![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > General
Canadian Semantic Web is an edited volume based on the first Canadian Web Working Symposium, June 2006, in Quebec, Canada. It is the first edited volume based on this subject. This volume includes, but is not limited to, the following popular topics: "Trust, Privacy, Security on the Semantic Web," "Semantic Grid and Semantic Grid Services" and "Semantic Web Mining."
Replete with interviews with key practitioners (both in the book and online) will give up-to-date information on the techniques, forms and concepts used by leading figures in contemporary Live Visuals.
An Interdisciplinary Approach to Modern Network Security presents the latest methodologies and trends in detecting and preventing network threats. Investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students, professionals, practitioners, network analysts and technology specialists interested in the simulation and application of computer network protection. It presents theoretical frameworks and the latest research findings in network security technologies, while analyzing malicious threats which can compromise network integrity. It discusses the security and optimization of computer networks for use in a variety of disciplines and fields. Touching on such matters as mobile and VPN security, IP spoofing and intrusion detection, this edited collection emboldens the efforts of researchers, academics and network administrators working in both the public and private sectors. This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, web security and much more. Information and communication systems are an essential component of our society, forcing us to become dependent on these infrastructures. At the same time, these systems are undergoing a convergence and interconnection process that has its benefits, but also raises specific threats to user interests. Citizens and organizations must feel safe when using cyberspace facilities in order to benefit from its advantages. This book is interdisciplinary in the sense that it covers a wide range of topics like network security threats, attacks, tools and procedures to mitigate the effects of malware and common network attacks, network security architecture and deep learning methods of intrusion detection.
Packed with projects and inspirational ideas you can do any time, any place, become an accomplished photographer while feeding your creativity with this guide that reveals what just what your smartphone camera is capable of. A camera phone is something we always have on us and creativity is something we all have in us but often we struggle to use them properly, feeling like we don't have the time, space or inclination to dedicate to it. Here, photography expert and bestselling author Jo Bradford supplies a collection of practical exercises that allow you to master the features on your smartphone camera to take incredible images and also help you to easily reconnect with your creative side. By encouraging you to try something different with your camera and seek out creative opportunities - from light painting to collage, image stacking to time-lapse landscapes - soon you will once again feel the satisfaction of thinking and acting creatively, with the added benefit of taking you from a snapper to an accomplished photographer with visual literacy. Smartphone photography is addictive with a tangible feel-good factor; it's time to embrace it and capture the moments that matter to you in all their glory.
This book provides an overview of the emerging smart connected world, and discusses the roles and the usage of underlying semantic computing and Internet-of-Things (IoT) technologies. The book comprises ten chapters overall, grouped in two parts. Part I "Smart Connected World: Overview and Technologies" consists of seven chapters and provides a holistic overview of the smart connected world and its supporting tools and technologies. Part II "Applications and Case Studies" consists of three chapters that describe applications and case studies in manufacturing, smart cities, health, and more. Each chapter is self-contained and can be read independently; taken together, readers get a bigger picture of the technological and application landscape of the smart connected world. This book is of interest for researchers, lecturers, and practitioners in Semantic Web, IoT and related fields. It can serve as a reference for instructors and students taking courses in hybrid computing getting abreast of cutting edge and future directions of a connected ecosystem. It will also benefit industry professionals like software engineers or data scientists, by providing a synergy between Web technologies and applications. This book covers the most important topics on the emerging field of the smart connected world. The contributions from leading active researchers and practitioners in the field are thought provoking and can help in learning and further research. The book is a valuable resource that will benefit academics and industry. It will lead to further research and advancement of the field. Bharat K. Bhargava, Professor of Computer Science, Purdue University, United States
The Internet of Things (IoT) has become a major influence on the development of new technologies and innovations. When utilized properly, these applications can enhance business functions and make them easier to perform. Protocols and Applications for the Industrial Internet of Things discusses and addresses the difficulties, challenges, and applications of IoT in industrial processes and production and work life. Featuring coverage on a broad range of topics such as industrial process control, machine learning, and data mining, this book is geared toward academicians, computer engineers, students, researchers, and professionals seeking current and relevant research on applications of the IoT.
Containing the edited research papers resulting from an ambitious, cross-disciplinary research project, this volume examines the spatiality of virtual inhabited 3D worlds - virtual reality and cyberspace. (Three other volumes look at Interaction, Staging and Methodology.) It is about the communication spaces emerging at the Internet and supported by special 3D interfaces. It is also about the virtual spaces created by virtual reality hardware (CAVEs, panoramic screens, head mounted display systems etc.) and software.Virtual Space: Spatiality in Virtual Inhabited 3D Worlds is interdisciplinary. It deals with philosophical, psychological, communicational, technological and aesthetic aspects of space. While philosophy raises the question concerning the ontology of space - what is space - psychology deals with our perception of space. Communication theory looks at the way in which space supports communication (i.e. that space is a medium for communication), and finally aesthetic analyses exemplify the use of virtual space in virtual cities, in museums and in art.
This book provides practical information about web archives, offers inspiring examples for web archivists, raises new challenges, and shares recent research results about access methods to explore information from the past preserved by web archives. The book is structured in six parts. Part 1 advocates for the importance of web archives to preserve our collective memory in the digital era, demonstrates the problem of web ephemera and shows how web archiving activities have been trying to address this challenge. Part 2 then focuses on different strategies for selecting web content to be preserved and on the media types that different web archives host. It provides an overview of efforts to address the preservation of web content as well as smaller-scale but high-quality collections of social media or audiovisual content. Next, Part 3 presents examples of initiatives to improve access to archived web information and provides an overview of access mechanisms for web archives designed to be used by humans or automatically accessed by machines. Part 4 presents research use cases for web archives. It also discusses how to engage more researchers in exploiting web archives and provides inspiring research studies performed using the exploration of web archives. Subsequently, Part 5 demonstrates that web archives should become crucial infrastructures for modern connected societies. It makes the case for developing web archives as research infrastructures and presents several inspiring examples of added-value services built on web archives. Lastly, Part 6 reflects on the evolution of the web and the sustainability of web archiving activities. It debates the requirements and challenges for web archives if they are to assume the responsibility of being societal infrastructures that enable the preservation of memory. This book targets academics and advanced professionals in a broad range of research areas such as digital humanities, social sciences, history, media studies and information or computer science. It also aims to fill the need for a scholarly overview to support lecturers who would like to introduce web archiving into their courses by offering an initial reference for students.
Mind your online P's and Q's with this expert digital manners guide Conducting yourself online can be challenging. It sometimes seems like the web and social media is tailor-made to cause upset and anger. But, with the right guide, anyone can learn how to be a beacon of civility and politeness online. In Digital Etiquette For Dummies, a team of online communication experts share their combined insights into improving your presence on social media, writing emails that exude positivity and clarity, behaving correctly in virtual meetings, and much more. You'll become a paragon of politeness as you learn to apply the timeless rules of etiquette to the unique environment of the web, social media, email, Zoom, and smartphones. In this book, you'll also: Learn near-universal etiquette rules for email, social media, cellphones, and more Discover ways to make sure that your polite attitude isn't being lost in the text-only context of a business email Avoid common social media pitfalls and digital faux pas that can trip up even the most careful communicators A great handbook for anyone who uses digital communication in business or in their personal life (so, pretty much everyone), Digital Etiquette For Dummies also belongs on the reading lists of those trying to improve their online interactions on social media.
This comprehensive volume explores the evolving fields of consumer informatics and telemedicine as envisioned by the Institute of Medicine in its landmark reports on the electronic medical record, patient safety, and quality care. Each chapter describes the role of computers, technology, and telecommunications as enablers within a specific application focused on the needs of consumers. The applications covered are ones which empower consumers as they seek information, analyze their health care needs, and make decisions about their own health care. Such applications empower professionals in their efforts to serve patients, while increasing the knowledge of the consumer. Richly illustrated with detailed examples, this volume speaks to a wide range of audiences as it addresses issues raised by consumer informatics, the use of technology, research and development effects, and telemedicine. Chapter highlights include: Patient-Centered Communication; Using the Internet Toward Reliable Consumer Health Information; Disease Management and Home Telehealth; and Biothreats and Disaster Management. The book's audience includes all healthcare professionals, healthcare administrators, IT professionals, health informaticians, and students.
In a world that is awash in ubiquitous technology, even the least tech-savvy know that we must take care how that technology affects individuals and society. That governments and organizations around the world now focus on these issues, that universities and research institutes in many different languages dedicate significant resources to study the issues, and that international professional organizations have adopted standards and directed resources toward ethical issues in technology is in no small part the result of the work of Simon Rogerson. - Chuck Huff, Professor of Social Psychology at Saint Olaf College, Northfield, Minnesota In 1995, Apple launched its first WWW server, Quick Time On-line. It was the year Microsoft released Internet Explorer and sold 7 million copies of Windows 95 in just 2 months. In March 1995, the author Simon Rogerson opened the first ETHICOMP conference with these words: We live in a turbulent society where there is social, political, economic and technological turbulence ... it is causing a vast amount of restructuring within all these organisations which impacts on individuals, which impacts on the way departments are set up, organisational hierarchies, job content, span of control, social interaction and so on and so forth. ... Information is very much the fuel of modern technological change. Almost anything now can be represented by the technology and transported to somewhere else. It's a situation where the more information a computer can process, the more of the world it can actually turn into information. That may well be very exciting, but it is also very concerning. That could be describing today. More than 25 years later, these issues are still at the forefront of how ethical digital technology can be developed and utilised. This book is an anthology of the author's work over the past 25 years of pioneering research in digital ethics. It is structured into five themes: Journey, Process, Product, Future and Education. Each theme commences with an introductory explanation of the papers, their relevance and their interrelationship. The anthology finishes with a concluding chapter which summarises the key messages and suggests what might happen in the future. Included in this chapter are insights from some younger leading academics who are part of the community charged with ensuring that ethical digital technology is realised.
Building Flickr Applications with PHP teaches you how to use today's most popular online photo management system. You'll learn to work with both your own photos and Flickr's enormous cache, and create new and compelling extensions to the Flickr platform. This book is a great pick because It's written by experienced developer Rob Kunkle and Phlickr developer Andrew Morton. You'll learn how to use the PHP API Phlickr to write and retrieve photos. Flicker is growing quickly in popularity in the online photo management world. Using the popular PHP-driven Phlickr API in conjunction with MySQL, you'll discover how to take advantage of open source tools like PHP, Apache, and MySQL, as well as the Flickr architecture, to manage, retrieve, and format photos in imaginative ways. You'll also learn how to build upon Flickr's photo collaboration features to create interfaces for working with others on photo album projects. And you'll learn how to format Flickr tags--taking advantage of RSS to distribute photo updates.
Blockchain technology is an emerging distributed, decentralized architecture and computing paradigm, which has accelerated the development and application of cloud, fog and edge computing; artificial intelligence; cyber physical systems; social networking; crowdsourcing and crowdsensing; 5g; trust management and finance; and other many useful sectors. Nowadays, the primary blockchain technology uses are in information systems to keep information secure and private. However, many threats and vulnerabilities are facing blockchain in the past decade such 51% attacks, double spending attacks, etc. The popularity and rapid development of blockchain brings many technical and regulatory challenges for research and academic communities. The main goal of this book is to encourage both researchers and practitioners of Blockchain technology to share and exchange their experiences and recent studies between academia and industry. The reader will be provided with the most up-to-date knowledge of blockchain in mainstream areas of security and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and p2p applications are increasing day-by-day, and the attackers adopt new mechanisms to threaten the security and privacy of the users in those environments). This book provides a detailed explanation of security and privacy with respect to blockchain for information systems, and will be an essential resource for students, researchers and scientists studying blockchain uses in information systems and those wanting to explore the current state of play.
Berkeley's philosophy has been much studied and discussed over the years, and a growing number of scholars have come to the realization that scientific and mathematical writings are an essential part of his philosophical enterprise. The aim of this volume is to present Berkeley's two most important scientific texts in a form which meets contemporary standards of scholarship while rendering them accessible to the modern reader. Although editions of both are contained in the fourth volume of the Works, these lack adequate introductions and do not provide com plete and corrected texts. The present edition contains a complete and critically established text of both De Motu and The Analyst, in addi tion to a new translation of De Motu. The introductions and notes are designed to provide the background necessary for a full understanding of Berkeley's account of science and mathematics. Although these two texts are very different, they are united by a shared a concern with the work of Newton and Leibniz. Berkeley's De Motu deals extensively with Newton's Principia and Leibniz's Specimen Dynamicum, while The Analyst critiques both Leibnizian and Newto nian mathematics. Berkeley is commonly thought of as a successor to Locke or Malebranche, but as these works show he is also a successor to Newton and Leibniz."
For the past couple of years, network automation techniques that include software-defined networking (SDN) and dynamic resource allocation schemes have been the subject of a significant research and development effort. Likewise, network functions virtualization (NFV) and the foreseeable usage of a set of artificial intelligence techniques to facilitate the processing of customers' requirements and the subsequent design, delivery, and operation of the corresponding services are very likely to dramatically distort the conception and the management of networking infrastructures. Some of these techniques are being specified within standards developing organizations while others remain perceived as a "buzz" without any concrete deployment plans disclosed by service providers. An in-depth understanding and analysis of these approaches should be conducted to help internet players in making appropriate design choices that would meet their requirements as well as their customers. This is an important area of research as these new developments and approaches will inevitably reshape the internet and the future of technology. Design Innovation and Network Architecture for the Future Internet sheds light on the foreseeable yet dramatic evolution of internet design principles and offers a comprehensive overview on the recent advances in networking techniques that are likely to shape the future internet. The chapters provide a rigorous in-depth analysis of the promises, pitfalls, and other challenges raised by these initiatives, while avoiding any speculation on their expected outcomes and technical benefits. This book covers essential topics such as content delivery networks, network functions virtualization, security, cloud computing, automation, and more. This book will be useful for network engineers, software designers, computer networking professionals, practitioners, researchers, academicians, and students looking for a comprehensive research book on the latest advancements in internet design principles and networking techniques.
'Witty, rigorous, and as urgent as a fire alarm' Dorian Lynskey 'Cooly prosecutorial' Guardian Nobody meant for this to happen. Facebook didn't mean to facilitate a genocide. Twitter didn't want to be used to harass women. YouTube never planned to radicalise young men. But with billions of users, these platforms need only tweak their algorithms to generate more 'engagement'. In so doing, they bring unrest to previously settled communities and erode our relationships. Social warming has happened gradually - as a by-product of our preposterously convenient digital existence. But the gradual deterioration of our attitudes and behaviour on- and offline - this vicious cycle of anger and outrage - is real. And it can be corrected. Here's how.
This book makes the case that the changes brought about by the connectivity of the Internet have so transformed the nature of post secondary learning that we need to view it differently. Both the content and the processes of learning have been profoundly altered because of the accessibility of information and the multi-way interactivity provided by the Internet. We call this new phenomenon 'the Connecticon' - which encompasses the paradigm created by the infrastructure, the content, the multiple connection devices of the Web, as well as by the hyper-interactivity of the connected generation for whom attention is the new ourrency. It is the aim of this book to identify and document the Connecticon - its nature, its impact and its implications. We will do this in the broad domain of learning, though a similar study could be carried out in commercial, social or political fields.
Jackie Phamotse digs deep into the climate of law and policy in the social media landscape. After a David and Goliath social media legal battle that saw many take note tweeting about her, the result is a brace, thought-provoking and remarkably detailed social media guide and personal narrative. A first-hand approach on beating public humiliation and cyber victimization, Phamotse combines personal anecdotes, hard data and compelling research to cut through an unjust system governed by the rich and famous. The author directly addresses the question of power and obsession related to social media influencers. Written with equal doses of humor, compassion and wisdom, I Tweet What I Like is an inspiring call to action, celebrating diversity and human potential. I Tweet What I Like will inspire you!
In a fast-moving technical and business environment like the Internet only exactitude can guarantee success. An 'almost correct' specification is a wrong specification. Make total accuracy your signature with this invaluable guide. It offers detailed definitions of the bewildering array of terms and phrases relating to e-Business and the Internet, plus short articles to explain more complex topics. Covering both business-related and technology terms, you'll never fall victim to fuzzy thinking again. Fully updated to cover new and emerging areas such as wireless and mobile technologies, this new edition will be your constant companion. No need to risk disastrous misinterpretation when you can have total accuracy at your fingertips.
Michael Strobel worked for several years as a software engineer and consultant in the German IT industry before joining IBM Research in Switzerland, where he developed his interest in support for negotiations in electronic markets. During his career in research, he has published several articles on this topic in major international conferences and journals and received a PhD from the University of St.Gallen, Switzerland. Based on his experiences and contributions, the author discusses electronic negotiation technologies - key ingredients for the next generation of electronic markets - from a scientific as well as a practitioner's perspective. He reviews the state-of-the-art and then introduces novel support mechanisms and design elements, which are applied in a number of case studies. This book is geared towards technicians interested in E-Commerce application development but also offers extensive background reading for educational purposes. "
This second book by the author on WSNs focuses on the concepts of energy, and energy harvesting and management techniques. Definitions and terminologies are made clear without leaning on the relaxing assumption that they are already known or easily reachable, the reader is not to be diverted from the main course. Neatly drawn figures assist in viewing and imagining the offered topics. To make energy related topics felt and seen, the adopted technologies as well as their manufacturers are presented in details. With such a depth, this book is intended for a wide audience, it is meant to be helper and motivator, for the senior undergraduates, postgraduates, researchers, and practitioners; concepts and energy related applications are laid out, research and practical issues are backed by appropriate literature, and new trends are put under focus. For senior undergraduate students, it familiarizes with conceptual foundations and practical projects implementations. Also, it is intended for graduate students working on their thesis and in need of specific knowledge on WSNs and the related energy harvesting and management techniques. Moreover, it is targeting researchers and practitioners interested in features and applications of WSNs, and on the available energy harvesting and management projects and testbeds. Exercises at the end of each chapter are not just questions and answers; they are not limited to recapitulate ideas. Their design objective is not bound to be a methodical review of the provided concepts, but rather as a motivator for lot more of searching, finding, and comparing beyond what has been presented in the book.
As a foreword, here we publish an email letter of Late Professor Herb Simon, Nobel Laureate, that he wrote on the occasion ofthe death of the fatherofa friend. This letterofcondolence, more than any other wisdom, tells about the essence of the process of scientific creation, which is so important for both, the specific subject being covered by this book, and for the general science. When asked to address an SSGRR conference in Italy, prior to his death, Professor Herb Simon agreed that these lines be presented to all those who are interested in understanding the real essence oftheir own scientific struggle. Dear Professor Milutinovic: I want to extend my deepest sympathy to you and your family on the death of your father. His career was a very distinguished one, and his life spanned a most complex and difficult sequence of epochs in your country's history. Our generation (I am just a year younger than he was), like all its predecessors, leaves many tasks - hopefully no more than it inherited - for the next generation to take up; but even knowing that it must be so does not remove one's senseofloss in the parting.
Social media has come to deeply penetrate our lives: Facebook, YouTube, Twitter and many other platforms define many of our daily habits of communication and creative production. The Culture of Connectivity studies the rise of social media in the first decade of the twenty-first century up until 2012, providing both a historical and a critical analysis of the emergence of major platforms in the context of a rapidly changing ecosystem of connective media. Such history is needed to understand how these media have come to profoundly affect our experience of online sociality. The first stage of their development shows a fundamental shift. While most sites started out as amateur-driven community platforms, half a decade later they have turned into large corporations that do not just facilitate user connectedness, but have become global information and data mining companies extracting and exploiting user connectivity. Author and media scholar Jose van Dijck offers an analytical prism to examine techno-cultural as well as socio-economic aspects of this transformation. She dissects five major platforms: Facebook, Twitter, Flickr, YouTube, and Wikipedia. Each of these microsystems occupies a distinct position in the larger ecology of connective media, and yet, their underlying mechanisms for coding interfaces, steering users, and filtering content rely on shared ideological principles. At the level of management and organization, we can also observe striking similarities between these platforms' shifting ownership status, governance strategies, and business models. Reconstructing the premises on which these platforms are built, this study highlights how norms for online interaction and communication gradually changed. "Sharing," "friending," "liking," "following," "trending," and "favoriting" have come to denote online practices imbued with specific technological and economic meanings. This process of normalization, the author argues, is part of a larger political and ideological battle over information control in an online world where everything is bound to become social. Crossing lines of technological, historical, sociological, and cultural inquiry, The Culture of Connectivity will reshape the way we think about interpersonal connection in the digital age. |
You may like...
Ukulele for Beginners - Tips and Tricks…
Academic Music Studio
Hardcover
Platinum Mathematics - Grade 4…
L. Bowie, C. Gleeson-Baird, …
Paperback
(1)R210 Discovery Miles 2 100
Mokgomana - The Life Of John Kgoana…
Peter Delius, Daniel Sher
Paperback
Imperial Lives and Letters of the…
Theodore Mommsen, Karl F. Morrison
Hardcover
Self-healing Materials
Martin D. Hager, Sybrand van der Zwaag, …
Hardcover
R6,432
Discovery Miles 64 320
|