![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > General
It's axiomatic to state that people fear what they do not understand, and this is especially true when it comes to technology. However, despite their prevalence, computers remain shrouded in mystery, and many users feel apprehensive when interacting with them. Smartphones have only exacerbated the issue. Indeed, most users of these devices leverage only a small fraction of the power they hold in their hands. How Things Work: The Computer Science Edition is a roadmap for readers who want to overcome their technophobia and harness the full power of everyday technology. Beginning with the basics, the book demystifies the mysterious world of computer science, explains its fundamental concepts in simple terms, and answers the questions many users feel too intimidated to ask. By the end of the book, readers will understand how computers and smart devices function and, more important, how they can make these devices work for them. To complete the picture, the book also introduces readers to the darker side of modern technology: security and privacy concerns, identity theft, and threats from the Dark Web.
"Best of the Web - Geography" is the first title in a new series of evaluative guides, which guide the reader through the best web sites within a subject area. The book is compiled with the reader in mind and has a very clear, consistent and systematic layout. A large number of sites have been evaluated. The book contains information on geographical sites around the world. Only sites, which are considered to be informative, reliable and stable have been included. All the sites listed will provide valuable information within this subject area. The information given for each site includes: title, URL, owner/maintainer, server location, and a full description. This is an excellent guide, which will be invaluable to anyone seeking geographical information on the Web. It is an essential reference source for librarians and information officers, students and library users in the academic, public and commercial sectors.
This book describes efficient and effective techniques for harnessing the power of Linked Data by tackling the various aspects of managing its growing volume: storing, querying, reasoning, provenance management and benchmarking. To this end, Chapter 1 introduces the main concepts of the Semantic Web and Linked Data and provides a roadmap for the book. Next, Chapter 2 briefly presents the basic concepts underpinning Linked Data technologies that are discussed in the book. Chapter 3 then offers an overview of various techniques and systems for centrally querying RDF datasets, and Chapter 4 outlines various techniques and systems for efficiently querying large RDF datasets in distributed environments. Subsequently, Chapter 5 explores how streaming requirements are addressed in current, state-of-the-art RDF stream data processing. Chapter 6 covers performance and scaling issues of distributed RDF reasoning systems, while Chapter 7 details benchmarks for RDF query engines and instance matching systems. Chapter 8 addresses the provenance management for Linked Data and presents the different provenance models developed. Lastly, Chapter 9 offers a brief summary, highlighting and providing insights into some of the open challenges and research directions. Providing an updated overview of methods, technologies and systems related to Linked Data this book is mainly intended for students and researchers who are interested in the Linked Data domain. It enables students to gain an understanding of the foundations and underpinning technologies and standards for Linked Data, while researchers benefit from the in-depth coverage of the emerging and ongoing advances in Linked Data storing, querying, reasoning, and provenance management systems. Further, it serves as a starting point to tackle the next research challenges in the domain of Linked Data management.
The V-chip is a highly significant part of the discussion about
whether television (or broadcasting in general) deserves some
special attention in terms of its accessibility to children, its
particular power to affect conduct, and its invasiveness. But as
this notion of filtering and labeling has caught the imagination of
the regulator, the legislator, and all those who wish to consider
new ways to alter bargaining over imagery in society, the very
"idea" of the V-chip or its equivalent is moving across other
technologies, including the Internet. The V-chip issue has also
fueled the ongoing debate about violence and sexual practices in
society, and how representations on television relate to those
practices.
Unit Integration Testing (UIT) had been a challenge because there was no tool that could help in XHR programming and unit integration validations in an efficient way until Cypress arrived. Cypress started releasing versions in 2015 and became popular in 2018 with version 2.0.0. This book explores Cypress scripts that help implement 'shift left testing', which is a dream come true for many software testers. Shift left occurs in the majority of testing projects, but could not be implemented fully because tools were unavailable and knowledge was lacking about the possibilities of testing early in the life cycle. Shift left is a key testing strategy to help testing teams focus less on defect identifications and more on developing practices to prevent defects. Cypress scripts can help front-end developers and quality engineers to work together to find defects soon after web components are built. These components can be tested immediately after they are built with Cypress Test Driven Development (TDD) scripts. Thus, defects can be fixed straight away during the development stage. Testing teams do not have to worry about finding these same defects in a later development stage because Cypress tests keep verifying components in the later stages. Defect fixing has become much cheaper with Cypress than when other tools are used. The book also covers Behaviour Driven Development (BDD)-based Gherkin scripts and the Cypress Cucumber preprocessor, which can improve test scenario coverage. Automated Software Testing with Cypress is written to fulfil the BDD and TDD needs of testing teams. Two distinct open source repositories are provided in Github to help start running Cypress tests in no time!
What Is Thinking? What is Turing's Test? What is Godel's Undecidability Theorem? How is Berners-Lee's Semantic Web logic going to overcome paradoxes and complexity to produce machine processing on the Web? Thinking on the Web draws from the contributions of Tim Berners-Lee (What is solvable on the Web?), Kurt Godel (What is decidable?), and Alan Turing (What is machine intelligence?) to evaluate how much "intelligence" can be projected onto the Web. The authors offer both abstract and practical perspectives to delineate the opportunities and challenges of a "smarter" Web through a threaded series of vignettes and a thorough review of Semantic Web development.
e-Finance: The Electronic Revolution is the first comprehensive and practical attempt to chart the history, progress and future of B2B and B2C electronic financial services. It explains clearly and concisely how and why the world of retail and institutional finance has started a migration from conventional foundations to computerized, Internet-driven practices, and considers where such efforts will ultimately lead. Industry examples from different countries and markets are included throughout the book to illustrate the expansion, failures, successes, and future of electronic finance.
Virtual English examines English language communication on the World Wide Web, focusing on Internet practices crafted by underserved communities in the US and overlooked participants in several Asian Diaspora communities. Jillana Enteen locates instances where subjects use electronic media to resist popular understandings of cyberspace, computer-mediated communication, nation and community, presenting unexpected responses to the forces of globalization and predominate US value systems. The populations studied here contribute websites, conversations and artifacts that employ English strategically, broadening and splintering the language to express their concerns in the manner they perceive as effective. Users are thus afforded new opportunities to transmit information, conduct conversations, teach and make decisions, shaping, in the process, both language and technology. Moreover, web designers and writers conjure distinct versions of digitally enhanced futures -- computer-mediated communication may attract audiences previously out of reach. The subjects of Virtual English challenge prevailing deployments and conceptions of emerging technologies. Their on-line practices illustrate that the Internet need not replicate current geopolitical beliefs and practices and that reconfigurations exist in tandem with dominant models.
From its launch in 1997, the Frankfurt technology stock exchange developed spectacularly as did other European technology exchanges. Many Europeans thought that a new age of entrepreneurship had dawned. Following the downturn, however, the search for blame began. Much of this blame was undifferentiated and subjective. Public policy lessons were not drawn. Written by a well-known commentator of the European venture capital community, this book analyses the rise and decline of European internet entrepreneurship. The effects of both the public promotion of venture capital investments as well as the timing of telecommunications reform are examined in detail in various European countries, in particular in Germany and Sweden. The book contains a wealth of unique data on the failure of European internet ventures and draws several technology and telecommunications policy conclusions.
Power and Authority in Internet Governance investigates the hotly contested role of the state in today's digital society. The book asks: Is the state "back" in internet regulation? If so, what forms are state involvement taking, and with what consequences for the future? The volume includes case studies from across the world and addresses a wide range of issues regarding internet infrastructure, data and content. The book pushes the debate beyond a simplistic dichotomy between liberalism and authoritarianism in order to consider also greater state involvement based on values of democracy and human rights. Seeing internet governance as a complex arena where power is contested among diverse non-state and state actors across local, national, regional and global scales, the book offers a critical and nuanced discussion of how the internet is governed - and how it should be governed. Power and Authority in Internet Governance provides an important resource for researchers across international relations, global governance, science and technology studies and law as well as policymakers and analysts concerned with regulating the global internet.
This new volume provides an informative collection of chapters on ICT and data analytics in education, helping to lead the digital revolution in higher education. The chapters emphasize skill development through ICT, artificial intelligence in education, policies for integrating ICT in higher education, and more. The book focuses mainly on technological advancements in ICT in education, the perceived role of ICT in the teaching-learning transaction, pedagogy for teaching-learning in the 21st century, student-centered learning based on ICT, learning analytics, online technologies learning, tools for technology enhanced learning, distance education and learning, the effective use of ICT in management education, experiences in ICT for technology-enhanced learning, influence of ICT in research development in higher education, role of teachers in direct classroom teaching in web-based education system, and role of ICT in innovation capacity building. The case studies help to illustrate the ideas and concepts discussed in the chapters.
This handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues. As more organizations use cloud computing and cloud providers for data operations, the need for proper security in these and other potentially vulnerable areas has become a global priority for organizations of all sizes. Research efforts from academia and industry, as conducted and reported by experts in all aspects of security related to cloud computing, are gathered within one reference guide. Features * Covers patching and configuration vulnerabilities of a cloud server * Evaluates methods for data encryption and long-term storage in a cloud server * Demonstrates how to verify identity using a certificate chain and how to detect inappropriate changes to data or system configurations John R. Vacca is an information technology consultant and internationally known author of more than 600 articles in the areas of advanced storage, computer security, and aerospace technology. John was also a configuration management specialist, computer specialist, and the computer security official (CSO) for NASA's space station program (Freedom) and the International Space Station Program from 1988 until his retirement from NASA in 1995.
Virtual English examines English language communication on the World Wide Web, focusing on Internet practices crafted by underserved communities in the US and overlooked participants in several Asian Diaspora communities. Jillana Enteen locates instances where subjects use electronic media to resist popular understandings of cyberspace, computer-mediated communication, nation and community, presenting unexpected responses to the forces of globalization and predominate US value systems. The populations studied here contribute websites, conversations and artifacts that employ English strategically, broadening and splintering the language to express their concerns in the manner they perceive as effective. Users are thus afforded new opportunities to transmit information, conduct conversations, teach and make decisions, shaping, in the process, both language and technology. Moreover, web designers and writers conjure distinct versions of digitally enhanced futures -- computer-mediated communicationmay attract audiences previously out of reach. The subjects of Virtual English challenge prevailing deployments and conceptions of emerging technologies. Their on-line practices illustrate that the Internet need not replicate current geopolitical beliefs and practices and that reconfigurations exist in tandem with dominant models.
Handbook on Networked Multipoint Multimedia Conferencing and Multistream Immsersive Telepresence using SIP: Scalable Distributed Applications and Media Control over Internet is the first book to put together all IETF request for comments (RFCs), and the internet drafts standards related to the multipoint conferencing and immersive telepresence. This book includes mandatory and optional texts of all standards in a chronological and systematic way almost with one-to-one integrity from the beginning to end, allowing the reader to understand all aspects of the highly complex real-time applications. It is a book that network designers, software developers, product manufacturers, implementers, interoperability testers, professionals, professors, and researchers will find to be immensely useful. Practitioners and engineers in all spectrums who are concentrating on building the real-time, scalable, interoperable multipoint applications, can use this book to make informed choices based on technical standards in the market place, on all proprietary non-scalable and non-interposable products. This book will provide focus and foundation for these decision makers.
The amount of data in everyday life has been exploding. This data increase has been especially significant in scientific fields, where substantial amounts of data must be captured, communicated, aggregated, stored, and analyzed. Cloud Computing with e-Science Applications explains how cloud computing can improve data management in data-heavy fields such as bioinformatics, earth science, and computer science. The book begins with an overview of cloud models supplied by the National Institute of Standards and Technology (NIST), and then: Discusses the challenges imposed by big data on scientific data infrastructures, including security and trust issues Covers vulnerabilities such as data theft or loss, privacy concerns, infected applications, threats in virtualization, and cross-virtual machine attack Describes the implementation of workflows in clouds, proposing an architecture composed of two layers-platform and application Details infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS), and software-as-a-service (SaaS) solutions based on public, private, and hybrid cloud computing models Demonstrates how cloud computing aids in resource control, vertical and horizontal scalability, interoperability, and adaptive scheduling Featuring significant contributions from research centers, universities, and industries worldwide, Cloud Computing with e-Science Applications presents innovative cloud migration methodologies applicable to a variety of fields where large data sets are produced. The book provides the scientific community with an essential reference for moving applications to the cloud.
This work studies the development of bilateral relations in two pairs of states (dyads): Argentina-Brazil and Argentina-Chile. It takes on a moderate constructivist approach that incorporates into the analysis of international relations the role of identities, ideas and perceptions as well as of material forces, and understands that the former are affected and changed during interaction. It also uses to securitization theory to explain how issues come or cease to be considered security matters through social constructions.
Linda Morrison brings the voices and issues of a little-known, complex social movement to the attention of sociologists, mental health professionals, and the general public. The members of this social movement work to gain voice for their own experience, to raise consciousness of injustice and inequality, to expose the darker side of psychiatry, and to promote alternatives for people in emotional distress. Talking Back to Psychiatry explores the movement's history, its complex membership, its strategies and goals, and the varied response it has received from psychiatry, policy makers, and the public at large.
Visualizing with Text uncovers the rich palette of text elements usable in visualizations from simple labels through to documents. Using a multidisciplinary research effort spanning across fields including visualization, typography, and cartography, it builds a solid foundation for the design space of text in visualization. The book illustrates many new kinds of visualizations, including microtext lines, skim formatting, and typographic sets that solve some of the shortcomings of well-known visualization techniques. Key features: More than 240 illustrations to aid inspiration of new visualizations Eight new approaches to data visualization leveraging text Quick reference guide for visualization with text Builds a solid foundation extending current visualization theory Bridges between visualization, typography, text analytics, and natural language processing The author website, including teaching exercises and interactive demos and code, can be found here. Designers, developers, and academics can use this book as a reference and inspiration for new approaches to visualization in any application that uses text.
The Internet in China reflects many contradictions and complexities of the society in which it is embedded. Despite the growing significance of digital media and communication technologies, research on their contingent, non-linear, and sometimes paradoxical impact on civic engagement remains theoretically underdeveloped and empirically understudied. As importantly, many studies on the internet's implications in Chinese societies have focused on China. This book draws on a variety of theoretical and methodological approaches to advance a balanced and context-rich understanding of the effects of digital media and communication technologies, especially social media, for state legitimacy, the rise of issue-based networks, the growth of the public sphere, and various forms of civic engagement in China, Taiwan, and the global Chinese diaspora. Using ethnography, interview, experiment, survey, and the big data method, scholars from North America, Europe, and Asia show that the couture and impacts of digital activism depend on issue and context. This book was originally published as a special issue of Information, Communication & Society.
Is your enterprise's strategy for cybersecurity just crossing its fingers and hoping nothing bad ever happens? If so...you're not alone. Getting cybersecurity right is all too often an afterthought for Fortune 500 firms, bolted on and hopefully creating a secure environment. We all know this approach doesn't work, but what should a smart enterprise do to stay safe? Today, cybersecurity is no longer just a tech issue. In reality, it never was. It's a management issue, a leadership issue, a strategy issue: It's a "must have right"...a survival issue. Business leaders and IT managers alike need a new paradigm to work together and succeed. After years of distinguished work as a corporate executive, board member, author, consultant, and expert witness in the field of risk management and cybersecurity, David X Martin is THE pioneering thought leader in the new field of CyRMSM. Martin has created an entirely new paradigm that approaches security as a business problem and aligns it with business needs. He is the go-to guy on this vitally important issue. In this new book, Martin shares his experience and expertise to help you navigate today's dangerous cybersecurity terrain, and take proactive steps to prepare your company-and yourself -to survive, thrive, and keep your data (and your reputation) secure.
Having toppled the bookselling giants on-line, Jeff Bezos is now
leading Amazon.com
The Future of Digital Data, Heritage and Curation critiques digital cultural heritage concepts and their application to data, developing new theories, curatorial practices and a more-than-human museology for a contemporary and future world. Presenting a diverse range of case examples from around the globe, Cameron offers a critical and philosophical reflection on the ways in which digital cultural heritage is currently framed as societal data worth passing on to future generations in two distinct forms: digitally born and digitizations. Demonstrating that most perceptions of digital cultural heritage are distinctly western in nature, the book also examines the complicity of such heritage in climate change, and environmental destruction and injustice. Going further still, the book theorizes the future of digital data, heritage, curation and the notion of the human in the context of the profusion of new types of societal data and production processes driven by the intensification of data economies and through the emergence of new technologies. In so doing, the book makes a case for the development of new types of heritage that comprise AI, automated systems, biological entities, infrastructures, minerals and chemicals - all of which have their own forms of agency, intelligence and cognition. The Future of Digital Data, Heritage and Curation is essential reading for academics and students engaged in the study of museums, archives, libraries, galleries, archaeology, cultural heritage management, information management, curatorial studies and digital humanities.
What does it mean to 'belong' to an online community? What happens to the body in cyberspace? How has the Internet been theorised: as a site of liberation, duplicity, threat? In her reading of cyberculture studies after the affective turn, the author argues for a new cyberculture studies that goes beyond dominant cultural narratives of the Internet as dystopian or utopian space, and pays attention to the ways in which online culture has become embedded in everyday lives. The book intervenes in narratives of virtual reality to propose that the Internet can be re-read as a space of fantasy. This book draws on readings of the everyday, taken-for-granted sites of digital culture that have often been overlooked by cyberculture studies. Specific themes include religious fundamentalist sites and hate speech, online mourning, vampire homepages, virtual fashion and food shopping sites, and pro-anorexic communities. The book is attentive to the continuities and disruptions between online and offline experience. The author examines the ways in which bodies, subjects and communities are produced and reproduced through the stories we tell about online belongings.
This highly topical text considers the construction of the next
generation of the Web, called the Semantic Web. This will enable
computers to automatically consume Web-based information,
overcoming the human-centric focus of the Web as it stands at
present, and expediting the construction of a whole new class of
knowledge-based applications that will intelligently utilize Web
content. |
You may like...
Alfred'S Basic All in One Sacred Course…
Willard A Palmer, Morton Manus, …
Paperback
(1)R237 Discovery Miles 2 370
Centralising Public Procurement - The…
Carina Risvig Hamer, Mario Comba
Hardcover
R4,323
Discovery Miles 43 230
Pearson Edexcel International GCSE (9-1…
Brian Arnold, Steve Woolley, …
Paperback
R1,253
Discovery Miles 12 530
Embedded, Cyber-Physical, and IoT…
Shuvra S. Bhattacharyya, Miodrag Potkonjak, …
Hardcover
R2,688
Discovery Miles 26 880
Engineering Instruction for High-Ability…
National Assoc for Gifted Children, Alicia Cotabish
Paperback
R1,044
Discovery Miles 10 440
|