0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (149)
  • R250 - R500 (526)
  • R500+ (1,592)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > General

The Art of Screen Time - How Your Family Can Balance Digital Media and Real Life (Paperback): Anya Kamenetz The Art of Screen Time - How Your Family Can Balance Digital Media and Real Life (Paperback)
Anya Kamenetz
R441 R365 Discovery Miles 3 650 Save R76 (17%) Ships in 10 - 15 working days

The newest generation of children is exposed to ubiquitous technology, more than any generation that preceded them. They are photographed with smartphones from the moment they're born, and begin interacting with screens at around four months old. Is this good news or bad news? A wonderful opportunity to connect around the world? Or the first step in creating a generation of addled screen zombies? The truth is, there's no road map for navigating this territory. But while many have been quick to declare this the dawn of a neurological and emotional crisis, solid science on the subject is surprisingly hard to come by. In this book, Anya Kamenetz--an expert on both education and technology, as well as a mother of two young children--takes a refreshingly practical look at the subject. Surveying hundreds of fellow parents on their practices and ideas, and cutting through a thicket of inconclusive studies and overblown claims, she hones a simple message, a riff on Michael Pollan's well-known "food rules": Enjoy Screens. Not too much. Mostly with others. This brief but powerful dictum forms the backbone of a philosophy that will help parents survive the ubiquity of technology in their children's lives, curb their panic, and create room for a happy, healthy family life. Kamenetz's sophisticated yet practical thinking is a necessary cure for an age of anxiety.

Advances in Cyber Security and Intelligent Analytics (Hardcover): Abhishek Verma, Jitendra Kumar, Hari Mohan Gaur, Vrijendra... Advances in Cyber Security and Intelligent Analytics (Hardcover)
Abhishek Verma, Jitendra Kumar, Hari Mohan Gaur, Vrijendra Singh, Valentina Emilia Balas
R3,049 Discovery Miles 30 490 Ships in 12 - 17 working days

The proposed title intends to provide a comprehensive view of emerging paradigms of computer science. The initial chapters will introduce various emerging paradigms and discuss research challenges related to them. Then some of the chapters will focus on the research solutions to address the identified challenges. The last few chapters will provide a discussion on future research directions.

Cyber Security Applications for Industry 4.0 (Hardcover): R. Sujatha, G. Prakash, Noor Zaman Jhanjhi Cyber Security Applications for Industry 4.0 (Hardcover)
R. Sujatha, G. Prakash, Noor Zaman Jhanjhi
R3,629 Discovery Miles 36 290 Ships in 12 - 17 working days

Cyber Security Applications for Industry 4.0 (CSAI 4.0) provides integrated features of various disciplines in Computer Science, Mechanical, Electrical, and Electronics Engineering which are defined to be Smart systems. It is paramount that Cyber-Physical Systems (CPS) provide accurate, real-time monitoring and control for smart applications and services. With better access to information from real-time manufacturing systems in industrial sectors, the CPS aim to increase the overall equipment effectiveness, reduce costs, and improve efficiency. Industry 4.0 technologies are already enabling numerous applications in a variety of industries. Nonetheless, legacy systems and inherent vulnerabilities in an organization's technology, including limited security mechanisms and logs, make the move to smart systems particularly challenging. Features: Proposes a conceptual framework for Industry 4.0-based Cyber Security Applications concerning the implementation aspect Creates new business models for Industrialists on Control Systems and provides productive workforce transformation Outlines the potential development and organization of Data Protection based on strategies of cybersecurity features and planning to work in the new area of Industry 4.0 Addresses the protection of plants from the frost and insects, automatic hydroponic irrigation techniques, smart industrial farming and crop management in agriculture relating to data security initiatives The book is primarily aimed at industry professionals, academicians, and researchers for a better understanding of the secure data transition between the Industry 4.0 enabled connected systems and their limitations

Gender and Security in Digital Space - Navigating Access, Harassment, and Disinformation (Hardcover): Gulizar Haciyakupoglu,... Gender and Security in Digital Space - Navigating Access, Harassment, and Disinformation (Hardcover)
Gulizar Haciyakupoglu, Yasmine Wong
R3,767 Discovery Miles 37 670 Ships in 12 - 17 working days

Digital space offers new avenues, opportunities, and platforms in the fight for gender equality, and for the social, economic, and political participation of women and marginalised communities. However, the very same space plays host to gender inequalities and security threats with gendered implications. This edited volume ventures into complexities at the intersection of gender, security, and digital space, with a particular focus on the persistent problems of access, harassment, and disinformation. Scholars and practitioners in this volume tackle various facets of the issue, presenting an array of research, experiences, and case studies that span the globe. This knowledge lends itself to potential policy considerations in tackling inequalities and threats with gendered implications in cyber space towards digital spaces that are safe and equal. This book is a must-read for students, scholars, and practitioners seeking to expand their knowledge on the gendered threats in digital space and potential remedies against them.

Next Generation Healthcare Systems Using Soft Computing Techniques (Hardcover): Rohit Raja, Korhan Cengiz, Hiral Raja, Rekh Ram... Next Generation Healthcare Systems Using Soft Computing Techniques (Hardcover)
Rohit Raja, Korhan Cengiz, Hiral Raja, Rekh Ram Janghel
R3,037 Discovery Miles 30 370 Ships in 12 - 17 working days

This book presents soft computing techniques and applications used in healthcare systems, along with the latest advancements. Written as a guide for assessing the roles that these techniques play, the book also highlights implementation strategies, lists problem-solving solutions, and paves the way for future research endeavors in smart and next-generation healthcare systems. This book provides applications of soft computing techniques related to healthcare systems and can be used as a reference guide for assessing the roles that various techniques, such as machine learning, fuzzy logic, and statical mathematics, play in the advancements of smart healthcare systems. The book presents the basics as well as the advanced concepts to help beginners, as well as industry professionals, get up to speed on the latest developments in healthcare systems. The book examines descriptive, predictive, and social network techniques and discusses analytical tools and the important role they play in finding solutions to problems in healthcare systems. A framework of robust and novel healthcare techniques is highlighted, as well as implementation strategies and a setup for future research endeavors. Healthcare Systems Using Soft Computing Techniques is a valuable resource for researchers and postgraduate students in healthcare systems engineering, computer science, information technology, and applied mathematics. The book introduces beginners to-and at the same time brings industry professionals up to speed with-the important role soft computing techniques play in smart healthcare systems.

Vulnerability Management (Paperback, 2nd edition): Park Foreman Vulnerability Management (Paperback, 2nd edition)
Park Foreman
R1,428 Discovery Miles 14 280 Ships in 12 - 17 working days

Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today, we identify vulnerabilities in our software systems, infrastructure, and enterprise strategies. Those vulnerabilities are addressed through various and often creative means. Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman's more than three decades of multinational experience, the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility, he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps, especially those that are inherent in a larger organization. Completely updated, the second edition provides a fundamental understanding of technology risks-including a new chapter on cloud vulnerabilities and risk management-from an interloper's perspective. This book is a guide for security practitioners, security or network engineers, security officers, and CIOs seeking understanding of VM and its role in the organization. To serve various audiences, it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy, although serving the executive well, provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise.

The Cybersecurity Body of Knowledge - The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity... The Cybersecurity Body of Knowledge - The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity (Paperback)
Daniel Shoemaker, Anne Kohnke, Ken Sigler
R1,280 Discovery Miles 12 800 Ships in 12 - 17 working days

The Cybersecurity Body of Knowledge explains the content, purpose, and use of eight knowledge areas that define the boundaries of the discipline of cybersecurity. The discussion focuses on, and is driven by, the essential concepts of each knowledge area that collectively capture the cybersecurity body of knowledge to provide a complete picture of the field. This book is based on a brand-new and up to this point unique, global initiative, known as CSEC2017, which was created and endorsed by ACM, IEEE-CS, AIS SIGSEC, and IFIP WG 11.8. This has practical relevance to every educator in the discipline of cybersecurity. Because the specifics of this body of knowledge cannot be imparted in a single text, the authors provide the necessary comprehensive overview. In essence, this is the entry-level survey of the comprehensive field of cybersecurity. It will serve as the roadmap for individuals to later drill down into a specific area of interest. This presentation is also explicitly designed to aid faculty members, administrators, CISOs, policy makers, and stakeholders involved with cybersecurity workforce development initiatives. The book is oriented toward practical application of a computing-based foundation, crosscutting concepts, and essential knowledge and skills of the cybersecurity discipline to meet workforce demands. Dan Shoemaker, PhD, is full professor, senior research scientist, and program director at the University of Detroit Mercy's Center for Cyber Security and Intelligence Studies. Dan is a former chair of the Cybersecurity & Information Systems Department and has authored numerous books and journal articles focused on cybersecurity. Anne Kohnke, PhD, is an associate professor of cybersecurity and the principle investigator of the Center for Academic Excellence in Cyber Defence at the University of Detroit Mercy. Anne's research is focused in cybersecurity, risk management, threat modeling, and mitigating attack vectors. Ken Sigler, MS, is a faculty member of the Computer Information Systems (CIS) program at the Auburn Hills campus of Oakland Community College in Michigan. Ken's research is in the areas of software management, software assurance, and cybersecurity.

The Complete Guide for CPP Examination Preparation (Paperback, 2nd edition): Anthony V. DiSalvatore (CPP, PSP & PCI) The Complete Guide for CPP Examination Preparation (Paperback, 2nd edition)
Anthony V. DiSalvatore (CPP, PSP & PCI)
R1,117 Discovery Miles 11 170 Ships in 12 - 17 working days

Originally written by a team of Certified Protection Professionals (CPPs), Anthony DiSalvatore gives valuable updates to The Complete Guide for CPP Examination Preparation. This new edition contains an overview of the fundamental concepts and practices of security management while offering important insights into the CPP exam. Until recently the security profession was regarded as a "necessary evil." This book is a comprehensive guide to a profession that is now considered critical to our well-being in the wake of 9/11. It presents a practical approach drawn from decades of combined experience shared by the authors, prepares the reader for the CPP exam, and walks them through the certification process. This edition gives revised and updated treatment of every subject in the CPP exam, encourages and outlines a three-part program for you to follow, and includes sample questions at the end of each area of study. Although these are not questions that appear on the actual exam, they convey the principles and concepts that the exam emphasizes and are valuable in determining if you have mastered the information. The book also includes a security survey that covers all facets of external and internal security, as well as fire prevention. The Complete Guide for CPP Examination Preparation, Second Edition allows you to move steadily forward along your path to achieving one of the most highly regarded certifications in the security industry.

Atari 2600/7800: a visual compendium (Paperback): Bitmap Books Atari 2600/7800: a visual compendium (Paperback)
Bitmap Books 1
R954 Discovery Miles 9 540 Ships in 9 - 15 working days
Mind the Tech Gap - Addressing the Conflicts between IT and Security Teams (Paperback): Nikki. Robinson Mind the Tech Gap - Addressing the Conflicts between IT and Security Teams (Paperback)
Nikki. Robinson
R1,117 Discovery Miles 11 170 Ships in 12 - 17 working days

1. Learn best practices for every facet of management 2. Learn what type of leader you need to be to succeed 3. Maximize employee engagement and retention among staff 4. Develop your staff's talent to full potential 5. Learn where the future of management is headed

How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Hardcover): Ravi Das How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Hardcover)
Ravi Das
R3,470 Discovery Miles 34 700 Ships in 12 - 17 working days

Written by an author that has real world experience in launching a cyber consulting company. Comprehensive coverage ranging all the way from the legal formation to be used to which segment of the Cybersecurity Industry should be targeted. Explains how CISOs can market their services and get key customers.

Healthcare Analytics - Emergency Preparedness for COVID-19 (Hardcover): Edward M. Rafalski, Ross M. Mullner Healthcare Analytics - Emergency Preparedness for COVID-19 (Hardcover)
Edward M. Rafalski, Ross M. Mullner
R3,189 Discovery Miles 31 890 Ships in 12 - 17 working days

The first COVID-19 case in the US was reported on January 20, 2020. As the first cases were being reported in the US, Washington State became a reliable source not just for hospital bed demand based on incidence and community spread but also for modeling the impact of skilled nursing facilities and assisted living facilities on hospital bed demand. Various hospital bed demand modeling efforts began in earnest across the United States in university settings, private consulting and health systems. Nationally, the University of Washington Institute of Health Metrics and Evaluation seemed to gain a footing and was adopted as a source for many states for its ability to predict the epidemiological curve by state, including the peak. This book therefore addresses a compelling need for documenting what has been learned by the academic and professional healthcare communities in healthcare analytics and disaster preparedness to this point in the pandemic. What is clear, at least from the US perspective, is that the healthcare system was unprepared and uncoordinated from an analytics perspective. Learning from this experience will only better prepare all healthcare systems and leaders for future crisis. Both prospectively, from a modeling perspective and retrospectively from a root cause analysis perspective, analytics provide clarity and help explain causation and data relationships. A more structured approach to teaching healthcare analytics to students, using the pandemic and the rich dataset that has been developed, provides a ready-made case study from which to learn and inform disaster planning and preparedness. The pandemic has strained the healthcare and public health systems. Researchers and practitioners must learn from this crisis to better prepare our processes for future pandemics, at minimum. Finally, government officials and policy makers can use this data to decide how best to assist the healthcare and public health systems in crisis.

Ethical Digital Technology in Practice (Hardcover): Simon Rogerson Ethical Digital Technology in Practice (Hardcover)
Simon Rogerson
R4,358 Discovery Miles 43 580 Ships in 12 - 17 working days

Unique selling point: Exploration of the societal and ethical issues surrounding the use and development of digital technology Core audience: IT managers and executives; academic researchers; students of IT Place in the market: Professional title with appeal to academics and students

Practical Core Software Security - A Reference Framework (Hardcover): James F Ransome, Anmol Misra, Mark S. Merkow Practical Core Software Security - A Reference Framework (Hardcover)
James F Ransome, Anmol Misra, Mark S. Merkow
R5,392 Discovery Miles 53 920 Ships in 12 - 17 working days

As long as humans write software, the key to successful software security is making the software development program process more efficient and effective. Although the approach of this textbook includes people, process, and technology approaches to software security, Practical Core Software Security: A Reference Framework stresses the people element of software security, which is still the most important part to manage as software is developed, controlled, and exploited by humans. The text outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. It focuses on what humans can do to control and manage a secure software development process using best practices and metrics. Although security issues will always exist, students learn how to maximize an organization's ability to minimize vulnerabilities in software products before they are released or deployed by building security into the development process. The authors have worked with Fortune 500 companies and have often seen examples of the breakdown of security development lifecycle (SDL) practices. The text takes an experience-based approach to apply components of the best available SDL models in dealing with the problems described above. Software security best practices, an SDL model, and framework are presented in this book. Starting with an overview of the SDL, the text outlines a model for mapping SDL best practices to the software development life cycle (SDLC). It explains how to use this model to build and manage a mature SDL program. Exercises and an in-depth case study aid students in mastering the SDL model. Professionals skilled in secure software development and related tasks are in tremendous demand today. The industry continues to experience exponential demand that should continue to grow for the foreseeable future. This book can benefit professionals as much as students. As they integrate the book's ideas into their software security practices, their value increases to their organizations, management teams, community, and industry.

Data Publics - Public Plurality in an Era of Data Determinacy (Paperback): Peter Moertenboeck, Helge Mooshammer Data Publics - Public Plurality in an Era of Data Determinacy (Paperback)
Peter Moertenboeck, Helge Mooshammer
R1,243 Discovery Miles 12 430 Ships in 12 - 17 working days

Data has emerged as a key component that determines how interactions across the world are structured, mediated and represented. This book examines these new data publics and the areas in which they become operative, via analysis of politics, geographies, environments and social media platforms. By claiming to offer a mechanism to translate every conceivable occurrence into an abstract code that can be endlessly manipulated, digitally processed data has caused conventional reference systems which hinge on our ability to mark points of origin, to rapidly implode. Authors from a range of disciplines provide insights into such a political economy of data capitalism; the political possibilities of techno-logics beyond data appropriation and data refusal; questions of visual, spatial and geographical organization; emergent ways of life and the environments that sustain them; and the current challenges of data publics, which is explored via case studies of three of the most influential platforms in the social media economy today: Facebook, Instagram and Whatsapp. Data Publics will be of great interest to academics and students in the fields of computer science, philosophy, sociology, media and communication studies, architecture, visual culture, art and design, and urban and cultural studies.

Urban Analytics with Social Media Data - Foundations, Applications and Platforms (Hardcover): Tan Yigitcanlar, Nayomi Kankanamge Urban Analytics with Social Media Data - Foundations, Applications and Platforms (Hardcover)
Tan Yigitcanlar, Nayomi Kankanamge
R3,052 Discovery Miles 30 520 Ships in 12 - 17 working days

The use of data science and urban analytics has become a defining feature of smart cities. This timely book is a clear guide to the use of social media data for urban analytics. The book presents the foundations of urban analytics with social media data, along with real-world applications and insights on the platforms we use today. It looks at social media analytics platforms, cyberphysical data analytics platforms, crowd detection platforms, City-as-a-Platform, and city-as-a-sensor for platform urbanism. The book provides examples to illustrate how we apply and analyse social media data to determine disaster severity, assist authorities with pandemic policy, and capture public perception of smart cities. This will be a useful reference for those involved with and researching social, data, and urban analytics and informatics.

Streaming and Copyright Law - An end-user perspective (Hardcover): Lasantha Ariyarathna Streaming and Copyright Law - An end-user perspective (Hardcover)
Lasantha Ariyarathna
R4,070 Discovery Miles 40 700 Ships in 12 - 17 working days

This book examines the challenges posed to Australian copyright law by streaming, from the end-user perspective. It compares the Australian position with the European Union and United States to draw lessons from them, regarding how they have dealt with streaming and copyright. By critically examining the technological functionality of streaming and the failure of copyright enforcement against the masses, it argues for strengthening end-user rights. The rising popularity of streaming has resulted in a revolutionary change to how digital content, such as sound recordings, cinematographic films, and radio and television broadcasts, is used on the internet. Superseding the conventional method of downloading, using streaming to access digital content has challenged copyright law, because it is not clear whether end-user acts of streaming constitute copyright infringement. These prevailing grey areas between copyright and streaming often make end-users feel doubtful about accessing digital content through streaming. It is uncertain whether exercising the right of reproduction is appropriately suited for streaming, given the ambiguities of "embodiment" and scope of "substantial part". Conversely, the fair dealing defence in Australia cannot be used aptly to defend end-users' acts of streaming digital content, because end-users who use streaming to access digital content can rarely rely on the defence of fair dealing for the purposes of criticism or review, news reporting, parody or satire, or research or study. When considering a temporary copy exception, end-users are at risk of being held liable for infringement when using streaming to access a website that contains infringing digital content, even if they lack any knowledge about the content's infringing nature. Moreover, the grey areas in circumventing geo-blocking have made end-users hesitant to access websites through streaming because it is not clear whether technological protection measures apply to geo-blocking. End-users have a severe lack of knowledge about whether they can use circumvention methods, such as virtual private networks, to access streaming websites without being held liable for copyright infringement. Despite the intricacies between copyright and access to digital content, the recently implemented website-blocking laws have emboldened copyright owners while suppressing end-users' access to digital content. This is because the principles of proportionality and public interest have been given less attention when determining website-blocking injunctions.

Information System Audit - How to Control the Digital Disruption (Hardcover): Philippe Peret Information System Audit - How to Control the Digital Disruption (Hardcover)
Philippe Peret
R1,775 Discovery Miles 17 750 Ships in 12 - 17 working days

* Structured approach from fundamental knowledge to entanglements between the concepts and the business needs * Simple and straight to the point presentation with diagrams and figures to help the understanding * Key points to take into account to design and implement an audit strategy based on company size * An overarching book on audit providing links between the different ways to audit a company * No boring or complex audit technical knowledge nor IT technical knowledge * Historical backgrounds to demonstrate that if the digital wave is new however the underlying risks are not.

A Haunted Road Atlas - Sinister Stops, Dangerous Destinations, and True Crime Tales (Paperback): Christine Schiefer, Em Schulz A Haunted Road Atlas - Sinister Stops, Dangerous Destinations, and True Crime Tales (Paperback)
Christine Schiefer, Em Schulz
R744 R596 Discovery Miles 5 960 Save R148 (20%) Ships in 10 - 15 working days
Security Analytics - A Data Centric Approach to Information Security (Hardcover): Mehak Khurana, Shilpa Mahajan Security Analytics - A Data Centric Approach to Information Security (Hardcover)
Mehak Khurana, Shilpa Mahajan
R4,504 Discovery Miles 45 040 Ships in 12 - 17 working days

The book gives a comprehensive overview of security issues in cyber physical systems by examining and analyzing the vulnerabilities. It also brings current understanding of common web vulnerabilities and its analysis while maintaining awareness and knowledge of contemporary standards, practices, procedures and methods of Open Web Application Security Project. This book is a medium to funnel creative energy and develop new skills of hacking and analysis of security and expedites the learning of the basics of investigating crimes, including intrusion from the outside and damaging practices from the inside, how criminals apply across devices, networks, and the internet at large and analysis of security data. Features Helps to develop an understanding of how to acquire, prepare, visualize security data. Unfolds the unventured sides of the cyber security analytics and helps spread awareness of the new technological boons. Focuses on the analysis of latest development, challenges, ways for detection and mitigation of attacks, advanced technologies, and methodologies in this area. Designs analytical models to help detect malicious behaviour. The book provides a complete view of data analytics to the readers which include cyber security issues, analysis, threats, vulnerabilities, novel ideas, analysis of latest techniques and technology, mitigation of threats and attacks along with demonstration of practical applications, and is suitable for a wide-ranging audience from graduates to professionals/practitioners and researchers.

Ransomware and Cybercrime (Hardcover): Andrew Jenkinson Ransomware and Cybercrime (Hardcover)
Andrew Jenkinson
R3,172 Discovery Miles 31 720 Ships in 12 - 17 working days

In May 2021, Jim Gosler, known as the Godfather and commander of US agencies' cyber offensive capability, said, ''Either the Intelligence Community (IC) would grow and adapt, or the Internet would eat us alive.'' Mr Gosler was speaking at his retirement only several months before the terrorist attacks of 9/11. He possibly did not realise the catalyst or the tsunami that he and his tens of thousands of US IC offensive website operatives had created and commenced. Over the last two decades, what Mr Gosler and his army of Internet keyboard warriors created would become the modus operandi for every faceless, nameless, state-sponsored or individual cybercriminal to replicate against an unwary, ill-protected, and ignorant group of executives and security professionals who knew little to nothing about the clandestine methods of infiltration and weaponisation of the Internet that the US and UK agencies led, all in the name of security. This book covers many cyber and ransomware attacks and events, including how we have gotten to the point of massive digital utilisation, particularly during the global lockdown and COVID-19 pandemic, to online spending that will see twice the monetary amount lost to cybercrime than what is spent online. There is little to no attribution, and with the IC themselves suffering cyberattacks, they are all blamed on being sophisticated ones, of course. We are witnessing the undermining of our entire way of life, our economies, and even our liberties. The IC has lots to answer for and unequivocally created the disastrous situation we are currently in. They currently have little to no answer. We need-no, we must demand-change. That change must start by ensuring the Internet and all connections to it are secure and no longer allow easy access and exfiltration for both the ICs and cybercriminals.

Rethinking the Jurisprudence of Cyberspace (Hardcover): Chris Reed, Andrew Murray Rethinking the Jurisprudence of Cyberspace (Hardcover)
Chris Reed, Andrew Murray
R2,849 Discovery Miles 28 490 Ships in 12 - 17 working days

Cyberspace is a difficult area for lawyers and lawmakers. With no physical constraining borders, the question of who is the legitimate lawmaker for cyberspace is complex. Rethinking the Jurisprudence of Cyberspace examines how laws can gain legitimacy in cyberspace and identifies the limits of the law?s authority in this space. Two key questions are central to the book: Who has authority to make laws within cyberspace and how do laws in cyberspace achieve legitimacy? Chris Reed and Andrew Murray answer these questions by examining the jurisprudential principles that explain law in the physical world and rethinking them for the cyberworld. In doing so they establish that cyberlaw is more similar to traditional law than previously thought, but that establishing legitimate authority is quite different. This book provides the first thorough examination of the jurisprudence of cyberspace law, asking why any law should be obeyed and how the rule of law is to be maintained there. Academics and researchers who are interested in the regulation of cyberspace will find this to be a compelling study. More broadly, it will appeal to those researching in the fields of transnational legal studies, jurisprudence and legal thought.

Say What!? Communicate with Tact and Impact - What to Say to Get Results at Any Point in an Audit (Paperback): Ann M. Butera Say What!? Communicate with Tact and Impact - What to Say to Get Results at Any Point in an Audit (Paperback)
Ann M. Butera
R1,175 Discovery Miles 11 750 Ships in 12 - 17 working days

This book addresses the important role of communication within the context of performing an audit, project, or review (i.e., planning, detailed testing, and reporting). Intended for audit, information security, enterprise, and operational risk professionals at all levels, including those just starting out, Say What!? Communicate with Tact and Impact: What to Say to Get Results at Any Point in an Audit contains an array of practical and time-tested approaches that foster efficient and effective communication at any point during an engagement. The practical and memorable techniques are culled from author Ann M. Butera's CRP experience as a trusted advisor who has taught thousands of professionals how to develop and hone their interpersonal, communication, and empathic skills. Those familiar with the Five Tier Competency ModelTM she developed will recognize these techniques as a deep dive on the competencies comprising Tier 3: Project Management and Tier 5: Managing Constituent Relations. The author discusses the following behaviors in one's dealings with executives, process owners, control performers, and colleagues: Demonstrating executive presence Becoming the trusted advisor Influencing others Communicating with tact, confidence, and impact Facilitating productive meetings and discussions Overcoming resistance and objections Managing and resolving conflict Knowing when to let a topic go and move on This book is a guide for professionals who want to interact proactively and persuasively with those they work with, audit, or review. It describes techniques that can be used during virtual, in-person, telephone, or video conferences (as opposed to emails, workpapers, and reports). It provides everyone (newer associates in particular) with the interpersonal skills needed to (1) develop and build relationships with their internal constituents and clients, (2) facilitate conversations and discussions before and during meetings, and (3) handle impromptu questions with confidence and executive presence and make positive first impressions. The topics and techniques discussed are accompanied by case studies, examples, and exercises to give the readers the opportunity to develop plans to bridge the gap between theory and practice. The readers can use the book as a reliable resource when subject matter experts or training guides are not readily available.

She Memes Well - Essays (Hardcover): Quinta Brunson She Memes Well - Essays (Hardcover)
Quinta Brunson
R663 R552 Discovery Miles 5 520 Save R111 (17%) Ships in 10 - 15 working days
5G and Beyond - The Future of IoT (Hardcover): Parag Chatterjee, Robin Singh Bhadoria, Yadunath Pathak 5G and Beyond - The Future of IoT (Hardcover)
Parag Chatterjee, Robin Singh Bhadoria, Yadunath Pathak
R3,920 Discovery Miles 39 200 Ships in 12 - 17 working days

1) This book presents a two-fold approach to the topic. On one hand it discusses the fundamentals and theoretical concepts of 5G with respect to the IoT, and on the other hand it showcases some impactful and trending research in this field. Clearly, IoT is an interdisciplinary field and therefore this book would be useful to different stakeholders related to mobile communications and IoT networking architecture. 2) IoT is one of the most trending topics worldwide and 5G is coming into force across the world. Hence there would be demand for this topic 3) As compared to competition, the proposed book has updated content. It is written completely with the consideration of 5G inclusion worldwide in 2020, state-of-the-art research across the globe presented in diverse chapters, dual approach of conceptual and research/implementational perspectives put together.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Commodore 64: a visual compendium
Bitmap Books Hardcover  (1)
R1,097 Discovery Miles 10 970
IT Contracts and Dispute Management - A…
Steven Baker, Lawrence Akka, … Hardcover R5,696 Discovery Miles 56 960
WFH: Working From Home - How To Build A…
Harriet Minter Paperback R355 R280 Discovery Miles 2 800
Tomorrow, and Tomorrow, and Tomorrow…
Gabrielle Zevin Paperback  (1)
R465 R389 Discovery Miles 3 890
Squishmallows Official Collectors' Guide
Squishmallows Hardcover R337 Discovery Miles 3 370
Metal Slug: The Ultimate History
Bitmap Books Hardcover  (1)
R1,300 Discovery Miles 13 000
Research Handbook on the Law and…
Ioannis Kokkoris, Claudia Lemus Hardcover R6,357 Discovery Miles 63 570
Like, Comment, Subscribe - Inside…
Mark Bergen Paperback R350 R277 Discovery Miles 2 770
Artificial Intelligence - Law and…
Charles Kerrigan Hardcover R5,761 Discovery Miles 57 610
Game Boy: The Box Art Collection
Bitmap Books Hardcover R1,159 Discovery Miles 11 590

 

Partners