![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > General
This book discusses the use of the internet in China, the complicated power relations in online political communications, and the interactions and struggles between the government and the public over the use of the internet. It argues that there is a "semi-structured" online public sphere, in which there is a certain amount of equal and liberal political communication, but that the online political debates are also limited by government control and censorship, as well as by inequality and exclusions, and moreover that the government rarely engages in the political debates. Based on extensive original research, and considering specific debates around particular issues, the book analyses how Chinese net-users debate about political issues, how they problematize the government's actions and policies, what language they use, what online discourses are produced, and how the debates and online discourses are limited. Overall, the book provides a rich picture of the current state of online political communication in China.
Internet Strategy: The Road to Web Services Solutions reminds readers that several attempts have been made to convince the world that DOT.COM was developed to take over businesses, and the traditional way of creating businesses and running organizations would be condemned to the past. One of those attempts led to the Application Service Provision model, from which the current Web Services business model takes its origins. As organizations start to carefully invest again, ""Internet Strategy: The Road to Web Services Solutions"" shows that the focus is on delivering value and enabling growth. The book concentrates on how to create, execute and evolve a customer-centric strategy of any Internet-based management strategy in order to provide valuable customer experiences. ""Internet Strategy: The Road to Web Services Solutions"" presents how enabling technologies are as important as ever. It points out that there's a need to move to new levels in thinking and execution, to help organizations maintain cost efficiencies and enable growth in revenues and profitability.
The book will focus on exploiting state of the art research in semantic web and web science. The rapidly evolving world-wide-web has led to revolutionary changes in the whole of society. The research and development of the semantic web covers a number of global standards of the web and cutting edge technologies, such as: linked data, social semantic web, semantic web search, smart data integration, semantic web mining and web scale computing. These proceedings are from the 6th Chinese Semantics Web Symposium.
This book offers a timely exploration of our patterns of engagement with politics, news, and information in current high-choice information environments It analyzes the issue plaguing our society today - The spread of misinformation and its impact on the public sphere, our politics and our everyday lives The book offers insights into the processes that influence the supply of misinformation and factors influencing how and why people expose themselves to and process information that may support or contradict their beliefs and attitudes A team of authors from across a range of disciplines address the phenomena of knowledge resistance and its causes and consequences at the macro- as well as the micro-level The chapters take a philosophical look at the notion of knowledge resistance, before moving on to discuss issues such as misinformation and fake news, psychological mechanisms such as motivated reasoning in processes of selective exposure and attention, how people respond to evidence and fact-checking, the role of political partisanship, political polarization over factual beliefs, and how knowledge resistance might be counteracted This book will have a broad appeal to scholars and students interested in knowledge resistance, primarily within philosophy, psychology, media and communication, and political science, as well as journalists and policymakers
Social engineering attacks target the weakest link in an organization's security human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, "Social Engineering Penetration Testing" gives you the practical methodology and everything you need to plan and execute a social engineering penetration test and assessment. You will gain fascinating insights into how social engineering techniques including email phishing, telephone pretexting, and physical vectors can be used to elicit information or manipulate individuals into performing actions that may aid in an attack. Using the book's easy-to-understand models and examples, you will have a much better understanding of how best to defend against these attacks. The authors of "Social Engineering Penetration Testing "show you
hands-on techniques they have used at RandomStorm to provide
clients with valuable results that make a real difference to the
security of their businesses. You will learn about the differences
between social engineering pen tests lasting anywhere from a few
days to several months. The book shows you how to use widely
available open-source tools to conduct your pen tests, then walks
you through the practical steps to improve defense measures in
response to test results.
Combining theory and practice, this updated new edition provides a complete overview of how to create deep and meaningful quests for games. It uses the Unity game engine in conjunction with Fungus and other free plugins to provide an accessible entry into quest design. The book begins with an introduction to the theory and history of quests in games, before covering four theoretical components of quests: their spaces, objects, actors, and challenges. Each chapter also includes a practical section, with accompanying exercises and suggestions for the use of specific technologies for four crucial aspects of quest design: * level design * quest item creation * NPC and dialogue construction * scripting This book will be of great interest to all game designers looking to create new, innovative quests in their games. It will also appeal to new media researchers, as well as humanities scholars in the fields of mythology and depth-psychology that want to bring computer-assisted instruction into their classroom in an innovative way. The companion website includes lecture and workshop slides, and can be accessed at: www.designingquests.com
Combining theory and practice, this updated new edition provides a complete overview of how to create deep and meaningful quests for games. It uses the Unity game engine in conjunction with Fungus and other free plugins to provide an accessible entry into quest design. The book begins with an introduction to the theory and history of quests in games, before covering four theoretical components of quests: their spaces, objects, actors, and challenges. Each chapter also includes a practical section, with accompanying exercises and suggestions for the use of specific technologies for four crucial aspects of quest design: * level design * quest item creation * NPC and dialogue construction * scripting This book will be of great interest to all game designers looking to create new, innovative quests in their games. It will also appeal to new media researchers, as well as humanities scholars in the fields of mythology and depth-psychology that want to bring computer-assisted instruction into their classroom in an innovative way. The companion website includes lecture and workshop slides, and can be accessed at: www.designingquests.com
Working with the Web Audio API is the definitive and instructive guide to understanding and using the Web Audio API. The Web Audio API provides a powerful and versatile system for controlling audio on the Web. It allows developers to generate sounds, select sources, add effects, create visualizations and render audio scenes in an immersive environment. This book covers all essential features, with easy to implement code examples for every aspect. All the theory behind it is explained, so that one can understand the design choices as well as the core audio processing concepts. Advanced concepts are also covered, so that the reader will gain the skills to build complex audio applications running in the browser. Aimed at a wide audience of potential students, researchers and coders, this is a comprehensive guide to the functionality of this industry-standard tool for creating audio applications for the web.
The book Digital Health Transformation with Blockchain and Artificial Intelligence covers the global digital revolution in the field of healthcare sector. The population has been overcoming the COVID-19 period; therefore, we need to establish intelligent digital healthcare systems using various emerging technologies like Blockchain and Artificial Intelligence. Internet of Medical Things is the technological revolution that has included the element of "smartness" in the healthcare industry and also identifying, monitoring, and informing service providers about the patient's clinical information with faster delivery of care services. This book highlights the important issues i.e. (a) How Internet of things can be integrated with the healthcare ecosystem for better diagnostics, monitoring, and treatment of the patients, (b) Artificial Intelligence for predictive and preventive healthcare systems, (c) Blockchain for managing healthcare data to provide transparency, security, and distributed storage, and (d) Effective remote diagnostics and telemedicine approach for developing smart care. The book encompasses chapters belong to the blockchain, Artificial Intelligence, and Big health data technologies. Features: Blockchain and internet of things in healthcare systems Secure Digital Health Data Management in Internet of Things Public Perception towards AI-Driven Healthcare Security, privacy issues and challenges in adoption of smart digital healthcare Big data analytics and Internet of things in the pandemic era Clinical challenges for digital health revolution Artificial intelligence for advanced healthcare Future Trajectory of Healthcare with Artificial Intelligence 9 Parkinson disease pre-diagnosis using smart technologies Emerging technologies to combat the COVID-19 Machine Learning and Internet of Things in Digital Health Transformation Effective Remote Healthcare and Telemedicine Approaches Legal implication of blockchain technology in public health This Book on "Digital Health Transformation with Blockchain and Artificial Intelligence" aims at promoting and facilitating exchanges of research knowledge and findings across different disciplines on the design and investigation of secured healthcare data analytics. It can also be used as a textbook for a Masters course in security and biomedical engineering. This book will also present new methods for the medical data analytics, blockchain technology, and diagnosis of different diseases to improve the quality of life in general, and better integration into digital healthcare.
Working with the Web Audio API is the definitive and instructive guide to understanding and using the Web Audio API. The Web Audio API provides a powerful and versatile system for controlling audio on the Web. It allows developers to generate sounds, select sources, add effects, create visualizations and render audio scenes in an immersive environment. This book covers all essential features, with easy to implement code examples for every aspect. All the theory behind it is explained, so that one can understand the design choices as well as the core audio processing concepts. Advanced concepts are also covered, so that the reader will gain the skills to build complex audio applications running in the browser. Aimed at a wide audience of potential students, researchers and coders, this is a comprehensive guide to the functionality of this industry-standard tool for creating audio applications for the web.
1. This is the first book to examine cross-device search behavior. 2. This book will discuss a comprehensive range of behaviors in the context of cross-device search, which includes querying, gazing, clicking and touching. 3. The book will be of great interest to academics and students situated in the fields of library and information science, computer science, and management science. The book should also provide fascinating insights to practitioners, including those working for internet service providers.
1. This is the first book to examine cross-device search behavior. 2. This book will discuss a comprehensive range of behaviors in the context of cross-device search, which includes querying, gazing, clicking and touching. 3. The book will be of great interest to academics and students situated in the fields of library and information science, computer science, and management science. The book should also provide fascinating insights to practitioners, including those working for internet service providers.
Carol Smallwood's The Complete Guide to Using Google in Libraries, Volume 1: Instruction, Administration, and Staff Productivity explores how Google's suite of tools, from Google Docs (now Google Drive), Google Scholar, Hangout, Forms, and others made freely available to the Internet Community can be used by libraries to expand the role of digital operations in the management of library materials, to communicate with their patrons and collaborators, to exploit the resources on the Web, and many others. The book has 29 chapters organized into sections that focus on ways that Google's suite of tools can be applied to address problems in a specific area of library concern. The section headings are: Library Instruction for Users; Collaboration within and among libraries; Library Administration; Collection Management; and Library Productivity. In each topical area, the chapters show how librarians are taking advantage of these tools to change the way that their library works. All of this without the burden of an additional bill to pay. Through these carefully selected case studies from real libraries, you will be able to learn about the surprising and powerful potential that exists through Google tools to improve library operations.
We live in a world where a tweet can be instantly retweeted and read by millions around the world in minutes, where a video forwarded to friends can destroy a political career in hours, and where an unknown man or woman can become an international celebrity overnight. Virality: individuals create it, governments fear it, companies would die for it. So what is virality and how does it work? Why does one particular video get millions of views while hundreds of thousands of others get only a handful? In Going Viral, Nahon and Hemsley uncover the factors that make things go viral online. They analyze the characteristics of networks that shape virality, including the crucial role of gatekeepers who control the flow of information and connect networks to one another. They also explore the role of human attention, showing how phenomena like word of mouth, bandwagon effects, homophily and interest networks help to explain the patterns of individual behavior that make viral events. Drawing on a wide range of examples, from the Joseph Kony video to the tweet that spread the news that Osama Bin Laden was dead, from the video of Homer Simpson voting in the US elections to the photo of a police officer pepper-spraying students at the University of California Davis, this path-breaking account of viral events will be essential reading for students, scholars, politicians, policymakers, executives, artists, musicians and anyone who wants to understand how our world today is being shaped by the flow of information online.
This book develops the core system science needed to enable the development of a complex industrial internet of things/manufacturing cyber-physical systems (IIoT/M-CPS). Gathering contributions from leading experts in the field with years of experience in advancing manufacturing, it fosters a research community committed to advancing research and education in IIoT/M-CPS and to translating applicable science and technology into engineering practice. Presenting the current state of IIoT and the concept of cybermanufacturing, this book is at the nexus of research advances from the engineering and computer and information science domains. Readers will acquire the core system science needed to transform to cybermanufacturing that spans the full spectrum from ideation to physical realization.
With the widespread growth of the Internet, a new space - cyberspace - has appeared and has rapidly been integrated into every facet of life and work. It has effectively become the fourth basic living space for human beings. Although cyberspace has become a topic of increasing widespread concern, it is still difficult to understand cyberspace well because of its many definitions, vast and varied content, and differences with other similar spaces. A Brief History of Cyberspace attempts to establish a complete knowledge system about the evolution and history of cyberspace and cyber-enabled spaces (i.e., cyber-enabled physical space, cyber-enabled social space, and cyber-enabled thinking space). By providing a comprehensive overview, this book aims to help readers understand the history of cyberspace and lays a solid foundation for researchers and learners who are interested in cyberspace. The book has three main objectives: To provide a comprehensive understanding of the development of cyberspace, ranging from its origin, evolutions, and research status to open issues and future challenges, as well as related hot topics in industry and academia. To examine cyber life, cyber syndrome, and health in addition to cyber-enabled spaces designed for better living. To describe cyberspace governance from the perspective of the individual, society, and national and international levels in order to promote a more profound and reasonable direction to the development of cyberspace. Consisting of 16 chapters, the book is divided into three parts. Chapter 1 introduces the origins and basic concept of cyberspace, cyber philosophy, and cyber logic to help readers have a general understanding of cyberspace. Chapters 2 through 7 discuss a wide variety of topics related to human behavior, psychology, and health to help people better adapt to cyberspace. Chapters 8 through 16 present the history of cyberspace governance and various social and culture aspects of cyberspace. Each chapter concludes with a discussion of future development.
- Provides both students and artists with a practice-orientated guide to socially engaged art practices in the twenty-first century. - Features first-hand insight into the individual processes and methodologies of twenty-eight established artists including: Kim Abeles, Christopher Blay, Joseph DeLappe, Mary Beth Heffernan, Chris Johnson, Rebekah Modrak, Praba Pilar, Tabita Rezaire, Sylvain Souklaye, and collaborators Victoria Vesna and Siddharth Ramakrishnan. - Demonstrates a range of creative projects that engage different forms of technologies for readers interested in making the social turn in their artistic practice, and offers creative prompts that readers can respond to in their own practices.
- Provides both students and artists with a practice-orientated guide to socially engaged art practices in the twenty-first century. - Features first-hand insight into the individual processes and methodologies of twenty-eight established artists including: Kim Abeles, Christopher Blay, Joseph DeLappe, Mary Beth Heffernan, Chris Johnson, Rebekah Modrak, Praba Pilar, Tabita Rezaire, Sylvain Souklaye, and collaborators Victoria Vesna and Siddharth Ramakrishnan. - Demonstrates a range of creative projects that engage different forms of technologies for readers interested in making the social turn in their artistic practice, and offers creative prompts that readers can respond to in their own practices.
Covering both the fundamentals and the in-depth topics related to Verilog digital design, both students and experts can benefit from reading this book by gaining a comprehensive understanding of how modern electronic products are designed and implemented. Principles of Verilog Digital Design contains many hands-on examples accompanied by RTL codes that together can bring a beginner into the digital design realm without needing too much background in the subject area. This book has a particular focus on how to transform design concepts into physical implementations using architecture and timing diagrams. Common mistakes a beginner or even an experienced engineer can make are summarized and addressed as well. Beyond the legal details of Verilog codes, the book additionally presents what uses Verilog codes have through some pertinent design principles. Moreover, students reading this book will gain knowledge about system-level design concepts. Several ASIC designs are illustrated in detail as well. In addition to design principles and skills, modern design methodology and how it is carried out in practice today are explored in depth as well.
Wireless Sensor Networks and the Internet of Things: Future Directions and Applications explores a wide range of important and real-time issues and applications in this ever-advancing field. Different types of WSN and IoT technologies are discussed in order to provide a strong framework of reference, and the volume places an emphasis on solutions to the challenges of protection, conservation, evaluation, and implementation of WSN and IoT that lead to low-cost products, energy savings, low carbon usage, higher quality, and global competitiveness. The volume is divided into four sections that cover: Wireless sensor networks and their relevant applications Smart monitoring and control systems with the Internet of Things Attacks, threats, vulnerabilities, and defensive measures for smart systems Research challenges and opportunities This collection of chapters on an important and diverse range of issues presents case studies and applications of cutting-edge technologies of WSN and IoT that will be valuable for academic communities in computer science, information technology, and electronics, including cyber security, monitoring, and data collection. The informative material presented here can be applied to many sectors, including agriculture, energy and power, resource management, biomedical and health care, business management, and others.
This newly revised edition of the highly successful 1997 book offers professionals and students an up-to-date, in-depth understanding of how payments are made electronically across the Internet. The second edition explores the very latest developments in this quickly expanding area, including the newest security techniques and methods, and features a completely new chapter on the exciting advances in mobile commerce. Pub 8/01.
This book provides a comprehensive introduction of Fog Radio Access Networks (F-RANs), from both academic and industry perspectives. The authors first introduce the network architecture and the frameworks of network management and resource allocation for F-RANs. They then discuss the recent academic research achievements of F-RANs, such as the analytical results of theoretical performance limits and optimization theory-based resource allocation techniques. Meanwhile, they discuss the application and implementations of F-RANs, including the latest standardization procedure, and the prototype and test bed design. The book is concluded by summarizing the existing open issues and future trends of F-RANs. Includes the latest theoretical and technological research achievements of F-RANs, also discussing existing open issues and future trends of F-RANs toward 6G from an interdisciplinary perspective; Provides commonly-used tools for research and development of F-RANs such as open resource projects for implementing prototypes and test beds; Includes examples of prototype and test bed design and gives tools to evaluate the performance of F-RANs in simulations and experimental circumstances. |
You may like...
Star Wars: Episode 7 - The Force Awakens
Daisy Ridley, John Boyega, …
DVD
(10)
Orangutans - Geographic Variation in…
Serge A. Wich, S. Suci Utami Atmoko, …
Hardcover
R3,609
Discovery Miles 36 090
Identification and Control - The Gap…
Ricardo S. Sanchez-Pena, Joseba Quevedo Casin, …
Hardcover
R2,694
Discovery Miles 26 940
|