![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > General
Two of the most prolific and challenging authorities on the topic of competitive intelligence (CI) reflect on and respond to the changes in the field over the last decade. The authors point out that CI users have to change what they are doing, show why they are doing it, and provide ways of doing it. Their book reviews the problems in the development of CI since the 1980s, discusses the impact of the Internet and the rise in use of other secondary sources, and draws from and provides access to the growing body of CI information, knowledge, and literature. Combining a scholarly approach with hands-on advice, McGonagle and Vella have written the first work to guide CI professionals through the emerging literature of their field. Among the important changes in the field the authors cover are: the radical changes in on line database searching and ways in which the Internet has fundamentally modified how we think of accessing data. Their book explores and reports the major body of work from the Society of Competitive Intelligence Professionals, now that more businesses worldwide are using competitive intelligence and either writing about their experiences with it, or joining in new benchmarking studies. The result is newer information on what really works, what doesn't work, and who is doing what with it. The book is thus a starting point for people new to the field of CI as well as a resource to help experienced professionals do their jobs better.
It's axiomatic to state that people fear what they do not understand, and this is especially true when it comes to technology. However, despite their prevalence, computers remain shrouded in mystery, and many users feel apprehensive when interacting with them. Smartphones have only exacerbated the issue. Indeed, most users of these devices leverage only a small fraction of the power they hold in their hands. How Things Work: The Computer Science Edition is a roadmap for readers who want to overcome their technophobia and harness the full power of everyday technology. Beginning with the basics, the book demystifies the mysterious world of computer science, explains its fundamental concepts in simple terms, and answers the questions many users feel too intimidated to ask. By the end of the book, readers will understand how computers and smart devices function and, more important, how they can make these devices work for them. To complete the picture, the book also introduces readers to the darker side of modern technology: security and privacy concerns, identity theft, and threats from the Dark Web.
It's axiomatic to state that people fear what they do not understand, and this is especially true when it comes to technology. However, despite their prevalence, computers remain shrouded in mystery, and many users feel apprehensive when interacting with them. Smartphones have only exacerbated the issue. Indeed, most users of these devices leverage only a small fraction of the power they hold in their hands. How Things Work: The Computer Science Edition is a roadmap for readers who want to overcome their technophobia and harness the full power of everyday technology. Beginning with the basics, the book demystifies the mysterious world of computer science, explains its fundamental concepts in simple terms, and answers the questions many users feel too intimidated to ask. By the end of the book, readers will understand how computers and smart devices function and, more important, how they can make these devices work for them. To complete the picture, the book also introduces readers to the darker side of modern technology: security and privacy concerns, identity theft, and threats from the Dark Web.
The narrative of the birth of internet culture often focuses on the achievements of American entrepreneurs in Silicon Valley, but there is an alternative history of internet pioneers in Europe who developed their own model of network culture in the early 1990s. Drawing from their experiences in the leftist and anarchist movements of the '80s, they built DIY networks that give us a glimpse into what internet culture could have been if it were in the hands of squatters, hackers, punks, artists, and activists. In the Dutch scene, the early internet was intimately tied to the aesthetics and politics of squatting. Untethered from profit motives, these artists and activists aimed to create a decentralized tool that would democratize culture and promote open and free exchange of information.
Life without the internet, a very new technology, seems almost unimaginable for most people in western nations. Today the internet is intrinsic to media and communications, entertainment, politics, defence, business, banking, education and administrative systems as well as to social interaction. "The Internet" disentangles this extraordinarily complex information and communication technology from its place in our daily lives, allowing it to be examined anew. Technology has historically been shaped by governmental, military and commercial requirements, but the development of the internet is increasingly driven by its users. YouTube, Facebook, Twitter, Flickr and many other emerging applications are shifting the way we express ourselves, communicate with our friends, and even engage with global politics. At the same time three-quarters of the world's population remain effectively excluded from the internet. Packed with case studies drawn from around the world, "The Internet" presents a clear and up-to-date introduction to the social, cultural, technological and political worlds this new media form is creating.
Cybernetic-Existentialism: Freedom, Systems, and Being-for-Others in Contemporary Arts and Performance offers a unique discourse and an original aesthetic theory. It argues that fusing perspectives from the philosophy of Existentialism with insights from the 'universal science' of cybernetics provides a new analytical lens and deconstructive methodology to critique art. In this study, Steve Dixon examines how a range of artists' works reveal the ideas of Existentialist philosophers including Kierkegaard, Camus, de Beauvoir, and Sartre on freedom, being and nothingness, eternal recurrence, the absurd, and being-for-others. Simultaneously, these artworks are shown to engage in complex explorations of concepts proposed by cyberneticians including Wiener, Shannon, and Bateson on information theory and 'noise', feedback loops, circularity, adaptive ecosystems, autopoiesis, and emergence. Dixon's groundbreaking book demonstrates how fusing insights and knowledge from these two fields can throw new light on pressing issues within contemporary arts and culture, including authenticity, angst and alienation, homeostasis, radical politics, and the human as system.
In this book, the author outlines a Robust Web Parking, Truck and Transportation Portal (RWPTTP) for integrating parking and transportation services - a revolutionary approach in contrast to incremental change for managing traffic congestion. Autonomous vehicle technology, artificial intelligence, internet of things (IOT), and other interconnected hardware and software tools will assist autonomous parking and transportation services and provide next-century infrastructure for consolidated transportation customer services. The book highlights currently available autonomous parking and transportation technologies, and the development of an integrated and intelligent transportation service/system (IITS) platform, with specific use of technologies to reconfigure the transportation industry. The author also suggests many regulatory and policy changes to simplify data collection, traffic operation, introduction of a duplicate transportation system using light rail (LRs) and high speed rail (SPRs), and redistribution of parking spaces along such routes, using renewable energy.
A uniquely interdisciplinary look at storytelling in digital, analogue, and hybridised contexts, this book traces different ways stories are experienced in our contemporary mediascape. It uses an engaging range of current examples to explore interactive and immersive narratives. Critical Encounters with Immersive Storytelling considers exciting new forms of storytelling that are emerging in contemporary popular culture. Here, immersion is being facilitated in a variety of ways and in a multitude of contexts, from 3D cinema to street games, from immersive theatre plays to built environments such as theme parks, as well as in a multitude of digital formats. The book explores diverse modes and practices of immersive storytelling, discussing what is gained and lost in each of these 'genres'. Building on notions of experience and immersion, it suggests a framework within which we might begin to understand the quality of being immersed. It also explores the practical and ethical aspects of this exciting and evolving terrain. This accessible and lively study will be of great interest to students and researchers of media studies, digital culture, games studies, extended reality, experience design, and storytelling.
Social technology is quickly becoming a vital tool in our personal, educational, and professional lives. However, while social networking helps the world stay connected, its use must be further examined in order to determine any possible pitfalls associated with the use of this technology. Implications of Social Media Use in Personal and Professional Settings investigates the paradoxical nature of social networking in our personal lives and in the workplace. Highlighting emergent research and psychological impacts, this publication is an indispensable reference source for academics, researchers, and professionals interested in the application of social media, as well as the positive aspects and detrimental effects of the usage of these technologies.
Digitising Enterprise in an Information Age is an effort that focuses on a very vast cluster of Enterprises and their digitising technology involvement and take us through the road map of the implementation process in them, some of them being ICT, Banking, Stock Markets, Textile Industry & ICT, Social Media, Software Quality Assurance, Information Systems Security and Risk Management, Employee Resource Planning etc. It delves on increased instances of cyber spamming and the threat that poses to e-Commerce and Banking and tools that help and Enterprise toward of such threats. To quote Confucius, "As the water shapes itself to the vessel that contains it, so does a wise man adapts himself to circumstances." And the journey of evolution and progression will continue and institutions and enterprises will continue to become smarter and more and more technology savvy. Enterprises and businesses across all genre and spectrum are trying their level best to adopt to change and move on with the changing requirements of technology and as enterprises and companies upgrade and speed up their digital transformations and move their outdate heirloom systems to the cloud, archaic partners that don't keep up will be left behind. Note: T&F does not sell or distribute the Hardback in India, Pakistan, Nepal, Bhutan, Bangladesh and Sri Lanka.
Wiley Online Trading for a Living
Internet of Things (IoT) is an ecosystem comprised of heterogeneous connected devices that communicate to deliver capabilities making our living, cities, transport, energy, and other areas more intelligent. This book delves into the different cyber-security domains and their challenges due to the massive amount and the heterogeneity of devices. This book introduces readers to the inherent concepts of IoT. It offers case studies showing how IoT counteracts the cyber-security concerns for domains. It provides suggestions on how to mitigate cyber threats by compiling a catalogue of threats that currently comprise the contemporary threat landscape. It then examines different security measures that can be applied to system installations or operational environment and discusses how these measures may alter the threat exploitability level and/or the level of the technical impact. Professionals, graduate students, researchers, academicians, and institutions that are interested in acquiring knowledge in the areas of IoT and cyber-security, will find this book of interest.
Social media users fracture into tribes, but social media ecosystems are globally interconnected technically, socially, culturally, and economically. At the crossroads, Huatong Sun, author of Cross-Cultural Technology Design, presents theory, method, and case studies to uncover the global interconnectedness of social media design and reorient universal design standards. Centering on the dynamics between structure and agency, Sun draws on practice theories and transnational fieldwork and articulates a critical design approach. The "CLUE2 (CLUE squared)" framework extends from situated activity to social practice, and connects macro institutions with micro interactions to redress asymmetrical relations in everyday life. Why were Japanese users not crazed about Facebook? Would Twitter have had been more successful than its copycat Weibo in China if not banned? How did mobilities and value propositions play out in the competition of WhatsApp, WeChat, LINE, and KakaoTalk for global growth? Illustrating the cultural entanglement with a relational view of design, Sun provides three provocative accounts of cross-cultural social media design and use. Concepts such as affordance, genre, and uptake are demonstrated as design tools to bind the material with the discursive and leap from the critical to the generative for culturally sustaining design. Sun calls to reshape the crossroads into a design square where differences are nourished as design resources, where diverse discourses interact for innovation, and where alternative design epistemes thrive from the local. This timely book will appeal to researchers, students, and practitioners who design across disciplines, paradigms, and boundaries to bridge differences in this increasingly globalized world.
Online Terrorist Propaganda, Recruitment, and Radicalization is most complete treatment of the rapidly growing phenomenon of how terrorists' online presence is utilized for terrorism funding, communication, and recruitment purposes. The book offers an in-depth coverage of the history and development of online "footprints" to target new converts, broaden their messaging, and increase their influence. Chapters present the emergence of various groups; the advancement of terrorist groups' online presences; their utilization of video, chat room, and social media; and the current capability for propaganda, training, and recruitment. With contributions from leading experts in the field-including practitioners and terrorism researchers-the coverage moves from general factors to specific groups practices as relate to Islamic State of Iraq and the Levant (ISIL), and numerous other groups. Chapters also examine the lone wolf phenomenon as a part of the disturbing trend of self-radicalization. A functional, real-world approach is used regarding the classification of the means and methods by which an online presence is often utilized to promote and support acts of terrorism. Online Terrorist Propaganda, Recruitment, and Radicalization examines practical solutions in identifying the threat posed by terrorist propaganda and U.S. government efforts to counter it, with a particular focus on ISIS, the Dark Web, national and international measures to identify, thwart, and prosecute terrorist activities online. As such, it will be an invaluable resources for intelligence professionals, terrorism and counterterrorism professionals, those researching terrorism funding, and policy makers looking to restrict the spread of terrorism propaganda online.
This book presents, in an integrated form, both the analysis and synthesis of three different types of hidden Markov models. Unlike other books on the subject, it is generic and does not focus on a specific theme, e.g. speech processing. Moreover, it presents the translation of hidden Markov models' concepts from the domain of formal mathematics into computer codes using MATLAB (R). The unique feature of this book is that the theoretical concepts are first presented using an intuition-based approach followed by the description of the fundamental algorithms behind hidden Markov models using MATLAB (R). This approach, by means of analysis followed by synthesis, is suitable for those who want to study the subject using a more empirical approach. Key Selling Points: Presents a broad range of concepts related to Hidden Markov Models (HMM), from simple problems to advanced theory Covers the analysis of both continuous and discrete Markov chains Discusses the translation of HMM concepts from the realm of formal mathematics into computer code Offers many examples to supplement mathematical notation when explaining new concepts
Social networking has increased drastically in recent years, resulting in an increased amount of data being created daily. Furthermore, diversity of issues and complexity of the social networks pose a challenge in social network mining. Traditional algorithm software cannot deal with such complex and vast amounts of data, necessitating the development of novel analytic approaches and tools. This reference work deals with social network aspects of big data analytics. It covers theory, practices and challenges in social networking. The book spans numerous disciplines like neural networking, deep learning, artificial intelligence, visualization, e-learning in higher education, e-healthcare, security and intrusion detection.
This book covers techniques that can be used to analyze data from IoT sensors and addresses questions regarding the performance of an IoT system. It strikes a balance between practice and theory so one can learn how to apply these tools in practice with a good understanding of their inner workings. This is an introductory book for readers who have no familiarity with these techniques. The techniques presented in An Introduction to IoT Analytics come from the areas of machine learning, statistics, and operations research. Machine learning techniques are described that can be used to analyze IoT data generated from sensors for clustering, classification, and regression. The statistical techniques described can be used to carry out regression and forecasting of IoT sensor data and dimensionality reduction of data sets. Operations research is concerned with the performance of an IoT system by constructing a model of the system under study and then carrying out a what-if analysis. The book also describes simulation techniques. Key Features IoT analytics is not just machine learning but also involves other tools, such as forecasting and simulation techniques. Many diagrams and examples are given throughout the book to fully explain the material presented. Each chapter concludes with a project designed to help readers better understand the techniques described. The material in this book has been class tested over several semesters. Practice exercises are included with solutions provided online at www.routledge.com/9780367686314 Harry G. Perros is a Professor of Computer Science at North Carolina State University, an Alumni Distinguished Graduate Professor, and an IEEE Fellow. He has published extensively in the area of performance modeling of computer and communication systems.
This book covers techniques that can be used to analyze data from IoT sensors and addresses questions regarding the performance of an IoT system. It strikes a balance between practice and theory so one can learn how to apply these tools in practice with a good understanding of their inner workings. This is an introductory book for readers who have no familiarity with these techniques. The techniques presented in An Introduction to IoT Analytics come from the areas of machine learning, statistics, and operations research. Machine learning techniques are described that can be used to analyze IoT data generated from sensors for clustering, classification, and regression. The statistical techniques described can be used to carry out regression and forecasting of IoT sensor data and dimensionality reduction of data sets. Operations research is concerned with the performance of an IoT system by constructing a model of the system under study and then carrying out a what-if analysis. The book also describes simulation techniques. Key Features IoT analytics is not just machine learning but also involves other tools, such as forecasting and simulation techniques. Many diagrams and examples are given throughout the book to fully explain the material presented. Each chapter concludes with a project designed to help readers better understand the techniques described. The material in this book has been class tested over several semesters. Practice exercises are included with solutions provided online at www.routledge.com/9780367686314 Harry G. Perros is a Professor of Computer Science at North Carolina State University, an Alumni Distinguished Graduate Professor, and an IEEE Fellow. He has published extensively in the area of performance modeling of computer and communication systems.
Cloud computing is becoming the next revolution in the IT industry; providing central storage for internet data and services that have the potential to bring data transmission performance, security and privacy, data deluge, and inefficient architecture to the next level. Enabling the New Era of Cloud Computing: Data Security, Transfer, and Management discusses cloud computing as an emerging technology and its critical role in the IT industry upgrade and economic development in the future. This book is an essential resource for business decision makers, technology investors, architects and engineers, and cloud consumers interested in the cloud computing future.
Urban Sensographies views the human body as a highly nuanced sensor to explore how various performance-based methods can be implemented to gather usable 'felt data' about the environment of the city as the basis for creating embodied mappings. The contributors to this fascinating volume seek to draw conclusions about the constitution, character and morphology of urban space as public, habitable and sustainable by monitoring the reactions of the human body as a form of urban sensor. This co-authored book is centrally concerned, as a symptom of the degree to which cities are evolving in the 21st century, to examine the effects of this change on the practices and behaviours of urban dwellers. This takes into account such factors as: defensible, retail and consumer space; legacies of modernist design in the built environment; the effects of surveillance technologies, motorised traffic and smart phone use; the integration of 'wild' as well as 'domesticated' nature in urban planning and living; and the effects of urban pollution on the earth's climate. Drawing on three years of funded practical research carried out by a multi-medial team of researchers and artists, this book analyses the presence and movement of the human body in urban space, which is essential reading for academics and practitioners in the fields of dance, film, visual art, sound technology, digital media and performance studies.
This book aims to provide the latest research developments and results in the domain of AI techniques for smart cyber ecosystems. It presents a holistic insight into AI-enabled theoretic approaches and methodology in IoT networking, security analytics using AI tools and network automation, which ultimately enable intelligent cyber space. This book will be a valuable resource for students, researchers, engineers and policy makers working in various areas related to cybersecurity and privacy for Smart Cities. This book includes chapters titled "An Overview of the Artificial Intelligence Evolution and Its Fundamental Concepts, and Their Relationship with IoT Security", "Smart City: Evolution and Fundamental Concepts", "Advances in AI-Based Security for Internet of Things in Wireless Virtualization Environment", "A Conceptual Model for Optimal Resource Sharing of Networked Microgrids Focusing Uncertainty: Paving Path to Eco-friendly Smart Cities", "A Novel Framework for a Cyber Secure Smart City", "Contemplating Security Challenges and Threats for Smart Cities", "Self-Monitoring Obfuscated IoT Network", "Introduction to Side Channel Attacks and Investigation of Power Analysis and Fault Injection Attack Techniques", "Collaborative Digital Forensic Investigations Model for Law Enforcement: Oman as a Case Study", "Understanding Security Requirements and Challenges in the Industrial Internet of Things: A Review", "5G Security and the Internet of Things", "The Problem of Deepfake Videos and How to Counteract Them in Smart Cities", "The Rise of Ransomware Aided by Vulnerable IoT Devices", "Security Issues in Self-Driving Cars within Smart Cities", and "Trust-Aware Crowd Associated Network-Based Approach for Optimal Waste Management in Smart Cities". This book provides state-of-the-art research results and discusses current issues, challenges, solutions and recent trends related to security and organization within IoT and Smart Cities. We expect this book to be of significant importance not only to researchers and practitioners in academia, government agencies and industries, but also for policy makers and system managers. We anticipate this book to be a valuable resource for all those working in this new and exciting area, and a "must have" for all university libraries.
This new volume looks at the electrifying world of blockchain technology and how it has been revolutionizing the Internet of Things and cyber-physical systems. Aimed primarily at business users and developers who are considering blockchain-based projects, the volume provides a comprehensive introduction to the theoretical and practical aspects of blockchain technology. It presents a selection of chapters on topics that cover new information on blockchain and bitcoin security, IoT security threats and attacks, privacy issues, fault-tolerance mechanisms, and more. Some major software packages are discussed, and it also addresses the legal issues currently affecting the field. The information presented here is relevant to current and future problems relating to blockchain technology and will provide the tools to build efficient decentralized applications. Blockchain technology and the IoT can profoundly change how the world-and businesses-work, and this book provides a window into the current world of blockchain. No longer limited to just Bitcoin, blockchain technology has spread into many sectors and into a significant number of different technologies.
Private online digital currency systems offer people accessible, convenient, and inexpensive everyday financial tools outside of traditional bank-owned and operated platforms. Digital currency systems facilitate local and international fund transfers, online and offline payments, and simple cash-to-digital everyday financial products without the need for a conventional bank account of any retail bank product. Over the past several years, Bitcoin has grown into an efficient person-to-person and person-to-business payment system without the backing of any bank or financial institution. This phenomenon is producing a new level of an on- and offline commerce and a society much more attuned to digital currency systems. The Digital Currency Challenge details how new 2007-2008 U.S. legal issues surrounding digital currency products forced companies from the U.S. market and caused the Treasury Department to enact stricter regulations. Mullan profiles new and innovative present day digital currency systems, such as Bitcoin, and illustrates how software designers and monetary theorists use new technology to circumvent current U.S. regulations. This work also explains how new digital currency systems are not just software products, but tools providing financial freedom to people in countries all around the world.
This book covers challenges and solutions in establishing Industry 4.0 standards for Internet of Things. It proposes a clear view about the role of Internet of Things in establishing standards. The sensor design for industrial problem, challenges faced, and solutions are all addressed. The concept of digital twin and complexity in data analytics for predictive maintenance and fault prediction is also covered. The book is aimed at existing problems faced by the industry at present, with the goal of cost-efficiency and unmanned automation. It also concentrates on predictive maintenance and predictive failures. In addition, it includes design challenges and a survey of literature.
This book teaches beginners and aspiring game developers how to develop 2D games with Unity. Thousands of commercial games have been built with Unity. The reader will learn the complete process of 2D game development, step by step. The theory behind each step is fully explained. This book contains numerous color illustrations and access to all source code and companion videos. Key Features: Fully detailed game projects from scratch. Beginners can do the steps and create games right away. No coding experience is necessary. Numerous examples take a raw beginner toward professional coding proficiency in C# and Unity. Includes a thorough introduction to Unity 2020, including 2D game development, prefabs, cameras, animation, character controllers, lighting, and sound. Includes a step-by-step introduction to Unity 2019.3. Extensive coverage of GIMP, Audacity, and MuseScore for the creation of 2D graphics, sound effects, and music. All required software is free to use for any purpose including commercial applications and games. Franz Lanzinger is the owner and chief game developer of Lanzinger Studio, an independent game development and music studio in Sunnyvale, California. He started his career in game programming in 1982 at Atari Games, Inc., where he designed and programmed the classic arcade game Crystal Castles. In 1989, he joined Tengen, where he was a programmer and designer for Ms. Pac-Man and Toobin' on the NES. He co-founded Bitmasters, where he designed and coded games including Rampart and Championship Pool for the NES and SNES, and NCAA Final Four Basketball for the SNES and Sega Genesis. In 1996, he founded Actual Entertainment, publisher and developer of the Gubble video game series. He has a B.Sc. in mathematics from the University of Notre Dame and attended graduate school in mathematics at the University of California at Berkeley. He is a former world record holder on Centipede and Burgertime. He is a professional author, game developer, accompanist, and piano teacher. He is currently working on remaking the original Gubble game in Unity and Blender. |
You may like...
BEM-based Finite Element Approaches on…
Steffen Weisser
Hardcover
Further Developments in Fractals and…
Julien Barral, Stephane Seuret
Hardcover
R3,406
Discovery Miles 34 060
Progress in Turbulence VII - Proceedings…
Ramis Oerlu, Alessandro Talamelli, …
Hardcover
Optimal Trajectory Tracking of Nonlinear…
Jakob Loeber
Hardcover
Nonlinear Functional Analysis and…
Jesus Garcia-Falset, Khalid Latrach
Hardcover
R4,990
Discovery Miles 49 900
|