![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
Step up your presentation skills with our 6-page laminated guide, focusing on graphic features, animation, audio and a variety of ways presentations can be formatted and distributed. Joan Lambert, author of multiple books on the Microsoft Office Suite, creator of many Lynda.com videos and an experienced corporate trainer used her experience and knowledge to cover the most relevant functions for users at different levels. Also look for the "PowerPoint 2016" QuickStudy for more general coverage of software use, then use the pair to become a power user that can create presentations that "wow". Suggested uses: Workplace -- flat for easy storage and access at a moments notice to find a function you need to use, or to jog your memory for a function you do not use often; Company Training -- reduce help-desk calls and keep productivity flowing for a team or for your entire company; Students/Teachers/Parents -- help with the learning curve in a classroom or for your child and any projects requiring PowerPoint; College Professors/Students -- give polished presentations to your classes that give your hard work the look it deserves.
Online social media are changing the face of politics in the United States. Beginning with a strong theoretical foundation grounded in political, communications and psychology literature, Tweeting to Power examines the effect of online social media on how people come to learn, understand and engage in politics. Gainous and Wagner propose that platforms such as Facebook and Twitter offer the opportunity for a new information flow that is no longer being structured and limited by the popular media. Television and newspapers, which were traditionally the sole or primary gatekeeper, can no longer limit or govern what information is exchanged. By lowering the cost of both supplying the information and obtaining it, social networking applications have recreated how, when and where people are informed. To establish this premise, Gainous and Wagner analyze multiple datasets, quantitative and qualitative, exploring and measuring the use of social media by voters and citizens as well as the strategies and approaches adopted by politicians and elected officials. They illustrate how these new and growing online communities are new forums for the exchange of information that is governed by relationships formed and maintained outside traditional media. Using empirical measures, they prove both how candidates utilize Twitter to shape the information voters rely upon and how effective this effort was at garnering votes in the 2010 congressional elections. With both theory and data, Gainous and Wagner show how the social media revolution is creating a new paradigm for political communication and shifting the very foundation of the political process.
In his final book, the late Henry Kissinger joins forces with two
leading technologists to mount a profound exploration of the epochal
challenges and opportunities presented by the revolution in Artificial
Intelligence.
From hashtag activism to the flood of political memes on social media, the landscape of political communication is being transformed by the grassroots circulation of opinion on digital platforms and beyond. By exploring how everyday people assist in the promotion of political media messages to persuade their peers and shape the public mind, Joel Penney offers a new framework for understanding the phenomenon of viral political communication: the citizen marketer. Like the citizen consumer, the citizen marketer is guided by the logics of marketing practice, but, rather than being passive, actively circulates persuasive media to advance political interests. Such practices include using protest symbols in social media profile pictures, strategically tweeting links to news articles to raise awareness about select issues, sharing politically-charged internet memes and viral videos, and displaying mass-produced T-shirts, buttons, and bumper stickers that promote a favored electoral candidate or cause. Citizens view their participation in such activities not only in terms of how it may shape or influence outcomes, but as a statement of their own identity. As the book argues, these practices signal an important shift in how political participation is conceptualized and performed in advanced capitalist democratic societies, as they casually inject political ideas into the everyday spaces and places of popular culture. While marketing is considered a dirty word in certain critical circles - particularly among segments of the left that have identified neoliberal market logics and consumer capitalist structures as a major focus of political struggle - some of these very critics have determined that the most effective way to push back against the forces of neoliberal capitalism is to co-opt its own marketing and advertising techniques to spread counter-hegemonic ideas to the public. Accordingly, this book argues that the citizen marketer approach to political action is much broader than any one ideological constituency or bloc. Rather, it is a means of promoting a wide range of political ideas, including those that are broadly critical of elite uses of marketing in consumer capitalist societies. The book includes an extensive historical treatment of citizen-level political promotion in modern democratic societies, connecting contemporary digital practices to both the 19th century tradition of mass political spectacle as well as more informal, culturally-situated forms of political expression that emerge from postwar countercultures. By investigating the logics and motivations behind the citizen marketer approach, as well as how it has developed in response to key social, cultural, and technological changes, Penney charts the evolution of activism in an age of mediatized politics, promotional culture, and viral circulation.
Whether you currently work in marketing or looking for a role in the industry, this book will teach you the fundamental basics of digital marketing and prepare you for the parts that nobody talks about. From getting to grips with SEO to practical tips on what to expect from a role in marketing, this guide should be all you need to put you on your path to digital success - without the jargon and ego. Lizzie Benton is a content marketer who has experience in climbing the marketing ladder. As a passionate advocate of the digital marketing industry, Lizzie has spoken at a number of business events, colleges and universities sharing her knowledge.
The Future of Creative Work provides a unique overview of the changing nature of creative work, examining how digital developments and the rise of intangible capital are causing an upheaval in the social institutions of work. It offers a profound insight into how this technological and social evolution will affect creative professions. Expert international contributors explore how robotics, artificial intelligence, blockchain, global digital platforms and autonomous systems will shape the design, production and consumption of culture. Taking a multidisciplinary approach incorporating creative industries studies, business, education and economics, the book analyses the technological drivers of disruption in the world of creative work. Chapters reveal how these changes will create new axes of power and inequality in the global sphere of creative work, predicting that conventional creative professions will be challenged and different species of creative work will evolve as a result. By charting the impact of digital and technological developments, The Future of Creative Work challenges traditional views of creative work, careers and education. This book will be a valuable resource for students and researchers undertaking creative industries studies. Its discussion of the application of creative careers across the economy will also be beneficial for scholars and practitioners interested in business, economics, and advertising and marketing studies.
The classic guide to how computers work, updated with new chapters and interactive graphics "For me, Code was a revelation. It was the first book about programming that spoke to me. It started with a story, and it built up, layer by layer, analogy by analogy, until I understood not just the Code, but the System. Code is a book that is as much about Systems Thinking and abstractions as it is about code and programming. Code teaches us how many unseen layers there are between the computer systems that we as users look at every day and the magical silicon rocks that we infused with lightning and taught to think." - Scott Hanselman, Partner Program Director, Microsoft, and host of Hanselminutes Computers are everywhere, most obviously in our laptops and smartphones, but also our cars, televisions, microwave ovens, alarm clocks, robot vacuum cleaners, and other smart appliances. Have you ever wondered what goes on inside these devices to make our lives easier but occasionally more infuriating? For more than 20 years, readers have delighted in Charles Petzold's illuminating story of the secret inner life of computers, and now he has revised it for this new age of computing. Cleverly illustrated and easy to understand, this is the book that cracks the mystery. You'll discover what flashlights, black cats, seesaws, and the ride of Paul Revere can teach you about computing, and how human ingenuity and our compulsion to communicate have shaped every electronic device we use. This new expanded edition explores more deeply the bit-by-bit and gate-by-gate construction of the heart of every smart device, the central processing unit that combines the simplest of basic operations to perform the most complex of feats. Petzold’s companion website, CodeHiddenLanguage.com, uses animated graphics of key circuits in the book to make computers even easier to comprehend. In addition to substantially revised and updated content, new chapters include: Chapter 18: Let’s Build a Clock! Chapter 21: The Arithmetic Logic Unit Chapter 22: Registers and Busses Chapter 23: CPU Control Signals Chapter 24: Jumps, Loops, and Calls Chapter 28: The World Brain From the simple ticking of clocks to the worldwide hum of the internet, Code reveals the essence of the digital revolution.
Oxford Coding and Robotics
Novice Level 1, in partnership with Resolute Education, comprises a
Workbook and Teacher’s Guide, for use together with the Novice Bot
Kit. The Level 1 Workbook introduces learners to the basics of logic
and coding, how computers work and store data, and applying
computational thinking skills.
The Destiny Comic Collection Vol. One is an essential collection of comic stories for Destiny fans. This 144 page volume includes Bungie's comic collection plus never before seen stories, behind the scenes galleries, and exclusive content from featured artists! From Osiris's exile to Ana Bray's homecoming on Mars, uncover the legends behind Destiny 2's iconic characters. Featuring stories written and illustrated in collaboration with Bungie by Ryan North (Dinosaur Comics, Marvel's The Unbeatable Squirrel Girl), Kris Anka (Marvel's X-Men and Star-Lord), Mark Waid (DC Comics' The Flash and Marvel's Captain America) plus a special introduction by Gerry Duggan (Marvel's Deadpool).
Using a step-by-step, highly visual approach, Andrews/Dark Shelton/Pierce's bestselling COMPTIA A+ GUIDE TO IT TECHNICAL SUPPORT, 11th edition, teaches you how to work with users as well as install, maintain, troubleshoot and network computer hardware and software. Ensuring you are well prepared for 220-1101 and 220-1102 certification exams, each module covers core and advanced topics while emphasizing practical application of the most current technology, techniques and industry standards. You will study the latest hardware, security, Active Directory, operational procedures, basics of scripting, virtualization, cloud computing, mobile devices, Windows 10, macOS and Linux. Digital lab manuals, live virtual machine labs, simulations, auto-graded quizzes and interactive activities provide additional preparation for the certification exam -- and your role as an IT support technician or administrator.
A step-by-step guide to working with programs that exploit quantum computing principles with the help of IBM Quantum, Qiskit, and Python Key Features * Understand the difference between classical computers and quantum computers * Work with key quantum computational principles such as superposition and entanglement and see how they are leveraged on IBM Quantum systems * Run your own quantum experiments and applications by integrating with Qiskit and Python Book Description IBM Quantum Lab is a platform that enables developers to learn the basics of quantum computing by allowing them to run experiments on a quantum computing simulator and on several real quantum computers. Updated with new examples and changes to the platform, this edition begins with an introduction to the IBM Quantum dashboard and Quantum Information Science Kit (Qiskit) SDK. You will get well versed with the IBM Quantum Composer interface as well as the IBM Quantum Lab. You will learn the differences between the various available quantum computers and simulators. Along the way, you'll learn some of the fundamental principles of quantum mechanics, quantum circuits, qubits, and the gates that are used to perform operations on each qubit. As you build on your knowledge, you'll understand the functionality of IBM Quantum and the developer-focused resources it offers to address key concerns like noise, decoherence, and affinity within a quantum system. You'll learn how to monitor and optimize your quantum circuits. Lastly, you'll look at the fundamental quantum algorithms and understand how they can be applied effectively. By the end of this quantum computing book, you'll know how to build quantum programs on your own and will have gained practical understanding of quantum computation skills that you can apply to your business. What you will learn * Get familiar with the contents and layout of IBM Quantum Lab * Create and visualize quantum circuits * Understand quantum gates and visualize how they operate on qubits using the IBM Quantum Composer * Save, import, and leverage existing circuits with the IBM Quantum Lab * Discover Qiskit and its latest modules for model, algorithm, and kernel developers * Get to grips with fundamental quantum algorithms such as Deutsch-Jozsa, Grover's algorithm, and Shor's algorithm Who This Book Is For This book is for Python developers who are looking to learn quantum computing from the ground up and put their knowledge to use in practical situations with the help of the IBM Quantum platform and Qiskit. Some background in computer science and high-school-level physics and math is required.
This thoroughly revised and expanded second edition of IT Contracts and Dispute Management provides an in-depth analysis of the legal issues that could potentially arise within each critical stage of a technology project. The authors draw on their extensive practical experience of advising and litigating in this evolving field, and have produced a work that is both authoritative and pragmatic. Key Features: Discussion of recent judicial decision of relational contracts, and the Supreme Court’s judgment on ‘no oral modification’ clauses and their applicability to change control procedures Updated information to account for the new High Court rules on disclosure Guidance on how to manage frequently occurring issues, such as delayed delivery Examination of important methods of project resuscitation when experiencing difficulty, as well as potential end of project issues This informative book will be a hugely valuable resource for lawyers in private practice who are advising clients striving to avoid or resolve disputes occurring from IT projects. It will also be beneficial for in-house legal counsel who advise clients at each stage of IT projects.
Passwords are not enough A password is a single authentication factor - anyone who has it can use it. No matter how strong it is, if it's lost or stolen, it's entirely useless at keeping information private. To secure your data properly, you also need to use a separate, secondary authentication factor. Data breaches are now commonplace In recent years, large-scale data breaches have increased dramatically in both severity and number, and the loss of personal information - including password data - has become commonplace. Furthermore, the fact that rapidly evolving password-cracking technology and the habitual use - and reuse - of weak passwords has rendered the security of username and password combinations negligible, and you have a very strong argument for more robust identity authentication. Consumers are beginning to realise just how exposed their personal and financial information is, and are demanding better security from the organisations that collect, process and store it. This has led to a rise in the adoption of two-factor authentication (TFA or 2FA). In the field of authentication security, the method of proving identity can be broken down into three characteristics - roughly summarised as 'what you have', 'what you are' and 'what you know'. Two-factor authentication relies on the combination of two of these factors. Product overview TFA is nothing new. It's mandated by requirement 8.3 of the Payment Card Industry Data Security Standard (PCI DSS) and banks have been using it for years, combining payment cards ('what you have') and PINs ('what you know'). If you use online banking you'll probably also have a chip authentication programme (CAP) keypad, which generates a one-time password (OTP). What is new is TFA's rising adoption beyond the financial sector. Two-Factor Authentication provides a comprehensive evaluation of popular secondary authentication methods, such as: Hardware-based OTP generation SMS-based OTP delivery Phone call-based mechanisms Geolocation-aware authentication Push notification-based authentication Biometric authentication factors Smart card verification As well as examining MFA (multi-factor authentication), 2SV (two-step verification) and strong authentication (authentication that goes beyond passwords, using security questions or layered security), the book also discusses the wider application of TFA for the average consumer, for example at such organisations as Google, Amazon and Facebook. It also considers the future of multi-factor authentication, including its application to the Internet of Things (IoT). Increasing your password strength will do absolutely nothing to protect you from online hacking, phishing attacks or corporate data breaches. If you're concerned about the security of your personal and financial data, you need to read this book. About the author Mark Stanislav is an information technology professional with over a decade's varied experience in systems administration, web application development and information security. He is currently a senior security consultant for the Strategic Services team at Rapid7. Mark has spoken internationally at nearly 100 events, including RSA, DEF CON, SecTor, SOURCE Boston, ShmooCon and THOTCON. News outlets such as the Wall Street Journal, Al Jazeera America, Fox Business, MarketWatch, CNN Money, Yahoo Finance, Marketplace and The Register have featured Mark's research, initiatives and insights on information security.
C++ 11 delivered strong support for multithreaded applications, and the subsequent C++14 and 17 updates have built on this baseline. C++ has better options for concurrency than ever before, which means it's an incredibly powerful option for multicore and parallel applications. This bestseller has been updated and revised to cover all the latest changes to C++ 14 and 17! C++ Concurrency in Action, Second Edition teaches readers everything they need to write robust and elegant multithreaded applications in C++17. Along the way, they’ll learn how to navigate the trickier bits of programming for concurrency while avoiding the common pitfalls. KEY FEATURES • Completely updated • Hands-on learning • In depth guide Written for C++ programmers who are new to concurrency and others who may have written multithreaded code using other languages, APIs, or platforms. ABOUT THE TECHNOLOGY Concurrency in terms of computers is a single system performing multiple independent activities in parallel, rather than sequentially, or one after the other. AUTHOR BIO Anthony Williams is a UK-based developer and consultant with many years' experience in C++. He has been an active member of the BSI C++ Standards Panel since 2001, and is the author or co-author of many of the C++ Standards Committee papers that led up to the inclusion of the thread library in the C++11 Standard. He was the maintainer of the Boost Thread library, and is the developer of the just::thread Pro extensions to the C++11 thread library from Just Software Solutions Ltd.
A gripping look at the rise of the microchip and the British tech company caught in the middle of the global battle for dominance. One tiny device lies at the heart of the world's relentless technological advance: the microchip. Today, these slivers of silicon are essential to running just about any machine, from household devices and factory production lines to smartphones and cutting-edge weaponry. At the centre of billions of these chips is a blueprint created and nurtured by a single company: Arm. Founded in Cambridge in 1990, Arm's designs have been used an astonishing 250 billion times and counting. The UK's high-tech crown jewel is an indispensable part of a global supply chain driven by American brains and Asian manufacturing brawn that has become the source of rising geopolitical tension. With exclusive interviews and exhaustive research, The Everything Blueprint tells the story of Arm, from humble beginnings to its pivotal role in the mobile phone revolution and now supplying data centres, cars and the supercomputers that harness artificial intelligence. It explores the company's enduring relationship with Apple and numerous other tech titans, plus its multi-billion-pound sale to the one-time richest man in the world, Japan's Masayoshi Son. The Everything Blueprint details the titanic power struggle for control of the microchip, through the eyes of a unique British enterprise that has found itself in the middle of that battle.
The recent activism film Just Do It (2011) had a message: 'Get off your arse and change the world'. But, as Michael Norton here implores, no-one has to be that energetic. Click2Change advocates sitting back and changing the world from computers, iPads and iPhones. Click2Change offers a wide range of world-changing thing to do on the internet: such as becoming an e-activist or recycling unwanted stuff. With plenty of ideas, information and lots of websites to access, readers will be able to make their mark on the world with a click of the mouse.
Cybercrime is on the rise, and it is becoming easier and easier for criminals to steal your personal information. Toolkits to create viruses, spyware, and other forms of malware are now readily available to anyone wishing to defraud and do damage, and you could be leaving yourself open to attack. It is estimated that standard computer-based defence systems catch only 25% of malware attacks. Do you know the risks you're running online? Are you protected? An Introduction to Hacking and Crimeware answers your concerns and provides a foundation-level overview of the dark world of cybercrime. Know your enemy An Introduction to Hacking and Crimeware is a comprehensive pocket guide to more serious online threats. Knowledge of these threats will help you understand how to ensure that your computer systems are protected and make sure that your business is safe, enabling you to focus on your core activities without fear of attack. Fight back In this pocket guide, the author: *Identifies terms and defines exactly what crimeware is, both intentional and unintentional; *Gives specific, up-to-date examples to help you identify the risks so that you can protect your business; *Explores the increasing use of commercial off-the-shelf (COTS) hacking tools, exposing the enemy's tactics; *Gives practical suggestions of active defence, so you can fight back; *Provides a valuable list of up-to-date, authoritative sources of information, so you can stay abreast of new developments and safeguard your business. An Introduction to Hacking And Crimeware will equip you with the vital information you need to deal with the threats presented by hacking and crimeware in all their many forms, safeguard your online information, and potentially save you and your business from very real danger.
Autonomous systems are on the frontiers of Artificial Intelligence (AI) research, and they are slowly finding their business applications. Driven mostly by Reinforcement Learning (RL) methods (one of the most difficult, but also the most promising modern AI algorithms), autonomous systems help create self-learning and self-optimising systems, ranging from simple game-playing agents to robots able to efficiently act in completely new environments. Based on in-depth study of more than 100 projects, Andrzej Wodecki explores RL as a key component of modern digital technologies, its real-life applications to activities in a value chain and the ways in which it impacts different industries. Artificial Intelligence in Management will help project leaders, decision makers and investors evaluate new autonomous projects and will serve as an inspiring guide for future research.
Host of public television's Mark Kistler's Imagination Station, shows young artists the cool and fun way to draw in 3-D! Hey, you! Open this book and learn how to draw in three dimensions! Mark Kistler's Imagination Station has thirty-six exciting drawing adventures. Mark teaches you the different skills you need in order to create such masterpieces as: * Dinosaurs in the Sky There's also a special guide for parents and teachers at the end of the book. |
You may like...
Database Systems - Design…
Carlos Coronel, Steven Morris
Paperback
Systems Analysis And Design In A…
John Satzinger, Robert Jackson, …
Hardcover
(1)
Artificial Intelligence for Neurological…
Ajith Abraham, Sujata Dash, …
Paperback
R3,925
Discovery Miles 39 250
|