![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > General
The A to Z Facebook guide for users, marketers, and developers alike Facebook has more than a billion users worldwide. Whether you enjoy spending time on Facebook every day, use it to advertise and market your product, or develop Facebook apps, this go-to guide has something you need. Its six minibooks cover creating a personal timeline, connecting with others, connecting Facebook to other social media, building a fan page, marketing a business on Facebook, and developing Facebook apps. It's fully updated to cover the latest Facebook changes, including Graph Search, mobile apps, Timeline enhancements, and news feed redesign. * Facebook has more than one billion active users who share more than 30 billion pieces of content each month * More than 37 million brands have Pages on Facebook * This complete guide has been fully updated to cover Facebook's latest changes, including Graph Search, mobile apps for both users and Page managers, a redesigned news feed, and enhancements to the Timeline * Minibooks cover creating a personal timeline, connecting with others, connecting Facebook to other social media, building a fan page, marketing a business on Facebook, and developing Facebook apps Facebook All-in-One For Dummies, 2nd Edition is packed with helpful information, great ideas, and ways to help you get even more out of Facebook.
Enterprise 2.0 (E 2.0) has caught the collective imagination of
executives who are innovating to radically change the face of
business. E 2.0 takes full benefit of social networking, including
blogs, discussion boards, mashups, and all that is sharable and
combinable.
This book includes discussions of social networking in enterprise activities such as human resources, risk management, operations, and project management. It describes the utility and role of social networking on a department by department basis, explains how to integrate social enterprising with knowledge management, and supplies helpful insights into legal, performance, and measurement issues. Touching on key security and privacy issues, the book clearly illustrates how social networking and E 2.0 can help improve risk management in your organization.
This title includes a number of Open Access chapters. In today's world, there are new opportunities for disaster communications through modern technology and social media. Social network applications such as Facebook, Twitter, and Instagram can connect friends, family, first responders, and those providing relief and assistance. However, social media and other modern communication tools have their limitations. They can be affected by disaster situations where there are power outages or interrupted cellular service. The research contained in this valuable compendium offers much-needed information for emergency responders, utility companies, relief organizations, and governments as they invest in infrastructure to support post-disaster communications. In order to make use of modern communication methods, as well as fully utilize more traditional communication networks, it is imperative that we understand how people actually communicate in the wake of a disaster situation and how various communication strategies can best be utilized. Communication during and immediately after a disaster situation is a vital component of response and recovery. Effective communication connects first responders, support systems, and family members with the communities and individuals immersed in the disaster. Reliable communication also plays a key role in a community's resilience. With research from internationally recognized experts, this volume provides an overview of communication challenges and best-practice analyses, looks at the internet and social media and mobile phones and other technology for disaster communication, and explores the challenges to effective communication. Presents a quality improvement project that gathered expert consensus on best practices used to improve disaster communication Analyzes the information dissemination mechanisms of different media to establish an efficient information dissemination plan for disaster pre-warning, including short message service (SMS), microblogs, news portals, cell phones, television, and oral communication Gauges the effectiveness of disaster risk communication Looks at the future of social media use during emergencies and afterwards Proposes a disaster resilient network that integrates various wireless networks into a cognitive wireless network in the event of disaster occurrences Effective Communication During Disasters: Making Use of Technology, Media, and Human Resources is an informative, multi-faceted resource on preparedness planning for effective communication before, during, and after a disaster occurs.
The Internet in China examines the cultural and political
ramifications of the Internet for Chinese society. The rapid growth
of the Internet has been enthusiastically embraced by the Chinese
government, but the government has also rushed to seize control of
the virtual environment. Individuals have responded with
impassioned campaigns against official control of information. The
emergence of a civil society via cyberspace has had profound
effects upon China--for example, in 2003, based on an Internet
campaign, the Chinese Supreme People's Court overturned the ruling
of a local court for the first time since the Communist Party came
to power in 1949.
This title helps the over 50 reader come to terms with the benefits of social networking.
The rapid advancement of digital multimedia technologies has not
only revolutionized the production and distribution of audiovisual
content, but also created the need to efficiently analyze TV
programs to enable applications for content managers and consumers.
Leaving no stone unturned, TV Content Analysis: Techniques and
Applications provides a detailed exploration of TV program analysis
techniques.
Most parts start with a chapter that provides an overview of that area, followed by state-of-the-art approaches focusing on specific issues covered in that section. Reporting on recent advances in the field, the book provides you with the global view and up-to-date understanding of emerging trends needed to participate in the development of the digital TV domain.
This title helps the reader understand how to go about researching their family tree, starting with the basics. This practical book will have you achieving immediate results using: a friendly, visual approach simple language practical, task-based examples large, full-colour screenshots. Discover everything you want to know about using online tools and services to research your family history in this easy-to-use guide; from the most essential tasks that you'll want to perform, to solving the most common problems you'll encounter.
IOT: Security and Privacy Paradigm covers the evolution of security and privacy issues in the Internet of Things (IoT). It focuses on bringing all security and privacy related technologies into one source, so that students, researchers, and practitioners can refer to this book for easy understanding of IoT security and privacy issues. This edited book uses Security Engineering and Privacy-by-Design principles to design a secure IoT ecosystem and to implement cyber-security solutions. This book takes the readers on a journey that begins with understanding the security issues in IoT-enabled technologies and how it can be applied in various aspects. It walks readers through engaging with security challenges and builds a safe infrastructure for IoT devices. The book helps readers gain an understand of security architecture through IoT and describes the state of the art of IoT countermeasures. It also differentiates security threats in IoT-enabled infrastructure from traditional ad hoc or infrastructural networks, and provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, in IoT. This book aims to provide the concepts of related technologies and novel findings of the researchers through its chapter organization. The primary audience includes specialists, researchers, graduate students, designers, experts and engineers who are focused on research and security related issues. Souvik Pal, PhD, has worked as Assistant Professor in Nalanda Institute of Technology, Bhubaneswar, and JIS College of Engineering, Kolkata (NAAC "A" Accredited College). He is the organizing Chair and Plenary Speaker of RICE Conference in Vietnam; and organizing co-convener of ICICIT, Tunisia. He has served in many conferences as chair, keynote speaker, and he also chaired international conference sessions and presented session talks internationally. His research area includes Cloud Computing, Big Data, Wireless Sensor Network (WSN), Internet of Things, and Data Analytics. Vicente Garcia-Diaz, PhD, is an Associate Professor in the Department of Computer Science at the University of Oviedo (Languages and Computer Systems area). He is also the editor of several special issues in prestigious journals such as Scientific Programming and International Journal of Interactive Multimedia and Artificial Intelligence. His research interests include eLearning, machine learning and the use of domain specific languages in different areas. Dac-Nhuong Le, PhD, is Deputy-Head of Faculty of Information Technology, and Vice-Director of Information Technology Apply and Foreign Language Training Center, Haiphong University, Vietnam. His area of research includes: evaluation computing and approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT and image processing in biomedical. Presently, he is serving on the editorial board of several international journals and has authored nine computer science books published by Springer, Wiley, CRC Press, Lambert Publication, and Scholar Press.
Since the Chinese were officially plugged into the virtual community in 1994, the usage of the internet in the country has developed at an incredible rate. By the end of 2008, there were approximately 298 million netizens in China, a number which surpasses that of the U.S. and ranks China the highest user in the world. The rapid development of the online Chinese community has not only boosted the information flow among citizens across the territory, but has also created a new form of social interaction between the state, the media, various professionals and intellectuals, as well as China's ordinary citizens. Although the subject of this book is online Chinese nationalism, which to a certain extent is seen as a pro-regime phenomenon, the emergence of an online civil society in China intrinsically provides some form of supervision of state power-perhaps even a check on it. The fact that the party-state has made use of this social interaction, while at the same time remaining worried about the negative impact of the same netizens, is a fundamental characteristic of the nature of the relationship between the state and the internet community. Many questions arise when considering the internet and Chinese nationalism. Which are the most important internet sites carrying online discussion of nationalism related to the author's particular area of study? What are the differences between online nationalism and the conventional form of nationalism, and why do these differences exist? Has nationalist online expression influenced actual foreign policy making? Has nationalist online expression influenced discourse in the mainstream mass media in China? Have there been any counter reactions towards online nationalism? Where do they come from? Online Chinese Nationalism and China's Bilateral Relations seeks to address these questions.
"Best of the Web - Geography" is the first title in a new series of evaluative guides, which guide the reader through the best web sites within a subject area. The book is compiled with the reader in mind and has a very clear, consistent and systematic layout. A large number of sites have been evaluated. The book contains information on geographical sites around the world. Only sites, which are considered to be informative, reliable and stable have been included. All the sites listed will provide valuable information within this subject area. The information given for each site includes: title, URL, owner/maintainer, server location, and a full description. This is an excellent guide, which will be invaluable to anyone seeking geographical information on the Web. It is an essential reference source for librarians and information officers, students and library users in the academic, public and commercial sectors.
This book describes efficient and effective techniques for harnessing the power of Linked Data by tackling the various aspects of managing its growing volume: storing, querying, reasoning, provenance management and benchmarking. To this end, Chapter 1 introduces the main concepts of the Semantic Web and Linked Data and provides a roadmap for the book. Next, Chapter 2 briefly presents the basic concepts underpinning Linked Data technologies that are discussed in the book. Chapter 3 then offers an overview of various techniques and systems for centrally querying RDF datasets, and Chapter 4 outlines various techniques and systems for efficiently querying large RDF datasets in distributed environments. Subsequently, Chapter 5 explores how streaming requirements are addressed in current, state-of-the-art RDF stream data processing. Chapter 6 covers performance and scaling issues of distributed RDF reasoning systems, while Chapter 7 details benchmarks for RDF query engines and instance matching systems. Chapter 8 addresses the provenance management for Linked Data and presents the different provenance models developed. Lastly, Chapter 9 offers a brief summary, highlighting and providing insights into some of the open challenges and research directions. Providing an updated overview of methods, technologies and systems related to Linked Data this book is mainly intended for students and researchers who are interested in the Linked Data domain. It enables students to gain an understanding of the foundations and underpinning technologies and standards for Linked Data, while researchers benefit from the in-depth coverage of the emerging and ongoing advances in Linked Data storing, querying, reasoning, and provenance management systems. Further, it serves as a starting point to tackle the next research challenges in the domain of Linked Data management.
e-Finance: The Electronic Revolution is the first comprehensive and practical attempt to chart the history, progress and future of B2B and B2C electronic financial services. It explains clearly and concisely how and why the world of retail and institutional finance has started a migration from conventional foundations to computerized, Internet-driven practices, and considers where such efforts will ultimately lead. Industry examples from different countries and markets are included throughout the book to illustrate the expansion, failures, successes, and future of electronic finance.
The V-chip is a highly significant part of the discussion about
whether television (or broadcasting in general) deserves some
special attention in terms of its accessibility to children, its
particular power to affect conduct, and its invasiveness. But as
this notion of filtering and labeling has caught the imagination of
the regulator, the legislator, and all those who wish to consider
new ways to alter bargaining over imagery in society, the very
"idea" of the V-chip or its equivalent is moving across other
technologies, including the Internet. The V-chip issue has also
fueled the ongoing debate about violence and sexual practices in
society, and how representations on television relate to those
practices.
Whether you re already in the cloud, or determining whether or not it makes sense for your organization, Cloud Computing and Software Services: Theory and Techniques provides the technical understanding needed to develop and maintain state-of-the-art cloud computing and software services. From basic concepts and recent research findings to future directions, it gathers the insight of 50 experts from around to present a global perspective on the range of technical topics related to cloud computing and Software as a Service (SaaS). The book also: Reviews real cases and applications of cloud computing Witten in a manner that makes this complex subject easy to understand, this is an ideal one-stop reference for anyone interested in cloud computing. The accessible language and wealth of illustrations also make it suitable for academic and research-oriented settings. The comprehensive coverage supplies you with the understanding of cloud computing technologies and trends in parallel computing needed to establish and maintain effective and efficient computing and software services. Praise for: a must for professionals and executives as each chapter is
contributed by a team of highly accomplished and acclaimed
researchers, pundits, and professors.
This book collates the key security and privacy concerns faced by individuals and organizations who use various social networking sites. This includes activities such as connecting with friends, colleagues, and family; sharing and posting information; managing audio, video, and photos; and all other aspects of using social media sites both professionally and personally. In the setting of the Internet of Things (IoT) that can connect millions of devices at any one time, the security of such actions is paramount. Securing Social Networks in Cyberspace discusses user privacy and trust, location privacy, protecting children, managing multimedia content, cyberbullying, and much more. Current state-of-the-art defense mechanisms that can bring long-term solutions to tackling these threats are considered in the book. This book can be used as a reference for an easy understanding of complex cybersecurity issues in social networking platforms and services. It is beneficial for academicians and graduate-level researchers. General readers may find it beneficial in protecting their social-media-related profiles.
This new volume provides an informative collection of chapters on ICT and data analytics in education, helping to lead the digital revolution in higher education. The chapters emphasize skill development through ICT, artificial intelligence in education, policies for integrating ICT in higher education, and more. The book focuses mainly on technological advancements in ICT in education, the perceived role of ICT in the teaching-learning transaction, pedagogy for teaching-learning in the 21st century, student-centered learning based on ICT, learning analytics, online technologies learning, tools for technology enhanced learning, distance education and learning, the effective use of ICT in management education, experiences in ICT for technology-enhanced learning, influence of ICT in research development in higher education, role of teachers in direct classroom teaching in web-based education system, and role of ICT in innovation capacity building. The case studies help to illustrate the ideas and concepts discussed in the chapters.
Cinematic Virtual Reality brings a combination of documentary, narrative and game design principles to the medical profession and, in the healthcare arena, collaboration is a key component for creating intellectually- and emotionally- rich immersive experiences. "The Power of Virtual Reality Cinema for Healthcare Training" gathers more than a dozen experts from both the production and healthcare fields to break down best practices for creating successful cine-VR projects. Designed for multi-disciplinary teams interested in integrating cine-VR production into their healthcare training and educational programs, this book has been written for two audiences: the healthcare professional interested in what production experts consider when approaching a project, and the media expert curious about how this new technology can be used in the medical field. Highlights include: Cutting edge medical education techniques developed by Ohio University's GRID Lab, including: PREality (creating a forced sense of deja-vu to increase acclimation time), a unique approach to eye-tracking to enhance team performance, and the low-CRIS technique (a low-cost rapid implementation strategy to capture patient care for rapid graduate student training). Insightful production techniques that will enhance your cine-VR projects including advanced plating methods to hide lighting set-ups, immersive audio considerations, and new ways to consider 360 storytelling including the Lovrick montage and the Christmas Carol continuum for story development. Detailed explanations of the production considerations and results of specific cine-VR productions (from funding approaches to distribution) including access to more than five hours of cine-VR examples of the actual productions available for download. Details on a wide variety of medical cine-VR projects, including 100 images that illustrate best practices for topics such as recording in active medical facilities, building successful multi-disciplinary teams, working within HIPAA regulations, conceptualizing cine-VR libraries for graduate education, and implementing innovative distribution models.
Virtual English examines English language communication on the World Wide Web, focusing on Internet practices crafted by underserved communities in the US and overlooked participants in several Asian Diaspora communities. Jillana Enteen locates instances where subjects use electronic media to resist popular understandings of cyberspace, computer-mediated communication, nation and community, presenting unexpected responses to the forces of globalization and predominate US value systems. The populations studied here contribute websites, conversations and artifacts that employ English strategically, broadening and splintering the language to express their concerns in the manner they perceive as effective. Users are thus afforded new opportunities to transmit information, conduct conversations, teach and make decisions, shaping, in the process, both language and technology. Moreover, web designers and writers conjure distinct versions of digitally enhanced futures -- computer-mediated communicationmay attract audiences previously out of reach. The subjects of Virtual English challenge prevailing deployments and conceptions of emerging technologies. Their on-line practices illustrate that the Internet need not replicate current geopolitical beliefs and practices and that reconfigurations exist in tandem with dominant models.
Virtual English examines English language communication on the World Wide Web, focusing on Internet practices crafted by underserved communities in the US and overlooked participants in several Asian Diaspora communities. Jillana Enteen locates instances where subjects use electronic media to resist popular understandings of cyberspace, computer-mediated communication, nation and community, presenting unexpected responses to the forces of globalization and predominate US value systems. The populations studied here contribute websites, conversations and artifacts that employ English strategically, broadening and splintering the language to express their concerns in the manner they perceive as effective. Users are thus afforded new opportunities to transmit information, conduct conversations, teach and make decisions, shaping, in the process, both language and technology. Moreover, web designers and writers conjure distinct versions of digitally enhanced futures -- computer-mediated communication may attract audiences previously out of reach. The subjects of Virtual English challenge prevailing deployments and conceptions of emerging technologies. Their on-line practices illustrate that the Internet need not replicate current geopolitical beliefs and practices and that reconfigurations exist in tandem with dominant models.
Linda Morrison brings the voices and issues of a little-known, complex social movement to the attention of sociologists, mental health professionals, and the general public. The members of this social movement work to gain voice for their own experience, to raise consciousness of injustice and inequality, to expose the darker side of psychiatry, and to promote alternatives for people in emotional distress. Talking Back to Psychiatry explores the movement's history, its complex membership, its strategies and goals, and the varied response it has received from psychiatry, policy makers, and the public at large.
What does it mean to 'belong' to an online community? What happens to the body in cyberspace? How has the Internet been theorised: as a site of liberation, duplicity, threat? In her reading of cyberculture studies after the affective turn, the author argues for a new cyberculture studies that goes beyond dominant cultural narratives of the Internet as dystopian or utopian space, and pays attention to the ways in which online culture has become embedded in everyday lives. The book intervenes in narratives of virtual reality to propose that the Internet can be re-read as a space of fantasy. This book draws on readings of the everyday, taken-for-granted sites of digital culture that have often been overlooked by cyberculture studies. Specific themes include religious fundamentalist sites and hate speech, online mourning, vampire homepages, virtual fashion and food shopping sites, and pro-anorexic communities. The book is attentive to the continuities and disruptions between online and offline experience. The author examines the ways in which bodies, subjects and communities are produced and reproduced through the stories we tell about online belongings.
Equips students and recent graduates with the tools and confidence to develop their own digital presence, addressing the growth in employability and professional skills courses globally; Unlike competing texts, requires no pre-existing technical knowledge, approaching the subject from a strategic and employability perspective rather than a technical or purely marketing approach; Introduces the new ABCDE framework and a series of practical tools and international case studies
This highly topical text considers the construction of the next
generation of the Web, called the Semantic Web. This will enable
computers to automatically consume Web-based information,
overcoming the human-centric focus of the Web as it stands at
present, and expediting the construction of a whole new class of
knowledge-based applications that will intelligently utilize Web
content. |
You may like...
Hockly's Insolvency Law Casebook
R. Sharrock, L.S. Steyn, …
Paperback
Advanced CAD Modeling - Explicit…
Nikola Vukasinovic, Joze Duhovnik
Hardcover
R3,353
Discovery Miles 33 530
Progress in Medicinal Chemistry, Volume…
F.D. King, G. Lawton
Hardcover
R4,360
Discovery Miles 43 600
|