![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
Whether you currently work in marketing or looking for a role in the industry, this book will teach you the fundamental basics of digital marketing and prepare you for the parts that nobody talks about. From getting to grips with SEO to practical tips on what to expect from a role in marketing, this guide should be all you need to put you on your path to digital success - without the jargon and ego. Lizzie Benton is a content marketer who has experience in climbing the marketing ladder. As a passionate advocate of the digital marketing industry, Lizzie has spoken at a number of business events, colleges and universities sharing her knowledge.
Step up your presentation skills with our 6-page laminated guide, focusing on graphic features, animation, audio and a variety of ways presentations can be formatted and distributed. Joan Lambert, author of multiple books on the Microsoft Office Suite, creator of many Lynda.com videos and an experienced corporate trainer used her experience and knowledge to cover the most relevant functions for users at different levels. Also look for the "PowerPoint 2016" QuickStudy for more general coverage of software use, then use the pair to become a power user that can create presentations that "wow". Suggested uses: Workplace -- flat for easy storage and access at a moments notice to find a function you need to use, or to jog your memory for a function you do not use often; Company Training -- reduce help-desk calls and keep productivity flowing for a team or for your entire company; Students/Teachers/Parents -- help with the learning curve in a classroom or for your child and any projects requiring PowerPoint; College Professors/Students -- give polished presentations to your classes that give your hard work the look it deserves.
Oxford Coding and Robotics
Novice Level 1, in partnership with Resolute Education, comprises a
Workbook and Teacher’s Guide, for use together with the Novice Bot
Kit. The Level 1 Workbook introduces learners to the basics of logic
and coding, how computers work and store data, and applying
computational thinking skills.
Passwords are not enough A password is a single authentication factor - anyone who has it can use it. No matter how strong it is, if it's lost or stolen, it's entirely useless at keeping information private. To secure your data properly, you also need to use a separate, secondary authentication factor. Data breaches are now commonplace In recent years, large-scale data breaches have increased dramatically in both severity and number, and the loss of personal information - including password data - has become commonplace. Furthermore, the fact that rapidly evolving password-cracking technology and the habitual use - and reuse - of weak passwords has rendered the security of username and password combinations negligible, and you have a very strong argument for more robust identity authentication. Consumers are beginning to realise just how exposed their personal and financial information is, and are demanding better security from the organisations that collect, process and store it. This has led to a rise in the adoption of two-factor authentication (TFA or 2FA). In the field of authentication security, the method of proving identity can be broken down into three characteristics - roughly summarised as 'what you have', 'what you are' and 'what you know'. Two-factor authentication relies on the combination of two of these factors. Product overview TFA is nothing new. It's mandated by requirement 8.3 of the Payment Card Industry Data Security Standard (PCI DSS) and banks have been using it for years, combining payment cards ('what you have') and PINs ('what you know'). If you use online banking you'll probably also have a chip authentication programme (CAP) keypad, which generates a one-time password (OTP). What is new is TFA's rising adoption beyond the financial sector. Two-Factor Authentication provides a comprehensive evaluation of popular secondary authentication methods, such as: Hardware-based OTP generation SMS-based OTP delivery Phone call-based mechanisms Geolocation-aware authentication Push notification-based authentication Biometric authentication factors Smart card verification As well as examining MFA (multi-factor authentication), 2SV (two-step verification) and strong authentication (authentication that goes beyond passwords, using security questions or layered security), the book also discusses the wider application of TFA for the average consumer, for example at such organisations as Google, Amazon and Facebook. It also considers the future of multi-factor authentication, including its application to the Internet of Things (IoT). Increasing your password strength will do absolutely nothing to protect you from online hacking, phishing attacks or corporate data breaches. If you're concerned about the security of your personal and financial data, you need to read this book. About the author Mark Stanislav is an information technology professional with over a decade's varied experience in systems administration, web application development and information security. He is currently a senior security consultant for the Strategic Services team at Rapid7. Mark has spoken internationally at nearly 100 events, including RSA, DEF CON, SecTor, SOURCE Boston, ShmooCon and THOTCON. News outlets such as the Wall Street Journal, Al Jazeera America, Fox Business, MarketWatch, CNN Money, Yahoo Finance, Marketplace and The Register have featured Mark's research, initiatives and insights on information security.
“the bird is freed”
A gripping look at the rise of the microchip and the British tech company caught in the middle of the global battle for dominance. One tiny device lies at the heart of the world's relentless technological advance: the microchip. Today, these slivers of silicon are essential to running just about any machine, from household devices and factory production lines to smartphones and cutting-edge weaponry. At the centre of billions of these chips is a blueprint created and nurtured by a single company: Arm. Founded in Cambridge in 1990, Arm's designs have been used an astonishing 250 billion times and counting. The UK's high-tech crown jewel is an indispensable part of a global supply chain driven by American brains and Asian manufacturing brawn that has become the source of rising geopolitical tension. With exclusive interviews and exhaustive research, The Everything Blueprint tells the story of Arm, from humble beginnings to its pivotal role in the mobile phone revolution and now supplying data centres, cars and the supercomputers that harness artificial intelligence. It explores the company's enduring relationship with Apple and numerous other tech titans, plus its multi-billion-pound sale to the one-time richest man in the world, Japan's Masayoshi Son. The Everything Blueprint details the titanic power struggle for control of the microchip, through the eyes of a unique British enterprise that has found itself in the middle of that battle.
The recent activism film Just Do It (2011) had a message: 'Get off your arse and change the world'. But, as Michael Norton here implores, no-one has to be that energetic. Click2Change advocates sitting back and changing the world from computers, iPads and iPhones. Click2Change offers a wide range of world-changing thing to do on the internet: such as becoming an e-activist or recycling unwanted stuff. With plenty of ideas, information and lots of websites to access, readers will be able to make their mark on the world with a click of the mouse.
Today's "machine-learning" systems, trained by data, are so effective that we've invited them to see and hear for us-and to make decisions on our behalf. But alarm bells are ringing. Recent years have seen an eruption of concern as the field of machine learning advances. When the systems we attempt to teach will not, in the end, do what we want or what we expect, ethical and potentially existential risks emerge. Researchers call this the alignment problem. Systems cull resumes until, years later, we discover that they have inherent gender biases. Algorithms decide bail and parole-and appear to assess Black and White defendants differently. We can no longer assume that our mortgage application, or even our medical tests, will be seen by human eyes. And as autonomous vehicles share our streets, we are increasingly putting our lives in their hands. The mathematical and computational models driving these changes range in complexity from something that can fit on a spreadsheet to a complex system that might credibly be called "artificial intelligence." They are steadily replacing both human judgment and explicitly programmed software. In best-selling author Brian Christian's riveting account, we meet the alignment problem's "first-responders," and learn their ambitious plan to solve it before our hands are completely off the wheel. In a masterful blend of history and on-the ground reporting, Christian traces the explosive growth in the field of machine learning and surveys its current, sprawling frontier. Readers encounter a discipline finding its legs amid exhilarating and sometimes terrifying progress. Whether they-and we-succeed or fail in solving the alignment problem will be a defining human story. The Alignment Problem offers an unflinching reckoning with humanity's biases and blind spots, our own unstated assumptions and often contradictory goals. A dazzlingly interdisciplinary work, it takes a hard look not only at our technology but at our culture-and finds a story by turns harrowing and hopeful.
Helping you quickly get up to speed, THE SHELLY CASHMAN SERIES (R) MICROSOFT (R) OFFICE 365 (R) & EXCEL (R) 2021 COMPREHENSIVE 1st edition, includes the latest on Microsoft 365 and Office 2021 features along with enhanced support for Mac users. Its trademark step-by-step, screen-by-screen, project-based approach enables you to expand your understanding of Office applications through hands-on experimentation and critical thinking. Module Learning Objectives are mapped to Microsoft Office Specialist (MOS) certification objectives, reinforcing the critical skills needed for college and career success. Other Ways boxes reveal alternate click paths to achieve a step, while BTW call-outs offer helpful hints as you work through your projects so you can make the most of Microsoft Office tools. In addition, MindTap and SAM (Skills Assessment Manager) online resources help maximize your study time -- and results.
There is now a plethora of internet of things (IoT) devices on the market that can connect to the internet and the desired environment to produce sufficient and reliable data that is required by the government administration for a variety of purposes. Additionally, the potential benefits of incorporating artificial intelligence (AI) and machine learning into governance are numerous. Governments can use AI and machine learning to enforce the law, detect fraud, and monitor urban areas by identifying problems before they occur. The government can also use AI to easily automate processes and replace mundane and repetitive tasks. AI, IoT, and Blockchain Breakthroughs in E-Governance defines and emphasizes various AI algorithms as well as new internet of things and blockchain breakthroughs in the field of e-governance. Covering key topics such as machine learning, government, and artificial intelligence, this premier reference source is ideal for government officials, policymakers, researchers, academicians, practitioners, scholars, instructors, and students.
Using a step-by-step, highly visual approach, Andrews/Dark Shelton/Pierce's bestselling COMPTIA A+ GUIDE TO IT TECHNICAL SUPPORT, 11th edition, teaches you how to work with users as well as install, maintain, troubleshoot and network computer hardware and software. Ensuring you are well prepared for 220-1101 and 220-1102 certification exams, each module covers core and advanced topics while emphasizing practical application of the most current technology, techniques and industry standards. You will study the latest hardware, security, Active Directory, operational procedures, basics of scripting, virtualization, cloud computing, mobile devices, Windows 10, macOS and Linux. Digital lab manuals, live virtual machine labs, simulations, auto-graded quizzes and interactive activities provide additional preparation for the certification exam -- and your role as an IT support technician or administrator.
Cybercrime is on the rise, and it is becoming easier and easier for criminals to steal your personal information. Toolkits to create viruses, spyware, and other forms of malware are now readily available to anyone wishing to defraud and do damage, and you could be leaving yourself open to attack. It is estimated that standard computer-based defence systems catch only 25% of malware attacks. Do you know the risks you're running online? Are you protected? An Introduction to Hacking and Crimeware answers your concerns and provides a foundation-level overview of the dark world of cybercrime. Know your enemy An Introduction to Hacking and Crimeware is a comprehensive pocket guide to more serious online threats. Knowledge of these threats will help you understand how to ensure that your computer systems are protected and make sure that your business is safe, enabling you to focus on your core activities without fear of attack. Fight back In this pocket guide, the author: *Identifies terms and defines exactly what crimeware is, both intentional and unintentional; *Gives specific, up-to-date examples to help you identify the risks so that you can protect your business; *Explores the increasing use of commercial off-the-shelf (COTS) hacking tools, exposing the enemy's tactics; *Gives practical suggestions of active defence, so you can fight back; *Provides a valuable list of up-to-date, authoritative sources of information, so you can stay abreast of new developments and safeguard your business. An Introduction to Hacking And Crimeware will equip you with the vital information you need to deal with the threats presented by hacking and crimeware in all their many forms, safeguard your online information, and potentially save you and your business from very real danger.
You ve just purchased a TI-83 Plus calculator to assist in performing different types of mathematical equations now, how can you get the most out of it? You ll find the answer to this question with our comprehensive, 3-panel guide that shows in great detail what exactly the TI-83 Plus can do. Function key and mode descriptions, as well as problem-solving examples, are included within a color-coded format for easy reference. "
Computational experiments on algorithms can supplement theoretical analysis by showing what algorithms, implementations, and speed-up methods work best for specific machines or problems. This book guides the reader through the nuts and bolts of the major experimental questions: What should I measure? What inputs should I test? How do I analyze the data? To answer these questions the book draws on ideas from algorithm design and analysis, computer systems, and statistics and data analysis. The wide-ranging discussion includes a tutorial on system clocks and CPU timers, a survey of strategies for tuning algorithms and data structures, a cookbook of methods for generating random combinatorial inputs, and a demonstration of variance reduction techniques. Numerous case studies and examples show how to apply these concepts. All the necessary concepts in computer architecture and data analysis are covered so that the book can be used by anyone who has taken a course or two in data structures and algorithms. A companion website, AlgLab (www.cs.amherst.edu/alglab) contains downloadable files, programs, and tools for use in experimental projects.
Discover how artificial intelligence thinks and reasons, and how we can make the most of their super-human abilities, in the must read new book from the prize-winning technology writer and author of The Dark Net and The People vs Tech. Knowing how to speak to AI – and how not to – is a skill that everyone now needs. Hundreds of millions of people now talk to AI, such as ChatGPT, every day. They organise their finances and holidays, ask advice, seek therapy and find love – via machines. Almost overnight, chatbots are transforming society, politics and business. This is one of the biggest and fastest technological changes in history. However, most people still don't really understand how AI works, how to make the most of it – or what the dangers are. As some people use it to turbo-charge their productivity at work, others are falling into dangerous conspiracies, delusions and psychosis. In How to Talk to AI, award-winning technology writer Jamie Bartlett takes you inside the machine: showing how we can stay in control of our powerful new companions, even as they are changing the way we live, feel, and think. Written in his accessible style, How to Talk to AI is the essential and empowering guide to help you understand how to make the most of these incredible new technologies, without succumbing to new powers of manipulation and control.
Host of public television's Mark Kistler's Imagination Station, shows young artists the cool and fun way to draw in 3-D! Hey, you! Open this book and learn how to draw in three dimensions! Mark Kistler's Imagination Station has thirty-six exciting drawing adventures. Mark teaches you the different skills you need in order to create such masterpieces as: * Dinosaurs in the Sky There's also a special guide for parents and teachers at the end of the book.
The new fifth edition of Principles of Business Information Systems features new cases, new questions and assignments and the latest technologies, whilst retaining its comprehensive coverage of Information Systems issues. It also boasts a wealth of real-world examples from a broad range of countries and updated coverage of IT and technological issues, making it perfect for courses that prepare students for the modern corporate world.
ISO/IEC 27001:2005 is an international standard for information security management systems (ISMSs). Closely allied to ISO/IEC 27002:2005 (which used to be known as ISO17799), this standard (sometimes called the ISMS standard) can help organisations meet all their information-related regulatory compliance objectives and can help them prepare and position themselves for new and emerging regulations. Information is the lifeblood of today s organis-ation and, therefore, ensuring that information is simultaneously protected and available to those who need it is essential to modern business operations. Information systems are not usually designed from the outset to be secure. Technical security measures and checklists are limited in their ability to protect a complete information system. Management systems and procedural controls are essential components of any really secure information system and, to be effective, need careful planning and attention to detail. ISO/IEC 27001 provides the specification for an information security management system and, in the related Code of Practice, ISO/IEC 27002, it draws on the knowledge of a group of experienced information security practitioners in a wide range of significant organisations across more than 40 countries to set out best practice in information security. An ISO27001-compliant system will provide a systematic approach to ensuring the availability, confidentiality and integrity of corporate information. The controls of ISO27001 are based on identifying and combating the entire range of potential risks to the organisation s information assets. This helpful, handy ISO27001/ISO27002 pocket guide gives a useful overview of these two important information security standards. Key features include: The ISO/IEC 27000 Family of Information Security Standards Background to the Standards Specification vs Code of Practice Certification process The ISMS and ISO27001 Overview of ISO/IEC 27001:2005 Documentation & Records Management Responsibility Policy & Scope Risk Assessment Implementation
This fully updated study guide covers every topic on the current version of the CompTIA Security+ exam Get complete coverage of all objectives included on the CompTIA Security+ exam SY0-601 from this comprehensive resource. Written by a team of leading information security experts, this authoritative guide fully addresses the skills required to perform essential security functions and to secure hardware, systems, and software. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference. Covers all exam domains, including: Threats, Attacks, and Vulnerabilities Architecture and Design Implementation Operations and Incident Response Governance, Risk, and Compliance Online content includes: 250 practice exam questions Test engine that provides full-length practice exams and customizable quizzes by chapter or by exam domain
Improve Your Creativity, Effectiveness, and Ultimately, Your Code In Modern Software Engineering, continuous delivery pioneer David Farley helps software professionals think about their work more effectively, manage it more successfully, and genuinely improve the quality of their applications, their lives, and the lives of their colleagues. Writing for programmers, managers, and technical leads at all levels of experience, Farley illuminates durable principles at the heart of effective software development. He distills the discipline into two core exercises: learning and exploration and managing complexity. For each, he defines principles that can help you improve everything from your mindset to the quality of your code, and describes approaches proven to promote success. Farley's ideas and techniques cohere into a unified, scientific, and foundational approach to solving practical software development problems within realistic economic constraints. This general, durable, and pervasive approach to software engineering can help you solve problems you haven't encountered yet, using today's technologies and tomorrow's. It offers you deeper insight into what you do every day, helping you create better software, faster, with more pleasure and personal fulfillment. Clarify what you're trying to accomplish Choose your tools based on sensible criteria Organize work and systems to facilitate continuing incremental progress Evaluate your progress toward thriving systems, not just more "legacy code" Gain more value from experimentation and empiricism Stay in control as systems grow more complex Achieve rigor without too much rigidity Learn from history and experience Distinguish "good" new software development ideas from "bad" ones Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.
Stochastic processes have a wide range of applications ranging from image processing, neuroscience, bioinformatics, financial management, and statistics. Mathematical, physical, and engineering systems use stochastic processes for modeling and reasoning phenomena. While comparing AI-stochastic systems with other counterpart systems, we are able to understand their significance, thereby applying new techniques to obtain new real-time results and solutions. Stochastic Processes and Their Applications in Artificial Intelligence opens doors for artificial intelligence experts to use stochastic processes as an effective tool in real-world problems in computational biology, speech recognition, natural language processing, and reinforcement learning. Covering key topics such as social media, big data, and artificial intelligence models, this reference work is ideal for mathematicians, industry professionals, researchers, scholars, academicians, practitioners, instructors, and students. |
You may like...
The new Household Discoveries; an…
Sidney Levi 1874- Ed Morse
Hardcover
R1,276
Discovery Miles 12 760
Distributed Systems Architecture - A…
Arno Puder, Kay Roemer, …
Hardcover
R1,666
Discovery Miles 16 660
Social Sensing - Building Reliable…
Dong Wang, Tarek Abdelzaher, …
Paperback
R1,814
Discovery Miles 18 140
Free and Open Source Enterprise Resource…
Rogerio Atem De Carvalho, Bjoern Johansson
Hardcover
R4,895
Discovery Miles 48 950
Revolutionizing Business Practices…
Manisha Gupta, Deergha Sharma, …
Hardcover
R6,199
Discovery Miles 61 990
|