|
Books > Computing & IT > Social & legal aspects of computing > General
As long as humans write software, the key to successful software
security is making the software development program process more
efficient and effective. Although the approach of this textbook
includes people, process, and technology approaches to software
security, Practical Core Software Security: A Reference Framework
stresses the people element of software security, which is still
the most important part to manage as software is developed,
controlled, and exploited by humans. The text outlines a
step-by-step process for software security that is relevant to
today's technical, operational, business, and development
environments. It focuses on what humans can do to control and
manage a secure software development process using best practices
and metrics. Although security issues will always exist, students
learn how to maximize an organization's ability to minimize
vulnerabilities in software products before they are released or
deployed by building security into the development process. The
authors have worked with Fortune 500 companies and have often seen
examples of the breakdown of security development lifecycle (SDL)
practices. The text takes an experience-based approach to apply
components of the best available SDL models in dealing with the
problems described above. Software security best practices, an SDL
model, and framework are presented in this book. Starting with an
overview of the SDL, the text outlines a model for mapping SDL best
practices to the software development life cycle (SDLC). It
explains how to use this model to build and manage a mature SDL
program. Exercises and an in-depth case study aid students in
mastering the SDL model. Professionals skilled in secure software
development and related tasks are in tremendous demand today. The
industry continues to experience exponential demand that should
continue to grow for the foreseeable future. This book can benefit
professionals as much as students. As they integrate the book's
ideas into their software security practices, their value increases
to their organizations, management teams, community, and industry.
The debate over cyber technology has resulted in new considerations
for national security operations. States find themselves in an
increasingly interconnected world with a diverse threat spectrum
and little understanding of how decisions are made within this
amorphous domain. With The Decision to Attack, Aaron Franklin
Brantly investigates how states decide to employ cyber in military
and intelligence operations against other states and how rational
those decisions are. In his examination, Brantly contextualizes
broader cyber decision-making processes into a systematic expected
utility-rational choice approach to provide a mathematical
understanding of the use of cyber weapons at the state level.
Topics Discussed: The Key Concepts of Cyber The Motivation and
Utility for Covert Action Digital Power Anonymity and Attribution
in Cyberspace Cyber and Conventional Operations: The Dynamics of
Conflict Defining the Role of Intelligence in Cyberspace How actors
decide to use cyber-a rational choice approach Cognitive Processes
and Decision-Making in Cyberspace Finding meaning in the expected
utility of international cyber conflict
|
Big Data
(Paperback)
Benoit Leclerc, Jesse Cale
|
R1,148
R996
Discovery Miles 9 960
Save R152 (13%)
|
Ships in 9 - 15 working days
|
|
The internet has launched the world into an era into which enormous
amounts of data are generated every day through technologies with
both positive and negative consequences. This often refers to big
data . This book explores big data in organisations operating in
the criminology and criminal justice fields. Big data entails a
major disruption in the ways we think about and do things, which
certainly applies to most organisations including those operating
in the criminology and criminal justice fields. Big data is
currently disrupting processes in most organisations - how
different organisations collaborate with one another, how
organisations develop products or services, how organisations can
identify, recruit, and evaluate talent, how organisations can make
better decisions based on empirical evidence rather than intuition,
and how organisations can quickly implement any transformation
plan, to name a few. All these processes are important to tap into,
but two underlying processes are critical to establish a foundation
that will permit organisations to flourish and thrive in the era of
big data - creating a culture more receptive to big data and
implementing a systematic data analytics-driven process within the
organisation. Written in a clear and direct style, this book will
appeal to students and scholars in criminology, criminal justice,
sociology, and cultural studies but also to government agencies,
corporate and non-corporate organisations, or virtually any other
institution impacted by big data.
The volume is devoted to the relevant problems in the legal sphere,
created and generated by recent advances in science and technology.
In particular, it investigates a series of cutting-edge
contemporary and controversial case-studies where scientific and
technological issues intersect with individual legal rights. The
book addresses challenging topics at the intersection of
communication technologies and biotech innovations such as freedom
of expression, right to health, knowledge production, Internet
content regulation, accessibility and freedom of scientific
research.
This book attempts to link some of the recent advances in
crowdsourcing with advances in innovation and management. It
contributes to the literature in several ways. First, it provides a
global definition, insights and examples of this managerial
perspective resulting in a theoretical framework. Second, it
explores the relationship between crowdsourcing and technological
innovation, the development of social networks and new behaviors of
Internet users. Third, it explores different crowdsourcing
applications in various sectors such as medicine, tourism,
information and communication technology (ICT), and marketing.
Fourth, it observes the ways in which crowdsourcing can improve
production, finance, management and overall managerial performance.
Crowdsourcing, also known as "massive outsourcing" or "voluntary
outsourcing," is the act of taking a job or a specific task usually
performed by an employee of a company or contractors, and
outsourcing it to a large group of people or a community (crowd or
mass) via the Internet, through an open call. The term was coined
by Jeff Howe in a 2006 issue of Wired magazine. It is being
developed in different sciences (i.e., medicine, engineering, ICT,
management) and is used in the most successful companies of the
modern era (i.e., Apple, Facebook, Inditex, Starbucks). The
developments in crowdsourcing has theoretical and practical
implications, which will be explored in this book. Including
contributions from international academics, scholars and
professionals within the field, this book provides a global,
multidimensional perspective on crowdsourcing.
This collected volume gathers a broad spectrum of social science
and information science articles about Facebook. It looks into
facets of users, such as age, sex, and culture, and into facets of
use, e.g. privacy behavior after the Snowden affair, unfriending on
Facebook, or Facebook addiction, as well as into quality
perceptions. Written by leading scholars investigating the impact
of Web 2.0., this volume is highly relevant for social media
researchers, information scientists, and social scientists, and,
not least, for everyone interested in Facebook-related topics.
This volume offers unique insights into the mutually constitutive
nature of social media practices and religious change. Part 1
examines how social media operate in conjunction with mass media in
the construction of discourses of religion and spirituality. It
includes: a longitudinal study of British news media coverage of
Christianity, secularism and religious diversity (Knott et al.); an
analysis of responses to two documentaries 'The Monastery' and 'The
Convent' (Thomas); an evaluation of theories of the sacred in
studies of religion and media within the 'strong program' in
cultural sociology in the US (Lynch); and a study of the
consequences of mass and social media synergies for public
perceptions of Islam in the Netherlands (Herbert). Part 2 examines
the role of social media in the construction of contemporary
martyrs and media celebrities (e.g., Michael Jackson) using mixed
and mobile methods to analyse fan sites (Bennett & Campbell)
and jihadi websites and YouTube (Nauta). Part 3 examines how
certain bounded religious communities negotiate the challenges of
social media: Judaism in Second Life (Abrams & Baker); Bah'ai
regulation of web use among members (Campbell & Fulton);
YouTube evangelists (Pihlaja); and public expressions of
bereavement (Greenhill & Fletcher). The book provides
theoretically informed empirical case studies and presents an
intriguing, complex picture of the aesthetic and ethical,
demographic and discursive aspects of new spaces of communication
and their implications for religious institutions, beliefs and
practices.
This book offers guidance for US-based IT businesses on both sides
of the Atlantic when dealing with big data and government data,
since transatlantic data flows are key to the success of these
enterprises. It offers practical insights into many of the
data-protection challenges US companies in various industries face
when seeking to comply with US and EU data-protection laws, and
analyses the potential conflicts in the light of their risks and
the way in which US-based cloud providers react to the
uncertainties of the applicable data-protection rules. The book
particularly focuses on the insights derived from a qualitative
study conducted in 2016 with various cloud-based IT businesses in
the Silicon Valley area, which shows the diversity of views on data
protection and the many approaches companies take to this topic.
Further, it discusses key data-protection issues in the field of
big data and government data.
Advancing technologies are rapidly modifying the current state of
business and society causing an expansion of possible career
opportunities. In order to stay competitive, institutions of
education must provide an emphasis on the wide-range of skills and
experiences needed to contribute to a 21st century workforce. As
new technologies emerge and even disrupt, there will be a demand
for new forms of education and deeper learning. Disruptive and
Emerging Technology Trends Across Education and the Workplace is a
collection of innovative research on the latest instructive methods
being utilized in classrooms and organizations as well as the
benefits and challenges of adopting these technologies. While
highlighting topics including mobile learning, augmented reality,
and cryptocurrencies, this book is ideally designed for developers,
professionals, educators, managers, researchers, scientists,
stakeholders, strategists, practitioners, and students seeking
current research on new forms of educational techniques in relation
to the continued application of new technologies in the workplace.
AI Metaheuristics for Information Security in Digital Media
examines the latest developments in AI-based metaheuristics
algorithms with applications in information security for digital
media. It highlights the importance of several security parameters,
their analysis, and validations for different practical
applications. Drawing on multidisciplinary research including
computer vision, machine learning, artificial intelligence,
modified/newly developed metaheuristics algorithms, it will enhance
information security for society. It includes state-of-the-art
research with illustrations and exercises throughout.
Mind your online P's and Q's with this expert digital manners guide
Conducting yourself online can be challenging. It sometimes seems
like the web and social media is tailor-made to cause upset and
anger. But, with the right guide, anyone can learn how to be a
beacon of civility and politeness online. In Digital Etiquette For
Dummies, a team of online communication experts share their
combined insights into improving your presence on social media,
writing emails that exude positivity and clarity, behaving
correctly in virtual meetings, and much more. You'll become a
paragon of politeness as you learn to apply the timeless rules of
etiquette to the unique environment of the web, social media,
email, Zoom, and smartphones. In this book, you'll also: Learn
near-universal etiquette rules for email, social media, cellphones,
and more Discover ways to make sure that your polite attitude isn't
being lost in the text-only context of a business email Avoid
common social media pitfalls and digital faux pas that can trip up
even the most careful communicators A great handbook for anyone who
uses digital communication in business or in their personal life
(so, pretty much everyone), Digital Etiquette For Dummies also
belongs on the reading lists of those trying to improve their
online interactions on social media.
New material treats such contemporary subjects as automatic
speech recognition and speaker verification for banking by computer
and privileged (medical, military, diplomatic) information and
control access.
The book also focuses on speech and audio compression for mobile
communication and the Internet. The importance of subjective
quality criteria is stressed.
The book also contains introductions to human monaural and
binaural hearing, and the basic concepts of signal analysis.
Beyond speech processing, this revised and extended new edition
of Computer Speech gives an overview of natural language technology
and presents the nuts and bolts of state-of-the-art speech dialogue
systems.
Cybersecurity risk is a top-of-the-house issue for all
organizations. Cybertax-Managing the Risks and Results is a must
read for every current or aspiring executive seeking the best way
to manage and mitigate cybersecurity risk. It examines
cybersecurity as a tax on the organization and charts the best ways
leadership can be cybertax efficient. Viewing cybersecurity through
the cybertax lens provides an effective way for non-cybersecurity
experts in leadership to manage and govern cybersecurity in their
organizations The book outlines questions and leadership techniques
to gain the relevant information to manage cybersecurity threats
and risk. The book enables executives to: Understand cybersecurity
risk from a business perspective Understand cybersecurity risk as a
tax (cybertax) Understand the cybersecurity threat landscape Drive
business-driven questions and metrics for managing cybersecurity
risk Understand the Seven C's for managing cybersecurity risk
Governing the cybersecurity function is as important as governing
finance, sales, human resources, and other key leadership
responsibilities Executive leadership needs to manage cybersecurity
risk like they manage other critical risks, such as sales,
finances, resources, and competition. This book puts managing
cybersecurity risk on an even plane with these other significant
risks that demand leader ships' attention. The authors strive to
demystify cybersecurity to bridge the chasm from the
top-of-the-house to the cybersecurity function. This book delivers
actionable advice and metrics to measure and evaluate cybersecurity
effectiveness across your organization.
In today's market, emerging technologies are continually assisting
in common workplace practices as companies and organizations search
for innovative ways to solve modern issues that arise. Prevalent
applications including internet of things, big data, and cloud
computing all have noteworthy benefits, but issues remain when
separately integrating them into the professional practices.
Significant research is needed on converging these systems and
leveraging each of their advantages in order to find solutions to
real-time problems that still exist. Challenges and Opportunities
for the Convergence of IoT, Big Data, and Cloud Computing is a
pivotal reference source that provides vital research on the
relation between these technologies and the impact they
collectively have in solving real-world challenges. While
highlighting topics such as cloud-based analytics, intelligent
algorithms, and information security, this publication explores
current issues that remain when attempting to implement these
systems as well as the specific applications IoT, big data, and
cloud computing have in various professional sectors. This book is
ideally designed for academicians, researchers, developers,
computer scientists, IT professionals, practitioners, scholars,
students, and engineers seeking research on the integration of
emerging technologies to solve modern societal issues.
Designed to offer an accessible set of case studies and analyses of
ethical dilemmas in data science. This book will be suitable for
technical readers in data science who want to understand diverse
ethical approaches to AI.
|
You may like...
The Dance Tree
Kiran Millwood Hargrave
Paperback
R385
R301
Discovery Miles 3 010
Herc
Phoenicia Rogerson
Paperback
R380
R304
Discovery Miles 3 040
Heart Bones
Colleen Hoover
Paperback
R357
Discovery Miles 3 570
|