![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
There is now a plethora of internet of things (IoT) devices on the market that can connect to the internet and the desired environment to produce sufficient and reliable data that is required by the government administration for a variety of purposes. Additionally, the potential benefits of incorporating artificial intelligence (AI) and machine learning into governance are numerous. Governments can use AI and machine learning to enforce the law, detect fraud, and monitor urban areas by identifying problems before they occur. The government can also use AI to easily automate processes and replace mundane and repetitive tasks. AI, IoT, and Blockchain Breakthroughs in E-Governance defines and emphasizes various AI algorithms as well as new internet of things and blockchain breakthroughs in the field of e-governance. Covering key topics such as machine learning, government, and artificial intelligence, this premier reference source is ideal for government officials, policymakers, researchers, academicians, practitioners, scholars, instructors, and students.
Cybercrime is on the rise, and it is becoming easier and easier for criminals to steal your personal information. Toolkits to create viruses, spyware, and other forms of malware are now readily available to anyone wishing to defraud and do damage, and you could be leaving yourself open to attack. It is estimated that standard computer-based defence systems catch only 25% of malware attacks. Do you know the risks you're running online? Are you protected? An Introduction to Hacking and Crimeware answers your concerns and provides a foundation-level overview of the dark world of cybercrime. Know your enemy An Introduction to Hacking and Crimeware is a comprehensive pocket guide to more serious online threats. Knowledge of these threats will help you understand how to ensure that your computer systems are protected and make sure that your business is safe, enabling you to focus on your core activities without fear of attack. Fight back In this pocket guide, the author: *Identifies terms and defines exactly what crimeware is, both intentional and unintentional; *Gives specific, up-to-date examples to help you identify the risks so that you can protect your business; *Explores the increasing use of commercial off-the-shelf (COTS) hacking tools, exposing the enemy's tactics; *Gives practical suggestions of active defence, so you can fight back; *Provides a valuable list of up-to-date, authoritative sources of information, so you can stay abreast of new developments and safeguard your business. An Introduction to Hacking And Crimeware will equip you with the vital information you need to deal with the threats presented by hacking and crimeware in all their many forms, safeguard your online information, and potentially save you and your business from very real danger.
This Research Handbook is an insightful overview of the key rules, concepts and tensions in privacy and data protection law. It highlights the increasing global significance of this area of law, illustrating the many complexities in the field through a blend of theoretical and empirical perspectives. Providing an excellent in-depth analysis of global privacy and data protection law, it explores multiple regional and national jurisdictions, bringing together interdisciplinary international contributions from Europe and beyond. Chapters cover critical topics in the field, including key features of the General Data Protection Regulation (GDPR), border surveillance, big data, artificial intelligence, and biometrics. It also investigates the relationship between privacy and data protection law and other fields of law, such as consumer law and competition law. With its detailed exploration and insights into privacy and data protection, this Research Handbook will prove a useful resource for information and media law students as well as academics researching fields such as data protection and privacy law and surveillance or security studies.
AI is going to change your world – but don’t panic.
This handbook covers the essential subject areas of cutaneous biometrics, including acne, aging, genetics, eczema, psoriasis, atopic dermatitis, rosacea, wound healing, and more. Erythema of rosacea and the risk of skin ulceration associated with oral nicorandil therapy are covered in detail. Various areas of acne are addressed, including acne severity grading, the assessment of general health and quality of life in patients with acne, and the effect of automated online counseling on clinical outcomes and quality of life among adolescents with acne vulgaris. Other topics include the development and validation of a clinical scale for the evaluation of forearm skin photoaging and a scoring system for mucosal disease severity. This is an ideal reference for biomedical engineering researchers and clinicians working in the field of dermatology interested in a deeper understanding of cutaneous biometrics and how it can be applied to their work. This book also:Â Broadens reader understanding of the importance of creating meaningful dermatological patient outcome measurements and the use of the physician global assessment in a clinical setting to measure and track patient outcomes Details the guidelines on the measurement of ultraviolet radiation levels in ultraviolet phototherapyÂ
A must-have, full-color guide to the Nikon D7100 The Nikon D7100 is an ideal camera for beginning photographers who may lack structured photography training but are still eager and determined to take great photos. And that?s where this fun-and-friendly guide comes in handy! Packed with more than 300 full-color photos, this introductory guide begins by helping you get a feel for the camera, get comfortable shooting in auto mode, managing playback options, and handle basic troubleshooting strategies. Veteran author Julie Adair King walks you through the D7100's features and encourages you to take creative control so that you can start capturing stunning pictures immediately. * Packs in more than 300 full-color photos that exemplify the basic photo skills needed to get great shots * Shares a wealth of information from one of the most popular digital photography authors * Walks you through adjusting manual settings to get better results from exposure, lighting, focus, and color * Contains an entire chapter on video mode * Explains how to send images to a computer for organizing, editing, and sharing Nikon D7100 For Dummies helps you get a grasp on your camera's controls so you can start taking memorable photos today!
You ve just purchased a TI-83 Plus calculator to assist in performing different types of mathematical equations now, how can you get the most out of it? You ll find the answer to this question with our comprehensive, 3-panel guide that shows in great detail what exactly the TI-83 Plus can do. Function key and mode descriptions, as well as problem-solving examples, are included within a color-coded format for easy reference. "
This timely book addresses the increasingly widespread issue of online political hatred in Europe. Taking an interdisciplinary approach, it examines both the contributions of new technologies, in particular social networks, to the rise of this phenomenon, and the legal and political contexts in which it is taking place. Through an analysis of online hate speech and its impacts, Giovanni Ziccardi characterizes contemporary political hatred in Europe, highlighting its victims, communication strategies, and the creation of a cross-national network of extremists enabled by technology. He compares legal and political responses to the problem at both national and EU levels, as well as the approach taken by the US, in order to examine the effectiveness of current measures. Finally, he evaluates possible remedies for the situation, including both legal and technological solutions, and outlines the potential for a unified European framework to counter the spread of hatred online. Online Political Hate Speech in Europe will be an essential read for scholars and students in law and politics looking for an in-depth analysis of this issue. It will also be useful for politicians, policy makers, and practitioners seeking to understand the mechanisms underlying the circulation of political hatred.
Autonomous systems are on the frontiers of Artificial Intelligence (AI) research, and they are slowly finding their business applications. Driven mostly by Reinforcement Learning (RL) methods (one of the most difficult, but also the most promising modern AI algorithms), autonomous systems help create self-learning and self-optimising systems, ranging from simple game-playing agents to robots able to efficiently act in completely new environments. Based on in-depth study of more than 100 projects, Andrzej Wodecki explores RL as a key component of modern digital technologies, its real-life applications to activities in a value chain and the ways in which it impacts different industries. Artificial Intelligence in Management will help project leaders, decision makers and investors evaluate new autonomous projects and will serve as an inspiring guide for future research.
This groundbreaking book explores the new legal and economic challenges triggered by big data, and analyses the interactions among and between intellectual property, competition law, free speech, privacy and other fundamental rights vis-a-vis big data analysis and algorithms. Offering both theoretical and practical insights, contributions illustrate the disruptive nature of the data-driven economy. Chapters discuss how products and services are digitalised and broken into bits, that in turn are reassembled, traded and used across sectors and borders, in contrast to how algorithms are already used to influence our choices, govern our news feeds and revolutionise business models at large. Having shown algorithms and big data to be the two fundamental driving forces of the new information society, expert authors explore which policy options, institutional frameworks and values should be adopted by lawmakers and regulatory authorities in order to ensure a fair balance between private interests such as competition, innovation and the fundamental rights of individuals. Innovatively combining both public and private law perspectives, this unique book will provide a valuable resource for scholars and students of information and technology law, media law, privacy, regulatory and human rights law. Its attention to the latest developments will also prove essential for policymakers and practitioners working in related areas.
The Future of Copyright in the Age of Artificial Intelligence offers an extensive analysis of intellectual property and authorship theories and explores the possible impact artificial intelligence might have on those theories. The author makes compelling arguments via the exploration of authorship, ownership and artificial intelligence. First, the book advocates for a more holistic approach to authorship, arguing that there is no good reason to exclude computer-generated and artificial intelligence creations from copyright. Second, it conducts an open search for the right 'candidate' for ownership. In doing so, the book explores several possible legal frameworks, including assigning ownership to the programmer, the user, the AI itself and other alternatives such as the public domain or author-in-law approaches. Third, the book explores the concept of artificial intelligence as it has developed through the years in various fields, seeking to reframe the AI legal concept. For academic scholars and law students these pages frame the theoretical discussion about artificial intelligence creations and provide in depth discussion about artificial intelligence legal challenges.
This comprehensive book provides a detailed survey and practical examination of a wide range of legal and regulatory topics in HealthTech. Combining the insights of leading healthcare experts from around the world, chapters first examine the key characteristics, use cases and regulation in the field, before turning to the development and potential applications of cutting-edge technologies in healthcare. The book also addresses the main issues involved in setting up and running a HealthTech business, highlighting the vital role this will play in developing the technologies and skill sets required for the future of the sector. Key features include: analysis of the impact of emerging innovations on the accessibility, efficiency and quality of healthcare and its effects on healthcare providers examination of artificial intelligence, blockchain and digital identity applications in healthcare, alongside associated regulatory challenges guidance on the financial requirements of healthcare start-ups at different stages of growth and various collaboration and partnership models in the HealthTech market discussion of the major regulatory questions affecting the HealthTech industry, from data protection, public procurement and product liability, to the regulation of medical devices, intellectual property and advertising. HealthTech: Law and Regulation will be an invaluable resource for both in-house lawyers in the healthcare and pharmaceutical sectors, as well as those working for law firms practising in these areas. It will also be of interest to academics and students teaching or researching in healthcare law.
Examining the consequences of technology-driven lifestyles for both crime commission and victimization, this comprehensive Handbook provides an overview of a broad array of techno-crimes as well as exploring critical issues concerning the criminal justice system's response to technology-facilitated criminal activity. The Handbook adopts a unique three-fold typology of technology-enabled crime: techno-crime committed by professional criminals (crime as work), techno-crime committed in traditional workplace settings (crime at work), and techno-crime committed by individuals outside of traditional workplace settings (crime after work.) Chapters explore an extensive range of criminal activities facilitated by the digital age, from embezzlement, financial fraud, corporate espionage, phishing, and ransomware to identity theft, hacking, cyber terrorism, and internet sex and hate crimes. Looking to the future, the Handbook considers timely questions posed by our continued reliance on information technology, including whether we are in danger of becoming a global surveillance state and how we might prevent the facilitation of cyber terrorism by social media giants. This dynamic Handbook will be an invaluable resource for scholars and students interested in criminology, digital sociology, terrorism and security, and surveillance studies. Offering practical insights on the need for a coordinated global techno-crime control strategy, it will serve as a resource for policymakers seeking cutting edge solutions to the growing problem of techno-crime.
Host of public television's Mark Kistler's Imagination Station, shows young artists the cool and fun way to draw in 3-D! Hey, you! Open this book and learn how to draw in three dimensions! Mark Kistler's Imagination Station has thirty-six exciting drawing adventures. Mark teaches you the different skills you need in order to create such masterpieces as: * Dinosaurs in the Sky There's also a special guide for parents and teachers at the end of the book.
Informed by the latest theoretical developments in studies of the social impacts of digital technology, Smart-Tech Society provides an empirically grounded and conceptually informed analysis of the impacts and paradoxes of smart-technology. While making life more convenient, smart-tech has also been associated with a loss of privacy and control over decision-making autonomy. Mark Whitehead and William Collier provide a critical analysis of the lived experience of smart-technology, presenting stories of varied social engagements with digital platforms and devices. Chapters explore the myriad contexts in and through which smart-tech insinuates itself within everyday life, the benefits it brings, and the processes through which it is being resisted. Detailed case studies explore the impacts of smart-technology across a broad range of fields including personal health, work, social life, urban management, and politics. Presenting new empirical evidence and analytical perspectives on the relationships between humans and smart-tech, this book will be of interest to academics and students in the fields of sociology, political science, human geography, and technology studies.
New and emerging technologies are reshaping justice systems and transforming the role of judges. The impacts vary according to how structural reforms take place and how courts adapt case management processes, online dispute resolution systems and justice apps. Significant shifts are also occurring with the development of more sophisticated forms of Artificial Intelligence that can support judicial work or even replace judges. These developments, together with shifts towards online court processes are explored in Judges, Technology and Artificial Intelligence. By considering how different jurisdictions are approaching current and future technological shifts and in particular by focusing on the different approaches in the US, UK, Australia and China and elsewhere, the author draws a rich comparative exploration of justice technology trends. Judicial commentary is considered as well as the growing scholarly discourse about these trends. Ethical and user centred design options are examined in the context of how responsive judges engage with supportive, replacement and disruptive technologies in courts. This book explores current issues regarding the responsiveness of the justice system in the pandemic era. In addition, how technology can respond and shift justice processes is a growing field of research, for judges, scholars, students and justice commentators. It provides a much-needed resource on an increasingly important topic.
On November 21, 1990, the Super Nintendo was officially introduced to the Japanese public as the Super Famicom - a date that would forever be engraved in the hearts and souls of gamers worldwide. Following in the footsteps of the NES, whose universal success had definitively shaped the fate of the gaming industry, the Super Nintendo was a technological masterpiece teeming with power and potential, and that still fascinates us to this very day. Across more than 510+ pages richly illustrated with photographs and documents from the period, this perfect fusion of our two previous Super Nintendo Anthology volumes recounts the life story of the Kyoto-based giant's wondrous 16-bit console and delves deep into its huge international games library. A true work of reference, allowing those who missed out on our Super Nintendo/Super Famicom Deluxe Edition the chance to own even more content than before. This new version of our SNES Anthology meshes together both the Software and Hardware books from our out-of-print Ultimate Edition. It covers the console's genesis through to the end of its life cycle (including a deep-dive into its many components, and its graphic/audio capabilities), as well as its accessories (official or otherwise), secrets behind the hardware, and a total of 1770+ official, unofficial and cancelled games - with a specific amount of page space dedicated to each one based on its quality and reputation, including their release date, developer, publisher, genre, and a rating out of five.
ISO/IEC 27001:2005 is an international standard for information security management systems (ISMSs). Closely allied to ISO/IEC 27002:2005 (which used to be known as ISO17799), this standard (sometimes called the ISMS standard) can help organisations meet all their information-related regulatory compliance objectives and can help them prepare and position themselves for new and emerging regulations. Information is the lifeblood of today s organis-ation and, therefore, ensuring that information is simultaneously protected and available to those who need it is essential to modern business operations. Information systems are not usually designed from the outset to be secure. Technical security measures and checklists are limited in their ability to protect a complete information system. Management systems and procedural controls are essential components of any really secure information system and, to be effective, need careful planning and attention to detail. ISO/IEC 27001 provides the specification for an information security management system and, in the related Code of Practice, ISO/IEC 27002, it draws on the knowledge of a group of experienced information security practitioners in a wide range of significant organisations across more than 40 countries to set out best practice in information security. An ISO27001-compliant system will provide a systematic approach to ensuring the availability, confidentiality and integrity of corporate information. The controls of ISO27001 are based on identifying and combating the entire range of potential risks to the organisation s information assets. This helpful, handy ISO27001/ISO27002 pocket guide gives a useful overview of these two important information security standards. Key features include: The ISO/IEC 27000 Family of Information Security Standards Background to the Standards Specification vs Code of Practice Certification process The ISMS and ISO27001 Overview of ISO/IEC 27001:2005 Documentation & Records Management Responsibility Policy & Scope Risk Assessment Implementation
A smart, incisive take-down of the bogus claims being made about
so-called ‘artificial intelligence’, exposing the real harm these
technologies do to our jobs, health, society and environment, who
stands to gain from them, and how to fight back.
If you want to make it beyond Instagram as a photographer you have to give a solid listen to the ideas, tips and overall mindset that Finn shares in this workshop. @alexstrohl Don't just take a picture, make photos that move people. Storytelling is a gift to photographers, letting you weave together characters, events, locations and subjects into a work of beauty greater than the sum of its parts. There are as many stories to tell as pictures to take, but there are also tried-and-tested methods you can adopt to help improve your photography and streamline your workflow. In this beginner-to-pro workshop, award-winning photographer and influencer Finn Beales teaches enthusiasts and aspiring professionals how to master every element of the photographer's process. By following his five-step course - Pitch, Prepare, Shoot, Edit and Deliver - you will develop the same successful, reliable working methods that earn influence and delight audiences, regardless of what genre you're working in. Create intrigue, pull in your audience and tell richer, more rounded stories using your DSLR camera. Want to craft a shoot from start to finish? All the essentials are covered, from building a story into your creative, shoot preparation, the necessary gear and props, working with mood-boards and call sheets, compositional balance, and directing models, right through to post production, editing and file delivery. Discover within: What equipment you'll need, when and why; The secret to key shots and essential techniques; Plot devices to help you craft your narrative; Step-by-step DSLR projects to perfect your skills; Effortlessly capture events, landscapes, portraits, interiors and experiences; How to edit better and be different; Extra exercises to improve your smartphone photography. Compose for impact. Stand out through story.
An eye-opening account of the tech arms race shaping out planet, from
an award-winning journalist and AI insider to the world of Sam Altman
and OpenAI
Combining clear labelled imagery with easy-to-understand text, this new
edition of Simply Artificial Intelligence is the perfect introduction
to the latest developments in AI, including ChatGPT and the Internet of
Things.
This fully updated study guide covers every topic on the current version of the CompTIA Security+ exam Get complete coverage of all objectives included on the CompTIA Security+ exam SY0-601 from this comprehensive resource. Written by a team of leading information security experts, this authoritative guide fully addresses the skills required to perform essential security functions and to secure hardware, systems, and software. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference. Covers all exam domains, including: Threats, Attacks, and Vulnerabilities Architecture and Design Implementation Operations and Incident Response Governance, Risk, and Compliance Online content includes: 250 practice exam questions Test engine that provides full-length practice exams and customizable quizzes by chapter or by exam domain
|
You may like...
Database Principles - Fundamentals of…
Carlos Coronel, Keeley Crockett, …
Paperback
Discovering Computers 2018 - Digital…
Misty Vermaat, Steven Freund, …
Paperback
|