![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
Whether you currently work in marketing or looking for a role in the industry, this book will teach you the fundamental basics of digital marketing and prepare you for the parts that nobody talks about. From getting to grips with SEO to practical tips on what to expect from a role in marketing, this guide should be all you need to put you on your path to digital success - without the jargon and ego. Lizzie Benton is a content marketer who has experience in climbing the marketing ladder. As a passionate advocate of the digital marketing industry, Lizzie has spoken at a number of business events, colleges and universities sharing her knowledge.
Oxford Coding and Robotics
Novice Level 1, in partnership with Resolute Education, comprises a
Workbook and Teacher’s Guide, for use together with the Novice Bot
Kit. The Level 1 Workbook introduces learners to the basics of logic
and coding, how computers work and store data, and applying
computational thinking skills.
The Destiny Comic Collection Vol. One is an essential collection of comic stories for Destiny fans. This 144 page volume includes Bungie's comic collection plus never before seen stories, behind the scenes galleries, and exclusive content from featured artists! From Osiris's exile to Ana Bray's homecoming on Mars, uncover the legends behind Destiny 2's iconic characters. Featuring stories written and illustrated in collaboration with Bungie by Ryan North (Dinosaur Comics, Marvel's The Unbeatable Squirrel Girl), Kris Anka (Marvel's X-Men and Star-Lord), Mark Waid (DC Comics' The Flash and Marvel's Captain America) plus a special introduction by Gerry Duggan (Marvel's Deadpool).
A step-by-step guide to working with programs that exploit quantum computing principles with the help of IBM Quantum, Qiskit, and Python Key Features * Understand the difference between classical computers and quantum computers * Work with key quantum computational principles such as superposition and entanglement and see how they are leveraged on IBM Quantum systems * Run your own quantum experiments and applications by integrating with Qiskit and Python Book Description IBM Quantum Lab is a platform that enables developers to learn the basics of quantum computing by allowing them to run experiments on a quantum computing simulator and on several real quantum computers. Updated with new examples and changes to the platform, this edition begins with an introduction to the IBM Quantum dashboard and Quantum Information Science Kit (Qiskit) SDK. You will get well versed with the IBM Quantum Composer interface as well as the IBM Quantum Lab. You will learn the differences between the various available quantum computers and simulators. Along the way, you'll learn some of the fundamental principles of quantum mechanics, quantum circuits, qubits, and the gates that are used to perform operations on each qubit. As you build on your knowledge, you'll understand the functionality of IBM Quantum and the developer-focused resources it offers to address key concerns like noise, decoherence, and affinity within a quantum system. You'll learn how to monitor and optimize your quantum circuits. Lastly, you'll look at the fundamental quantum algorithms and understand how they can be applied effectively. By the end of this quantum computing book, you'll know how to build quantum programs on your own and will have gained practical understanding of quantum computation skills that you can apply to your business. What you will learn * Get familiar with the contents and layout of IBM Quantum Lab * Create and visualize quantum circuits * Understand quantum gates and visualize how they operate on qubits using the IBM Quantum Composer * Save, import, and leverage existing circuits with the IBM Quantum Lab * Discover Qiskit and its latest modules for model, algorithm, and kernel developers * Get to grips with fundamental quantum algorithms such as Deutsch-Jozsa, Grover's algorithm, and Shor's algorithm Who This Book Is For This book is for Python developers who are looking to learn quantum computing from the ground up and put their knowledge to use in practical situations with the help of the IBM Quantum platform and Qiskit. Some background in computer science and high-school-level physics and math is required.
Passwords are not enough A password is a single authentication factor - anyone who has it can use it. No matter how strong it is, if it's lost or stolen, it's entirely useless at keeping information private. To secure your data properly, you also need to use a separate, secondary authentication factor. Data breaches are now commonplace In recent years, large-scale data breaches have increased dramatically in both severity and number, and the loss of personal information - including password data - has become commonplace. Furthermore, the fact that rapidly evolving password-cracking technology and the habitual use - and reuse - of weak passwords has rendered the security of username and password combinations negligible, and you have a very strong argument for more robust identity authentication. Consumers are beginning to realise just how exposed their personal and financial information is, and are demanding better security from the organisations that collect, process and store it. This has led to a rise in the adoption of two-factor authentication (TFA or 2FA). In the field of authentication security, the method of proving identity can be broken down into three characteristics - roughly summarised as 'what you have', 'what you are' and 'what you know'. Two-factor authentication relies on the combination of two of these factors. Product overview TFA is nothing new. It's mandated by requirement 8.3 of the Payment Card Industry Data Security Standard (PCI DSS) and banks have been using it for years, combining payment cards ('what you have') and PINs ('what you know'). If you use online banking you'll probably also have a chip authentication programme (CAP) keypad, which generates a one-time password (OTP). What is new is TFA's rising adoption beyond the financial sector. Two-Factor Authentication provides a comprehensive evaluation of popular secondary authentication methods, such as: Hardware-based OTP generation SMS-based OTP delivery Phone call-based mechanisms Geolocation-aware authentication Push notification-based authentication Biometric authentication factors Smart card verification As well as examining MFA (multi-factor authentication), 2SV (two-step verification) and strong authentication (authentication that goes beyond passwords, using security questions or layered security), the book also discusses the wider application of TFA for the average consumer, for example at such organisations as Google, Amazon and Facebook. It also considers the future of multi-factor authentication, including its application to the Internet of Things (IoT). Increasing your password strength will do absolutely nothing to protect you from online hacking, phishing attacks or corporate data breaches. If you're concerned about the security of your personal and financial data, you need to read this book. About the author Mark Stanislav is an information technology professional with over a decade's varied experience in systems administration, web application development and information security. He is currently a senior security consultant for the Strategic Services team at Rapid7. Mark has spoken internationally at nearly 100 events, including RSA, DEF CON, SecTor, SOURCE Boston, ShmooCon and THOTCON. News outlets such as the Wall Street Journal, Al Jazeera America, Fox Business, MarketWatch, CNN Money, Yahoo Finance, Marketplace and The Register have featured Mark's research, initiatives and insights on information security.
Translated around the world, and recommended reading on many coaching programmes this bestselling book is trusted globally as the definitive guide to coaching. This carefully revised edition will guide you through the entire process from first meeting to when coaching ends, with methods, tips and techniques that simply work. Understand and develop the core skills and beliefs of an effective coach Know how to ask insightful questions that deliver valuable answers Gain practical help to plan coaching assignments that accelerate and improve your results Adeptly handle the main barriers to great coaching Feel fully confident in your ability to coach in any situation Whether you're new to coaching or already an experienced coach, you'll find clear guidance and principles to help you coach more effectively and with greater impact. To support you further The Coaching Manual has a range of free to download resources - templates, tools and checklists.
“the bird is freed”
A gripping look at the rise of the microchip and the British tech company caught in the middle of the global battle for dominance. One tiny device lies at the heart of the world's relentless technological advance: the microchip. Today, these slivers of silicon are essential to running just about any machine, from household devices and factory production lines to smartphones and cutting-edge weaponry. At the centre of billions of these chips is a blueprint created and nurtured by a single company: Arm. Founded in Cambridge in 1990, Arm's designs have been used an astonishing 250 billion times and counting. The UK's high-tech crown jewel is an indispensable part of a global supply chain driven by American brains and Asian manufacturing brawn that has become the source of rising geopolitical tension. With exclusive interviews and exhaustive research, The Everything Blueprint tells the story of Arm, from humble beginnings to its pivotal role in the mobile phone revolution and now supplying data centres, cars and the supercomputers that harness artificial intelligence. It explores the company's enduring relationship with Apple and numerous other tech titans, plus its multi-billion-pound sale to the one-time richest man in the world, Japan's Masayoshi Son. The Everything Blueprint details the titanic power struggle for control of the microchip, through the eyes of a unique British enterprise that has found itself in the middle of that battle.
The recent activism film Just Do It (2011) had a message: 'Get off your arse and change the world'. But, as Michael Norton here implores, no-one has to be that energetic. Click2Change advocates sitting back and changing the world from computers, iPads and iPhones. Click2Change offers a wide range of world-changing thing to do on the internet: such as becoming an e-activist or recycling unwanted stuff. With plenty of ideas, information and lots of websites to access, readers will be able to make their mark on the world with a click of the mouse.
Updated for Excel 2021 and based on the bestselling editions from previous versions, Excel 2021 / Microsoft 365 Programming by Example is a practical, how-to book on Excel programming, suitable for readers already proficient with the Excel user interface. If you are looking to automate Excel routine tasks, this book will progressively introduce you to programming concepts via numerous illustrated hands-on exercises. More advanced topics are demonstrated via custom projects. From recording and editing a macro and writing VBA code from scratch to programming the Ribbon interface and working with XML documents, this book takes you on a programming journey that will change the way you work with Excel. The book provides information on performing automatic operations on files, folders, and other Microsoft Office applications. It also covers proper use of event procedures, testing and debugging, and guides you through programming more advanced Excel features, such as working with VBA classes and raising your own events in standalone class modules. Includes companion files with source code, hands-on projects, and figures.
Using a step-by-step, highly visual approach, Andrews/Dark Shelton/Pierce's bestselling COMPTIA A+ GUIDE TO IT TECHNICAL SUPPORT, 11th edition, teaches you how to work with users as well as install, maintain, troubleshoot and network computer hardware and software. Ensuring you are well prepared for 220-1101 and 220-1102 certification exams, each module covers core and advanced topics while emphasizing practical application of the most current technology, techniques and industry standards. You will study the latest hardware, security, Active Directory, operational procedures, basics of scripting, virtualization, cloud computing, mobile devices, Windows 10, macOS and Linux. Digital lab manuals, live virtual machine labs, simulations, auto-graded quizzes and interactive activities provide additional preparation for the certification exam -- and your role as an IT support technician or administrator.
There is now a plethora of internet of things (IoT) devices on the market that can connect to the internet and the desired environment to produce sufficient and reliable data that is required by the government administration for a variety of purposes. Additionally, the potential benefits of incorporating artificial intelligence (AI) and machine learning into governance are numerous. Governments can use AI and machine learning to enforce the law, detect fraud, and monitor urban areas by identifying problems before they occur. The government can also use AI to easily automate processes and replace mundane and repetitive tasks. AI, IoT, and Blockchain Breakthroughs in E-Governance defines and emphasizes various AI algorithms as well as new internet of things and blockchain breakthroughs in the field of e-governance. Covering key topics such as machine learning, government, and artificial intelligence, this premier reference source is ideal for government officials, policymakers, researchers, academicians, practitioners, scholars, instructors, and students.
Cybercrime is on the rise, and it is becoming easier and easier for criminals to steal your personal information. Toolkits to create viruses, spyware, and other forms of malware are now readily available to anyone wishing to defraud and do damage, and you could be leaving yourself open to attack. It is estimated that standard computer-based defence systems catch only 25% of malware attacks. Do you know the risks you're running online? Are you protected? An Introduction to Hacking and Crimeware answers your concerns and provides a foundation-level overview of the dark world of cybercrime. Know your enemy An Introduction to Hacking and Crimeware is a comprehensive pocket guide to more serious online threats. Knowledge of these threats will help you understand how to ensure that your computer systems are protected and make sure that your business is safe, enabling you to focus on your core activities without fear of attack. Fight back In this pocket guide, the author: *Identifies terms and defines exactly what crimeware is, both intentional and unintentional; *Gives specific, up-to-date examples to help you identify the risks so that you can protect your business; *Explores the increasing use of commercial off-the-shelf (COTS) hacking tools, exposing the enemy's tactics; *Gives practical suggestions of active defence, so you can fight back; *Provides a valuable list of up-to-date, authoritative sources of information, so you can stay abreast of new developments and safeguard your business. An Introduction to Hacking And Crimeware will equip you with the vital information you need to deal with the threats presented by hacking and crimeware in all their many forms, safeguard your online information, and potentially save you and your business from very real danger.
You ve just purchased a TI-83 Plus calculator to assist in performing different types of mathematical equations now, how can you get the most out of it? You ll find the answer to this question with our comprehensive, 3-panel guide that shows in great detail what exactly the TI-83 Plus can do. Function key and mode descriptions, as well as problem-solving examples, are included within a color-coded format for easy reference. "
Computational experiments on algorithms can supplement theoretical analysis by showing what algorithms, implementations, and speed-up methods work best for specific machines or problems. This book guides the reader through the nuts and bolts of the major experimental questions: What should I measure? What inputs should I test? How do I analyze the data? To answer these questions the book draws on ideas from algorithm design and analysis, computer systems, and statistics and data analysis. The wide-ranging discussion includes a tutorial on system clocks and CPU timers, a survey of strategies for tuning algorithms and data structures, a cookbook of methods for generating random combinatorial inputs, and a demonstration of variance reduction techniques. Numerous case studies and examples show how to apply these concepts. All the necessary concepts in computer architecture and data analysis are covered so that the book can be used by anyone who has taken a course or two in data structures and algorithms. A companion website, AlgLab (www.cs.amherst.edu/alglab) contains downloadable files, programs, and tools for use in experimental projects.
Building upon the success of best-sellers The Clean Coder and Clean Code, legendary software craftsman Robert C. "Uncle Bob" Martin shows how to bring greater professionalism and discipline to application architecture and design. As with his other books, Martin's Clean Architecture doesn't merely present multiple choices and options, and say "use your best judgment": it tells you what choices to make, and why those choices are critical to your success. Martin offers direct, no-nonsense answers to key architecture and design questions like: What are the best high level structures for different kinds of applications, including web, database, thick-client, console, and embedded apps? What are the core principles of software architecture? What is the role of the architect, and what is he/she really trying to achieve? What are the core principles of software design? How do designs and architectures go wrong, and what can you do about it? What are the disciplines and practices of professional architects and designers? Clean Architecture is essential reading for every software architect, systems analyst, system designer, and software manager -- and for any programmer who aspires to these roles or is impacted by their work.
Host of public television's Mark Kistler's Imagination Station, shows young artists the cool and fun way to draw in 3-D! Hey, you! Open this book and learn how to draw in three dimensions! Mark Kistler's Imagination Station has thirty-six exciting drawing adventures. Mark teaches you the different skills you need in order to create such masterpieces as: * Dinosaurs in the Sky There's also a special guide for parents and teachers at the end of the book.
The new fifth edition of Principles of Business Information Systems features new cases, new questions and assignments and the latest technologies, whilst retaining its comprehensive coverage of Information Systems issues. It also boasts a wealth of real-world examples from a broad range of countries and updated coverage of IT and technological issues, making it perfect for courses that prepare students for the modern corporate world.
ISO/IEC 27001:2005 is an international standard for information security management systems (ISMSs). Closely allied to ISO/IEC 27002:2005 (which used to be known as ISO17799), this standard (sometimes called the ISMS standard) can help organisations meet all their information-related regulatory compliance objectives and can help them prepare and position themselves for new and emerging regulations. Information is the lifeblood of today s organis-ation and, therefore, ensuring that information is simultaneously protected and available to those who need it is essential to modern business operations. Information systems are not usually designed from the outset to be secure. Technical security measures and checklists are limited in their ability to protect a complete information system. Management systems and procedural controls are essential components of any really secure information system and, to be effective, need careful planning and attention to detail. ISO/IEC 27001 provides the specification for an information security management system and, in the related Code of Practice, ISO/IEC 27002, it draws on the knowledge of a group of experienced information security practitioners in a wide range of significant organisations across more than 40 countries to set out best practice in information security. An ISO27001-compliant system will provide a systematic approach to ensuring the availability, confidentiality and integrity of corporate information. The controls of ISO27001 are based on identifying and combating the entire range of potential risks to the organisation s information assets. This helpful, handy ISO27001/ISO27002 pocket guide gives a useful overview of these two important information security standards. Key features include: The ISO/IEC 27000 Family of Information Security Standards Background to the Standards Specification vs Code of Practice Certification process The ISMS and ISO27001 Overview of ISO/IEC 27001:2005 Documentation & Records Management Responsibility Policy & Scope Risk Assessment Implementation
This fully updated study guide covers every topic on the current version of the CompTIA Security+ exam Get complete coverage of all objectives included on the CompTIA Security+ exam SY0-601 from this comprehensive resource. Written by a team of leading information security experts, this authoritative guide fully addresses the skills required to perform essential security functions and to secure hardware, systems, and software. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference. Covers all exam domains, including: Threats, Attacks, and Vulnerabilities Architecture and Design Implementation Operations and Incident Response Governance, Risk, and Compliance Online content includes: 250 practice exam questions Test engine that provides full-length practice exams and customizable quizzes by chapter or by exam domain |
You may like...
Database Systems - Design…
Carlos Coronel, Steven Morris
Paperback
Systems Analysis And Design In A…
John Satzinger, Robert Jackson, …
Hardcover
(1)
OECD report on public communication…
Organisation for Economic Cooperation and Development
Paperback
R1,953
Discovery Miles 19 530
Database Principles - Fundamentals of…
Carlos Coronel, Keeley Crockett, …
Paperback
|