Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Today we can find almost any information on a computer or the Internet. Without too much thought, we search, browse and use it in our daily lives, work and study. Yet the issues hanging on a button-press can range from needless time-wasting, through frustration at failed searches and missed information, to mistaken and even dangerous conclusions for users' knowledge, careers, finance, health, travel or relationships.;This work is a reader-friendly summary of the latest research in psychology, computing and information science, that shows how we search and use information, what can go wrong, and why. It sheds light on online information seeking in many different contexts, to increase awareness and effectiveness as a user.
Prepare for Microsoft Exam 70-535-and help demonstrate your real-world mastery of architecting complete cloud solutions on the Microsoft Azure platform. Designed for architects and other cloud professionals ready to advance their status, Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the MCSA level. Focus on the expertise measured by these objectives: Design compute infrastructure Design data implementation Design networking implementation Design security and identity solutions Design solutions by using platform services Design for operations This Microsoft Exam Ref: Organizes its coverage by exam skills Features strategic, what-if scenarios to challenge you Includes DevOps and hybrid technologies and scenarios Assumes you have experience building infrastructure and applications on the Microsoft Azure platform, and understand the services it offers
Your genius-level guide to Excel excellence Excel Portable Genius covers the key features of Microsoft Excel in a concise, fast-paced, portable format that provides the perfect quick and easy-to-follow reference for novices and experienced users alike. Written by seasoned tech expert and trainer Lisa A. Bucki, it answers the nine key questions Excel users are most likely to face in their work and adds some hot tips and advice on this incredibly useful--but sometimes difficult-to-learn--program's lesser-known features. Build formulas to perform powerful calculations Format data to make it easy to find interpret and to highlight key results Sort and filter to organize or display specific information Chart data to pinpoint changes and identify trends Communicate results by printing and sharing Complete with a comprehensive index and extensive illustrations complementing straightforward instructions, this is the ideal guide to mastery of the world's most popular spreadsheet program.
The book examines patterns of participation in human rights treaties. International relations theory is divided on what motivates states to participate in treaties, specifically human rights treaties. Instead of examining the specific motivations, this dissertation examines patterns of participation. In doing so, it attempts to match theoretical expectations of state behavior with participation. The conclusion of this study is that the data suggests there are multiple motivations that lead states to participate in human rights treaties. The book is divided into five substantive chapters. After an introduction, the second chapter examines the literature on why states join treaties in general, and human rights treaties in particular. The third chapter reviews the obligations states commit to under the fifteen treaties under consideration. The fourth chapter uses basic quantitative methods to examine any differences in the participation rates between democratic and non-democratic states. The fifth chapter examines reservations, declarations, and objections made in conjuncture with the fifteen treaties. The chapter employs both quantitative and qualitative methods to determine if there are substantial differences between democratic and non-democratic states. Finally, the sixth chapter examines those states that participate in the most human rights treaties to determine if there are characteristics that help to identify these states. Additionally, the chapter examines and evaluates theoretical predictions about participation.
Digital editing gives editors far greater freedom than ever before to move scenes of information around and place them anywhere in a film's sequence. Apple's Final Cut Pro is the most widely used Mac-based digital editor, and is especially popular with independent filmmakers and graphic artists. Final Cut Pro 5 Editing Essentials enables readers to master the craft of digital editing on Apple's Final Cut Pro. This full-color editing workshop features eight tutorials that provide firsthand experience with the art and technique of editing. Covering the essentials - capturing material, organizing it, editing, adding transitions, basic titling and sound techniques, and outputting from the application - the tutorials are explained in jargon-free language by a seasoned teacher and digital editor. This book includes downloadable resources filled with graphic files for the tutorial projects to help users hone their editing craft. Companion files are available at http://www.taylorandfrancis.com/cw/wolsky-9781578202867/.
Changes in the media landscape present new challenges for scholars interested in the relationship between the mass media and civil society. Notably, the explosion of the Internet in advanced industrial democracies and its more limited introduction in other types of regimes has provided new pathways for communication. This volume explores the nature of the Internet's impact on civil society, addressing the following central questions: * Is the Internet qualitativey different from the more traditional forms of the media? * Has the Internet demonstrated real potential to improve civil society through a wider provision of information, an enhancement of communication between government and citizen or via better state transparency? * Alternatively, does the Internet pose a threat to the coherence of civil society as people are encouraged to abandon shared media experiences and pursue narrow interests? * In authoritarian states, does the Internet function as a beacon for free speech or another tool for propaganda? This book will be of interest to students and scholars of the Internet and civil society. Jensen, University of Aarhus Weiner Lusoli, University of Salford Stephen Ward, University of Salford Scott Wr
Blue Team defensive advice from the biggest names in cybersecurity The Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the biggest names in cybersecurity. Inside, dozens of the world's leading Blue Team security specialists show you how to harden systems against real and simulated breaches and attacks. You'll discover the latest strategies for blocking even the most advanced red-team attacks and preventing costly losses. The experts share their hard-earned wisdom, revealing what works and what doesn't in the real world of cybersecurity. Tribe of Hackers Blue Team goes beyond the bestselling, original Tribe of Hackers book and delves into detail on defensive and preventative techniques. Learn how to grapple with the issues that hands-on security experts and security managers are sure to build into their blue team exercises. Discover what it takes to get started building blue team skills Learn how you can defend against physical and technical penetration testing Understand the techniques that advanced red teamers use against high-value targets Identify the most important tools to master as a blue teamer Explore ways to harden systems against red team attacks Stand out from the competition as you work to advance your cybersecurity career Authored by leaders in cybersecurity attack and breach simulations, the Tribe of Hackers series is perfect for those new to blue team security, experienced practitioners, and cybersecurity team leaders. Tribe of Hackers Blue Team has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the blue team defense.
Visual Thinking for Information Design, Second Edition brings the science of perception to the art of design. The book takes what we now know about perception, cognition and attention and transforms it into concrete advice that students and designers can directly apply. It demonstrates how designs can be considered as tools for cognition and extensions of the viewer's brain in much the same way that a hammer is an extension of the user's hand. The book includes hundreds of examples, many in the form of integrated text and full-color diagrams. Renamed from the first edition, Visual Thinking for Design, to more accurately reflect its focus on infographics, this timely revision has been updated throughout and includes more content on pattern perception, the addition of new material illustrating color assimilation, and a new chapter devoted to communicating ideas through images.
A publication linked to the release of an important update of Dark Souls 3. If the Dark Souls series managed to seduce players and journalists, it was mainly by word of mouth. It was such a great success that Dark Souls 2 was named "Game of the Year" 2014 by the vast majority of gaming magazines and websites. To date, this saga is one of the most important in the gaming industry. The odd thing is that these games are well known for their difficulty and their cryptic universe. This publication narrates the epic success story, but also describes its gameplay mechanics and its specific lore across more than 300 pages. Characters, plots and the scenario of the three Souls (Demon's Souls, Dark Souls and Dark Souls II) are deciphered by Damien Mecheri and Sylvain Romieu, who spent a long year studying these dense and enigmatic games down to the smallest detail.
Drum Sound and Drum Tuning assists drummers, sound engineers, and music students in learning critical skills related to drum sound and achieving an optimised and personalised drum kit set-up. The book covers the essential theories of percussion acoustics and develops this knowledge in order to facilitate creative approaches to drum tuning and professional-level recording and mixing of drums. All aspects of drumhead vibration, drumhead equalisation, and resonant drumhead coupling are de-mystified, alongside discussions relating to drumhead types, drum shell vibration, and tuning to musical intervals for different performance genres. The book develops drum sound theory and creative analysis into a detailed dissection of recording and production techniques specifically for drums, including discussions on studio technologies, room acoustics, microphone techniques, phase coherence, and mixing drums with advanced digital audio workstation (DAW) techniques and creative processing tools. Drum Sound and Drum Tuning includes many practical hands-on exercises that incorporate example tutorials with Logic Pro and iDrumTune Pro software, encouraging the reader to put theory into immediate creative practice and to develop their own listening skills in an informed and reflective manner. The book also documents primary interviews and opinion from some of the world's most celebrated drummers, music producers, and sound engineers, enabling the reader to connect the relevant theories with real-world context, whilst refining their own personalised approach to mastering drum sound.
This book provides in-depth insights into use cases implementing artificial intelligence (AI) applications at the edge. It covers new ideas, concepts, research, and innovation to enable the development and deployment of AI, the industrial internet of things (IIoT), edge computing, and digital twin technologies in industrial environments. The work is based on the research results and activities of the AI4DI (ECSEL JU) project, including an overview of industrial use cases, research, technological innovation, validation, and deployment. This book's sections build on the research, development, and innovative ideas elaborated for applications in five industries: automotive, semiconductor, industrial machinery, food and beverage, and transportation. The articles included under each of these five industrial sectors discuss AI-based methods, techniques, models, algorithms, and supporting technologies, such as IIoT, edge computing, digital twins, collaborative robots, silicon-born AI circuit concepts, neuromorphic architectures, and augmented intelligence, that are anticipating the development of Industry 5.0. Automotive applications cover use cases addressing AI-based solutions for inbound logistics and assembly process optimisation, autonomous reconfigurable battery systems, virtual AI training platforms for robot learning, autonomous mobile robotic agents, and predictive maintenance for machines on the level of a digital twin. AI-based technologies and applications in the semiconductor manufacturing industry address use cases related to AI-based failure modes and effects analysis assistants, neural networks for predicting critical 3D dimensions in MEMS inertial sensors, machine vision systems developed in the wafer inspection production line, semiconductor wafer fault classifications, automatic inspection of scanning electron microscope cross-section images for technology verification, anomaly detection on wire bond process trace data, and optical inspection. The use cases presented for machinery and industrial equipment industry applications cover topics related to wood machinery, with the perception of the surrounding environment and intelligent robot applications. AI, IIoT, and robotics solutions are highlighted for the food and beverage industry, presenting use cases addressing novel AI-based environmental monitoring; autonomous environment-aware, quality control systems for Champagne production; and production process optimisation and predictive maintenance for soybeans manufacturing. For the transportation sector, the use cases presented cover the mobility-as-a-service development of AI-based fleet management for supporting multimodal transport. This book highlights the significant technological challenges that AI application developments in industrial sectors are facing, presenting several research challenges and open issues that should guide future development for evolution towards an environment-friendly Industry 5.0. The challenges presented for AI-based applications in industrial environments include issues related to complexity, multidisciplinary and heterogeneity, convergence of AI with other technologies, energy consumption and efficiency, knowledge acquisition, reasoning with limited data, fusion of heterogeneous data, availability of reliable data sets, verification, validation, and testing for decision-making processes.
Features Contains ready-to-use coding recipes allowing fast prototyping and solving of mathematical problems using FEM. Suitable for upper-level undergraduates and graduates in applied mathematics, science, or engineering. Both MATLAB and Python programming codes are provided to give readers more flexibility in the practical framework implementation.
Experience learning made easy--and quickly teach yourself the essentials of working with Windows 7. With STEP BY STEP, you set the pace--building and practicing the skills you need, just when you need them Learn to manage windows and folders, sort and filter files, create an efficient Windows working environment, and safely access the Internet. You'll learn how to install and manage software and hardware, create and manage homegroups, share content with other computers and computer users, and instantly locate content stored on your PC or network. You'll also learn how to fine-tune your PC's performance and resolve common problems. Plus, the supplied practice files give you a chance to hone your skills and put the book's lessons to work. For customers who purchase an ebook version of this title, instructions for downloading the CD files can be found in the ebook.
The SPSS Survival Manual throws a lifeline to students and researchers grappling with this powerful data analysis software. In her bestselling guide, Julie Pallant takes you through the entire research process, helping you choose the right data analysis technique for your project. This edition has been updated to include up to SPSS version 26. From the formulation of research questions, to the design of the study and analysis of data, to reporting the results, Julie discusses basic and advanced statistical techniques. She outlines each technique clearly, with step-by-step procedures for performing the analysis, a detailed guide to interpreting data output and an example of how to present the results in a report. For both beginners and experienced users in Psychology, Sociology, Health Sciences, Medicine, Education, Business and related disciplines, the SPSS Survival Manual is an essential text. It is illustrated throughout with screen grabs, examples of output and tips, and is also further supported by a website with sample data and guidelines on report writing. This seventh edition is fully revised and updated to accommodate changes to IBM SPSS procedures.
Expert insight for modern Python (3.6+) coding from the author of Python Essential Reference Python educator Dave Beazley's concise handbook focuses on the essential core of the Python programming language, with code examples to illuminate how Python works and how to structure programs that can be more easily explained, tested, and debugged. Rather than trying to cover every possible feature and quirk of a 30-year-old language, this pragmatic guide provides a concise narrative related to fundamental programming topics that form the foundation for Python projects of any size including Data abstraction Control flow Program structure Functions: master functions and functional programming idioms Objects: control objects and master the "protocols" that define their behavior Modules: plan for project growth by understanding modules and packages Generators Classes: understand classes from both high-level and technical perspectives I/O handling: proper techniques and abstractions Dicts "This is a pragmatic book that presents some of the most important topics about the Python programming language in a concise form, designed to make it easier to find out the most relevant information bits in a context where resources abound and frequently are just too overwhelming." -Victor Domingos, Software Developer, Slim Business Solutions, The No Title (R) Tech Blog
This book is about the past and future of research on the effectiveness of learning networks (also known as "e-learning" or "online learning" or "Web-based learning"). Learning networks are groups of people using computer technology, communicating and collaborating online to build knowledge together. Over the past decade there has been an explosion not only of online courses, but also of studies on them. In Learning Together Online: Research on Asynchronous Learning Networks, leading researchers in the field use an integrated theoretical framework, which they call "Online Interaction Learning Theory," to organize what past research shows and where future research is going. It models the variables and processes that are important in determining the relative effectiveness of online learners working to reach a deeper level of understanding by interacting with each other and with the texts under investigation. Now that there have been hundreds of studies and thousands of courses offered online, what does the empirical evidence show? This book addresses the question directly by presenting what is known from research results about how to design and teach courses effectively online, ranging from the organizational context and characteristics of students to learning theories and research design methods. It also provides a research agenda for the next decade. Learning Together Online: Research on Asynchronous Learning Networks is both a textbook for graduate students and a professional reference for faculty teaching online, researchers conducting studies, and graduate students taking courses about learning technologies who need to know the state of the art of research in the area of online learning.
A formal analysis A Singing Contest comprises close readings of
Seamus
From the former news policy lead at Google, an “informative and often harrowing wake-up call” (Publishers Weekly) that explains the high-stakes global cyberwar brewing between Western democracies and the authoritarian regimes of China and Russia that could potentially crush democracy. From 2016 to 2020, Jacob Helberg led Google’s global internal product policy efforts to combat disinformation and foreign interference. During this time, he found himself in the midst of what can only be described as a quickly escalating two-front technology cold war between democracy and autocracy. On the front-end, we’re fighting to control the software—applications, news information, social media platforms, and more—of what we see on the screens of our computers, tablets, and phones, a clash which started out primarily with Russia but now increasingly includes China and Iran. Even more ominously, we’re also engaged in a hidden back-end battle—largely with China—to control the internet’s hardware, which includes devices like cellular phones, satellites, fiber-optic cables, and 5G networks. This tech-fueled war will shape the world’s balance of power for the coming century as autocracies exploit 21st-century methods to redivide the world into 20th-century-style spheres of influence. Without a firm partnership with the government, Silicon Valley is unable to protect democracy from the autocrats looking to sabotage it from Beijing to Moscow and Tehran. Helberg offers “unnervingly convincing evidence that time is running out in the ‘gray war’ with the enemies of freedom” (Kirkus Reviews) which could affect every meaningful aspect of our lives, including our economy, our infrastructure, our national security, and ultimately, our national sovereignty.
Tackling the cybersecurity challenge is a matter of survival for society at large. Cyber attacks are rapidly increasing in sophistication and magnitude-and in their destructive potential. New threats emerge regularly, the last few years having seen a ransomware boom and distributed denial-of-service attacks leveraging the Internet of Things. For organisations, the use of cybersecurity risk management is essential in order to manage these threats. Yet current frameworks have drawbacks which can lead to the suboptimal allocation of cybersecurity resources. Cyber insurance has been touted as part of the solution - based on the idea that insurers can incentivize companies to improve their cybersecurity by offering premium discounts - but cyber insurance levels remain limited. This is because companies have difficulty determining which cyber insurance products to purchase, and insurance companies struggle to accurately assess cyber risk and thus develop cyber insurance products. To deal with these challenges, this volume presents new models for cybersecurity risk management, partly based on the use of cyber insurance. It contains: A set of mathematical models for cybersecurity risk management, including (i) a model to assist companies in determining their optimal budget allocation between security products and cyber insurance and (ii) a model to assist insurers in designing cyber insurance products. The models use adversarial risk analysis to account for the behavior of threat actors (as well as the behavior of companies and insurers). To inform these models, we draw on psychological and behavioural economics studies of decision-making by individuals regarding cybersecurity and cyber insurance. We also draw on organizational decision-making studies involving cybersecurity and cyber insurance. Its theoretical and methodological findings will appeal to researchers across a wide range of cybersecurity-related disciplines including risk and decision analysis, analytics, technology management, actuarial sciences, behavioural sciences, and economics. The practical findings will help cybersecurity professionals and insurers enhance cybersecurity and cyber insurance, thus benefiting society as a whole. This book grew out of a two-year European Union-funded project under Horizons 2020, called CYBECO (Supporting Cyber Insurance from a Behavioral Choice Perspective).
This updated and reorganized Fifth edition of Software Testing: A Craftsman's Approach continues to be a valuable reference for software testers, developers, and engineers, by applying the strong mathematics content of previous editions to a coherent treatment of software testing. Responding to instructor and student survey input, the authors have streamlined chapters and examples. The Fifth Edition: Has a new chapter on feature interaction testing that explores the feature interaction problem and explains how to reduce tests Uses Java instead of pseudo-code for all examples including structured and object-oriented ones Presents model-based development and provides an explanation of how to conduct testing within model-based development environments Explains testing in waterfall, iterative, and agile software development projects Explores test-driven development, reexamines all-pairs testing, and explains the four contexts of software testing Thoroughly revised and updated, Software Testing: A Craftsman's Approach, Fifth Edition is sure to become a standard reference for those who need to stay up to date with evolving technologies in software testing.
'This is the most important conversation of our time, and Tegmark's thought-provoking book will help you join it' Stephen Hawking THE INTERNATIONAL BESTSELLER. DAILY TELEGRAPH AND THE TIMES BOOKS OF THE YEAR SELECTED AS ONE OF BARACK OBAMA'S FAVOURITE BOOKS OF 2018 AI is the future - but what will that future look like? Will superhuman intelligence be our slave, or become our god? Taking us to the heart of the latest thinking about AI, Max Tegmark, the MIT professor whose work has helped mainstream research on how to keep AI beneficial, separates myths from reality, utopias from dystopias, to explore the next phase of our existence. How can we grow our prosperity through automation, without leaving people lacking income or purpose? How can we ensure that future AI systems do what we want without crashing, malfunctioning or getting hacked? Should we fear an arms race in lethal autonomous weapons? Will AI help life flourish as never before, or will machines eventually outsmart us at all tasks, and even, perhaps, replace us altogether? 'This is a rich and visionary book and everyone should read it' The Times
In The Culturally Customized Web Site, Nitish Singh and Arun
Pereira focus on cultural aspects of international website design,
honing in on three objectives:
This book shows IT managers how to identify, mitigate and manage risks in an IT outsourcing exercise. The book explores current trends and highlights key issues and changes that are taking place within outsourcing. Attention is given to identifying the drivers and related risks of outsourcing by examining recently published and existing concepts of IT outsourcing. Founded on academic theory and empirical and quantitative information, this book: * Incorporates the complete risk identification and mitigation life cycle * Highlights the concept of core competency * Looks at motivating factors and working relationships of the buyer and supplier * Provides background to understand the risks as a result of 'human factors' as defined by the agency theory * Reviews the areas of risk that influence the decision to outsource the IT function * Examines the forces that determine the equilibrium in the risk profiles for the buyer and supplier |
You may like...
Spoilt Ballots - The Elections That…
Matthew Blackman, Nick Dall
Paperback
Nuclear - Inside South Africa's Secret…
Karyn Maughan, Kirsten Pearson
Paperback
Land Matters - South Africa's Failed…
Tembeka Ngcukaitobi
Paperback
(4)
|