiveness of it and the impact it has on firm’s sales. The examined sample consists of one hundred fifty firms and fifty executives which have been randomly selected to prove the effectiveness of digital marketing. Collected data has been analyzed with the help of various statistical tools and techniques. 

 

Resource ID #66a87c3934975 SCIT

26 | Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security Edited by Chang-Tsun Li. 2013

 

The revolutionary way in which modern technologies have enabled us to exchange information with ease has created a demand for interdisciplinary research in digital forensics and investigations aiming to combat the abuse of computer technologies. Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security presents various digital crime and forensic disciplines that use electronic devices and software for crime prevention and detection. This book provides theoretical and empirical research articles and case studies for a broad range of academic readers as well as professionals, industry consultants, and practitioners involved in the use, design, and development of techniques related to digital forensics and investigation.

 

Resource ID #66a22569730a8 SCIT

27 | Essentials of Discrete Mathematics By David James Hunter · 2009

 

Essentials of Discrete Mathematics is the ideal text for a one-term discrete mathematics course to serve computer science majors as well students from a wide range of other disciplines. The material is organized around five types of mathematical thinking: logical, relational, recursive, quantitative, and analytical. This presentation results in a coherent outline that steadily builds upon mathematical sophistication. Graphs are introduced early and referred to throughout the text, providing a richer context for examples and applications. Students will encounter algorithms near the end of the text, after they have acquired enough skills and experience to analyze them properly. The final chapter contains in-depth case studies from a variety of fields, including biology, sociology, linguistics, economics, and music. Clear and concise, Essentials of Discrete Mathematics presents a unified and complete picture of discrete math that instructors can move through in a single semester.

 

Resource ID #66a378aa694e0 SCIT

28 | Fundamentals of Digital Forensics : Theory, Methods, and Real-Life ApplicationsBy Joakim Kävrestad · 2020

 

This practical and accessible textbook/reference describes the theory and methodology of digital forensic examinations, presenting examples developed in collaboration with police authorities to ensure relevance to real-world practice. The coverage includes discussions on forensic artifacts and constraints, as well as forensic tools used for law enforcement and in the corporate sector. Emphasis is placed on reinforcing sound forensic thinking, and gaining experience in common tasks through hands-on exercises.

This enhanced second edition has been expanded with new material on incident response tasks and computer memory analysis.

Topics and features:

Outlines what computer forensics is, and what it can do, as well as what its limitations are Discusses both the theoretical foundations and the fundamentals of forensic methodology Reviews broad principles that are applicable worldwide Explains how to find and interpret several important artifacts Describes free and open source software tools, along with the Access Data Forensic Tool kit Features exercises and review questions throughout, with solutions provided in the appendices Includes numerous practical examples, and provides supporting video lectures online

This easy-to-follow primer is an essential resource for students of computer forensics, and will also serve as a valuable reference for practitioners seeking instruction on performing forensic examinations.

Joakim Kävrestad is a lecturer and researcher at the University of Skövde, Sweden, and an Access Data Certified Examiner. He also serves as a forensic consultant, with several years of experience as a forensic expert with the Swedish police.

 

Resource ID #66a22a0b49cf7 SCIT

29 | Integrations of Data Warehousing, Data Mining, and Database Technologies: Innovative Approaches David Taniar, Li Chen. 2011

 

In the last years, data warehousing systems have gained relevance to support decision making within organizations. The core component of these systems is the data warehouse and nowadays it is widely assumed that the data warehouse design must follow the multidimensional paradigm. Thus, many methods have been presented to support the multidimensional design of the data warehouse. The first methods introduced were requirement-driven but the semantics of the data warehouse (since the data warehouse is the result of homogenizing and integrating relevant data of the organization in a single, detailed view of the organization business) require to also consider the data sources during the design process. Considering the data sources gave rise to several data-driven methods that automate the data warehouse design process, mainly, from relational data sources. Currently, research on multidimensional modeling is still a hot topic and we have two main research lines. On the one hand, new hybrid automatic methods have been introduced proposing to combine data-driven and requirement-driven approaches. These methods focus on automating the whole process and improving the feedback retrieved by each approach to produce better results. On the other hand, some new approaches focus on considering alternative scenarios than relational sources. These methods also consider (semi)-structured data sources, such as ontologies or XML, that have gained relevance in the last years. Thus, they introduce innovative solutions for overcoming the heterogeneity of the data sources. All in all, we discuss the current scenario of multidimensional modeling by carrying out a survey of multidimensional design methods. We present the most relevant methods introduced in the literature and a detailed comparison showing the main features of each approach.

 

Resource ID #66a889ba50ce5 SCIT

30 | Introduction to Artificial Intelligence : A Beginner’s Guide By Simplilearn · 2020

 

This AI beginner’s guide aims to take the readers through the current AI landscape, provides the key fundamentals and terminologies of AI, and offers practical guidelines on why and how you can be a part of the AI revolution, and also the ways in which you can scale up your AI career.

 

Resource ID #66a38e623354a SCIT

31 | Introduction to Artificial Intelligence By Wolfgang Ertel · 2018

 

This accessible and engaging textbook presents a concise introduction to the exciting field of artificial intelligence (AI). The broad-ranging discussion covers the key subdisciplines within the field, describing practical algorithms and concrete applications in the areas of agents, logic, search, reasoning under uncertainty, machine learning, neural networks, and reinforcement learning. Fully revised and updated, this much-anticipated second edition also includes new material on deep learning.

Topics and features:

Presents an application-focused and hands-on approach to learning, with supplementary teaching resources provided at an associated website

Contains numerous study exercises and solutions, highlighted examples, definitions, theorems, and illustrative cartoons Includes chapters on predicate logic, PROLOG, heuristic search, probabilistic reasoning, machine learning and data mining, neural networks and reinforcement learning

Reports on developments in deep learning, including applications of neural networks to generate creative content such as text, music and art (NEW)

Examines performance evaluation of clustering algorithms, and presents two practical examples explaining Bayes’ theorem and its relevance in everyday life (NEW)

Discusses search algorithms, analyzing the cycle check, explaining route planning for car navigation systems, and introducing Monte Carlo Tree Search (NEW)

Includes a section in the introduction on AI and society, discussing the implications of AI on topics such as employment and transportation (NEW)

Ideal for foundation courses or modules on AI, this easy-to-read textbook offers an excellent overview of the field for students of computer science and other technical disciplines, requiring no more than a high-school level of knowledge of mathematics to understand the material.


 

Resource ID #66a38da40a376 SCIT

32 | Introduction to Cyber Security

 

This book consists of cyber crimes classification, cyber fraud, types of frauds, types of computer virus and how worms work on computer systems. 

 

Resource ID #66a35ceb485af SCIT

33 | Introduction to Cyber Security Guide to the World of Cyber Security

 

Introduction to Cyber Security is a handy guide to the world of Cyber Security. It can serve as a reference manual for those working in the Cyber Security domain. The book takes a dip in history to talk about the very first computer virus, and at the same time, discusses in detail about the latest cyber threats. There are around four chapters covering all the Cyber Security technologies used across the globe. The book throws light on the Cyber Security landscape and the methods used by cybercriminals. Starting with the history of the Internet, the book takes the reader through an interesting account of the Internet in India, the birth of computer viruses, and how the Internet evolved over time. The book also provides an insight into the various techniques used by Cyber Security professionals to defend against the common cyberattacks launched by cybercriminals. The readers will also get to know about the latest technologies that can be used by individuals to safeguard themselves from any cyberattacks, such as phishing scams, social engineering, online frauds, etc. The book will be helpful for those planning to make a career in the Cyber Security domain. It can serve as a guide to prepare for the interviews, exams and campus work.

 

Resource ID #66a35a2b853b7 SCIT

34 | Introduction to Software Design with Java By Martin P. Robillard · 2019

 

This textbook provides an in-depth introduction to software design, with a focus on object-oriented design, and using the Java programming language. Its goal is to help readers learn software design by discovering the experience of the design process. To this end, a narrative is used that introduces each element of design know-how in context, and explores alternative solutions in that context. The narrative is supported by hundreds of code fragments and design diagrams.

The first chapter is a general introduction to software design. The subsequent chapters cover design concepts and techniques, which are presented as a continuous narrative anchored in specific design problems. The design concepts and techniques covered include effective use of types and interfaces, encapsulation, composition, inheritance, design patterns, unit testing, and many more. A major emphasis is placed on coding and experimentation as a necessary complement to reading the text. To support this aspect of the learning process, a companion website with practice problems is provided, and three sample applications that capture numerous design decisions are included. Guidance on these sample applications is provided in a section called “Code Exploration” at the end of each chapter. Although the Java language is used as a means of conveying design-related ideas, the book’s main goal is to address concepts and techniques that are applicable in a host of technologies.

This book is intended for readers who have a minimum of programming experience and want to move from writing small programs and scripts to tackling the development of larger systems. This audience naturally includes students in university-level computer science and software engineering programs. As the prerequisites to specific computing concepts are kept to a minimum, the content is also accessible to programmers without a primary training in computing. In a similar vein, understanding the code fragments requires only a minimal grasp of the language, such as would be taught in an introductory programming course.

 

Resource ID #66a358e06cad3 SCIT

35 | Introduction to Software Testing By Paul Ammann, Jeff Offutt · 2017

 

This extensively classroom-tested text takes an innovative approach to explaining software testing that defines it as the process of applying a few precise, general-purpose criteria to a structure or model of the software. The book incorporates cutting-edge developments, including techniques to test modern types of software such as OO, web applications, and embedded software. This revised second edition significantly expands coverage of the basics, thoroughly discussing test automaton frameworks, and it adds new, improved examples and numerous exercises. The theory of coverage criteria is carefully and cleanly explained to help students understand concepts before delving into practical applications, while extensive use of the JUnit test framework gives students practical experience in a test framework popular in the industry. Exercises, meanwhile, feature specifically tailored tools that allow students to check their own work. The book's website also offers an instructor's manual, PowerPoint slides, testing tools for students, and example software programs in Java.

 

Resource ID #66a359b6aaadc SCIT

36 | Introductory Computer Forensics : A Hands-on Practical Approach By Xiaodong Lin · 2018

 

This textbook provides an introduction to digital forensics, a rapidly evolving field for solving crimes. Beginning with the basic concepts of computer forensics, each of the book’s 21 chapters focuses on a particular forensic topic composed of two parts: background knowledge and hands-on experience through practice exercises. Each theoretical or background section concludes with a series of review questions, which are prepared to test students’ understanding of the materials, while the practice exercises are intended to afford students the opportunity to apply the concepts introduced in the section on background knowledge.

This experience-oriented textbook is meant to assist students in gaining a better understanding of digital forensics through hands-on practice in collecting and preserving digital evidence by completing various exercises. With 20 student-directed, inquiry-based practice exercises, students will better understand digital forensic concepts and learn digital forensic investigation techniques.

This textbook is intended for upper undergraduate and graduate-level students who are taking digital-forensic related courses or working in digital forensics research. It can also be used by digital forensics practitioners, IT security analysts, and security engineers working in the IT security industry, particular IT professionals responsible for digital investigation and incident handling or researchers working in these related fields as a reference book.

 

Resource ID #66a22bccdc037 SCIT

37 | Mathematics for Computer Scientists By Gareth J. Janacek, Mark Lemmon Close. 2011

 

The aim of this book is to present some of the basic mathematics that is needed by computer scientistic. It is a little like programming. It takes time to understand a lot of code and you never understand how to write code by just reading a manual mathematics is exactly the same.

 

Resource ID #66a384976d0b8 SCIT

38 | Problems and Exercises in Discrete Mathematics By G.P. Gavrilov, A.A. Sapozhenko · 2013

 

Many years of practical experience in teaching discrete mathematics form the basis of this text book. Part I contains problems on such topics as Boolean algebra, k-valued logics, graphs and networks, elements of coding theory, automata theory, algorithms theory, combinatorics, Boolean minimization and logical design. The exercises are preceded by ample theoretical background material. For further study the reader is referred to the extensive bibliography. Part II follows the same structure as Part I, and gives helpful hints and solutions.

Audience: This book will be of great value to undergraduate students of discrete mathematics, whereas the more difficult exercises, which comprise about one-third of the material, will also appeal to postgraduates and researchers.

 

Resource ID #66a3793f0f651 SCIT

39 | Systems Analysis and Design Methods

 

This work aims to balance the coverage of concepts, techniques and their applications, provide the most examples of system analysis and design deliverables available, and balance the coverage of classical methods and emerging methods.

 

Resource ID #66a357abd1680 SCIT

40 | Systems Analysis and Design Techniques, Methodologies, Approaches, and Architectures

 

For the last two decades, IS researchers have conducted empirical studies leading to better understanding of the impact of Systems Analysis and Design methods in business, managerial, and cultural contexts. SA & D research has established a balanced focus not only on technical issues, but also on organizational and social issues in the information society. This volume presents the very latest, state-of-the-art research by well-known figures in the field. The chapters are grouped into three categories: techniques, methodologies, and approaches.

 

Resource ID #66a3573b8d82f SCIT

41 | Systems Analysis and Design: People, Processes, and Projects

 

For the last two decades, IS researchers have conducted empirical studies leading to a better understanding of the impact of Systems Analysis and Design methods in business, managerial, and cultural contexts. SA&D research has established a balanced focus not only on technical issues, but also on organizational and social issues in the information society. This volume presents the very latest, state-of-the-art research by well-known figures in the field. The chapters are grouped into three categories: techniques, methodologies, and approaches.

 

Resource ID #66a35500e867d SCIT

42 | Understanding and Conducting Information Systems Auditing By Veena Hingarh, Arif Ahmed · 2013

 

A comprehensive guide to understanding and auditing modern information systems

The increased dependence on information system resources for performing key activities within organizations has made system audits essential for ensuring the confidentiality, integrity, and availability of information system resources. One of the biggest challenges faced by auditors is the lack of a standardized approach and relevant checklist. Understanding and Conducting Information Systems Auditing brings together resources with audit tools and techniques to solve this problem.

Featuring examples that are globally applicable and covering all major standards, the book takes a non-technical approach to the subject and presents information systems as a management tool with practical applications. It explains in detail how to conduct information systems audits and provides all the tools and checklists needed to do so. In addition, it also introduces the concept of information security grading, to help readers to implement practical changes and solutions in their organizations.

Includes everything needed to perform information systems audits Organized into two sections—the first designed to help readers develop the understanding necessary for conducting information systems audits and the second providing checklists for audits Features examples designed to appeal to a global audience

Taking a non-technical approach that makes it accessible to readers of all backgrounds, Understanding and Conducting Information Systems Auditing is an essential resource for anyone auditing information systems.

 

Resource ID #66a369a738fe0 SCIT

43 | Understanding Digital Marketing Marketing Strategies for Engaging the Digital Generation By Damian Ryan, Calvin Jones · 2012

 

Digital marketing now represents 25% of the marketing spend in the UK and this is predicted to move to 50% or higher within the next three years. Understanding Digital Marketing looks at the world of digital marketing: how it got started, how it got to where it is today, and where the thought leaders in the industry believe it is headed in the future. This authoritative title demonstrates how to harness the power of digital media and use it to achieve the utmost success in business, now and in the future. Understanding Digital Marketing deals with every key topic in detail, including: search marketing, social media, Google, mobile marketing, affiliate marketing, e-mail marketing, customer engagement and digital marketing strategies. Essential reading for both practitioners and students alike, and including real-world examples of digital marketing successes and expert opinions, Understanding Digital Marketing provides you with tools to utilize the power of the internet to take your company wherever you want it to go.

 

Resource ID #66a36706eaae0 SCIT