Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
The ever-increasing dependence of our lives and livelihoods on the correct functioning of computer software means that logic and program correctness are core elements of all good computer science degrees. This book presents both these topics in one self-contained text. The focus of the book is on "correct-by-construction" program design -- the discipline of calculating programs from their specifications. Modern, calculational logic is introduced in combination with key program construction principles, such as the assignment axiom, loop invariants and bound functions. This material is intertwined with motivational discussion, programming examples and challenging problem-solving exercises, bringing the book alive for its intended audience, undergraduates in computer science and mathematics, as well as professional programmers wishing to further develop their programming skills. The book covers the elements of logic and program correctness that form the foundations of further study --- the logical connectives and their algebraic properties, induction, quantifiers and program construction rules. Substantial examples of program construction are included. Many exercises are provided, all with detailed solutions.
Equipping you with the most up-to-date tools available, Minnick's RESPONSIVE WEB DESIGN WITH HTML 5 & CSS, 9th edition, teaches you step by step how to design professional quality websites that attract and retain customers. Packed with best practices and tips from the pros, the text gives you a solid foundation in HTML, CSS and responsive web design. It shows you how to create one website that automatically adapts to mobile, tablet, laptop and desktop devices as well as large monitors. You will learn how to code a webpage to make a phone call from a mobile device, embed a map, use custom fonts, create shortcut navigation menus, integrate social media to promote a business and more. In addition, you will use popular web framework Bootstrap to create a webpage. Also available: MindTap digital learning solution.
Equip your students with a management-focused overview of information security as well as the tools to effectively administer it with Whitman/Mattord's MANAGEMENT OF INFORMATION SECURITY, Sixth Edition. More than ever, we need to prepare information security management students to build and staff security programs capable of securing systems and networks to meet the challenges in a world where continuously emerging threats, ever-present attacks and the success of criminals illustrate weaknesses in current information technologies. This text offers an exceptional blend of skills and experiences to administer and manage the more secure computing environments that organizations need. Reflecting the latest developments from the field, it includes updated coverage of NIST, ISO and security governance along with emerging concerns like Ransomware, Cloud Computing and the Internet of Things.
Packed with hands-on learning tools, Tomsho's GUIDE TO NETWORKING ESSENTIALS, Eighth Edition, equips you with the knowledge and skills to work with network infrastructure devices and network operating systems in a small to medium-size network environment. Focusing on troubleshooting and computer networking technologies, it delivers a comprehensive introduction to network protocols and network devices, including wireless and cybersecurity technologies. It reflects the latest networking technologies and operating systems, covers new Ethernet standards, includes an Internet of Things (IoT) chapter and adds certification mapping to the Microsoft Technology Associate (MTA Exam 98-366) in Networking Fundamentals. Maximizing your success, virtual labs and the MindTap digital learning solution give you ample opportunities to put what you learn into practice and prep for the certification test.
Master the technical skills and industry knowledge you need to begin an exciting career installing, configuring and troubleshooting computer networks with West/Dean/Andrews' NETWORK+ GUIDE TO NETWORKS, 8th edition. It thoroughly prepares you for success on CompTIA's Network+ N10-007 certification exam with fully mapped coverage of all objectives, including protocols, topologies, hardware, network design, security and troubleshooting. Virtualization-based projects give you experience working with a wide variety of hardware, software, operating systems and device interactions, while "On the Job" stories, Applying Concepts activities, and Hands-On and Capstone Projects let you explore concepts in more depth. MindTap Networking offers additional practice and certification prep. The text's emphasis on real-world problem solving provides the tools for success in any computing environment.
The story of YouTube, the global phenomenon which single-handedly upended traditional media and transformed Google into one of the world's most profitable companies. Since 2005, YouTube has exploded, giving a platform to unique and valuable voices, but also to propaganda, misinformation and illicit videos. The algorithm which determines whether a channel lives or dies - how or when videos are seen, and how much creators earn through advertising - is notoriously secretive, remaining a mystery to consumers and broadcasters alike. At the same time, the site is massively profitable for parent company Google, helping turn it into one of the most influential powers on the planet. In Like, Comment, Subscribe, Bloomberg tech journalist Mark Bergen delivers the definitive account on YouTube, detailing how it started, how it works and ultimately how it drives Google's success. It can be seen as the story of a technical marvel that has upended traditional media and created stars out of everyday people, or the story of the rise of a ruthless advertising conglomerate with little regard for its impact on the world beyond the bottom line - but in reality, it's the story of both.
Providing essential information for business managers, computer programmers, system designers, as well as home computer users, DATABASE COMMUNICATIONS AND COMPUTER NETWORKS, 8e provides a thorough introduction that includes coverage of the language of computer networks as well as the effects of data communications on business and society. Balancing technical concepts with everyday issues, it equips you with a solid understanding of the basic features, operations, and limitations of different types of computer networks. It offers full coverage of wireless technologies, industry convergence, compression techniques, network security, LAN technologies, VoIP, and error detection and correction. The Eighth Edition also offers up-to-the-minute coverage of near field communications, updated USB interface, lightning interface, and IEEE 802.11 ac and ad wireless standards, firewall updates, router security problems, the Internet of Things, cloud computing, zero-client workstations, and Internet domain names.
Gain a clear understanding of even the most complex, highly theoretical computational theory topics in the approachable presentation found only in the market-leading INTRODUCTION TO THE THEORY OF COMPUTATION, 3E. The number one choice for today's computational theory course, this revision continues the book's well-know, approachable style with timely revisions, additional practice, and more memorable examples in key areas. A new first-of-its-kind theoretical treatment of deterministic context-free languages is ideal for a better understanding of parsing and LR(k) grammars. You gain a solid understanding of the fundamental mathematical properties of computer hardware, software, and applications with a blend of practical and philosophical coverage and mathematical treatments, including advanced theorems and proofs. INTRODUCTION TO THE THEORY OF COMPUTATION, 3E's comprehensive coverage makes this a valuable reference for your continued studies in theoretical computing.
Learn to maximize the use of mobile devices, make the most of online tools for collaboration and communication, and fully utilize the web and cloud with the latest edition of DISCOVERING COMPUTERS 2018. Clearly see how technology skills can assist you both in gaining employment and advancing your career. This edition highlights web development, how to create a strong web presence, and take full advantage of the latest Windows 10. To keep your instruction as current as possible, online coverage of contemporary technology developments builds on the book's timely discussions. The authors provide helpful suggestions within a proven learning structure and emphasize meaningful practice to reinforce your skills. Self-assessments open each module and enable you to focus your study and learn more in less time. DISCOVERING COMPUTERS presents the key content you need to succeed, using an approach that ensures understanding.
Prepare for programming success as you learn the fundamental principles of developing structured program logic with Farrell's fully revised PROGRAMMING LOGIC AND DESIGN, COMPREHENSIVE, 9E. Ideal for mastering foundational programming, this popular book takes a unique, language-independent approach to programming with a distinctive emphasis on modern conventions. Noted for its clear writing style and complete coverage, the book eliminates highly technical jargon while introducing you to universal programming concepts and encouraging a strong programming style and logical thinking. Frequent side notes and Quick Reference boxes provide concise explanations of important programming concepts. Each chapter also contains learning objectives, a concise summary, and a helpful list of key terms. End-of-chapter material ensures your comprehension with multiple-choice review, programming and debugging exercises, and a maintenance exercise that encourages you to improve working logic.
The new fourth edition of Principles of Business Information Systems features new cases, new questions and assignments and the latest technologies, whilst retaining its comprehensive coverage of Information Systems issues. It also boasts a wealth of real world examples from a broad range of countries and updated coverage of IT and technological issues, making it perfect for courses that prepare students for the modern corporate world.
Eran Eyal had it all: a trendy New York apartment, a jet-set lifestyle
and investors lining up to get in on his million-dollar cryptocurrency
start-up, Shopin. He had come a long way from an ordinary middle-class
childhood in Durban and the burgeoning tech start-up world of Cape
Town.
“the bird is freed”
Facebook had a problem. Along with its sister platforms Instagram and WhatsApp, it was a daily destination for billions of users around the world, extolling its products for connecting people. But as a succession of scandals rocked Facebook from 2016, some began to question whether the company could control, or even understood, its own platforms. As Facebook employees searched for answers, what they uncovered was worse than they could've imagined. The problems ran far deeper than politics. Facebook was peddling and amplifying anger, looking the other way at human trafficking, enabling drug cartels and authoritarians and allowing VIP users to break the platform's supposedly inviolable rules. It turned out to be eminently possible to isolate many of Facebook's worst problems, but whenever employees offered solutions their work was consistently delayed, watered down or stifled by a company that valued user engagement above all else. The only option left was to blow the whistle. In Broken Code, award-winning Wall Street Journal reporter Jeff Horwitz tells the riveting inside story of these employees and their explosive discoveries, uncovering the shocking cost of Facebook's blind ambition in the process.
Women and Cyber Rights in Africa explores the challenges faced by African women in cyberspace, highlighting the exacerbation of gender inequalities by emerging technologies. Authored by African female researchers, it employs multidisciplinary approaches and Afro-feminist theories to discuss biases, stereotypes, and the impact of patriarchal structures. The book addresses limited digital literacy, gendered cyber-criminality, and inadequate gender-sensitive policies. It aims to spur effective policy development and further research on African women's cyber rights.
It is almost impossible to keep up with the pace and direction in which business and technology are moving today. ARTIFICIAL INTELLIGENCE. AUTOMATION. BLOCKCHAIN. BIG DATA. INTERNET OF THINGS. THE FOURTH INDUSTRIAL REVOLUTION. Who actually knows what any of these concepts mean for their business, much less how to integrate them? Things are moving at a faster pace than ever before and trying to keep up has become intimidating and overwhelming. It’s tempting to bury your head in the sand than try to make head or tail of it all. But none of the buzzwords actually matter! You don’t have to jump aboard every single change and adjustment in the market, or trade in your suit for a T-shirt, jeans and sneaker combo. If you have the right context, it’s a lot simpler to understand and use technological shifts as an opportunity to transform your business. Tech Adjacent is about understanding the principles of tech and its pace, hearing the footsteps of where it might be going, knowing how disruption and innovation work tangibly and, most importantly, leveraging it for your individual exponential success. Innovation is contextual, so while Uber, Airbnb and Facebook are grandiose Silicon Valley success stories, they have little relevance in our own market. This book shares stories and case studies of African businesses, exposing who is getting disrupted as we speak and why, as well as how new companies are leading the next wave of growth. Mushambi Mutuma’s experience and expertise in both business and as a tech entrepreneur give real-life context to rapid change, unlocking future opportunities and offering tools to predict where your audience and industry are heading. He sells no big ideas, but genuinely shares his unique perspectives and know-how to help whoever he can in the process. Tech Adjacent isn’t just another book on growing your business in 100 days, nor is it dry academic theory. It is the guidebook for not only surviving but excelling in a world of exponential growth. Whether you are a start-up entrepreneur or a corporate executive, this guide is a must for both present and future leaders.
For courses in Python programming. A clear and student-friendly introduction to the fundamentals of Python In Starting Out with Python, 5th Edition, Tony Gaddis' accessible coverage introduces students to the basics of programming in a high-level language. Python, an easy-to-learn and increasingly popular object-oriented language, allows readers to become comfortable with the fundamentals of programming without the troublesome syntax that can be challenging for novices. With the knowledge acquired using Python, students gain confidence in their skills and learn to recognize the logic behind developing high-quality programs. Starting Out with Python discusses control structures, functions, and lists before classes. As with all Gaddis texts, clear and easy-to-read code listings, concise and practical real-world examples, focused explanations, and an abundance of exercises appear in every chapter. Updates to the 5th Edition include a new chapter on database programming, and new coverage of GUI programming, string processing and formatting, and turtle graphics topics.
GUIDE TO NETWORK SECURITY is a wide-ranging new text that provides a detailed review of the network security field, including essential terminology, the history of the discipline, and practical techniques to manage implementation of network security solutions. It begins with an overview of information, network, and web security, emphasizing the role of data communications and encryption. The authors then explore network perimeter defense technologies and methods, including access controls, firewalls, VPNs, and intrusion detection systems, as well as applied cryptography in public key infrastructure, wireless security, and web commerce. The final section covers additional topics relevant for information security practitioners, such as assessing network security, professional careers in the field, and contingency planning. Perfect for both aspiring and active IT professionals, GUIDE TO NETWORK SECURITY is an ideal resource for readers who want to help organizations protect critical information assets and secure their systems and networks, both by recognizing current threats and vulnerabilities, and by designing and developing the secure systems of the future.
Naomi Klein, author of era-defining bestsellers, The Shock Doctrine,
This Changes Everything and No Logo, is back with her most compulsive
and personal book yet: a revelatory journey into the mirror world of
our polarised age
The Deitels' groundbreaking How to Program series offers unparalleled breadth and depth of programming fundamentals, object-oriented programming concepts and intermediate-level topics for further study. Java How to Program, Late Objects, 11th Edition, presents leading-edge computing technologies using the Deitel signature live-code approach, which demonstrates concepts in hundreds of complete working programs. The 11th Edition presents updated coverage of Java SE 8 and new Java SE 9 capabilities, including JShell, the Java Module System, and other key Java 9 topics.
A delightful, engaging, and comprehensive overview of interaction design Effective and engaging design is a critical component of any digital product, from virtual reality software to chatbots, smartphone apps, and more. In the newly updated sixth edition of Interaction Design: Beyond Human-Computer Interaction, a team of accomplished technology, design, and computing professors delivers an intuitive and instructive discussion of the principles underlying the design of effective interactive technologies. The authors discuss how to design and apply digital technologies in the real world, illustrated with numerous examples. The book explores the interdisciplinary foundations of interaction design, including skills from product design, computer science, human and social psychology, and others. The book builds on the highly successful fifth edition and draws on extensive new research and interviews with accomplished professionals and researchers in the field that reflect a rapidly-changing landscape. It is supported by a website hosting digital resources that add to and complement the material contained within. Readers will also find: Explorations of the social and emotional components of interacting with apps, digital devices and computers Descriptions about how to design, prototype, evaluate and construct technologies that support human-computer interaction Discussions of the cognitive aspects of interaction design, as well as design and evaluation, including usability testing and expert reviews. An essential text for undergraduate and graduate students of human-computer interaction, interaction design, software engineering, web design, and information studies, Interaction Design will also prove to be indispensable for interaction design and user experience professionals.
|
You may like...
Discovering Computers (c)2017
Mark Frydenberg, Misty Vermaat, …
Paperback
(3)
R966 Discovery Miles 9 660
Database Principles - Fundamentals of…
Carlos Coronel, Keeley Crockett, …
Paperback
Systems Analysis And Design In A…
John Satzinger, Robert Jackson, …
Hardcover
(1)
|