0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (111)
  • R250 - R500 (425)
  • R500+ (1,382)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > General

Practical Security for Agile and DevOps (Paperback): Mark S. Merkow Practical Security for Agile and DevOps (Paperback)
Mark S. Merkow
R2,032 Discovery Miles 20 320 Ships in 10 - 15 working days

This textbook was written from the perspective of someone who began his software security career in 2005, long before the industry began focusing on it. This is an excellent perspective for students who want to learn about securing application development. After having made all the rookie mistakes, the author realized that software security is a human factors issue rather than a technical or process issue alone. Throwing technology into an environment that expects people to deal with it but failing to prepare them technically and psychologically with the knowledge and skills needed is a certain recipe for bad results. Practical Security for Agile and DevOps is a collection of best practices and effective implementation recommendations that are proven to work. The text leaves the boring details of software security theory out of the discussion as much as possible to concentrate on practical applied software security that is useful to professionals. It is as much a book for students' own benefit as it is for the benefit of their academic careers and organizations. Professionals who are skilled in secure and resilient software development and related tasks are in tremendous demand. This demand will increase exponentially for the foreseeable future. As students integrate the text's best practices into their daily duties, their value increases to their companies, management, community, and industry. The textbook was written for the following readers: Students in higher education programs in business or engineering disciplines AppSec architects and program managers in information security organizations Enterprise architecture teams with a focus on application development Scrum Teams including: Scrum Masters Engineers/developers Analysts Architects Testers DevOps teams Product owners and their management Project managers Application security auditors Agile coaches and trainers Instructors and trainers in academia and private organizations

Research Anthology on Applying Social Networking Strategies to Classrooms and Libraries, VOL 2 (Hardcover): Information R... Research Anthology on Applying Social Networking Strategies to Classrooms and Libraries, VOL 2 (Hardcover)
Information R Management Association
R8,991 Discovery Miles 89 910 Ships in 18 - 22 working days
Antisocial Media - Crime-watching in the Internet Age (Hardcover, 1st ed. 2018): Mark A. Wood Antisocial Media - Crime-watching in the Internet Age (Hardcover, 1st ed. 2018)
Mark A. Wood
R2,880 Discovery Miles 28 800 Ships in 18 - 22 working days

This book provides a cutting-edge introduction to Internet-facilitated crime-watching and examines how social media have shifted the landscape for producing, distributing, and consuming footage of crime. In this thought-provoking work, Mark Wood examines the phenomenon of antisocial media: participatory online domains where footage of crime is aggregated, sympathetically curated, and consumed as entertainment. Focusing on Facebook pages dedicated to hosting footage of street fights, brawls, and other forms of bareknuckle violence, Wood demonstrates that to properly grapple with antisocial media, we must address not only their content, but also their software. In doing so, this study goes a long way to addressing the fundamental question: how have social media changed the way we consume crime? Synthesizing criminology, media theory, software studies, and digital sociology, Antisocial Media is media criminology for the Facebook age. It is essential reading for students and scholars interested in social media, cultural criminology, and the crime-media interface.

Social Networks  - The Modern-Day Family - Law and Policy of Regulation (Hardcover, 1st ed. 2021): Vanessa Kirch Social Networks - The Modern-Day Family - Law and Policy of Regulation (Hardcover, 1st ed. 2021)
Vanessa Kirch
R3,113 Discovery Miles 31 130 Ships in 18 - 22 working days

Social networks have created a plethora of problems regarding privacy and the protection of personal data. The use of social networks has become a key concern of legal scholars, policy-makers and the operators as well as users of those social networks. This pathbreaking book highlights the importance of privacy in the context of today's new electronic communication technologies as it presents conflicting claims to protect national and international security, the freedom of the Internet and economic considerations. Using the New Haven School of Jurisprudence's intellectual framework, the author presents the applicable law on privacy and social media in international and comparative perspective, focusing on the United States, the European Union and its General Data Protection Regulation of 2018 as well as Germany, the United Kingdom and Latin America. The book appraises the law in place, discusses alternatives and presents recommendations in pursuit of a public order of human dignity.

Social Media - The Academic Library Perspective (Paperback): Nina Verishagen Social Media - The Academic Library Perspective (Paperback)
Nina Verishagen
R1,615 Discovery Miles 16 150 Ships in 10 - 15 working days

Social Media: The Academic Library Perspective provides a step-by-step guide on social media as written by somebody who has already done the work. Made up of case studies written by authors at various institutions who provide different perspectives on their institution's use of social media, the book highlights successes and failures, while also focusing on tips for social media management in the academic library that anybody in the community can interpret and adapt. Social media platforms are dealt with systematically, making this an essential guide for librarians who want to use social media to the benefit of their library.

The Rhythm Image - Music Videos and New Audiovisual Forms (Hardcover): Steven Shaviro The Rhythm Image - Music Videos and New Audiovisual Forms (Hardcover)
Steven Shaviro
R3,377 R3,175 Discovery Miles 31 750 Save R202 (6%) Ships in 10 - 15 working days

Music videos play a critical role in our age of ubiquitous streaming digital media. They project the personas and visions of musical artists; they stand at the cutting edge of developments in popular culture; and they fuse and revise multiple frames of reference, from dance to high fashion to cult movies and television shows to Internet memes. Above all, music videos are laboratories for experimenting with new forms of audiovisual expression. The Rhythm Image explores all these dimensions. The book analyzes, in depth, recent music videos for artists ranging from pop superstar The Weeknd to independent women artists like FKA twigs and Dawn Richard. The music videos discussed in this book all treat the traditional themes of popular music: sex and romance, money and fame, and the lived experiences of race and gender. But they twist these themes in strange and unexpected ways, in order to reflect our entanglement with a digital world of social media, data gathering, and 24/7 demands upon our attention.

Dressing Up - Menswear in the Age of Social Media (Hardcover): Joshua M. Bluteau Dressing Up - Menswear in the Age of Social Media (Hardcover)
Joshua M. Bluteau
R2,514 Discovery Miles 25 140 Ships in 10 - 15 working days

What does men's fashion say about contemporary masculinity? How do these notions operate in an increasingly digitized world? To answer these questions, author Joshua M. Bluteau combines theoretical analysis with vibrant narrative, exploring men's fashion in the online world of social media as well as the offline worlds of retail, production, and the catwalk. Is it time to reassess notions of masculinity? How do we construct ourselves in the online world, and what are the dangers of doing so? From the ateliers of London to the digital landscape of Instagram, Dressing Up re-examines the ways men dress, and the ways men post.

Coaching Online - A Practical Guide (Paperback): Kate Anthony, DeeAnna Merz Nagel Coaching Online - A Practical Guide (Paperback)
Kate Anthony, DeeAnna Merz Nagel
R976 Discovery Miles 9 760 Ships in 10 - 15 working days

Translating traditional coaching methods and competencies for use in the online world, this informative and timely guide shows coaches how to transform their face-to-face practice into one that utilises technological means of communication with clients, mentors, and everyone else associated with their practice. The book offers up-to-the-minute practical and ethical information from two world-expert coaches, leaning on their combined 50 years of experience and study. It covers the practice of online coaching via email, chat, audio/telephone and video methods, as well as the ethics of online coaching (including an ethical framework), case material, supervision, mentoring and training, and a look into the future of the coaching profession in light of technological developments and the culture of cyberspace. Whether you are a coach-in-training or established Coaching Master, this book is an accessible and invaluable tool for taking and maintaining your coaching services online.

Social Media Marketing - Breakthroughs in Research and Practice, VOL 2 (Hardcover): Information Reso Management Association Social Media Marketing - Breakthroughs in Research and Practice, VOL 2 (Hardcover)
Information Reso Management Association
R10,437 Discovery Miles 104 370 Ships in 18 - 22 working days
The European Union as Guardian of Internet Privacy - The Story of Art 16 TFEU (Hardcover, 1st ed. 2016): Hielke Hijmans The European Union as Guardian of Internet Privacy - The Story of Art 16 TFEU (Hardcover, 1st ed. 2016)
Hielke Hijmans
R4,810 Discovery Miles 48 100 Ships in 18 - 22 working days

This book examines the role of the EU in ensuring privacy and data protection on the internet. It describes and demonstrates the importance of privacy and data protection for our democracies and how the enjoyment of these rights is challenged by, particularly, big data and mass surveillance. The book takes the perspective of the EU mandate under Article 16 TFEU. It analyses the contributions of the specific actors and roles within the EU framework: the judiciary, the EU legislator, the independent supervisory authorities, the cooperation mechanisms of these authorities, as well as the EU as actor in the external domain. Article 16 TFEU enables the Court of the Justice of the EU to play its role as constitutional court and to set high standards for fundamental rights protection. It obliges the European Parliament and the Council to lay down legislation that encompasses all processing of personal data. It confirms control by independent supervisory authorities as an essential element of data protection and it gives the EU a strong mandate to act in the global arena. The analysis shows that EU powers can be successfully used in a legitimate and effective manner and that this subject could be a success story for the EU, in times of widespread euroskepsis. It demonstrates that the Member States remain important players in ensuring privacy and data protection. In order to be a success story, the key stakeholders should be prepared to go the extra mile, so it is argued in the book. The book is based on academic research for which the author received a double doctorate at the University of Amsterdam and the Vrije Universiteit Brussels. It builds on a long inside experience within the European institutions, as well as within the community of data protection and data protection authorities. It is a must read in a time where the setting of EU privacy and data protection is changing dramatically, not only as a result of the rapidly evolving information society, but also because of important legal developments such as the entry into force of the General Data Protection Regulation. This book will appeal to all those who are in some way involved in making this regulation work. It will also appeal to people interested in the institutional framework of the European Union and in the role of the Union of promoting fundamental rights, also in the wider world.

Social Network Analysis in Predictive Policing - Concepts, Models and Methods (Hardcover, 1st ed. 2016): Mohammad A. Tayebi,... Social Network Analysis in Predictive Policing - Concepts, Models and Methods (Hardcover, 1st ed. 2016)
Mohammad A. Tayebi, Uwe Glasser
R3,286 R2,916 Discovery Miles 29 160 Save R370 (11%) Ships in 10 - 15 working days

This book focuses on applications of social network analysis in predictive policing. Data science is used to identify potential criminal activity by analyzing the relationships between offenders to fully understand criminal collaboration patterns. Co-offending networks-networks of offenders who have committed crimes together-have long been recognized by law enforcement and intelligence agencies as a major factor in the design of crime prevention and intervention strategies. Despite the importance of co-offending network analysis for public safety, computational methods for analyzing large-scale criminal networks are rather premature. This book extensively and systematically studies co-offending network analysis as effective tool for predictive policing. The formal representation of criminological concepts presented here allow computer scientists to think about algorithmic and computational solutions to problems long discussed in the criminology literature. For each of the studied problems, we start with well-founded concepts and theories in criminology, then propose a computational method and finally provide a thorough experimental evaluation, along with a discussion of the results. In this way, the reader will be able to study the complete process of solving real-world multidisciplinary problems.

Assessing and Insuring Cybersecurity Risk (Paperback): Ravi Das Assessing and Insuring Cybersecurity Risk (Paperback)
Ravi Das
R1,740 Discovery Miles 17 400 Ships in 10 - 15 working days

Remote workforces using VPNs, cloud-based infrastructure and critical systems, and a proliferation in phishing attacks and fraudulent websites are all raising the level of risk for every company. It all comes down to just one thing that is at stake: how to gauge a company's level of cyber risk and the tolerance level for this risk. Loosely put, this translates to how much uncertainty an organization can tolerate before it starts to negatively affect mission critical flows and business processes. Trying to gauge this can be a huge and nebulous task for any IT security team to accomplish. Making this task so difficult are the many frameworks and models that can be utilized. It is very confusing to know which one to utilize in order to achieve a high level of security. Complicating this situation further is that both quantitative and qualitative variables must be considered and deployed into a cyber risk model. Assessing and Insuring Cybersecurity Risk provides an insight into how to gauge an organization's particular level of cyber risk, and what would be deemed appropriate for the organization's risk tolerance. In addition to computing the level of cyber risk, an IT security team has to determine the appropriate controls that are needed to mitigate cyber risk. Also to be considered are the standards and best practices that the IT security team has to implement for complying with such regulations and mandates as CCPA, GDPR, and the HIPAA. To help a security team to comprehensively assess an organization's cyber risk level and how to insure against it, the book covers: The mechanics of cyber risk Risk controls that need to be put into place The issues and benefits of cybersecurity risk insurance policies GDPR, CCPA, and the the CMMC Gauging how much cyber risk and uncertainty an organization can tolerate is a complex and complicated task, and this book helps to make it more understandable and manageable.

Social Media Analytics for User Behavior Modeling - A Task Heterogeneity Perspective (Paperback): Arun Reddy Nelakurthi,... Social Media Analytics for User Behavior Modeling - A Task Heterogeneity Perspective (Paperback)
Arun Reddy Nelakurthi, Jingrui He
R1,561 Discovery Miles 15 610 Ships in 10 - 15 working days

Winner of the "Outstanding Academic Title" recognition by Choice for the 2020 OAT Awards. The Choice OAT Award represents the highest caliber of scholarly titles that have been reviewed by Choice and conveys the extraordinary recognition of the academic community. In recent years social media has gained significant popularity and has become an essential medium of communication. Such user-generated content provides an excellent scenario for applying the metaphor of mining any information. Transfer learning is a research problem in machine learning that focuses on leveraging the knowledge gained while solving one problem and applying it to a different, but related problem. Features: Offers novel frameworks to study user behavior and for addressing and explaining task heterogeneity Presents a detailed study of existing research Provides convergence and complexity analysis of the frameworks Includes algorithms to implement the proposed research work Covers extensive empirical analysis Social Media Analytics for User Behavior Modeling: A Task Heterogeneity Perspective is a guide to user behavior modeling in heterogeneous settings and is of great use to the machine learning community.

Cyber Forensics - Examining Emerging and Hybrid Technologies (Paperback): Albert J. Marcella Cyber Forensics - Examining Emerging and Hybrid Technologies (Paperback)
Albert J. Marcella
R1,515 Discovery Miles 15 150 Ships in 10 - 15 working days

Threat actors, be they cyber criminals, terrorists, hacktivists or disgruntled employees, are employing sophisticated attack techniques and anti-forensics tools to cover their attacks and breach attempts. As emerging and hybrid technologies continue to influence daily business decisions, the proactive use of cyber forensics to better assess the risks that the exploitation of these technologies pose to enterprise-wide operations is rapidly becoming a strategic business objective. This book moves beyond the typical, technical approach to discussing cyber forensics processes and procedures. Instead, the authors examine how cyber forensics can be applied to identifying, collecting, and examining evidential data from emerging and hybrid technologies, while taking steps to proactively manage the influence and impact, as well as the policy and governance aspects of these technologies and their effect on business operations. A world-class team of cyber forensics researchers, investigators, practitioners and law enforcement professionals have come together to provide the reader with insights and recommendations into the proactive application of cyber forensic methodologies and procedures to both protect data and to identify digital evidence related to the misuse of these data. This book is an essential guide for both the technical and non-technical executive, manager, attorney, auditor, and general practitioner who is seeking an authoritative source on how cyber forensics may be applied to both evidential data collection and to proactively managing today's and tomorrow's emerging and hybrid technologies. The book will also serve as a primary or supplemental text in both under- and post-graduate academic programs addressing information, operational and emerging technologies, cyber forensics, networks, cloud computing and cybersecurity.

Teach Yourself Getting Started on Second Life (Paperback): Teach Yourself Getting Started on Second Life (Paperback)
R94 Discovery Miles 940 Ships in 10 - 15 working days
The Sensible Guide to Program Management Professional (PgMP) (R) Success - Including 420 Practice Exam Questions (Paperback):... The Sensible Guide to Program Management Professional (PgMP) (R) Success - Including 420 Practice Exam Questions (Paperback)
Te Wu
R1,760 Discovery Miles 17 600 Ships in 10 - 15 working days

A Sensible Guide to Program Management Professional (PgMP) (R) Success is for program managers preparing to take the PgMP exam based on The Standard for Program Management - 4th Edition (PgM4 Standard). It is designed for busy professionals whose responsibilities have taken them into the realm of coordinating, facilitating, managing, and leading programs. Program managers are leaders who are directly managing large amounts of project resources for their organizations. This study guide addresses three main concerns facing PgMP exam candidates: What are the essential concepts, processes, and tools that form the foundation of today's program management? Since program management is still an emerging profession with professionals often working in different ways, what does this mean for a "standard" exam? More specifically, how does that impact your ability to pass the PgMP exam? What is the best way to prepare for the PgMP exam? To address the first concern, this book highlights the underlying rationale for program management: why it exists in organizations; why it is becoming ever more important; what programs are, especially for the purpose of passing the exam; how to think like a portfolio manager; and what the most important concepts, processes, and tools are for this profession. By simplifying complex ideas and communicating them in plain English with relevant examples, this book aims to help readers not only to pass the PgMP exam but also to serve as an essential guide for program managers. For the second concern, this book differs from other study guides by describing the author's personal experience as a program manager and addressing the most pressing questions for each of the performance domains in The Standard for Program Management. To address the last concern, this book contains 420 practice questions, access to an online exam simulator and an online PgMP community, and a time-tested approach for passing the PgMP exam.

Beginning AutoCAD (R) 2022 Exercise Workbook (Paperback): Cheryl Shrock Beginning AutoCAD (R) 2022 Exercise Workbook (Paperback)
Cheryl Shrock; Contributions by Steve Heather
R1,715 Discovery Miles 17 150 Ships in 18 - 22 working days

Just as the AutoCAD software continues to be improved and perfected, so does the Beginning AutoCAD (R) Exercise Workbook. This work is truly the ideal package from which to learn AutoCAD, whether you're a complete beginner, or simply learning about the latest features. The new AutoCAD 2022 software includes features such as Installer, which reduces the number of steps needed for the initial install, Share Current Drawing, allowing other users to view or edit a drawing in the online AutoCAD Web application, and Trace, encouraging collaboration on drawing changes using the AutoCAD Web and Mobile apps. Readers can download the provided templates used for drawings in the book from the Industrial Press website. Expert author duo Shrock and Heather share their knowledge with students and instructors, including plenty of inside tips and dozens of exercises to help users get comfortable and see real progress. NEW AND/OR IMPROVED FEATURES IN BEGINNING AUTOCAD 2022: Redesigned Start Tab-There are three main sections that provide access to recent work, enabling users to carry on where they left off, and offering them access to online saved drawing files. (Included in Lesson 1) Count-The new Count feature allows users to count the instances of objects and Blocks that are placed in their drawing. (Included in Lesson 29) Floating Drawing Tabs-Users can now drag a drawing file Tab from the main AutoCAD application window to make it a separate drawing file window. This is extremely useful for those with two or more monitors. (Included in Lesson 2)

Empowered or Left Behind - Use of Technology During COVID-19 (Hardcover): DeeDee M. Bennett Gayle, Xiaojun (Jenny) Yuan Empowered or Left Behind - Use of Technology During COVID-19 (Hardcover)
DeeDee M. Bennett Gayle, Xiaojun (Jenny) Yuan
R1,612 Discovery Miles 16 120 Ships in 10 - 15 working days

This book is timely and discusses the effects from the pandemic. Written for longevity, and may be useful to compare this pandemic and the response to future events. The book is written for academia: social sciences, public health, information science, emergency management, and policy fields, and is easier informational reading for the layperson.

Handling and Exchanging Electronic Evidence Across Europe (Hardcover, 1st ed. 2018): Maria Angela Biasiotti, Jeanne Pia Mifsud... Handling and Exchanging Electronic Evidence Across Europe (Hardcover, 1st ed. 2018)
Maria Angela Biasiotti, Jeanne Pia Mifsud Bonnici, Joe Cannataci, Fabrizio Turchi
R4,413 Discovery Miles 44 130 Ships in 10 - 15 working days

This volume offers a general overview on the handling and regulating electronic evidence in Europe, presenting a standard for the exchange process. Chapters explore the nature of electronic evidence and readers will learn of the challenges involved in upholding the necessary standards and maintaining the integrity of information. Challenges particularly occur when European Union member states collaborate and evidence is exchanged, as may be the case when solving a cybercrime. One such challenge is that the variety of possible evidences is so wide that potentially anything may become the evidence of a crime. Moreover, the introduction and the extensive use of information and communications technology (ICT) has generated new forms of crimes or new ways of perpetrating them, as well as a new type of evidence. Contributing authors examine the legal framework in place in various EU member states when dealing with electronic evidence, with prominence given to data protection and privacy issues. Readers may learn about the state of the art tools and standards utilized for treating and exchanging evidence, and existing platforms and environments run by different Law Enforcement Agencies (LEAs) at local and central level. Readers will also discover the operational point of view of LEAs when dealing with electronic evidence, and their requirements and expectations for the future. Finally, readers may consider a proposal for realizing a unique legal framework for governing in a uniform and aligned way the treatment and cross border exchange of electronic evidence in Europe. The use, collection and exchange of electronic evidence in the European Union context and the rules, practises, operational guidelines, standards and tools utilized by LEAs, judges, Public prosecutors and other relevant stakeholders are all covered in this comprehensive work. It will appeal to researchers in both law and computer science, as well as those with an interest in privacy, digital forensics, electronic evidence, legal frameworks and law enforcement.

Smart Contracts and Comparative Law - A Western Perspective (Hardcover, 1st ed. 2021): Andrea Stazi Smart Contracts and Comparative Law - A Western Perspective (Hardcover, 1st ed. 2021)
Andrea Stazi
R3,324 Discovery Miles 33 240 Ships in 18 - 22 working days

The book analyzes the most relevant developments in the relation between contracts and technology, from automatically concluded contracts to today's revolutionary "smart contracts" developed through blockchain, which are beginning to and will increasingly disrupt many economic and social relations. First of all, the author offers a broad analysis of the peculiarities and evolution of the relation between contracts and technology. The main features and elements of electronic contracts are then examined in depth to highlight the specific rules applicable to them in the international comparative legal framework. In turn, the book provides a detailed explanation of the technology, economic and social dynamics, and legal issues concerning blockchain and smart contracts. The analysis focuses on the question of the legal nature of smart contracts, the issues posed by their development and the first legal solutions adopted in some countries. The comparative approach pursued makes it possible to focus attention on the first solutions adopted until now in various systems, with particular regard to the circulation of models and ideas and to the specificities of their local variations, in terms of e.g. applicable law and jurisdiction. In reviewing the characteristics of distributed ledger technologies, and in particular of the blockchain technology on which smart contracts are based, above all the peculiarities of the latter are taken into consideration, especially automatic execution and resistance to tampering, which simultaneously present significant opportunities and complex legal issues. A comprehensive framework is then provided to reconcile smart contracts with comparative contract law, in order to define the scope and specificities of their binding force, legal effectiveness and regulation in various legal systems. Lastly, with specific reference to the elements, pathologies and contractual remedies for smart contracts, the book examines the peculiarities of their application and the main issues that emerge in comparative contract law in order to promote their harmonized use, in keeping with the transnational nature of such a revolutionary tool.

The Current Collegiate Hookup Culture - Dating Apps, Hookup Scripts, and Sexual Outcomes (Hardcover): Aditi Paul The Current Collegiate Hookup Culture - Dating Apps, Hookup Scripts, and Sexual Outcomes (Hardcover)
Aditi Paul
R2,690 Discovery Miles 26 900 Ships in 10 - 15 working days

The Current Collegiate Hookup Cultureprovides a holistic picture of the current hookup culture in American college campuses. Based on the findings from a nationally representative survey, Aditi Paul demonstrates that hookups initiated through dating apps are fundamentally different from hookups that ensue from conventional meeting contexts. By comparing the socio-demographic and psychological profiles of students who report meeting their hookup partners through dating apps compared to other venues, she examines if and how hookup scripts and the physical and emotional outcomes of hookups differ across meeting contexts. Furthermore, she explores the potential effect of sexually permissive practices and impresses the importance of including international students into the larger conversation surrounding hookup culture. The Current Collegiate Hookup Culture calls into question long-held gender-specific beliefs about the collegiate hookup culture and advocates moving past dated assumptions for an understanding that more accurately represents the current hookup culture in American college campuses.

AI for Big Data Based Engineering Applications from the Security Perspectives (Hardcover): Balwinder Raj, Brij B. Gupta, Shingo... AI for Big Data Based Engineering Applications from the Security Perspectives (Hardcover)
Balwinder Raj, Brij B. Gupta, Shingo Yamaguchi, Sandeep Singh Gill
R3,786 Discovery Miles 37 860 Ships in 10 - 15 working days

i. This book will contain AI, ML, DL, big data and security never before considered ii. Innovative artificial intelligence techniques and algorithms iii. Only emerging from recent research and development, e.g. AI for big data from security perspective, which are not covered in any existing texts iv. Artificial Intelligence for big data and security Applications with advanced features v. Key new finding of machine learning and deep learning for Security Applications

Crossing the Bridge of the Digital Divide - A Walk with Global Leaders (Hardcover): Anthony H. Normore, Antonia Issa Lahera Crossing the Bridge of the Digital Divide - A Walk with Global Leaders (Hardcover)
Anthony H. Normore, Antonia Issa Lahera
R2,787 Discovery Miles 27 870 Ships in 18 - 22 working days

Crossing the Bridge of the Digital Divide: A Walk with Global Leaders explores the combined effect of the rapid growth of information as an increasingly fragmented information base, a large component of which is available only to people with money and/or acceptable institutional affiliations. In the recent past, the outcome of these challenges has been characterized as the ""digital divide"" between the information "haves" and "have nots" along racial and socio economic lines that seem to widen as time passes. To address the issues of digital equity and digital inequality in an effort to bridge the digital divide, educational scholars, researchers and practitioners are in positions to ensure equitable opportunities are made available for people of all ages, races, ability, sexual orientation, and ethnicity in support of social justice for bridging the digital divide. The digital divide addresses issues concerning equal opportunity, equity and access that have an effect on the development of marginalized and otherwise disenfranchised populations within and across systems nationally and internationally. The contributing authors- representing Unites States, Canada, South Africa, New Zealand, and the UK - posit that education institutions can serve as the bridge to close the digital divide for students who do not have access to information technology in their homes. At a time when more computers are made available in schools than ever before, the digital divide continues to widen and fewer people in the lowest SES groups are given the opportunity to join the world of computer technology and the internet. As a result, the influence of leadership activity on institutional racism, gender discrimination, inequality of opportunity, inequity of educational processes, digital exclusion, and justice have gained currency and attention. The contributing national and international authors examine the digital divide in terms of social justice leadership, equity and access. It is within this context that the authors offer discussions from a lens of their choice, i.e. conceptual, review of literature, epistemological, etc. By adopting an educational approach to bridging the digital divide, researchers and practitioners can connect and extend long- established lines of conceptual and empirical inquiry aimed at improving organizational practices and thereby gain insights that might be otherwise overlooked, or assumed. This holds great promise for generating, refining, and testing theories of leadership for equity and access, and helps strengthen already vibrant lines of inquiry on social justice.

Digital Forensics for Handheld Devices (Paperback): Eamon P. Doherty Digital Forensics for Handheld Devices (Paperback)
Eamon P. Doherty
R2,157 Discovery Miles 21 570 Ships in 10 - 15 working days

Approximately 80 percent of the world's population now owns a cell phone, which can hold evidence or contain logs about communications concerning a crime. Cameras, PDAs, and GPS devices can also contain information related to corporate policy infractions and crimes. Aimed to prepare investigators in the public and private sectors, Digital Forensics for Handheld Devices examines both the theoretical and practical aspects of investigating handheld digital devices. This book touches on all areas of mobile device forensics, including topics from the legal, technical, academic, and social aspects of the discipline. It provides guidance on how to seize data, examine it, and prepare it as evidence for court. This includes the use of chain of custody forms for seized evidence and Faraday Bags for digital devices to prevent further connectivity and tampering of evidence. Emphasizing the policies required in the work environment, the author provides readers with a clear understanding of the differences between a corporate investigation and a criminal investigation. The book also: Offers best practices for establishing an incident response policy and seizing data from company or privately owned digital devices Provides guidance in establishing dedicated examinations free of viruses, spyware, and connections to other devices that could taint evidence Supplies guidance on determining protocols for complicated crime scenes with external media and devices that may have connected with the handheld device Considering important privacy issues and the Fourth Amendment, this book facilitates an understanding of how to use digital forensic tools to investigate the complete range of available digital devices, including flash drives, cell phones, PDAs, digital cameras, and netbooks. It includes examples of commercially available digital forensic tools and ends with a discussion of the education and certifications required for various careers in mobile device forensics.

Augmentation Technologies and Artificial Intelligence in Technical Communication - Designing Ethical Futures (Hardcover): Ann... Augmentation Technologies and Artificial Intelligence in Technical Communication - Designing Ethical Futures (Hardcover)
Ann Hill Duin, Isabel Pedersen
R4,626 Discovery Miles 46 260 Ships in 10 - 15 working days

Innovative examination of augmentation technologies in terms of technical, social, and ethical considerations Usable as a supplemental text for a variety of courses, and also of interest to researchers and professionals in fields including: technical communication, digital communication, UX design, information technology, informatics, human factors, artificial intelligence, ethics, philosophy of technology, and sociology of technology First major work to combine technological, ethical, social, and rhetorical perspectives on human augmentation Additional cases and research material available at the authors' Fabric of Digital Life research database at https://fabricofdigitallife.com/

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Infringement Nation - Copyright 2.0 and…
John Tehranian Hardcover R2,229 Discovery Miles 22 290
Social Media Marketing - A Quickstudy…
Edwards Poster R232 Discovery Miles 2 320
Mostly Laughing - Life in the DMs
Katie Garner Hardcover R569 R523 Discovery Miles 5 230
HealthTech - Law and Regulation
Jelena Madir Hardcover R6,348 Discovery Miles 63 480
Social Media Marketing - A Comprehensive…
Jason Lazar Hardcover R554 R509 Discovery Miles 5 090
Research Anthology on Applying Social…
Information R Management Association Hardcover R8,997 Discovery Miles 89 970
Like, Comment, Subscribe - Inside…
Mark Bergen Paperback R380 R357 Discovery Miles 3 570
The Frugal Book Promoter - 3rd Edition…
Carolyn Howard-Johnson Hardcover R850 R744 Discovery Miles 7 440
Management of Cybersecurity
Michael E. Whitman, Herbert J Mattord Paperback R1,221 R1,143 Discovery Miles 11 430
Research Anthology on Strategies for…
Information R Management Association Hardcover R13,719 Discovery Miles 137 190

 

Partners