Gratis Versand ab 14,99 €. Mehr Infos.
Bookbot

Flávia Gonçalves Fernandes

    INFORMATION SYSTEMS SECURITY
    EXPERT SYSTEMS IN INFORMATION TECHNOLOGY
    Geographic Information in a Web Environment
    Networks and Internet
    Analysis and Development of Projects and Systems
    Systemische Familienaufstellung
    • Systemische Familienaufstellung

      Leitfaden für das Studium

      • 72 Seiten
      • 3 Lesestunden

      Die Technik des Familienstellens, entwickelt von Bert Hellinger, ist eine integrative Therapieform, die Verhaltensmuster aufdeckt und auflöst, die die persönliche Entwicklung behindern. Sie fokussiert sich auf unterbewusste Themen und wird in der Regel in einer einzigen Sitzung durchgeführt. Hellinger definiert drei zentrale "Gesetze der Liebe" – Zugehörigkeit, Hierarchie und Gleichgewicht – die für harmonische Beziehungen innerhalb von Familiensystemen entscheidend sind. Dabei spielt die Reihenfolge des Eintreffens eine wichtige Rolle, um ein Gleichgewicht im Geben und Nehmen zu gewährleisten.

      Systemische Familienaufstellung
    • Analysis and Development of Projects and Systems

      Software Documentation and Implementation

      • 60 Seiten
      • 3 Lesestunden

      Focusing on the role of systems analysts, the book delves into the study of hardware, software, and user interactions to optimize information processing. It outlines how these professionals create standardized solutions for software execution on hardware, ensuring users are trained in standard operating procedures. The text emphasizes the analyst's responsibilities in the organization, implementation, and maintenance of computer systems and networks, highlighting their crucial role in gathering and utilizing company information for development.

      Analysis and Development of Projects and Systems
    • Networks and Internet

      Information Distribution

      • 56 Seiten
      • 2 Lesestunden

      Delving into the infrastructure of the digital world, this book offers an in-depth look at computer networks and their evolution, from early connections to the modern Internet. It explains key concepts like data transmission, communication protocols (TCP/IP), and essential technologies such as routers and switches. Readers will explore various network topologies, security challenges, and information distribution, including client-server architecture and the role of cloud services and social networks. Emerging standards like IoT and the impact of 5G are also discussed.

      Networks and Internet
    • Geographic Information in a Web Environment

      Systems Development

      • 56 Seiten
      • 2 Lesestunden

      The internship serves as a crucial bridge for Computer Engineering undergraduates, providing them with their first real-world experience in the industry. It not only enhances their practical skills beyond academic knowledge but also significantly increases their employability by offering a pathway to their first job. Many students find that their internship leads directly to job offers, making it an essential step in their professional development and preparation for the competitive job market.

      Geographic Information in a Web Environment
    • EXPERT SYSTEMS IN INFORMATION TECHNOLOGY

      Labor Market and Trends

      • 60 Seiten
      • 3 Lesestunden

      Expert Systems represent a specialized area within Artificial Intelligence, designed to emulate human experts' reasoning for problem-solving. By capturing and utilizing human knowledge, these systems excel in specific domains, often outperforming human experts in decision-making. They also serve as valuable tools for non-experts, enhancing their ability to tackle complex issues.

      EXPERT SYSTEMS IN INFORMATION TECHNOLOGY
    • INFORMATION SYSTEMS SECURITY

      Social Media Risk Analysis

      • 64 Seiten
      • 3 Lesestunden

      Focusing on the principles of information security, the book explores the importance of protecting data to ensure it remains accessible only to authorized individuals. It outlines essential policies, processes, and methods that organizations must implement to control data circulation and prevent unauthorized access. Highlighting the role of IT departments, the text emphasizes the necessity of having trained professionals and effective tools to maintain data integrity and confidentiality, ultimately safeguarding companies from potential risks.

      INFORMATION SYSTEMS SECURITY
    • Optimization of Routes for Traveling in Brazil

      Applications of Dijkstra's Algorithm

      • 116 Seiten
      • 5 Lesestunden

      Focusing on optimization, this work explores the application of Dijkstra's algorithm to determine the most efficient routes between municipalities across various Brazilian states. By calculating the minimum cost paths in a graph, it addresses the practical need to reduce expenses and time in travel planning. The study highlights the algorithm's significance as a widely used tool for enhancing route selection, making it a valuable resource for anyone interested in efficient travel logistics.

      Optimization of Routes for Traveling in Brazil
    • Database in SQL Server Software

      Solving Exercises

      • 56 Seiten
      • 2 Lesestunden

      The book explores Azure SQL Database, highlighting its fully managed, intelligent features that enhance performance and security. It details how Microsoft handles maintenance, allowing users to save time and resources. The text emphasizes the ease of migrating existing SQL Server databases to SQL Database Managed Instance without altering applications, thanks to its extensive compatibility and virtual network support. It positions Managed Instance as the ideal solution for transitioning large numbers of databases from on-premises environments or virtual machines.

      Database in SQL Server Software
    • Development of Technological Applications

      Research Projects and Case Studies

      • 72 Seiten
      • 3 Lesestunden

      The book explores the multifaceted nature of Information Technology (IT), emphasizing its role in managing and utilizing information across various domains. It highlights how IT can influence personal and public freedoms, serving as both a tool for empowerment and a means of control. The text discusses the importance of organization and classification of information for effective decision-making, while also addressing the potential of IT to enhance individual and collective growth by learning from past experiences and successes.

      Development of Technological Applications
    • Serious Game Implementation

      Applications in Healthcare and Education

      • 64 Seiten
      • 3 Lesestunden

      The book explores the integration of serious games in health and education, specifically focusing on physiotherapy. It introduces an interactive game designed to enhance physiotherapeutic exercises through Kinect and mobile devices. Utilizing Virtual and Augmented Reality, it allows for visualization and three-dimensional interaction, aiming to motivate patients and create a more engaging physiotherapy environment. The emphasis is on technological innovations that enhance treatment effectiveness and patient experience.

      Serious Game Implementation
    • BUSINESS INFORMATION SYSTEMS

      Governance and Business Intelligence

      • 52 Seiten
      • 2 Lesestunden

      Focusing on the processes of business analysis and data collection, this book delves into the infrastructure that enhances decision-making through Business Intelligence (BI). It outlines how BI consolidates business information to identify improvements, address weaknesses, and respond to market trends. Key objectives include data collection via management tools, compliance with data protection laws, and enabling in-depth data analysis for actionable insights. Ultimately, BI fosters informed decision-making, offering a significant competitive advantage for businesses.

      BUSINESS INFORMATION SYSTEMS
    • Data

      Information coding

      • 52 Seiten
      • 2 Lesestunden

      Delving into the intricacies of data representation, this book covers fundamental concepts and advanced coding techniques essential for understanding the digital age. It presents clear explanations and engaging examples of various data forms, including numerical systems and compression algorithms. Additionally, the text highlights the significance of coding in information security and its practical applications, such as data transmission and efficient storage. Suitable for both technology specialists and curious readers, it provides a vital understanding of how coding underpins our information-rich world.

      Data
    • Family Systemic Constellation

      Guided Study Guide

      • 72 Seiten
      • 3 Lesestunden

      Integrative therapy, developed by Bert Hellinger, focuses on resolving behavioral patterns that impede personal growth. Known as brief therapy, it typically addresses specific issues in a single session, working with subconscious elements. The approach is grounded in three "laws of love": belonging, hierarchy, and balance, which foster harmony within family systems. Hellinger emphasizes the significance of order in relationships and the necessity of equitable exchanges of giving and receiving to maintain balance and promote well-being.

      Family Systemic Constellation
    • Theories of Computing for Software Development

      Agile Methodologies and Architectures for Mobile Devices

      • 68 Seiten
      • 3 Lesestunden

      Focusing on the evolution of software systems, the book explores the challenges posed by constant changes, such as error correction and feature additions, which lead to unreliability and cost issues. It highlights the growing importance of software engineering and architecture in addressing these complexities, emphasizing the need for professionals to effectively design, code, and communicate. The text delves into architectural strategies like layered structures that enhance flexibility, portability, and maintainability, while also ensuring quality and performance through standard interfaces and modularization.

      Theories of Computing for Software Development
    • CONNECTING KNOWLEDGE

      Exploring the Educational World through Digital Games

      • 56 Seiten
      • 2 Lesestunden

      The transformative potential of digital games in education is thoroughly examined, showcasing how these tools can enhance the learning process. The book presents detailed analyses of the integration of technology and education, supported by solid research. It highlights both the opportunities and challenges of using digital games as pedagogical tools, offering insights into the revolutionary impact such innovations may have on the educational landscape.

      CONNECTING KNOWLEDGE
    • Evolution of Computers

      History and Timeline

      • 56 Seiten
      • 2 Lesestunden

      The book offers a detailed exploration of the evolution of computer technology, tracing its journey from early mechanical devices to today’s advanced supercomputers. Key milestones, such as the development of ENIAC and UNIVAC, are highlighted alongside significant innovations in integrated circuits and the personal computer revolution. It also documents the rise of mobile computing and examines trends in artificial intelligence and quantum computing. Additionally, the evolution of software, including operating systems and cloud applications, is thoroughly covered, providing a holistic view of the computing landscape.

      Evolution of Computers
    • Electronics

      Reports for Practical Classes

      • 52 Seiten
      • 2 Lesestunden

      Focusing on the fundamental role of electrons, this book explores the science of electronics, detailing its division into analogue and digital systems. It examines how electrical energy is controlled through circuits composed of various components, emphasizing their applications in representing, storing, transmitting, and processing information. The text also highlights the significance of internal computer circuits, telecommunications systems, and sensors, illustrating the broad impact of electronics in modern technology and its essential role in controlling processes and mechanisms.

      Electronics
    • Computer Architecture and Organisation

      Fundamental Concepts

      • 52 Seiten
      • 2 Lesestunden

      The book explores the interplay between Computer Architecture and Computer Organisation, emphasizing how architecture influences programming execution while organisation pertains to the physical components and their connections. It presents a hierarchical representation of computer systems, facilitating the study of complex assemblies and their interactions. Key functions such as data processing, storage, transfer, and control are examined, highlighting the necessity of executing a set of instructions for effective operation. This comprehensive approach provides insights into the fundamental workings of computer systems.

      Computer Architecture and Organisation
    • OFFICE AUTOMATION SYSTEMS

      Electronic Commerce and Managerial Processes

      • 52 Seiten
      • 2 Lesestunden

      Focusing on the benefits of office automation systems, the book highlights how these technologies streamline routine tasks, leading to significant time and resource savings. By enhancing productivity and providing efficient monitoring of operations, companies can achieve cost reductions. Additionally, the implementation of such systems promotes employee welfare and comfort, further boosting overall productivity levels. This comprehensive approach emphasizes the transformative impact of automation in the workplace.

      OFFICE AUTOMATION SYSTEMS
    • Digital Security

      Cyber Attack Prevention

      • 52 Seiten
      • 2 Lesestunden

      Focusing on the current landscape of digital security, this book delves into common cyber threats like phishing and ransomware, outlining the vulnerabilities they exploit. It covers essential principles such as encryption and authentication, while also emphasizing best practices for safeguarding both personal and corporate data. Readers will gain insights into identifying weaknesses in systems and implementing proactive measures like firewalls and antivirus software. Additionally, the importance of user awareness and training against social engineering attacks is highlighted, making it a vital resource for enhancing digital security.

      Digital Security