![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
Whether you currently work in marketing or looking for a role in the industry, this book will teach you the fundamental basics of digital marketing and prepare you for the parts that nobody talks about. From getting to grips with SEO to practical tips on what to expect from a role in marketing, this guide should be all you need to put you on your path to digital success - without the jargon and ego. Lizzie Benton is a content marketer who has experience in climbing the marketing ladder. As a passionate advocate of the digital marketing industry, Lizzie has spoken at a number of business events, colleges and universities sharing her knowledge.
The Future of Creative Work provides a unique overview of the changing nature of creative work, examining how digital developments and the rise of intangible capital are causing an upheaval in the social institutions of work. It offers a profound insight into how this technological and social evolution will affect creative professions. Expert international contributors explore how robotics, artificial intelligence, blockchain, global digital platforms and autonomous systems will shape the design, production and consumption of culture. Taking a multidisciplinary approach incorporating creative industries studies, business, education and economics, the book analyses the technological drivers of disruption in the world of creative work. Chapters reveal how these changes will create new axes of power and inequality in the global sphere of creative work, predicting that conventional creative professions will be challenged and different species of creative work will evolve as a result. By charting the impact of digital and technological developments, The Future of Creative Work challenges traditional views of creative work, careers and education. This book will be a valuable resource for students and researchers undertaking creative industries studies. Its discussion of the application of creative careers across the economy will also be beneficial for scholars and practitioners interested in business, economics, and advertising and marketing studies.
Recent breakthroughs in AI have not only increased demand for AI products, they've also lowered the barriers to entry for those who want to build AI products. The model-as-a-service approach has transformed AI from an esoteric discipline into a powerful development tool that anyone can use. Everyone, including those with minimal or no prior AI experience, can now leverage AI models to build applications. In this book, author Chip Huyen discusses AI engineering: the process of building applications with readily available foundation models. The book starts with an overview of AI engineering, explaining how it differs from traditional ML engineering and discussing the new AI stack. The more AI is used, the more opportunities there are for catastrophic failures, and therefore, the more important evaluation becomes. This book discusses different approaches to evaluating open-ended models, including the rapidly growing AI-as-a-judge approach. AI application developers will discover how to navigate the AI landscape, including models, datasets, evaluation benchmarks, and the seemingly infinite number of use cases and application patterns. You'll learn a framework for developing an AI application, starting with simple techniques and progressing toward more sophisticated methods, and discover how to efficiently deploy these applications. Features:
Chip Huyen works to accelerate data analytics on GPUs at Voltron Data. Previously, she was with Snorkel AI and NVIDIA, founded an AI infrastructure startup, and taught Machine Learning Systems Design at Stanford. She's the author of the book Designing Machine Learning Systems, an Amazon bestseller in AI.
The Destiny Comic Collection Vol. One is an essential collection of comic stories for Destiny fans. This 144 page volume includes Bungie's comic collection plus never before seen stories, behind the scenes galleries, and exclusive content from featured artists! From Osiris's exile to Ana Bray's homecoming on Mars, uncover the legends behind Destiny 2's iconic characters. Featuring stories written and illustrated in collaboration with Bungie by Ryan North (Dinosaur Comics, Marvel's The Unbeatable Squirrel Girl), Kris Anka (Marvel's X-Men and Star-Lord), Mark Waid (DC Comics' The Flash and Marvel's Captain America) plus a special introduction by Gerry Duggan (Marvel's Deadpool).
Oxford Coding and Robotics
Novice Level 1, in partnership with Resolute Education, comprises a
Workbook and Teacher’s Guide, for use together with the Novice Bot
Kit. The Level 1 Workbook introduces learners to the basics of logic
and coding, how computers work and store data, and applying
computational thinking skills.
A step-by-step guide to working with programs that exploit quantum computing principles with the help of IBM Quantum, Qiskit, and Python Key Features * Understand the difference between classical computers and quantum computers * Work with key quantum computational principles such as superposition and entanglement and see how they are leveraged on IBM Quantum systems * Run your own quantum experiments and applications by integrating with Qiskit and Python Book Description IBM Quantum Lab is a platform that enables developers to learn the basics of quantum computing by allowing them to run experiments on a quantum computing simulator and on several real quantum computers. Updated with new examples and changes to the platform, this edition begins with an introduction to the IBM Quantum dashboard and Quantum Information Science Kit (Qiskit) SDK. You will get well versed with the IBM Quantum Composer interface as well as the IBM Quantum Lab. You will learn the differences between the various available quantum computers and simulators. Along the way, you'll learn some of the fundamental principles of quantum mechanics, quantum circuits, qubits, and the gates that are used to perform operations on each qubit. As you build on your knowledge, you'll understand the functionality of IBM Quantum and the developer-focused resources it offers to address key concerns like noise, decoherence, and affinity within a quantum system. You'll learn how to monitor and optimize your quantum circuits. Lastly, you'll look at the fundamental quantum algorithms and understand how they can be applied effectively. By the end of this quantum computing book, you'll know how to build quantum programs on your own and will have gained practical understanding of quantum computation skills that you can apply to your business. What you will learn * Get familiar with the contents and layout of IBM Quantum Lab * Create and visualize quantum circuits * Understand quantum gates and visualize how they operate on qubits using the IBM Quantum Composer * Save, import, and leverage existing circuits with the IBM Quantum Lab * Discover Qiskit and its latest modules for model, algorithm, and kernel developers * Get to grips with fundamental quantum algorithms such as Deutsch-Jozsa, Grover's algorithm, and Shor's algorithm Who This Book Is For This book is for Python developers who are looking to learn quantum computing from the ground up and put their knowledge to use in practical situations with the help of the IBM Quantum platform and Qiskit. Some background in computer science and high-school-level physics and math is required.
This thoroughly revised and expanded second edition of IT Contracts and Dispute Management provides an in-depth analysis of the legal issues that could potentially arise within each critical stage of a technology project. The authors draw on their extensive practical experience of advising and litigating in this evolving field, and have produced a work that is both authoritative and pragmatic. Key Features: Discussion of recent judicial decision of relational contracts, and the Supreme Court’s judgment on ‘no oral modification’ clauses and their applicability to change control procedures Updated information to account for the new High Court rules on disclosure Guidance on how to manage frequently occurring issues, such as delayed delivery Examination of important methods of project resuscitation when experiencing difficulty, as well as potential end of project issues This informative book will be a hugely valuable resource for lawyers in private practice who are advising clients striving to avoid or resolve disputes occurring from IT projects. It will also be beneficial for in-house legal counsel who advise clients at each stage of IT projects.
Naomi Klein, author of era-defining bestsellers, The Shock Doctrine,
This Changes Everything and No Logo, is back with her most compulsive
and personal book yet: a revelatory journey into the mirror world of
our polarised age
Passwords are not enough A password is a single authentication factor - anyone who has it can use it. No matter how strong it is, if it's lost or stolen, it's entirely useless at keeping information private. To secure your data properly, you also need to use a separate, secondary authentication factor. Data breaches are now commonplace In recent years, large-scale data breaches have increased dramatically in both severity and number, and the loss of personal information - including password data - has become commonplace. Furthermore, the fact that rapidly evolving password-cracking technology and the habitual use - and reuse - of weak passwords has rendered the security of username and password combinations negligible, and you have a very strong argument for more robust identity authentication. Consumers are beginning to realise just how exposed their personal and financial information is, and are demanding better security from the organisations that collect, process and store it. This has led to a rise in the adoption of two-factor authentication (TFA or 2FA). In the field of authentication security, the method of proving identity can be broken down into three characteristics - roughly summarised as 'what you have', 'what you are' and 'what you know'. Two-factor authentication relies on the combination of two of these factors. Product overview TFA is nothing new. It's mandated by requirement 8.3 of the Payment Card Industry Data Security Standard (PCI DSS) and banks have been using it for years, combining payment cards ('what you have') and PINs ('what you know'). If you use online banking you'll probably also have a chip authentication programme (CAP) keypad, which generates a one-time password (OTP). What is new is TFA's rising adoption beyond the financial sector. Two-Factor Authentication provides a comprehensive evaluation of popular secondary authentication methods, such as: Hardware-based OTP generation SMS-based OTP delivery Phone call-based mechanisms Geolocation-aware authentication Push notification-based authentication Biometric authentication factors Smart card verification As well as examining MFA (multi-factor authentication), 2SV (two-step verification) and strong authentication (authentication that goes beyond passwords, using security questions or layered security), the book also discusses the wider application of TFA for the average consumer, for example at such organisations as Google, Amazon and Facebook. It also considers the future of multi-factor authentication, including its application to the Internet of Things (IoT). Increasing your password strength will do absolutely nothing to protect you from online hacking, phishing attacks or corporate data breaches. If you're concerned about the security of your personal and financial data, you need to read this book. About the author Mark Stanislav is an information technology professional with over a decade's varied experience in systems administration, web application development and information security. He is currently a senior security consultant for the Strategic Services team at Rapid7. Mark has spoken internationally at nearly 100 events, including RSA, DEF CON, SecTor, SOURCE Boston, ShmooCon and THOTCON. News outlets such as the Wall Street Journal, Al Jazeera America, Fox Business, MarketWatch, CNN Money, Yahoo Finance, Marketplace and The Register have featured Mark's research, initiatives and insights on information security.
Combining clear labelled imagery with easy-to-understand text, this new
edition of Simply Artificial Intelligence is the perfect introduction
to the latest developments in AI, including ChatGPT and the Internet of
Things.
Using a step-by-step, highly visual approach, Andrews/Dark Shelton/Pierce's bestselling COMPTIA A+ GUIDE TO IT TECHNICAL SUPPORT, 11th edition, teaches you how to work with users as well as install, maintain, troubleshoot and network computer hardware and software. Ensuring you are well prepared for 220-1101 and 220-1102 certification exams, each module covers core and advanced topics while emphasizing practical application of the most current technology, techniques and industry standards. You will study the latest hardware, security, Active Directory, operational procedures, basics of scripting, virtualization, cloud computing, mobile devices, Windows 10, macOS and Linux. Digital lab manuals, live virtual machine labs, simulations, auto-graded quizzes and interactive activities provide additional preparation for the certification exam -- and your role as an IT support technician or administrator.
A gripping look at the rise of the microchip and the British tech company caught in the middle of the global battle for dominance. One tiny device lies at the heart of the world's relentless technological advance: the microchip. Today, these slivers of silicon are essential to running just about any machine, from household devices and factory production lines to smartphones and cutting-edge weaponry. At the centre of billions of these chips is a blueprint created and nurtured by a single company: Arm. Founded in Cambridge in 1990, Arm's designs have been used an astonishing 250 billion times and counting. The UK's high-tech crown jewel is an indispensable part of a global supply chain driven by American brains and Asian manufacturing brawn that has become the source of rising geopolitical tension. With exclusive interviews and exhaustive research, The Everything Blueprint tells the story of Arm, from humble beginnings to its pivotal role in the mobile phone revolution and now supplying data centres, cars and the supercomputers that harness artificial intelligence. It explores the company's enduring relationship with Apple and numerous other tech titans, plus its multi-billion-pound sale to the one-time richest man in the world, Japan's Masayoshi Son. The Everything Blueprint details the titanic power struggle for control of the microchip, through the eyes of a unique British enterprise that has found itself in the middle of that battle.
The recent activism film Just Do It (2011) had a message: 'Get off your arse and change the world'. But, as Michael Norton here implores, no-one has to be that energetic. Click2Change advocates sitting back and changing the world from computers, iPads and iPhones. Click2Change offers a wide range of world-changing thing to do on the internet: such as becoming an e-activist or recycling unwanted stuff. With plenty of ideas, information and lots of websites to access, readers will be able to make their mark on the world with a click of the mouse.
Cybercrime is on the rise, and it is becoming easier and easier for criminals to steal your personal information. Toolkits to create viruses, spyware, and other forms of malware are now readily available to anyone wishing to defraud and do damage, and you could be leaving yourself open to attack. It is estimated that standard computer-based defence systems catch only 25% of malware attacks. Do you know the risks you're running online? Are you protected? An Introduction to Hacking and Crimeware answers your concerns and provides a foundation-level overview of the dark world of cybercrime. Know your enemy An Introduction to Hacking and Crimeware is a comprehensive pocket guide to more serious online threats. Knowledge of these threats will help you understand how to ensure that your computer systems are protected and make sure that your business is safe, enabling you to focus on your core activities without fear of attack. Fight back In this pocket guide, the author: *Identifies terms and defines exactly what crimeware is, both intentional and unintentional; *Gives specific, up-to-date examples to help you identify the risks so that you can protect your business; *Explores the increasing use of commercial off-the-shelf (COTS) hacking tools, exposing the enemy's tactics; *Gives practical suggestions of active defence, so you can fight back; *Provides a valuable list of up-to-date, authoritative sources of information, so you can stay abreast of new developments and safeguard your business. An Introduction to Hacking And Crimeware will equip you with the vital information you need to deal with the threats presented by hacking and crimeware in all their many forms, safeguard your online information, and potentially save you and your business from very real danger.
Autonomous systems are on the frontiers of Artificial Intelligence (AI) research, and they are slowly finding their business applications. Driven mostly by Reinforcement Learning (RL) methods (one of the most difficult, but also the most promising modern AI algorithms), autonomous systems help create self-learning and self-optimising systems, ranging from simple game-playing agents to robots able to efficiently act in completely new environments. Based on in-depth study of more than 100 projects, Andrzej Wodecki explores RL as a key component of modern digital technologies, its real-life applications to activities in a value chain and the ways in which it impacts different industries. Artificial Intelligence in Management will help project leaders, decision makers and investors evaluate new autonomous projects and will serve as an inspiring guide for future research.
The Future of Copyright in the Age of Artificial Intelligence offers an extensive analysis of intellectual property and authorship theories and explores the possible impact artificial intelligence might have on those theories. The author makes compelling arguments via the exploration of authorship, ownership and artificial intelligence. First, the book advocates for a more holistic approach to authorship, arguing that there is no good reason to exclude computer-generated and artificial intelligence creations from copyright. Second, it conducts an open search for the right 'candidate' for ownership. In doing so, the book explores several possible legal frameworks, including assigning ownership to the programmer, the user, the AI itself and other alternatives such as the public domain or author-in-law approaches. Third, the book explores the concept of artificial intelligence as it has developed through the years in various fields, seeking to reframe the AI legal concept. For academic scholars and law students these pages frame the theoretical discussion about artificial intelligence creations and provide in depth discussion about artificial intelligence legal challenges.
This comprehensive book provides a detailed survey and practical examination of a wide range of legal and regulatory topics in HealthTech. Combining the insights of leading healthcare experts from around the world, chapters first examine the key characteristics, use cases and regulation in the field, before turning to the development and potential applications of cutting-edge technologies in healthcare. The book also addresses the main issues involved in setting up and running a HealthTech business, highlighting the vital role this will play in developing the technologies and skill sets required for the future of the sector. Key features include: analysis of the impact of emerging innovations on the accessibility, efficiency and quality of healthcare and its effects on healthcare providers examination of artificial intelligence, blockchain and digital identity applications in healthcare, alongside associated regulatory challenges guidance on the financial requirements of healthcare start-ups at different stages of growth and various collaboration and partnership models in the HealthTech market discussion of the major regulatory questions affecting the HealthTech industry, from data protection, public procurement and product liability, to the regulation of medical devices, intellectual property and advertising. HealthTech: Law and Regulation will be an invaluable resource for both in-house lawyers in the healthcare and pharmaceutical sectors, as well as those working for law firms practising in these areas. It will also be of interest to academics and students teaching or researching in healthcare law.
You ve just purchased a TI-83 Plus calculator to assist in performing different types of mathematical equations now, how can you get the most out of it? You ll find the answer to this question with our comprehensive, 3-panel guide that shows in great detail what exactly the TI-83 Plus can do. Function key and mode descriptions, as well as problem-solving examples, are included within a color-coded format for easy reference. "
|
You may like...
Leadership In Health Services Management
Karien Jooste, Siedine Coetzee
Paperback
Innovations in Power Systems Reliability
George Anders, Alfredo Vaccaro
Hardcover
R4,212
Discovery Miles 42 120
The Oxford Handbook of The American…
Raymond Knapp, Mitchell Morris, …
Hardcover
R5,411
Discovery Miles 54 110
Harry Potter: A Pop-Up Guide To Hogwarts
Matthew Reinhart
Hardcover
Formal Languages and Compilation
Stefano Crespi Reghizzi, Luca Breveglieri, …
Hardcover
R2,513
Discovery Miles 25 130
|