![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > General
"A systematic review of the structure and context of the blockchain-derived economic model... (the book) describes cryptoeconomics in connection with the game theory, behavioral economics and others in simple understandable language."-Wang Feng, founder of Linekong Interactive Group and Mars Finance, partner in Geekbang Venture Capital Blockchain technology has subverted existing perceptions and is the start of an economic revolution, called, cryptoeconomics. Blockchain is a key component of cryptoeconomics. Vlad Zamfir, a developer of Ethereum, defines this term as "a formal discipline that studies protocols that governs the production, distribution, and consumption of goods and services in a decentralized digital economy. Cryptoeconomics is a practical science that focuses on the design and characterization of these protocols". This book explains the structures of blockchain-derived economic models, their history, and their application. It uses real-world cases to illustrate the relationship between cryptoeconomics and blockchain. Blockchain technology solves trust issues. A blockchain application can restrict behavior on the blockchain through a reward and punishment system that enables consensus in an innovative way. The greatest significance of cryptoeconomics lies in guaranteeing safety, stability, activity, and order in a decentralized consensus system. Security and stability are achieved mainly by cryptographical mechanisms. Activity and order are achieved through economic mechanisms. Cryptoeconomics and Blockchain: Ignighting a New Era of Blockchain discusses the most popular consensus algorithms and optimization mechanisms. With examples explained in clear and simple terms that are easy to understand, the book also explores economic mechanisms of blockchain such as game theory and behavioral economics.
The world of Internet law is constantly changing and is difficult to follow, even for those for whom doing so is a full-time job. This updated, everything-you-need-to-know reference removes the uncertainty. Internet and the Law: Technology, Society, and Compromises, Second Edition is the go-to source for anyone who needs clear explanations of complex legal concepts related to online practices and content. This wide-ranging, alphabetical reference explores diverse areas of law, including territorial jurisdiction and taxation, that are relevant to or affected by advances in information technology and the rise of the Internet. Particular emphasis is placed on intellectual property law and laws regarding freedom of expression. The Internet, as this book shows, raises questions not only about how to protect intellectual creations, but about what should be protected. Entries also discuss how the Web has brought First Amendment rights and free expression into question as society grapples with attempts to control "leaks" and to restrict content such as pornography, spam, defamation, and criminal speech. Explains complex legal and technical concepts clearly and understandably through entries that range from 500 to 5,000 words Covers a wide range of topics, including censorship, copyright, domain name disputes, file-sharing, hacking, patents, spam, malware, international law, tax issues, trademarks, and viruses Features an introductory guide to the U.S. legal system, including how to find, read, and understand sources of law Includes cases, statutes, and international treaties relevant to the law of information technology and the Internet
Handbook on Networked Multipoint Multimedia Conferencing and Multistream Immsersive Telepresence using SIP: Scalable Distributed Applications and Media Control over Internet is the first book to put together all IETF request for comments (RFCs), and the internet drafts standards related to the multipoint conferencing and immersive telepresence. This book includes mandatory and optional texts of all standards in a chronological and systematic way almost with one-to-one integrity from the beginning to end, allowing the reader to understand all aspects of the highly complex real-time applications. It is a book that network designers, software developers, product manufacturers, implementers, interoperability testers, professionals, professors, and researchers will find to be immensely useful. Practitioners and engineers in all spectrums who are concentrating on building the real-time, scalable, interoperable multipoint applications, can use this book to make informed choices based on technical standards in the market place, on all proprietary non-scalable and non-interposable products. This book will provide focus and foundation for these decision makers.
Think about someone taking control of your car while you're driving. Or, someone hacking into a drone and taking control. Both of these things have been done, and both are attacks against cyber-physical systems (CPS). Securing Cyber-Physical Systems explores the cybersecurity needed for CPS, with a focus on results of research and real-world deployment experiences. It addresses CPS across multiple sectors of industry. CPS emerged from traditional engineered systems in the areas of power and energy, automotive, healthcare, and aerospace. By introducing pervasive communication support in those systems, CPS made the systems more flexible, high-performing, and responsive. In general, these systems are mission-critical-their availability and correct operation is essential. This book focuses on the security of such mission-critical systems. Securing Cyber-Physical Systems brings together engineering and IT experts who have been dealing separately with these issues. The contributed chapters in this book cover a broad range of CPS security topics, including: Securing modern electrical power systems Using moving target defense (MTD) techniques to secure CPS Securing wireless sensor networks (WSNs) used for critical infrastructures Mechanisms to improve cybersecurity and privacy in transportation CPS Anticipated cyberattacks and defense approaches for next-generation autonomous vehicles Security issues, vulnerabilities, and challenges in the Internet of Things Machine-to-machine (M2M) communication security Security of industrial control systems Designing "trojan-resilient" integrated circuits While CPS security techniques are constantly evolving, this book captures the latest advancements from many different fields. It should be a valuable resource for both professionals and students working in network, web, computer, or embedded system security.
Todd Whitaker, Jeffrey Zoul, and Jimmy Casas are widely acclaimed experts on teaching and leading and are pioneers in the education twitterverse, and now they are sharing their best practices! In What Connected Educators Do Differently, they show how being a connected educator-by using social media to connect with peers across the country and even across the globe-will greatly enhance your own learning and your success in a school or classroom. You'll find out how to create a personal and professional learning network to share resources and ideas, gain support, and make an impact on others. By customizing your professional development in this way, you'll be able to learn what you want, how you want, when you want. Best of all, you'll become energized and inspired by all the great ideas out there and how you can contribute, benefiting both you and your students. Whether you are a teacher or school leader, you will come away from this book with step-by-step advice and fresh ideas to try immediately. Being a connected educator has never been easier or more important than it is right now!
* Provides simple, conceptual descriptions of everyday technologies * Includes clear examples and diagrams that demonstrate the principles and techniques, not just a "how-to" punch list * Covers advanced topics for readers who want to dive into the deep end of the technology pool * Avoids jargon-where terminology does appear, the text will provide clear, concise definitions
Becoming a blogger takes practice, hard work, and, ultimately, a passion for the craft. Whether you plan to blog on politics or parenting, The Elements of Blogging is designed to give you the skills and strategies to get started, to sustain your work, and to seek out a robust audience. This book is loaded with practical advice on important topics such as determining a niche, finding the best stories, and blogging effectively and ethically. It features examples from both amateur and professional bloggers that show the techniques for building an argument, finding a voice, crafting a headline, and establishing a brand. Key features: Real-world applicability. This book includes thumbnail profiles of bloggers and their sites, which illuminate key skills you will need to become an effective blogger Interactivity. Each chapter features discussion points and exercises intended to get you to think about, reflect on, and apply the contents of each chapter Creativity. While this book dives into software and plug-ins for bloggers, its main goal is to cover how to write blogs on a myriad of topics: news, opinion pieces, travel, politics, art, and more. Visit the companion website: http://www.theelementsofblogging.com/
Originally published in 2003. This book examines the growth of news provision on the internet and its implications for news presentation, journalism practice, news consumers, and the business of running news organizations. Much of the focus is placed on the migration of newspapers onto the internet, but references are also made to the establishment of news websites by other organizations. The book examines the growth of online technology as a source of information and entertainment and considers how this development can be framed within models of communication and comments, on the apparent shortage of new models to explain the use, role, effectiveness, and impact of online communications.
In recent years, we have witnessed the mushrooming of pro- democracy and protest movements not only in the Arab world, but also within Europe and the Americas. Such movements have ranged from popular upheavals, like in Tunisia and Egypt, to the organization of large-scale demonstrations against unpopular policies, as in Spain, Greece and Poland. What connects these different events are not only their democratic aspirations, but also their innovative forms of communication and organization through online means, which are sometimes considered to be outside of the State's control. At the same time, however, it has become more and more apparent that countries are attempting to increase their understanding of, and control over, their citizens' actions in the digital sphere. This involves striving to develop surveillance instruments, control mechanisms and processes engineered to dominate the digital public sphere, which necessitates the assistance and support of private actors such as Internet intermediaries. Examples include the growing use of Internet surveillance technology with which online data traffic is analysed, and the extensive monitoring of social networks. Despite increased media attention, academic debate on the ambivalence of these technologies, mechanisms and techniques remains relatively limited, as is discussion of the involvement of corporate actors. The purpose of this edited volume is to reflect on how Internet-related technologies, mechanisms and techniques may be used as a means to enable expression, but also to restrict speech, manipulate public debate and govern global populaces. This book was published as a special issue of the Journal of Information Technology and Politics.
Web-Based Instruction details how faculty members can design web-based and web-assisted instructional delivery approaches to provide students with the opportunity to learn anytime and anyplace. It stresses the paradigm shift in using technology as an alternative instructional delivery tool but recognizes that the course design and delivery method must maintain the principles of good teaching practices and academic rigor. The book examines how to win student respect and trust, provide support systems, and transition from the classroom-based approach, and it includes examples of course designs, as well as student feedback systems. James Van Keuren takes the frustration out of designing and implementing alternative instructional delivery approaches that do not rely on face-to-face contact. He also creates a step-by-step process for shifting from a teacher-centered to a more student-centered learning environment.
Electronic commerce, supply chain management, customer relationship management, and other forms of Business Networking will fundamentally change the way business will be conducted in the information age. We will see close collaboration between processes of different enterprises, and above all, new enterprises and new processes. Business Networking offers exceptional opportunities for fast innovators and harbors fundamental risks for slowpokes. Business Networking proposes a process-oriented model for Business Networking and the concept of networkability to develop realistic strategies for managing enterprise relationships in the Internet economy. It is written to serve academic and professional audiences and formulate key success factors and management guidelines. All ideas were developed in close cooperation of research and practice and are documented in numerous original case examples.
Created around the world and available only on the Web, internet ""television"" series are independently produced, mostly low budget shows that often feature talented but unknown performers. Typically financed through crowd-funding, they are filmed with borrowed equipment and volunteer casts and crews, and viewers find them through word of mouth or by chance. The third of five volumes on Internet TV series, this book covers 335 alphabetically arranged gay and lesbian programs, giving casts, credits, story lines, episode descriptions, websites, dates and commentary. A complete index lists program titles and headings for gay, lesbian, bi-sexual, transgender and drag queen shows.
Sociology on the Web is directed at those who want to be able to access sociology Internet resources quickly and efficiently without needing to become IT experts. The emphasis throughout is on the location of high quality sociology Internet related resources likely to be useful for learning, teaching and research, from among the billions of publicly accessible Web pages. In addition to extensive coverage of topics relating to the efficient location of files and Web sites, Part III provides a substantial and annotated list of high quality resources likely to be of use to students of sociology. The work is structured so that it will be found useful by both beginners and intermediate level users, and be of continuing use over the course of higher education studies.
Updates content and introduces topics such as business changes and outsourcing. Addresses new cyber security risks such as IoT and Distributed Networks (i.e., blockchain). Covers strategy based on the OODA loop in the cycle. Demonstrates application of the concepts through short case studies of real-world incidents chronologically delineating related events. Discusses certifications and reference manuals in cyber security and digital forensics. Includes an entire chapter on tools used by professionals in the field.
A reference you?ll turn to whenever you need a practical solution
to your online content delivery problems!
A reference you?ll turn to whenever you need a practical solution to your online content delivery problems! Don?t depend on static HTML to meet your clients? demand for information?use Database-Driven Web Sites to help you find the dynamic program that will get the job done with ease. This book contains profiles of successful content delivery solutions in a variety of library situations, from academic to governmental, and covers many associated elements, such as web site redesign, digitization, and electronic access to archival information. Plentiful illustrations and straightforward language will make this book a valuable addition to your collections. Among the topics Database-Driven Web Sites examines are: staff skill development issues building a frequently asked questions (FAQ) database managing bibliographic citation software online reference collections in collegiate libraries developing portal web sites for state governments This book aims to empower librarians to create new services that would be impossible with strictly HTML-based web sites, so along with advice from professionals, Database-Driven Web Sites offers you practical tips for managing complex projects and includes numerous links to online resources and software.
Researchers and instructors: examine ways to make the Internet work to your advantage Using the Internet as a Research Tool for Social Work and Human Services examines the exciting benefits for social workers of using the Internet to facilitate their studies. By introducing various methodologies and insights, this book explains how the Web can be a valuable and legitimate form of research. This vital book examines the problems associated with studying virtual communities and cyber culture, and offers innovative ways to administer experiments by measuring response time over the Web. This informative book explores new and innovative trends in Internet research, including: methodologies for data collection, sampling, and representation of the subjects psychological testing and using the Internet for training developing and deploying Internet studies by replacing traditionally administered questionnaires with online surveys the use of technology to enhance the development of research skills of undergraduate-level multicultural mental health researchers
Courting Publicity: Twitter and Television Cameras in Court is a new title dealing with an incredibly topical subject matter that is only likely to increase in interest in the future and lead to new legislation and case law. It examines the impact on the legal process and those involved, of ever- increasing levels of scrutiny and public attention via new technologies. Contents includes: Courting Publicity Courts and Twitter Cases Media Rights v Privacy Rights The Internet Twitter in Court: Issues and UK Consultation Television Cameras in Court Supreme Court Other courts Effects of Television Cameras in Court Effects of Twitter in Court Effects of Twitter (and Internet) Outside of Court The Future
Drawing on the advice of experts in the field, The Web Writer's
Guide serves as the ideal sourcebook for tips and ideas for
freelance and staff writers of online content. This book provides
writers of all levels with the information they need in an
accessible, easy-to-use fashion. To the many deadline- and
project-conscious writers out there who need to further adapt to
the dynamics of digital media, this easy-to-use, comprehensive
guide serves as a remarkable guidepost.
Despite the pervasiveness of the Internet and its importance to a wide range of state functions, we still have little understanding of its implications in the context of International Relations. Combining the Philosophy of Technology with IR theories of power, this study explores state power in the information age.
Buddhism, the Internet and Digital Media: The Pixel in the Lotus explores Buddhist practice and teachings in an increasingly networked and digital era. Contributors consider the ways Buddhism plays a role and is present in digital media through a variety of methods including concrete case studies, ethnographic research, and content analysis, as well as interviews with practitioners and cyber-communities. In addition to considering Buddhism in the context of technologies such as virtual worlds, social media, and mobile devices, authors ask how the Internet affects identity, authority and community, and what effect this might have on the development, proliferation, and perception of Buddhism in an online environment. Together, these essays make the case that studying contemporary online Buddhist practice can provide valuable insights into the shifting role religion plays in our constantly changing, mediated, hurried, and uncertain culture. |
You may like...
Evaluating Websites and Web Services
Denis Yannacopoulos, Panagiotis Manolitzas, …
Hardcover
R5,413
Discovery Miles 54 130
|