0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (148)
  • R250 - R500 (529)
  • R500+ (1,579)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > General

Digital Existence - Ontology, Ethics and Transcendence in Digital Culture (Hardcover): Amanda Lagerkvist Digital Existence - Ontology, Ethics and Transcendence in Digital Culture (Hardcover)
Amanda Lagerkvist; Foreword by John Durham Peters
R4,074 Discovery Miles 40 740 Ships in 12 - 17 working days

Digital Existence: Ontology, Ethics and Transcendence in Digital Culture advances debates on digital culture and digital religion in two complementary ways. First, by focalizing the themes 'ontology,' 'ethics' and 'transcendence,' it builds on insights from research on digital religion in order to reframe the field and pursue an existential media analysis that further pushes beyond the mandatory focus in mainstream media studies on the social, cultural, political and economic dimensions of digitalization. Second, the collection also implies a broadening of the scope of the debate in the field of media, religion and culture - and digital religion in particular - beyond 'religion,' to include the wider existential dimensions of digital media. It is the first volume on our digital existence in the budding field of existential media studies.

The Total CISSP Exam Prep Book - Practice Questions, Answers, and Test Taking Tips and Techniques (Hardcover): Thomas R.... The Total CISSP Exam Prep Book - Practice Questions, Answers, and Test Taking Tips and Techniques (Hardcover)
Thomas R. Peltier, Patrick D. Howard, Bob Cartwright
R4,809 Discovery Miles 48 090 Ships in 12 - 17 working days

Until now, those preparing to take the Certified Information Systems Security Professional (CISSP) examination were not afforded the luxury of studying a single, easy-to-use manual. Written by ten subject matter experts (SMEs) - all CISSPs - this test prep book allows CISSP candidates to test their current knowledge in each of the ten security domains that make up the Common Body of Knowledge (CBK) from which the CISSP examination is based on. The Total CISSP Exam Prep Book: Practice Questions, Answers, and Test Taking Tips and Techniques provides an outline of the subjects, topics, and sub-topics contained within each domain in the CBK, and with it you can readily identify terms and concepts that you will need to know for the exam. The book starts with a review of each of the ten domains and provides 25 sample questions with answers and references for each. It discusses successful approaches for preparing for the exam based on experiences of those who have recently passed the exam. It then provides a complete 250-question practice exam with answers. Explanations are provided to clarify why the correct answers are correct, and why the incorrect answers are incorrect. With a total of 500 sample questions, The Total CISSP Exam Prep Book gives you a full flavor of what it will take to pass the exam.

Security for Service Oriented Architectures (Hardcover): Walter Williams Security for Service Oriented Architectures (Hardcover)
Walter Williams
R5,106 Discovery Miles 51 060 Ships in 12 - 17 working days

Although integrating security into the design of applications has proven to deliver resilient products, there are few books available that provide guidance on how to incorporate security into the design of an application. Filling this need, Security for Service Oriented Architectures examines both application and security architectures and illustrates the relationship between the two. Supplying authoritative guidance on how to design distributed and resilient applications, the book provides an overview of the various standards that service oriented and distributed applications leverage, including SOAP, HTML 5, SAML, XML Encryption, XML Signature, WS-Security, and WS-SecureConversation. It examines emerging issues of privacy and discusses how to design applications within a secure context to facilitate the understanding of these technologies you need to make intelligent decisions regarding their design.This complete guide to security for web services and SOA considers the malicious user story of the abuses and attacks against applications as examples of how design flaws and oversights have subverted the goals of providing resilient business functionality. It reviews recent research on access control for simple and conversation-based web services, advanced digital identity management techniques, and access control for web-based workflows. Filled with illustrative examples and analyses of critical issues, this book provides both security and software architects with a bridge between software and service-oriented architectures and security architectures, with the goal of providing a means to develop software architectures that leverage security architectures.It is also a reliable source of reference on Web services standards. Coverage includes the four types of architectures, implementing and securing SOA, Web 2.0, other SOA platforms, auditing SOAs, and defending and detecting attacks.

Network and Data Security for Non-Engineers (Hardcover): Frank M. Groom, Kevin Groom, Stephan S. Jones Network and Data Security for Non-Engineers (Hardcover)
Frank M. Groom, Kevin Groom, Stephan S. Jones
R5,097 Discovery Miles 50 970 Ships in 12 - 17 working days

Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.

Mastering the Five Tiers of Audit Competency - The Essence of Effective Auditing (Hardcover): Ann Butera Mastering the Five Tiers of Audit Competency - The Essence of Effective Auditing (Hardcover)
Ann Butera
R5,380 Discovery Miles 53 800 Ships in 12 - 17 working days

Risk-based operational audits and performance audits require a broad array of competencies. This book provides auditors and risk professionals with the understanding required to improve results during risk-based audits.Mastering the Five Tiers of Audit Competency: The Essence of Effective Auditing is an anthology of powerful risk-based auditing practices. Filled with practical do and don't techniques, it encompasses the interpersonal aspects of risk-based auditing, not just the technical content.This book details the behaviors you need to demonstrate and the habitual actions you need to take at each phase in an audit to manage the people relationships as well as the work itself. Each section of this book is devoted to a component of the audit: planning, detailed risk and control assessment, testing, audit report writing, project management, audit team management, and client relationship management.The book leverages The Whole Person Project, Inc.'s 30 years of hands-on organizational development experience and custom-designed internal audit training programs to aid those just starting out in audit as well as more experienced auditors. It also contains templates you can use to set performance goals and assess your progress towards achieving those goals.This book will spark ideas that can enhance performance, improve working relationships, and make it easier to complete audits that improve your organization's risk management culture and practices. Explaining how to make positive and sustained changes to the way you approach your work, the book includes a summary of the key points and a brief quiz to help you remember salient ideas in each chapter.Presenting proven methods and advice that can help you immediately save time, reduce stress, and produce reliable, quality results, this book is an ideal resource for anyone looking to make positive changes and adopt more productive work habits

Social Networking as a Criminal Enterprise (Hardcover): Catherine D. Marcum, George E. Higgins Social Networking as a Criminal Enterprise (Hardcover)
Catherine D. Marcum, George E. Higgins
R5,240 Discovery Miles 52 400 Ships in 12 - 17 working days

As social networking continues to evolve and expand, the opportunities for deviant and criminal behavior have multiplied. Social Networking as a Criminal Enterprise explores how new avenues for social networking criminality have affected our criminal justice system. With insight from field experts, this book examines: The history of social networking and the process of developing an online identity Schools of criminological theory and how they relate to criminality on social networking websites Forms of criminal behavior that can be performed utilizing social networking websites Criminality via texting, identity theft, and hacking Adolescents as offenders and victims in cyberbullying and digital piracy Online sexual victimization, including child pornography and sexual solicitation of youth The book concludes by discussing law enforcement's response, including new techniques and training, type of evidence, and use of experts. It also discusses how the corrections system has been affected by these types of offenders. Discussion questions at the end of each chapter encourage critical thinking and case studies help place the material in context. Ideal for students and scholars, the book offers a comprehensive examination of how the emergence of social networking has affected criminality online, and how it has impacted the criminal justice system.

Physical Security and Safety - A Field Guide for the Practitioner (Hardcover): Truett A Ricks, Bobby E. Ricks, Jeffrey Dingle Physical Security and Safety - A Field Guide for the Practitioner (Hardcover)
Truett A Ricks, Bobby E. Ricks, Jeffrey Dingle
R5,232 Discovery Miles 52 320 Ships in 12 - 17 working days

How-To Guide Written By Practicing Professionals Physical Security and Safety: A Field Guide for the Practitioner introduces the basic principles of safety in the workplace, and effectively addresses the needs of the responsible security practitioner. This book provides essential knowledge on the procedures and processes needed for loss reduction, protection of organizational assets, and security and safety management. Presents Vital Information on Recognizing and Understanding Security Needs The book is divided into two parts. The first half of the text, Security and Safety Planning, explores the theory and concepts of security and covers: threat decomposition, identifying security threats and vulnerabilities, protection, and risk assessment. The second half, Infrastructure Protection, examines the overall physical protection program and covers: access and perimeter control, alarm systems, response force models, and practical considerations for protecting information technology (IT). Addresses general safety concerns and specific issues covered by Occupational Safety and Health Administration (OSHA) and fire protection regulations Discusses security policies and procedures required for implementing a system and developing an attitude of effective physical security Acts as a handbook for security applications and as a reference of security considerations Physical Security and Safety: A Field Guide for the Practitioner offers relevant discourse on physical security in the workplace, and provides a guide for security, risk management, and safety professionals.

Ethics and the Internal Auditor's Political Dilemma - Tools and Techniques to Evaluate a Company's Ethical Culture... Ethics and the Internal Auditor's Political Dilemma - Tools and Techniques to Evaluate a Company's Ethical Culture (Hardcover)
Lynn Fountain
R5,247 Discovery Miles 52 470 Ships in 12 - 17 working days

This book helps auditors understand the reality of performing the internal audit role and the importance of properly managing ethical standards. It provides many examples of ethical conflicts and proposes alternative actions for the internal auditor. Internal auditors are well-schooled on the IIA Standards, but the reality is that the pressure placed on internal auditors related to execution of work and upholding ethical standards can be very difficult. Regardless of best practice or theory, auditors must be personally prepared to manage through issues they run across.

Web Security - A WhiteHat Perspective (Hardcover): Hanqing Wu, Liz Zhao Web Security - A WhiteHat Perspective (Hardcover)
Hanqing Wu, Liz Zhao
R5,133 Discovery Miles 51 330 Ships in 12 - 17 working days

In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target. This catastrophic event, deemed one of the biggest data breaches ever, clearly showed that many companies need to significantly improve their information security strategies. Web Security: A White Hat Perspective presents a comprehensive guide to web security technology and explains how companies can build a highly effective and sustainable security system. In this book, web security expert Wu Hanqing reveals how hackers work and explains why companies of different scale require different security methodologies. With in-depth analysis of the reasons behind the choices, the book covers client script security, server applications security, and Internet company security operations. It also includes coverage of browser security, cross sites script attacks, click jacking, HTML5/PHP security, injection attacks, authentication, session management, access control, web frame security, DDOS, leaks, Internet transactions security, and the security development lifecycle.

Managing A Network Vulnerability Assessment (Hardcover): Thomas R. Peltier, Justin Peltier, John A Blackley Managing A Network Vulnerability Assessment (Hardcover)
Thomas R. Peltier, Justin Peltier, John A Blackley
R4,808 Discovery Miles 48 080 Ships in 12 - 17 working days

The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders. Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them. By following the procedures outlined in this guide, a company can pinpoint what individual parts of their network need to be hardened, and avoid expensive and unnecessary purchases.

Unauthorized Access - The Crisis in Online Privacy and Security (Hardcover): Richard Warner, Robert Sloan Unauthorized Access - The Crisis in Online Privacy and Security (Hardcover)
Richard Warner, Robert Sloan
R5,261 Discovery Miles 52 610 Ships in 12 - 17 working days

Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in clear, straightforward language. The authors two renowned experts on computer security and law explore the well-established connection between social norms, privacy, security, and technological structure. This approach is the key to understanding information security and informational privacy, providing a practical framework to address ethical and legal issues. The authors also discuss how rapid technological developments have created novel situations that lack relevant norms and present ways to develop these norms for protecting informational privacy and ensuring sufficient information security. Bridging the gap among computer scientists, economists, lawyers, and public policy makers, this book provides technically and legally sound public policy guidance about online privacy and security. It emphasizes the need to make trade-offs among the complex concerns that arise in the context of online privacy and security.

Secure Java - For Web Application Development (Hardcover): Abhay Bhargav, B. V Kumar Secure Java - For Web Application Development (Hardcover)
Abhay Bhargav, B. V Kumar
R5,248 Discovery Miles 52 480 Ships in 12 - 17 working days

Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure programming, risk assessment, and threat modeling explaining how to integrate these practices into a secure software development life cycle. From the risk assessment phase to the proof of concept phase, the book details a secure web application development process. The authors provide in-depth implementation guidance and best practices for access control, cryptography, logging, secure coding, and authentication and authorization in web application development. Discussing the latest application exploits and vulnerabilities, they examine various options and protection mechanisms for securing web applications against these multifarious threats. The book is organized into four sections: Provides a clear view of the growing footprint of web applications Explores the foundations of secure web application development and the risk management process Delves into tactical web application security development with Java EE Deals extensively with security testing of web applications This complete reference includes a case study of an e-commerce company facing web application security challenges, as well as specific techniques for testing the security of web applications. Highlighting state-of-the-art tools for web application security testing, it supplies valuable insight on how to meet important security compliance requirements, including PCI-DSS, PA-DSS, HIPAA, and GLBA. The book also includes an appendix that covers the application security guidelines for the payment card industry standards.

Building an Information Security Awareness Program (Hardcover): Mark B. Desman Building an Information Security Awareness Program (Hardcover)
Mark B. Desman
R4,803 Discovery Miles 48 030 Ships in 12 - 17 working days

In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what can happen to them if they ignore them. The key, of course, is continuous awareness of the problems and the solutions. Building an Information Security Awareness Program addresses these concerns. A reference and self-study guide, it goes step-by-step through the methodology for developing, distributing, and monitoring an information security awareness program. It includes detailed instructions on determining what media to use and where to locate it, and it describes how to efficiently use outside sources to optimize the output of a small staff. The author stresses the importance of security and the entire organizations' role and responsibility in protecting it. He presents the material in a fashion that makes it easy for nontechnical staff members to grasp the concepts. These attributes render Building an Information Security Awareness Program an immensely valuable reference in the arsenal of the IS professional.

Securing and Controlling Cisco Routers (Hardcover): Peter T. Davis Securing and Controlling Cisco Routers (Hardcover)
Peter T. Davis
R4,870 Discovery Miles 48 700 Ships in 12 - 17 working days

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology. At the end of most chapters, readers will find the unique opportunity to practice what they have learned. Readers will be able to log on to a real router, practice commands, and gather information as shown in the chapter. To further round out this understanding of routers, Securing and Controlling Cisco Routers reviews Trojan Ports and Services and provides additional resources such as Web sites, mailing lists, bibliographies, glossaries, acronyms, and abbreviations.

Building A Global Information Assurance Program (Hardcover): Douglas E. Campbell, Raymond J. Curts Building A Global Information Assurance Program (Hardcover)
Douglas E. Campbell, Raymond J. Curts
R4,824 Discovery Miles 48 240 Ships in 12 - 17 working days

Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function. These government and business entities are beginning to realize the value of information assurance (IA) as a tool to ensure that the right information gets to the right people, at the right time, with a reasonable expectation that it is timely, accurate, authentic, and uncompromised. Intended for those interested in the construction and operation of an IA or Information Security (InfoSec) program, Building a Global Information Assurance Program describes the key building blocks of an IA development effort including: Information Attributes System Attributes Infrastructure or Architecture Interoperability IA Tools Cognitive Hierarchies Decision Cycles Organizational Considerations Operational Concepts Because of their extensive and diverse backgrounds, the authors bring a unique perspective to current IT issues. The text presents their proprietary process based on the systems development life cycle (SDLC) methodology specifically tailored for an IA program. This process is a structured, cradle-to-grave approach to IA program development, from program planning and design to implementation, support, and phase out. Building a Global Information Assurance Program provides a proven series of steps and tasks that you can follow to build quality IA programs faster, at lower costs, and with less risk.

Security Strategy - From Requirements to Reality (Hardcover): Bill Stackpole, Eric Oksendahl Security Strategy - From Requirements to Reality (Hardcover)
Bill Stackpole, Eric Oksendahl
R5,107 Discovery Miles 51 070 Ships in 12 - 17 working days

Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and place of strategy in an information security program and arms security managers and practitioners with a set of security tactics to support the implementation of strategic planning initiatives, goals, and objectives. The book focuses on security strategy planning and execution to provide a clear and comprehensive look at the structures and tools needed to build a security program that enables and enhances business processes. Divided into two parts, the first part considers business strategy and the second part details specific tactics. The information in both sections will help security practitioners and mangers develop a viable synergy that will allow security to take its place as a valued partner and contributor to the success and profitability of the enterprise. Confusing strategies and tactics all too often keep organizations from properly implementing an effective information protection strategy. This versatile reference presents information in a way that makes it accessible and applicable to organizations of all sizes. Complete with checklists of the physical security requirements that organizations should consider when evaluating or designing facilities, it provides the tools and understanding to enable your company to achieve the operational efficiencies, cost reductions, and brand enhancements that are possible when an effective security strategy is put into action.

Technocrime and Criminological Theory (Hardcover): Kevin Steinmetz, Matt R. Nobles Technocrime and Criminological Theory (Hardcover)
Kevin Steinmetz, Matt R. Nobles
R5,963 Discovery Miles 59 630 Ships in 12 - 17 working days

Cybercrime, computer crime, Internet crime, and technosecurity have been of increasing concern to citizens, corporations, and governments since their emergence in the 1980s. Addressing both the conventional and radical theories underlying this emerging criminological trend, including feminist theory, social learning theory, and postmodernism, this text paves the way for those who seek to tackle the most pertinent areas in technocrime. Technocrime and Criminological Theory challenges readers to confront the conflicts, gaps, and questions faced by both scholars and practitioners in the field. This book serves as an ideal primer for scholars beginning to study technocrime or as a companion for graduate level courses in technocrime or deviance studies.

IT Governance and Information Security - Guides, Standards, and Frameworks (Hardcover): Yassine Maleh, Abdelkebir Sahid, Mamoun... IT Governance and Information Security - Guides, Standards, and Frameworks (Hardcover)
Yassine Maleh, Abdelkebir Sahid, Mamoun Alazab, Mustapha Belaissaoui
R1,846 Discovery Miles 18 460 Ships in 9 - 15 working days

IT governance seems to be one of the best strategies to optimize IT assets in an economic context dominated by information, innovation, and the race for performance. The multiplication of internal and external data and increased digital management, collaboration, and sharing platforms exposes organizations to ever-growing risks. Understanding the threats, assessing the risks, adapting the organization, selecting and implementing the appropriate controls, and implementing a management system are the activities required to establish proactive security governance that will provide management and customers the assurance of an effective mechanism to manage risks. IT Governance and Information Security: Guides, Standards, and Frameworks is a fundamental resource to discover IT governance and information security. This book focuses on the guides, standards, and maturity frameworks for adopting an efficient IT governance and information security strategy in the organization. It describes numerous case studies from an international perspective and brings together industry standards and research from scientific databases. In this way, this book clearly illustrates the issues, problems, and trends related to the topic while promoting the international perspectives of readers. This book offers comprehensive coverage of the essential topics, including: IT governance guides and practices; IT service management as a key pillar for IT governance; Cloud computing as a key pillar for Agile IT governance; Information security governance and maturity frameworks. In this new book, the authors share their experience to help you navigate today's dangerous information security terrain and take proactive steps to measure your company's IT governance and information security maturity and prepare your organization to survive, thrive, and keep your data safe. It aspires to provide a relevant reference for executive managers, CISOs, cybersecurity professionals, engineers, and researchers interested in exploring and implementing efficient IT governance and information security strategies.

Data-centric Living - Algorithms, Digitization and Regulation (Paperback): V. Sridhar Data-centric Living - Algorithms, Digitization and Regulation (Paperback)
V. Sridhar
R1,173 Discovery Miles 11 730 Ships in 9 - 15 working days

This book explores how data about our everyday online behaviour are collected and how they are processed in various ways by algorithms powered by Artificial Intelligence (AI) and Machine Learning (ML). The book investigates the socioeconomic effects of these technologies, and the evolving regulatory landscape that is aiming to nurture the positive effects of these technology evolutions while at the same time curbing possible negative practices. The volume scrutinizes growing concerns on how algorithmic decisions can sometimes be biased and discriminative; how autonomous systems can possibly disrupt and impact the labour markets, resulting in job losses in several traditional sectors while creating unprecedented opportunities in others; the rapid evolution of social media that can be addictive at times resulting in associated mental health issues; and the way digital Identities are evolving around the world and their impact on provisioning of government services. The book also provides an in-depth understanding of regulations around the world to protect privacy of data subjects in the online world; a glimpse of how data is used as a digital public good in combating Covid pandemic; and how ethical standards in autonomous systems are evolving in the digital world. A timely intervention in this fast-evolving field, this book will be useful for scholars and researchers of digital humanities, business and management, internet studies, data sciences, political studies, urban sociology, law, media and cultural studies, sociology, cultural anthropology, and science and technology studies. It will also be of immense interest to the general readers seeking insights on daily digital lives.

The Digital Mom Handbook - How to Blog, Vlog, Tweet, and Facebook Your Way to a Dream Career at Home (Paperback): Audrey... The Digital Mom Handbook - How to Blog, Vlog, Tweet, and Facebook Your Way to a Dream Career at Home (Paperback)
Audrey McClelland, Colleen Padilla
R225 Discovery Miles 2 250 Ships in 12 - 17 working days

Mothers have been looking for the middle ground for more than half a century. Staying at home and raising the kids full-time isn't it. Working full-time and rushing home to tuck the kids in at 7 p.m. sharp ain't it either. Even part-time work outside the house can be a scramble for most women, as they try to 'have it all' between 9 am and 5 pm. To work or not to work? That seems to be the bottom-line question for most women today. But, Audrey McClelland and Colleen Padilla are proving that the equation is changing. Both of them left behind the corporate ladder and Ivy League degrees to stay home with their children; but, instead of assigning them permanent stay-at-home status, this choice was the catalyst to their reinvention. Miles apart, they each sat down at their computers one day and began to blog. Slowly but surely, their audiences grew. The portability of computers and smart-phones, the connective powers of social networks, and an overwhelming desire to happily mix work and family enabled them to move past the Mommy Wars (i.e. stay at home mom vs. working mom) into a territory all their own. Audrey and Colleen literally blogged, tweeted, skyped, vlogged, and facebooked their ways to the top. In "The Digital Mom Handbook", they will show other moms how to find middle ground - via the frontier of the Internet - too. Do you want to be a booming six-figure eBay saleswoman? A 20-hour-a-week brand consultant? A local Twitter correspondent? The terms are yours to define. Money, hours-per-week, title - these don't dictate your Digital Mom success. Personal satisfaction does. According to Audrey and Colleen, finding middle-ground requires 7 basic steps that moms can start using now to achieve the kind of success they desire: find your passion (look around, stake out your turf); hang a digital 'shingle' and start typing; find your tribe and forge alliances; let karma breed opportunity (carefully make the most of your network); don't forget the children! (define your version of success and make sure you're truly on middle ground); manage the Benjamins (a.k.a. 'the money'); and, live happily ever after (live your values).

Homo Digitalis - How digitalisation is making us more human (Paperback): Thierry Geerts Homo Digitalis - How digitalisation is making us more human (Paperback)
Thierry Geerts
R460 Discovery Miles 4 600 Ships in 12 - 17 working days

'All new technology is accompanied with great expectations on the one hand and great fear on the other. Thierry Geerts reduces the digital revolution to its true proportions and shows that we control the impact of technology ourselves: technology becomes what we make of it. Few are better placed than the author to clearly define the potential, the tasks, and the responsibility that awaits each and every one of us.' - Caroline Pauwels, rector of the VUB 'After Digitalis drew up the contours of the new digital world, Homo digitalis now describes how we can appropriate it so that digitalisation will benefit humanity. But instead of trying to convince at all costs, Thierry Geerts puts things in perspective. With great expertise, he guides us through numerous groundbreaking initiatives that start-ups and companies in Europe have often developed.'- Alain Gerlache, journalist 'This book couldn't have come out at a better time. Change can be scary for many, but above all, it brings many opportunities. Thierry Geerts fantastically explains how Digitalis can be an inclusive place where social mobility and equality are self-evident. Now it's up to our entrepreneurs, policymakers, and each of us as individuals to gear up and resolutely opt for the digital future.' - Yasmien Naciri, entrepreneur and marketer 'Think about the reasons for technology. That is the challenge that Thierry Geerts takes on with gusto and enthusiasm in this fascinating book.' - Laurent Hublet, co-founder and CEO of BeCentral, the largest digitalis campus in Europe In Homo digitalis, Thierry Geerts, CEO of Google Belgium and Luxembourg, looks at the dangers and opportunities of the digital revolution. Without taboos and with an eye to the future, he offers thoughtful examples of how digitalisation affects us as people and as a society. His conclusion is clear: technology is neutral, and it's up to people to use it consciously and confidently. If we do that, digitalisation will make us happier, with more time for creativity, personal development, healthcare, and the things that really matter. Then we'll become more human and we homo sapiens will turn into homo digitalis.

Wireless Multimedia Communication Systems - Design, Analysis, and Implementation (Paperback): Zoran S. Bojkovic, Bojan M.... Wireless Multimedia Communication Systems - Design, Analysis, and Implementation (Paperback)
Zoran S. Bojkovic, Bojan M. Bakmaz, K.R. Rao
R2,917 Discovery Miles 29 170 Ships in 12 - 17 working days

Rapid progress in software, hardware, mobile networks, and the potential of interactive media poses many questions for researchers, manufacturers, and operators of wireless multimedia communication systems. Wireless Multimedia Communication Systems: Design, Analysis, and Implementation strives to answer those questions by not only covering the underlying concepts involved in the design, analysis, and implementation of wireless multimedia communication systems, but also by tackling advanced topics such as mobility management, security components, and smart grids. Offering an accessible treatment of the latest research, this book: Presents specific wireless multimedia communication schemes that have proven to be useful Discusses important standardization processing activities regarding wireless networking Includes wireless mesh and multimedia sensor network architectures, protocols, and design optimizations Highlights the challenges associated with meeting complex connectivity requirements Contains numerous figures, tables, examples, references, and a glossary of acronyms Providing coverage of significant technological advances in their initial steps along with a survey of the fundamental principles and practices, Wireless Multimedia Communication Systems: Design, Analysis, and Implementation aids senior-level and graduate-level engineering students and practicing professionals in understanding the processes and furthering the development of today's wireless multimedia communication systems.

The Dictionary of Multimedia 1999 - Terms and Acronyms (Hardcover, 2nd edition): Brad Hansen The Dictionary of Multimedia 1999 - Terms and Acronyms (Hardcover, 2nd edition)
Brad Hansen
R3,231 Discovery Miles 32 310 Ships in 12 - 17 working days

Multimedia, which may be defined as interactive digital media, is a synthesis of traditional forms of art and communication with the rapidly-evolving fields of computing and networking. A variety of technical and social/cultural disciplines are involved: audio, graphic, hardware, human factors, networking, software, telecommunications, and video. A large and often incomprehensible vocabulary has resulted from the convergence of these diverse disciplines.

Comprehensive, concise and clearly written, The Dictionary of Multimedia presents and defines the "language" that has resulted from this convergence -- from A: B: C notation to z-sorting. Industry-standard acronyms are also spelled out and defined. Extended definitions of important concepts such as MIDI Fire Wire, and MPEG are included.

Features of the new Second Edition include: more than 4,000 terms (50% more than in the 1998 edition); additional illustrations and graphic examples; in-depth treatment of Internet technologies: XML, HTML 4.0, JavaScript; new standards: MPEG-2 and other video codecs, DVD, VRML, Dolby Audio; new bus architectures and operating systems; updated treatment of the latest hardware; JAVA programming references; etc.

You Are Not a Before Picture - How to Finally Make Peace with Your Body, for Good (Hardcover): Alex Light You Are Not a Before Picture - How to Finally Make Peace with Your Body, for Good (Hardcover)
Alex Light
R476 R394 Discovery Miles 3 940 Save R82 (17%) Ships in 9 - 15 working days

An urgent, enlightening and empowering guide to disavowing diet culture and learning to make peace with our bodies, from body confidence and anti-diet advocate, Alex Light. When we look in the mirror, so many of us see a 'before' picture: the miserable person in the side-by-side shot waiting for the 'glow-up' (read: weight loss) that will bring true happiness. But it's not our fault that we see our bodies as projects in need of constant work: this is just one of the beliefs that has been ingrained in us by diet culture. We have been taught to view ourselves as a collection of 'problem' areas for which the billion-dollar diet industry holds the solutions. Step-by-step, You Are Not A Before Picture provides a framework for changing the way we view ourselves and the world around us. Working with experts in the fields of psychotherapy, fitness and nutrition, Alex empowers readers to interrogate their underlying beliefs, challenge the external and internal forces that are holding us back, and finally find freedom in our bodies, for good. Alex Light was a number 4 Sunday Times Non Fiction bestseller in the w/e June 19th 2022

Big Data, Crime and Social Control (Hardcover): Ales Zavrsnik Big Data, Crime and Social Control (Hardcover)
Ales Zavrsnik
R4,056 Discovery Miles 40 560 Ships in 12 - 17 working days

From predictive policing to self-surveillance to private security, the potential uses to of big data in crime control pose serious legal and ethical challenges relating to privacy, discrimination, and the presumption of innocence. The book is about the impacts of the use of big data analytics on social and crime control and on fundamental liberties. Drawing on research from Europe and the US, this book identifies the various ways in which law and ethics intersect with the application of big data in social and crime control, considers potential challenges to human rights and democracy and recommends regulatory solutions and best practice. This book focuses on changes in knowledge production and the manifold sites of contemporary surveillance, ranging from self-surveillance to corporate and state surveillance. It tackles the implications of big data and predictive algorithmic analytics for social justice, social equality, and social power: concepts at the very core of crime and social control. This book will be of interest to scholars and students of criminology, sociology, politics and socio-legal studies.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Data Governance in AI, FinTech and…
Joseph Lee, Aline Darbellay Hardcover R3,452 Discovery Miles 34 520
I'm Too Young To Die: The Ultimate Guide…
Bitmap Books Hardcover R1,323 Discovery Miles 13 230
Financial Regulation and Technology - A…
Iain Sheridan Paperback R2,676 Discovery Miles 26 760
Squishmallows Official Collectors' Guide
Squishmallows Hardcover R337 Discovery Miles 3 370
Like, Comment, Subscribe - Inside…
Mark Bergen Paperback R350 R277 Discovery Miles 2 770
The Secret History of Mac Gaming…
Bitmap Books Hardcover R934 Discovery Miles 9 340
Regulating Social Network Sites - Data…
Asma Vranaki Hardcover R3,147 Discovery Miles 31 470
Selfies, Sexts And Smartphones - A…
Emma Sadleir Paperback R270 R211 Discovery Miles 2 110
Computational Legal Studies - The…
Ryan Whalen Hardcover R3,661 Discovery Miles 36 610
AI-based Metaheuristics for Information…
Apoorva S Shastri, Mangal Singh, … Hardcover R2,325 Discovery Miles 23 250

 

Partners