0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (6)
  • R100 - R250 (395)
  • R250 - R500 (1,684)
  • R500+ (50,302)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing

Theoretical and Computational Models of Word Learning - Trends in Psychology and Artificial Intelligence (Hardcover, New):... Theoretical and Computational Models of Word Learning - Trends in Psychology and Artificial Intelligence (Hardcover, New)
Lakshmi Gogate, George Hollich
R4,519 Discovery Miles 45 190 Ships in 18 - 22 working days

The process of learning words and languages may seem like an instinctual trait, inherent to nearly all humans from a young age. However, a vast range of complex research and information exists in detailing the complexities of the process of word learning. Theoretical and Computational Models of Word Learning: Trends in Psychology and Artificial Intelligence strives to combine cross-disciplinary research into one comprehensive volume to help readers gain a fuller understanding of the developmental processes and influences that makeup the progression of word learning. Blending together developmental psychology and artificial intelligence, this publication is intended for researchers, practitioners, and educators who are interested in language learning and its development as well as computational models formed from these specific areas of research.

Handbook of Research on Innovative Database Query Processing Techniques (Hardcover): Li Yan Handbook of Research on Innovative Database Query Processing Techniques (Hardcover)
Li Yan
R8,236 Discovery Miles 82 360 Ships in 18 - 22 working days

Research and development surrounding the use of data queries is receiving increased attention from computer scientists and data specialists alike. Through the use of query technology, large volumes of data in databases can be retrieved, and information systems built based on databases can support problem solving and decision making across industries. The Handbook of Research on Innovative Database Query Processing Techniques focuses on the growing topic of database query processing methods, technologies, and applications. Aimed at providing an all-inclusive reference source of technologies and practices in advanced database query systems, this book investigates various techniques, including database and XML queries, spatiotemporal data queries, big data queries, metadata queries, and applications of database query systems. This comprehensive handbook is a necessary resource for students, IT professionals, data analysts, and academicians interested in uncovering the latest methods for using queries as a means to extract information from databases. This all-inclusive handbook includes the latest research on topics pertaining to information retrieval, data extraction, data management, design and development of database queries, and database and XM queries.

Sensor Technology - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso Management Association Sensor Technology - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R9,261 Discovery Miles 92 610 Ships in 18 - 22 working days
The Best Damn Cybercrime and Digital Forensics Book Period (Paperback): Jack Wiles, Anthony Reyes The Best Damn Cybercrime and Digital Forensics Book Period (Paperback)
Jack Wiles, Anthony Reyes
R1,269 Discovery Miles 12 690 Ships in 10 - 15 working days

Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the application of computer investigation and analysis techniques to perform an investigation to find out exactly what happened on a computer and who was responsible. IDC estimates that the U.S. market for computer forensics will be grow from $252 million in 2004 to $630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be $1.8 billion dollars. The Techno Forensics Conference has increased in size by almost 50% in its second year; another example of the rapid growth in the market.
This book is the first to combine cybercrime and digital forensic topics to provides law enforcement and IT security professionals with the information needed to manage a digital investigation. Everything needed for analyzing forensic data and recovering digital evidence can be found in one place, including instructions for building a digital forensics lab.
* Digital investigation and forensics is a growing industry
* Corporate I.T. departments needing to investigate incidents related to corporate espionage or other criminal activities are learning as they go and need a comprehensive step-by-step guide to e-discovery
* Appeals to law enforcement agencies with limited budgets

Handbook of Knowledge Representation, Volume 1 (Hardcover): Frank Van Harmelen, Vladimir Lifschitz, Bruce Porter Handbook of Knowledge Representation, Volume 1 (Hardcover)
Frank Van Harmelen, Vladimir Lifschitz, Bruce Porter
R4,651 Discovery Miles 46 510 Ships in 10 - 15 working days

Handbook of Knowledge Representation describes the essential foundations of Knowledge Representation, which lies at the core of Artificial Intelligence (AI). The book provides an up-to-date review of twenty-five key topics in knowledge representation, written by the leaders of each field. It includes a tutorial background and cutting-edge developments, as well as applications of Knowledge Representation in a variety of AI systems. This handbook is organized into three parts. Part I deals with general methods in Knowledge Representation and reasoning and covers such topics as classical logic in Knowledge Representation; satisfiability solvers; description logics; constraint programming; conceptual graphs; nonmonotonic reasoning; model-based problem solving; and Bayesian networks. Part II focuses on classes of knowledge and specialized representations, with chapters on temporal representation and reasoning; spatial and physical reasoning; reasoning about knowledge and belief; temporal action logics; and nonmonotonic causal logic. Part III discusses Knowledge Representation in applications such as question answering; the semantic web; automated planning; cognitive robotics; multi-agent systems; and knowledge engineering. This book is an essential resource for graduate students, researchers, and practitioners in knowledge representation and AI.

Handbook of Research on Virtual Workplaces and the New Nature of Business Practices (Hardcover): Pavel Zemliansky, James Madison Handbook of Research on Virtual Workplaces and the New Nature of Business Practices (Hardcover)
Pavel Zemliansky, James Madison
R6,306 Discovery Miles 63 060 Ships in 18 - 22 working days

At one time, the office was a physical place, and employees congregated in the same location to work together on projects. The advent of the internet and the world wide web, however, not only made the unthinkable possible, it forever changed the way persons view both the office and work. ""Handbook of Research on Virtual Workplaces and the New Nature of Business Practices"" compiles authoritative research from XX scholars from over XX countries, covering the issues surrounding the influx of information technology to the office environment, from choice and effective use of technologies to necessary participants in the virtual workplace.

Computational Advancements in End-User Technologies - Emerging Models and Frameworks (Hardcover, New): Steve Clarke Computational Advancements in End-User Technologies - Emerging Models and Frameworks (Hardcover, New)
Steve Clarke
R4,593 Discovery Miles 45 930 Ships in 18 - 22 working days

In recent years, innovative technologies have lead to rapid progression and accelerated research studies within the field of end-user computing. ""Computational Advancements in End-User Technologies: Emerging Models and Frameworks"" contains leading research and practices into the advancement, significance, and comprehensive nature of end-user computing. A defining collection of significant tools, applications, and methodologies within this expanding field of study, this publication provides academicians, researchers, and practitioners with a complete and practical resource of expert international findings.

Digital Watermarking and Steganography (Hardcover, 2nd edition): Ingemar Cox, Matthew Miller, Jeffrey Bloom, Jessica Fridrich,... Digital Watermarking and Steganography (Hardcover, 2nd edition)
Ingemar Cox, Matthew Miller, Jeffrey Bloom, Jessica Fridrich, Ton Kalker
R2,109 Discovery Miles 21 090 Ships in 10 - 15 working days

Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and professionals in the first well-received edition. Steganography and steganalysis (the art of detecting hidden information) have been added to a robust treatment of digital watermarking, as many in each field research and deal with the other. New material includes watermarking with side information, QIM, and dirty-paper codes. The revision and inclusion of new material by these influential authors has created a must-own book for anyone in this profession.
*This new edition now contains essential information on steganalysis and steganography
*New concepts and new applications including QIM introduced
*Digital watermark embedding is given a complete update with new processes and applications

Complexity Science, Living Systems, and Reflexing Interfaces - New Models and Perspectives (Hardcover, New): Franco Orsucci,... Complexity Science, Living Systems, and Reflexing Interfaces - New Models and Perspectives (Hardcover, New)
Franco Orsucci, Nicoletta Sala
R4,947 Discovery Miles 49 470 Ships in 18 - 22 working days

There are new and important advancements in todays complexity theories in ICT and requires an extraordinary perspective on the interaction between living systems and information technologies. With human evolution and its continuous link with the development of new tools and environmental changes, technological advancements are paving the way for new evolutionary steps. Complexity Science, Living Systems, and Reflexing Interfaces: New Models and Perspectives is a collection of research provided by academics and scholars aiming to introduce important advancements in areas such as artificial intelligence, evolutionary computation, neural networks, and much more. This scholarly piece will provide contributions that will define the line of development in complexity science.

Handbook of Network and System Administration (Hardcover, New): Jan Bergstra, Mark Burgess Handbook of Network and System Administration (Hardcover, New)
Jan Bergstra, Mark Burgess
R4,654 Discovery Miles 46 540 Ships in 10 - 15 working days

System administration is about the design, running and maintenance of human-computer systems. Examples of human-computer systems include business enterprises, service institutions and any extensive machinery that is operated by, or interacts with human beings. System administration is often thought of as the technological side of a system: the architecture, construction and optimization of the collaborating parts, but it also occasionally touches on softer factors such as user assistance (help desks), ethical considerations in deploying a system, and the larger implications of its design for others who come into contact with it.
This book summarizes the state of research and practice in this emerging field of network and system administration, in an anthology of chapters written by the top academics in the field. The authors include members of the IST-EMANICS Network of Excellence in Network Management.
This book will be a valuable reference work for researchers and senior system managers wanting to understand the essentials of system administration, whether in practical application of a data center or in the design of new systems and data centers.
- Covers data center planning and design
- Discusses configuration management
- Illustrates business modeling and system administration
- Provides the latest theoretical developments

InfoSecurity 2008 Threat Analysis (Paperback): Craig Schiller, Seth Fogie, Colby DeRodeff, Michael Gregg InfoSecurity 2008 Threat Analysis (Paperback)
Craig Schiller, Seth Fogie, Colby DeRodeff, Michael Gregg; Contributions by Paul Schooping
R1,146 Discovery Miles 11 460 Ships in 10 - 15 working days

An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. Topics include Botnets, Cross Site Scripting Attacks, Social Engineering, Physical and Logical Convergence, Payment Card Industry (PCI) Data Security Standards (DSS), Voice over IP (VoIP), and Asterisk Hacking.
Each threat is fully defined, likely vulnerabilities are identified, and detection and prevention strategies are considered. Wherever possible, real-world examples are used to illustrate the threats and tools for specific solutions.
* Provides IT Security Professionals with a first look at likely new threats to their enterprise
* Includes real-world examples of system intrusions and compromised data
* Provides techniques and strategies to detect, prevent, and recover
* Includes coverage of PCI, VoIP, XSS, Asterisk, Social Engineering, Botnets, and Convergence

Computer Systems and Software Engineering - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information... Computer Systems and Software Engineering - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R8,935 Discovery Miles 89 350 Ships in 18 - 22 working days
Demystifying Federated Learning for Blockchain and Industrial Internet of Things (Hardcover): Sandeep Kautish, Gaurav Dhiman Demystifying Federated Learning for Blockchain and Industrial Internet of Things (Hardcover)
Sandeep Kautish, Gaurav Dhiman
R6,648 Discovery Miles 66 480 Ships in 18 - 22 working days

In recent years, mobile technology and the internet of objects have been used in mobile networks to meet new technical demands. Emerging needs have centered on data storage, computation, and low latency management in potentially smart cities, transport, smart grids, and a wide number of sustainable environments. Federated learning's contributions include an effective framework to improve network security in heterogeneous industrial internet of things (IIoT) environments. Demystifying Federated Learning for Blockchain and Industrial Internet of Things rediscovers, redefines, and reestablishes the most recent applications of federated learning using blockchain and IIoT to optimize data for next-generation networks. It provides insights to readers in a way of inculcating the theme that shapes the next generation of secure communication. Covering topics such as smart agriculture, object identification, and educational big data, this premier reference source is an essential resource for computer scientists, programmers, government officials, business leaders and managers, students and faculty of higher education, researchers, and academicians.

Architects of Intelligence - The truth about AI from the people building it (Paperback): Martin Ford Architects of Intelligence - The truth about AI from the people building it (Paperback)
Martin Ford
R1,041 Discovery Miles 10 410 Ships in 18 - 22 working days

Book DescriptionHow will AI evolve and what major innovations are on the horizon? What will its impact be on the job market, economy, and society? What is the path toward human-level machine intelligence? What should we be concerned about as artificial intelligence advances? Architects of Intelligence contains a series of in-depth, one-to-one interviews where New York Times bestselling author, Martin Ford, uncovers the truth behind these questions from some of the brightest minds in the Artificial Intelligence community. Martin has wide-ranging conversations with twenty-three of the world's foremost researchers and entrepreneurs working in AI and robotics: Demis Hassabis (DeepMind), Ray Kurzweil (Google), Geoffrey Hinton (Univ. of Toronto and Google), Rodney Brooks (Rethink Robotics), Yann LeCun (Facebook) , Fei-Fei Li (Stanford and Google), Yoshua Bengio (Univ. of Montreal), Andrew Ng (AI Fund), Daphne Koller (Stanford), Stuart Russell (UC Berkeley), Nick Bostrom (Univ. of Oxford), Barbara Grosz (Harvard), David Ferrucci (Elemental Cognition), James Manyika (McKinsey), Judea Pearl (UCLA), Josh Tenenbaum (MIT), Rana el Kaliouby (Affectiva), Daniela Rus (MIT), Jeff Dean (Google), Cynthia Breazeal (MIT), Oren Etzioni (Allen Institute for AI), Gary Marcus (NYU), and Bryan Johnson (Kernel). Martin Ford is a prominent futurist, and author of Financial Times Business Book of the Year, Rise of the Robots. He speaks at conferences and companies around the world on what AI and automation might mean for the future.

Drawn to Life: 20 Golden Years of Disney Master Classes - Two Volume Set: The Walt Stanchfield Lectures (Hardcover, 2nd... Drawn to Life: 20 Golden Years of Disney Master Classes - Two Volume Set: The Walt Stanchfield Lectures (Hardcover, 2nd edition)
Walt Stanchfield; Edited by Don Hahn
R5,141 Discovery Miles 51 410 Ships in 10 - 15 working days

Drawn to Life is a two-volume collection of the legendary lectures of long-time Disney animator Walt Stanchfield. For over 20 years, Walt mentored a new generation of animators at the Walt Disney Studios and influenced such talented artists such as Tim Burton, Brad Bird, Glen Keane, and Andreas Deja. His writing and drawings have become must-have lessons for fine artists, film professionals, animators, and students looking for inspiration and essential training in drawing and the art of animation. Written by Walt Stanchfield (1919–2000), who began work for the Walt Disney Studios in the 1950s. His work can be seen in films such as Sleeping Beauty, The Jungle Book, 101 Dalmatians, and Peter Pan. Edited by Disney Legend and Oscar®-nominated producer Don Hahn, whose credits include the classic Beauty and the Beast, The Lion King, and Hunchback of Notre Dame.

Data Mining Trends and Applications in Criminal Science and Investigations (Hardcover): Omowunmi E. Isafiade, Antoine B. Bagula Data Mining Trends and Applications in Criminal Science and Investigations (Hardcover)
Omowunmi E. Isafiade, Antoine B. Bagula
R5,267 Discovery Miles 52 670 Ships in 18 - 22 working days

The field of data mining is receiving significant attention in today's information-rich society, where data is available from different sources and formats, in large volumes, and no longer constitutes a bottleneck for knowledge acquisition. This rich information has paved the way for novel areas of research, particularly in the crime data analysis realm. Data Mining Trends and Applications in Criminal Science and Investigations presents scientific concepts and frameworks of data mining and analytics implementation and uses across various domains, such as public safety, criminal investigations, intrusion detection, crime scene analysis, and suspect modeling. Exploring the diverse ways that data is revolutionizing the field of criminal science, this publication meets the research needs of law enforcement professionals, data analysts, investigators, researchers, and graduate-level students.

Codes and Ciphers - A History Of Cryptography (Hardcover): Alexander d'Agapeyeff Codes and Ciphers - A History Of Cryptography (Hardcover)
Alexander d'Agapeyeff
R952 Discovery Miles 9 520 Ships in 10 - 15 working days

A fascinating work on the history and development of cryptography, from the Egyptians to WWII. Many of the earliest books, particularly those dating back to the 1900s and before, are now extremely scarce and increasingly expensive. Hesperides Press are republishing these classic works in affordable, high quality, modern editions, using the original text and artwork Contents Include The Beginings of Cryptography From the Middle Ages Onwards Signals, Signs, And Secret Languages Commercial Codes Military Codes and Ciphers Types of Codes and Ciphers Methods of Deciphering Bibliography

The History of Information Security - A Comprehensive Handbook (Hardcover): Karl Maria Michael De Leeuw, Jan Bergstra The History of Information Security - A Comprehensive Handbook (Hardcover)
Karl Maria Michael De Leeuw, Jan Bergstra
R4,752 Discovery Miles 47 520 Ships in 10 - 15 working days

Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties.
The history of Information Security reaches back to ancient times and starts with the emergence of bureaucracy in administration and warfare. Some aspects, such as the interception of encrypted messages during World War II, have attracted huge attention, whereas other aspects have remained largely uncovered.
There has never been any effort to write a comprehensive history. This is most unfortunate, because Information Security should be perceived as a set of communicating vessels, where technical innovations can make existing legal or organisational frame-works obsolete and a breakdown of political authority may cause an exclusive reliance on technical means.
This book is intended as a first field-survey. It consists of twenty-eight contributions, written by experts in such diverse fields as computer science, law, or history and political science, dealing with episodes, organisations and technical developments that may considered to be exemplary or have played a key role in the development of this field.
These include: the emergence of cryptology as a discipline during the Renaissance, the Black Chambers in 18th century Europe, the breaking of German military codes during World War II, the histories of the NSA and its Soviet counterparts and contemporary cryptology. Other subjects are: computer security standards, viruses and worms on the Internet, computer transparency and free software, computer crime, export regulations for encryption software and the privacy debate.
- Interdisciplinary coverage of the history Information Security
- Written by top experts in law, history, computer and information science
- First comprehensive work in Information Security

Co-Clustering (Hardcover): G Govaert Co-Clustering (Hardcover)
G Govaert
R3,767 Discovery Miles 37 670 Ships in 18 - 22 working days

Cluster or co-cluster analyses are important tools in a variety of scientific areas. The introduction of this book presents a state of the art of already well-established, as well as more recent methods of co-clustering. The authors mainly deal with the two-mode partitioning under different approaches, but pay particular attention to a probabilistic approach. Chapter 1 concerns clustering in general and the model-based clustering in particular. The authors briefly review the classical clustering methods and focus on the mixture model. They present and discuss the use of different mixtures adapted to different types of data. The algorithms used are described and related works with different classical methods are presented and commented upon. This chapter is useful in tackling the problem of co-clustering under the mixture approach. Chapter 2 is devoted to the latent block model proposed in the mixture approach context. The authors discuss this model in detail and present its interest regarding co-clustering. Various algorithms are presented in a general context. Chapter 3 focuses on binary and categorical data. It presents, in detail, the appropriated latent block mixture models. Variants of these models and algorithms are presented and illustrated using examples. Chapter 4 focuses on contingency data. Mutual information, phi-squared and model-based co-clustering are studied. Models, algorithms and connections among different approaches are described and illustrated. Chapter 5 presents the case of continuous data. In the same way, the different approaches used in the previous chapters are extended to this situation. Contents 1. Cluster Analysis. 2. Model-Based Co-Clustering. 3. Co-Clustering of Binary and Categorical Data. 4. Co-Clustering of Contingency Tables. 5. Co-Clustering of Continuous Data. About the Authors Gerard Govaert is Professor at the University of Technology of Compiegne, France. He is also a member of the CNRS Laboratory Heudiasyc (Heuristic and diagnostic of complex systems). His research interests include latent structure modeling, model selection, model-based cluster analysis, block clustering and statistical pattern recognition. He is one of the authors of the MIXMOD (MIXtureMODelling) software. Mohamed Nadif is Professor at the University of Paris-Descartes, France, where he is a member of LIPADE (Paris Descartes computer science laboratory) in the Mathematics and Computer Science department. His research interests include machine learning, data mining, model-based cluster analysis, co-clustering, factorization and data analysis. Cluster Analysis is an important tool in a variety of scientific areas. Chapter 1 briefly presents a state of the art of already well-established as well more recent methods. The hierarchical, partitioning and fuzzy approaches will be discussed amongst others. The authors review the difficulty of these classical methods in tackling the high dimensionality, sparsity and scalability. Chapter 2 discusses the interests of coclustering, presenting different approaches and defining a co-cluster. The authors focus on co-clustering as a simultaneous clustering and discuss the cases of binary, continuous and co-occurrence data. The criteria and algorithms are described and illustrated on simulated and real data. Chapter 3 considers co-clustering as a model-based co-clustering. A latent block model is defined for different kinds of data. The estimation of parameters and co-clustering is tackled under two approaches: maximum likelihood and classification maximum likelihood. Hard and soft algorithms are described and applied on simulated and real data. Chapter 4 considers co-clustering as a matrix approximation. The trifactorization approach is considered and algorithms based on update rules are described. Links with numerical and probabilistic approaches are established. A combination of algorithms are proposed and evaluated on simulated and real data. Chapter 5 considers a co-clustering or bi-clustering as the search for coherent co-clusters in biological terms or the extraction of co-clusters under conditions. Classical algorithms will be described and evaluated on simulated and real data. Different indices to evaluate the quality of coclusters are noted and used in numerical experiments.

Human, Social, and Organizational Aspects of Health Information Systems (Hardcover): A. W. Kushniruk, E. M. Borycki Human, Social, and Organizational Aspects of Health Information Systems (Hardcover)
A. W. Kushniruk, E. M. Borycki
R4,610 Discovery Miles 46 100 Ships in 18 - 22 working days

Human, Social, and Organizational Aspects of Health Information Systems offers an evidence-based management approach to issues associated with the human and social aspects of designing, developing, implementing, and maintaining health information systems across a healthcare organization - specific to an individual, team, organizational, system, and international perspective. Integrating knowledge from multiple levels, this book will benefit scholars and practitioners from the medical information, health service management, information technology arenas.

Technologies for Migration and Population Analysis - Spatial Interaction Data Applications (Hardcover): Technologies for Migration and Population Analysis - Spatial Interaction Data Applications (Hardcover)
R4,594 Discovery Miles 45 940 Ships in 18 - 22 working days

Internal migration serves as one of the key contributing factors to population change involving not only change in the numbers of people, but also a change in composition and structure of local populations. Technologies for Migration and Population Analysis: Spatial Interaction Data Applications addresses the technical and data-related side of studying population flows and provides a selection of substantive case studies and applications to exemplify research currently being carried out. With expert international contributors currently working in the field, this authoritative book allows readers to better understand interaction data and ways knowledge of population flows can be put to use.

Lean Enterprise - The Essential Step-by-Step Guide to Building a Lean Business with Six Sigma, Kanban, and 5S Methodologies... Lean Enterprise - The Essential Step-by-Step Guide to Building a Lean Business with Six Sigma, Kanban, and 5S Methodologies (Lean Guides with Scrum, Sprint, Kanban, DSDM, XP & Crystal) (Hardcover)
Greg Caldwell
R606 R545 Discovery Miles 5 450 Save R61 (10%) Ships in 18 - 22 working days
Cultural Commonalities in the Digital Ecosystem (Hardcover): M. Pelissier Cultural Commonalities in the Digital Ecosystem (Hardcover)
M. Pelissier
R3,750 Discovery Miles 37 500 Ships in 18 - 22 working days

INTELLECTUAL TECHNOLOGIES SET Coordinated by Jean-Max Noyer and Maryse Carmes The dynamics of production, circulation and dissemination of knowledge that are currently developing in the digital ecosystem testify to a profound change in capitalism. On the margins of the traditional duo of knowledge markets and exclusive property rights, the emerging notion of cultural commons is opening the door to new modes of production based on hybrid market arrangements and an inclusive understanding of property. This book studies the political economy of cultural commons in the digital ecosystem, outlining the contexts and areas of thought in which this concept has emerged and identifying the socio-economic, technical and political issues associated with it. It also analyzes the specific physical conditions that enable the implementation of the economy of cultural commons in a specific digital ecosystem, that of books, by studying the effects of digital libraries and self-publishing platforms.

Osculant - A Self-organizing Scheduling and Resource Management Scheme in a Network Computing Environment (Hardcover): Hsin-Ho... Osculant - A Self-organizing Scheduling and Resource Management Scheme in a Network Computing Environment (Hardcover)
Hsin-Ho Wu
R2,057 Discovery Miles 20 570 Ships in 18 - 22 working days
Virtually Sacred - Myth and Meaning in World of Warcraft and Second Life (Hardcover): Robert M. Geraci Virtually Sacred - Myth and Meaning in World of Warcraft and Second Life (Hardcover)
Robert M. Geraci
R1,396 Discovery Miles 13 960 Ships in 10 - 15 working days

Millions of users have taken up residence in virtual worlds, and in those worlds they find opportunities to revisit and rewrite their religious lives. Robert Geraci argues that virtual worlds and video games have become a locus for the satisfaction of religious needs, providing many users with communities, a meaningful experience of history and human activity, and a sense of transcendence. Using interviews, surveys, and his own first-hand experience within the games, Geraci shows how World of Warcraft and Second Life provide participants with the opportunity to rethink what it means to be religious in the contemporary world. Not all participants use virtual worlds for religious purposes, but many online residents use them to rearrange or replace religious practice as designers and users collaborate in the production of a new spiritual marketplace. Using World of Warcraft and Second Life as case studies, this book shows that many residents now use virtual worlds to re-imagine their traditions and work to restore them to authentic sanctity, or else replace religious institutions with virtual communities that provide meaning and purpose to human life. For some online residents, virtual worlds are even keys to a post-human future where technology can help us transcend mortal life. Geraci argues that World of Warcraft and Second Life are virtually sacred because they do religious work. They often do such work without regard for and frequently in conflict with traditional religious institutions and practices; ultimately they participate in our sacred landscape as outsiders, competitors, and collaborators.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Vending Machine Business Secrets - How…
Carter Woods Hardcover R547 Discovery Miles 5 470
Strategic Logistics Management - A…
W. Niemann, G. de Villier Paperback R766 Discovery Miles 7 660
Service Integration and Management…
IT Governance Paperback R1,124 Discovery Miles 11 240
Logistics Operations and Management…
Reza Farahani, Shabnam Rezapour, … Paperback R2,624 R2,473 Discovery Miles 24 730
Operations And Supply Chain Management
David Collier, James Evans Hardcover R1,391 R1,295 Discovery Miles 12 950
Migration and Urbanization - Local…
Denis Ushakov Hardcover R6,701 Discovery Miles 67 010
All About Pull Production - Designing…
Christoph Roser Hardcover R1,625 Discovery Miles 16 250
Facilities Design
Sunderesh S. Heragu Hardcover R3,436 Discovery Miles 34 360
X-SCM - The New Science of X-treme…
Lisa H. Harrington, Sandor Boyson, … Hardcover R6,767 Discovery Miles 67 670
Business Logistics Management
Wessel Pienaar, John Vogt Paperback R599 R539 Discovery Miles 5 390

 

Partners