0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (164)
  • R250 - R500 (519)
  • R500+ (1,482)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > General

Computer Programming for Beginners and Cybersecurity - 4 MANUSCRIPTS IN 1: The Ultimate Manual to Learn step by step How to... Computer Programming for Beginners and Cybersecurity - 4 MANUSCRIPTS IN 1: The Ultimate Manual to Learn step by step How to Professionally Code and Protect Your Data. This Book includes: Python, Java, C ++ and Cybersecurity (Hardcover)
Alan Grid
R1,042 Discovery Miles 10 420 Ships in 12 - 17 working days
Twitter - How To Market & Make Money With Twitter (Hardcover): Ace McCloud Twitter - How To Market & Make Money With Twitter (Hardcover)
Ace McCloud
R568 R476 Discovery Miles 4 760 Save R92 (16%) Ships in 10 - 15 working days
Language, Identity and Cycling in the New Media Age - Exploring Interpersonal Semiotics in Multimodal Media and Online Texts... Language, Identity and Cycling in the New Media Age - Exploring Interpersonal Semiotics in Multimodal Media and Online Texts (Hardcover, 1st ed. 2018)
Patrick Kiernan
R3,978 Discovery Miles 39 780 Ships in 12 - 17 working days

This book examines how identities associated with cycling are evoked, narrated and negotiated in a media context dominated by digital environments. Arguing that the nature of identity is being impacted by the changing nature of the material and semiotic resources available for making meaning, the author introduces an approach to exploring such identity positioning through the interrelated frameworks of Systemic Functional Linguistics and Multimodal Analysis, and illustrates how this happens in practice. The book is divided into three parts, each of which focuses on a different aspect of identity and media environment. Part I considers celebrity identities in the conventional media of print and television. Part II investigates community and leisure / sporting identity through an online cycling forum, while Part III examines corporate identity realised through corporate websites, consumer reviews and Youtube channels. This unique volume will appeal to students and scholars of discourse analysis, applied linguistics and the world of cycling.

Managing Public Relations and Brand Image through Social Media (Hardcover): Punita Duhan Managing Public Relations and Brand Image through Social Media (Hardcover)
Punita Duhan
R5,150 Discovery Miles 51 500 Ships in 12 - 17 working days

Each consumer now has the power to be a journalist, reviewer, and whistle blower. The prevalence of social media has made it possible to alter a brand's reputation with a single viral post, or spark a political movement with a hashtag. This new landscape requires a strategic plasticity and careful consideration of how the public will react to an organization's actions. Participation in social media is mandatory for a brand's success in this highly competitive online era. Managing Public Relations and Brand Image through Social Media provides the latest research and theoretical framework necessary to find ease in the shifting public relations and reputation management worlds. It provides an overview of the tools and skills necessary to deftly sidestep public affronts and to effectively use online outlets to enhance an organization's visibility and reputation. This publication targets policy makers, website developers, students and educators of public relations, PR and advertising professionals, and organizations who wish to better understand the effects of social media.

Global Perspectives on Social Media in Tertiary Learning and Teaching - Emerging Research and Opportunities (Hardcover): Inna... Global Perspectives on Social Media in Tertiary Learning and Teaching - Emerging Research and Opportunities (Hardcover)
Inna Piven, Robyn Gandell, Maryann Lee, Ann M. Simpson
R3,544 Discovery Miles 35 440 Ships in 12 - 17 working days

The prominence of social media, especially in the lives of teenagers and young adults, has long been regarded as a significant distraction from studies. However, the integration of these forms of media into the teaching experience can improve the engagement of students. Global Perspectives on Social Media in Tertiary Learning and Teaching: Emerging Research and Opportunities is an essential scholarly publication that embeds innovative, current pedagogical practices into new and redeveloped courses and introduces digital and online learning tools to best support teaching practices. Featuring coverage on a wide range of topics including collaborative learning, innovative learning environments, and blended teaching, this book provides essential research for educators, educational administrators, education stakeholders, academicians, researchers, and professionals within the realm of higher education.

Twitter - Social Communication in the Twitter Age (Hardcover): Dhiraj Murthy Twitter - Social Communication in the Twitter Age (Hardcover)
Dhiraj Murthy
R1,695 Discovery Miles 16 950 Ships in 12 - 17 working days

Twitter has become a household name, discussed both for its role in prominent national elections, natural disasters, and political movements, as well as for what some malign as narcissistic "chatter." This book takes a critical step back from popular discourse and media coverage of Twitter, to present the first balanced, scholarly engagement of this popular medium.

In this timely and comprehensive introduction, Murthy not only discusses Twitter's role in our political, economic, and social lives, but also draws a historical line between the telegraph and Twitter to reflect on changes in social communication over time. The book thoughtfully examines Twitter as an emergent global communications medium and provides a theoretical framework for students, scholars, and tweeters to reflect critically on the impact of Twitter and the contemporary media environment. The book uses case studies including citizen journalism, health, and national disasters to provide empirically rich insights and to help decipher some of the ways in which Twitter and social media more broadly may be shaping contemporary life.

The Responsibilities of Online Service Providers (Hardcover, 1st ed. 2017): Mariarosaria Taddeo, Luciano Floridi The Responsibilities of Online Service Providers (Hardcover, 1st ed. 2017)
Mariarosaria Taddeo, Luciano Floridi
R4,444 R2,817 Discovery Miles 28 170 Save R1,627 (37%) Ships in 12 - 17 working days

This volume focuses on the responsibilities of online service providers (OSPs) in contemporary societies. It examines the complexity and global dimensions of the rapidly evolving and serious challenges posed by the exponential development of Internet services and resources. It looks at the major actors - such as Facebook, Google, Twitter, and Yahoo! - and their significant influence on the informational environment and users' interactions within it, as well as the responsibilities and liabilities such influence entails. It discusses the position of OSPs as information gatekeepers and how they have gone from offering connecting and information-sharing services to paying members to providing open, free infrastructure and applications that facilitate digital expression and the communication of information. The book seeks consensus on the principles that should shape OSPs' responsibilities and practices, taking into account business ethics and policies. Finally, it discusses the rights of users and international regulations that are in place or currently lacking.

Brad Friedman on Digital Marketing - Doing Social Media Right, When You Don't Have the Time and Don't Want to Get in... Brad Friedman on Digital Marketing - Doing Social Media Right, When You Don't Have the Time and Don't Want to Get in Trouble (Hardcover)
Brad Friedman
R641 Discovery Miles 6 410 Ships in 12 - 17 working days
Research Anthology on Social Media Advertising and Building Consumer Relationships, VOL 4 (Hardcover): Information R Management... Research Anthology on Social Media Advertising and Building Consumer Relationships, VOL 4 (Hardcover)
Information R Management Association
R15,376 Discovery Miles 153 760 Ships in 10 - 15 working days
Photoshop - Real life Project Examples of Creating World Class Photos Using Photoshop Manipulation Techniques (Hardcover): John... Photoshop - Real life Project Examples of Creating World Class Photos Using Photoshop Manipulation Techniques (Hardcover)
John Slavio
R706 R583 Discovery Miles 5 830 Save R123 (17%) Ships in 10 - 15 working days
Conversations About Language & Culture (Hardcover): Howard Burton Conversations About Language & Culture (Hardcover)
Howard Burton
R822 Discovery Miles 8 220 Ships in 10 - 15 working days
Research Anthology on Social Media Advertising and Building Consumer Relationships, VOL 3 (Hardcover): Information R Management... Research Anthology on Social Media Advertising and Building Consumer Relationships, VOL 3 (Hardcover)
Information R Management Association
R15,378 Discovery Miles 153 780 Ships in 10 - 15 working days
Reasonable Expectations of Privacy? - Eleven country reports on camera surveillance and workplace privacy (Hardcover,... Reasonable Expectations of Privacy? - Eleven country reports on camera surveillance and workplace privacy (Hardcover, Edition.)
Sjaak Nouwt, Berend R. de Vries, Corien Prins
R1,524 Discovery Miles 15 240 Ships in 10 - 15 working days

In 1967, Justice John Marshall Harlan introduced the litmus test of 'a reasonable expectation of privacy' in his concurring opinion in the US Supreme Court case of Katz v. United States. Privacy, regulations to protect privacy, and data protection have been legal and social issues in many Western countries for a number of decades. However, recent measures to combat terrorism, to fight crime, and to increase security, together with the growing social acceptance of privacy-invasive technologies can be considered a serious threat to the fundamental right to privacy. What is the purport of 'reasonable expectations of privacy'? Reasonable expectations of privacy and the reality of data protection is the title of a research project being carried out by TILT, the Tilburg Institute for Law, Technology, and Society at Tilburg University, The Netherlands. The project is aimed at developing an international research network of privacy experts (professionals, academics, policymakers) and to carry out research on the practice, meaning, and legal performance of privacy and data protection in an international perspective. Part of the research project was to analyse the concept of privacy and the reality of data protection in case law, with video surveillance and workplace privacy as two focal points. The eleven country reports regarding case law on video surveillance and workplace privacy are the core of the present book. The conclusions drawn by the editors are intended to trigger and stimulate an international debate on the use and possible drawbacks of the 'reasonable expectations of privacy' concept. The editors are all affiliated to TILT - Tilburg Institute for Law, Technology, and Society, Tilburg University, The Netherlands. This is Volume 7 in the Information Technology and Law (IT&Law) Series

Master content workbook - How To Implement nurture marketing to increase sales, customer retention and build an online... Master content workbook - How To Implement nurture marketing to increase sales, customer retention and build an online community. (Hardcover)
Tyllah-Chanel Cornelio
R863 Discovery Miles 8 630 Ships in 10 - 15 working days
Patent Law for Computer Scientists - Steps to Protect Computer-Implemented Inventions (Hardcover, 2010 ed.): Daniel Closa, Alex... Patent Law for Computer Scientists - Steps to Protect Computer-Implemented Inventions (Hardcover, 2010 ed.)
Daniel Closa, Alex Gardiner, Falk Giemsa, Joerg Machek
R1,771 R1,581 Discovery Miles 15 810 Save R190 (11%) Ships in 12 - 17 working days

Patent laws are different in many countries, and inventors are sometimes at a loss to understand which basic requirements should be satisfied if an invention is to be granted a patent. This is particularly true for inventions implemented on a computer. While roughly a third of all applications (and granted patents) relate, in one way or another, to a computer, applications where the innovation mainly resides in software or in a business method are treated differently by the major patent offices in the US (USPTO), Japan (JPO), and Europe (EPO).

The authors start with a thorough introduction into patent laws and practices, as well as in related intellectual property rights, which also explains the procedures at the USPTO, JPO and EPO and, in particular, the peculiarities in the treatment of applications centering on software or computers. Based on this theoretical description, next they present in a very structured way a huge set of case studies from different areas like business methods, databases, graphical user interfaces, digital rights management, and many more. Each set starts with a rather short description and claim of the "invention," then explains the arguments a legal examiner will probably have, and eventually refines the description step by step, until all the reservations are resolved. All of these case studies are based on real-world examples, and will thus give an inexperienced developer an idea about the required level of detail and description he will have to provide.

Together, Closa, Gardiner, Giemsa and Machek have more than 70 years experience in the patent business. With their academic background in physics, electronic engineering, and computer science, they know about both the legal and the subject-based subtleties of computer-based inventions. With this book, they provide a guide to a patent examiner's way of thinking in a clear and systematic manner, helping to prepare the first steps towards a successful patent application.

Information Technology for Intellectual Property Protection - Interdisciplinary Advancements (Hardcover, New): Hideyasu Sasaki Information Technology for Intellectual Property Protection - Interdisciplinary Advancements (Hardcover, New)
Hideyasu Sasaki
R5,120 Discovery Miles 51 200 Ships in 12 - 17 working days

Information technology for intellectual property protection has become an increasingly important issue due to the expansion of ubiquitous network connectivity, which allows people to use digital content and programs that are susceptible to unauthorized electric duplication or copyright and patent infringement. Information Technology for Intellectual Property Protection: Interdisciplinary Advancements contains multidisciplinary knowledge and analysis by leading researchers and practitioners with technical backgrounds in information engineering and institutional experience in intellectual property practice. Through its discussions of both engineering solutions and the social impact of institutional protection, this book fills a gap in the existing literature and provides methods and applications for both practitioners and IT engineers.

Achieving Full Realization and Mitigating the Challenges of the Internet of Things (Hardcover): Marcel Ohanga Odhiambo, Weston... Achieving Full Realization and Mitigating the Challenges of the Internet of Things (Hardcover)
Marcel Ohanga Odhiambo, Weston Mwashita
R6,942 R6,263 Discovery Miles 62 630 Save R679 (10%) Ships in 12 - 17 working days

As the IoT market is booming, several issues are delaying the full realization of the technology. IoT devices, in cybersecurity terms, greatly increase security risk. This means that any scientific work that offers cybersecurity strategies will excite security experts who will be glad to expand their knowledge base on IoT cybersecurity. As a result of the booming of the IoT market, business competitors are jockeying for a piece of the market. This means that solutions from researchers that address compatibility issues will be greatly welcomed by IoT technology developers. Connectivity providers are likely to embrace solutions to challenges of bandwidth since a growing IoT market must be followed up by bandwidth-intensive IoT applications which tend to jostle for space on the current client-server model. Overpromising followed by underdelivering, has been the current approach by many innovators and the mismatch results in losses in production, orphaned technologies accompanied by frequent system failures. Solutions that address IoT performance issues are likely to excite many start-ups. Solutions to challenges of fragmentation presented by thousands of devices from different manufacturers operating on proprietary ecosystems are likely to be warmly embraced by many IoT brands developers. As such, a publication that specifically addresses the challenges faced in the rolling out of IoT technologies is sorely needed.

Hybrid Intelligence for Social Networks (Hardcover, 1st ed. 2017): Hema Banati, Siddhartha Bhattacharyya, Ashish Mani, Mario... Hybrid Intelligence for Social Networks (Hardcover, 1st ed. 2017)
Hema Banati, Siddhartha Bhattacharyya, Ashish Mani, Mario Koeppen
R3,428 Discovery Miles 34 280 Ships in 12 - 17 working days

This book explains aspects of social networks, varying from development and application of new artificial intelligence and computational intelligence techniques for social networks to understanding the impact of social networks. Chapters 1 and 2 deal with the basic strategies towards social networks such as mining text from such networks and applying social network metrics using a hybrid approach; Chaps. 3 to 8 focus on the prime research areas in social networks: community detection, influence maximization and opinion mining. Chapter 9 to 13 concentrate on studying the impact and use of social networks in society, primarily in education, commerce, and crowd sourcing. The contributions provide a multidimensional approach, and the book will serve graduate students and researchers as a reference in computer science, electronics engineering, communications, and information technology.

Law, Policy, and Technology - Cyberterrorism, Information Warfare, and Internet Immobilization (Hardcover, New): Pauline C.... Law, Policy, and Technology - Cyberterrorism, Information Warfare, and Internet Immobilization (Hardcover, New)
Pauline C. Reich, Eduardo Gelbstein
R4,782 Discovery Miles 47 820 Ships in 12 - 17 working days

In the information society, technology has become ubiquitous, but its intrinsic vulnerabilities and the complexity of managing mission-critical systems create an attractive target for potential attackers. Law, Policy, and Technology: Cyberterorrism, Information Warfare, and Internet Immobilization provides relevant frameworks and best practices as well as current empirical research findings in the area. It is aimed at professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact and what lessons can be learned from the attacks and simulations of the last few years.

Investigating Cyber Law and Cyber Ethics - Issues, Impacts and Practices (Hardcover): Alfreda Dudley, James Braman, Giovanni... Investigating Cyber Law and Cyber Ethics - Issues, Impacts and Practices (Hardcover)
Alfreda Dudley, James Braman, Giovanni Vincenti
R5,137 Discovery Miles 51 370 Ships in 12 - 17 working days

Ethical values in computing are essential for understanding and maintaining the relationship between computing professionals and researchers and the users of their applications and programs. While concerns about cyber ethics and cyber law are constantly changing as technology changes, the intersections of cyber ethics and cyber law are still underexplored. Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices discusses the impact of cyber ethics and cyber law on information technologies and society. Featuring current research, theoretical frameworks, and case studies, the book will highlight the ethical and legal practices used in computing technologies, increase the effectiveness of computing students and professionals in applying ethical values and legal statues, and provide insight on ethical and legal discussions of real-world applications.

Practical Core Software Security - A Reference Framework (Paperback): James F Ransome, Anmol Misra, Mark S. Merkow Practical Core Software Security - A Reference Framework (Paperback)
James F Ransome, Anmol Misra, Mark S. Merkow
R2,202 Discovery Miles 22 020 Ships in 12 - 17 working days

As long as humans write software, the key to successful software security is making the software development program process more efficient and effective. Although the approach of this textbook includes people, process, and technology approaches to software security, Practical Core Software Security: A Reference Framework stresses the people element of software security, which is still the most important part to manage as software is developed, controlled, and exploited by humans. The text outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. It focuses on what humans can do to control and manage a secure software development process using best practices and metrics. Although security issues will always exist, students learn how to maximize an organization's ability to minimize vulnerabilities in software products before they are released or deployed by building security into the development process. The authors have worked with Fortune 500 companies and have often seen examples of the breakdown of security development lifecycle (SDL) practices. The text takes an experience-based approach to apply components of the best available SDL models in dealing with the problems described above. Software security best practices, an SDL model, and framework are presented in this book. Starting with an overview of the SDL, the text outlines a model for mapping SDL best practices to the software development life cycle (SDLC). It explains how to use this model to build and manage a mature SDL program. Exercises and an in-depth case study aid students in mastering the SDL model. Professionals skilled in secure software development and related tasks are in tremendous demand today. The industry continues to experience exponential demand that should continue to grow for the foreseeable future. This book can benefit professionals as much as students. As they integrate the book's ideas into their software security practices, their value increases to their organizations, management teams, community, and industry.

Research Anthology on Social Media Advertising and Building Consumer Relationships, VOL 2 (Hardcover): Information R Management... Research Anthology on Social Media Advertising and Building Consumer Relationships, VOL 2 (Hardcover)
Information R Management Association
R15,367 Discovery Miles 153 670 Ships in 10 - 15 working days
The Decision to Attack - Military and Intelligence Cyber Decision-Making (Hardcover): Aaron Franklin Brantly The Decision to Attack - Military and Intelligence Cyber Decision-Making (Hardcover)
Aaron Franklin Brantly
R1,512 Discovery Miles 15 120 Ships in 10 - 15 working days

The debate over cyber technology has resulted in new considerations for national security operations. States find themselves in an increasingly interconnected world with a diverse threat spectrum and little understanding of how decisions are made within this amorphous domain. With The Decision to Attack, Aaron Franklin Brantly investigates how states decide to employ cyber in military and intelligence operations against other states and how rational those decisions are. In his examination, Brantly contextualizes broader cyber decision-making processes into a systematic expected utility-rational choice approach to provide a mathematical understanding of the use of cyber weapons at the state level. Topics Discussed: The Key Concepts of Cyber The Motivation and Utility for Covert Action Digital Power Anonymity and Attribution in Cyberspace Cyber and Conventional Operations: The Dynamics of Conflict Defining the Role of Intelligence in Cyberspace How actors decide to use cyber-a rational choice approach Cognitive Processes and Decision-Making in Cyberspace Finding meaning in the expected utility of international cyber conflict

Photoshop - The Ultimate Beginners' Guide to Mastering Adobe Photoshop in 1 Week (Hardcover): John Slavio Photoshop - The Ultimate Beginners' Guide to Mastering Adobe Photoshop in 1 Week (Hardcover)
John Slavio
R858 Discovery Miles 8 580 Ships in 10 - 15 working days
Research Anthology on Social Media Advertising and Building Consumer Relationships, VOL 1 (Hardcover): Information R Management... Research Anthology on Social Media Advertising and Building Consumer Relationships, VOL 1 (Hardcover)
Information R Management Association
R15,369 Discovery Miles 153 690 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Research Handbook on the Law and…
Ioannis Kokkoris, Claudia Lemus Hardcover R6,078 Discovery Miles 60 780
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi Paperback R620 R546 Discovery Miles 5 460
Facebook
Dana Kilroy Fold-out book or chart R208 Discovery Miles 2 080
Squishmallows Official Collectors' Guide
Squishmallows Hardcover R323 Discovery Miles 3 230
The Cinematic Art of Overwatch: Volume 1
Hardcover R621 Discovery Miles 6 210
Advanced Introduction to Law and…
Woodrow Barfield, Ugo Pagallo Paperback R639 Discovery Miles 6 390
Research Handbook on the Law of…
Woodrow Barfield, Ugo Pagallo Paperback R1,471 Discovery Miles 14 710
Digital Platforms and Global Law
Fabio Bassan Hardcover R2,380 Discovery Miles 23 800
Regulating Social Network Sites - Data…
Asma Vranaki Hardcover R3,010 Discovery Miles 30 100
Handbook on Tourism and Social Media
Dogan Gursoy, Rahul P.S. Kaurav Hardcover R6,107 Discovery Miles 61 070

 

Partners