0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (134)
  • R250 - R500 (490)
  • R500+ (1,443)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > General

CyRM - Mastering the Management of Cybersecurity (Paperback): David X. Martin CyRM - Mastering the Management of Cybersecurity (Paperback)
David X. Martin
R1,116 Discovery Miles 11 160 Ships in 10 - 15 working days

Is your enterprise's strategy for cybersecurity just crossing its fingers and hoping nothing bad ever happens? If so...you're not alone. Getting cybersecurity right is all too often an afterthought for Fortune 500 firms, bolted on and hopefully creating a secure environment. We all know this approach doesn't work, but what should a smart enterprise do to stay safe? Today, cybersecurity is no longer just a tech issue. In reality, it never was. It's a management issue, a leadership issue, a strategy issue: It's a "must have right"...a survival issue. Business leaders and IT managers alike need a new paradigm to work together and succeed. After years of distinguished work as a corporate executive, board member, author, consultant, and expert witness in the field of risk management and cybersecurity, David X Martin is THE pioneering thought leader in the new field of CyRMSM. Martin has created an entirely new paradigm that approaches security as a business problem and aligns it with business needs. He is the go-to guy on this vitally important issue. In this new book, Martin shares his experience and expertise to help you navigate today's dangerous cybersecurity terrain, and take proactive steps to prepare your company-and yourself -to survive, thrive, and keep your data (and your reputation) secure.

Building an Innovation Hotspot - Approaches and Policies to Stimulating New Industry (Paperback): Alicia (Lucy) Cameron Building an Innovation Hotspot - Approaches and Policies to Stimulating New Industry (Paperback)
Alicia (Lucy) Cameron
R1,381 Discovery Miles 13 810 Ships in 10 - 15 working days

Evaluates innovation policy and actions and considers real-world examples. Looks to the future of innovation and the role of future technologies. Provides an overview of recent policy trends in innovation and how they contribute to the creation of technology hotspots. Identifies how governments, industry, the research community and local communities can work together to craft individualised approaches to increasing innovation at a local level and building new industries.

Health Web Science - Social Media Data for Healthcare (Hardcover, 1st ed. 2015): Kerstin Denecke Health Web Science - Social Media Data for Healthcare (Hardcover, 1st ed. 2015)
Kerstin Denecke
R2,992 R1,821 Discovery Miles 18 210 Save R1,171 (39%) Ships in 10 - 15 working days

This book introduces the field of Health Web Science and presents methods for information gathering from written social media data. It explores the availability and utility of the personal medical information shared on social media platforms and determines ways to apply this largely untapped information source to healthcare systems and public health monitoring. Introducing an innovative concept for integrating social media data with clinical data, it addresses the crucial aspect of combining experiential data from social media with clinical evidence, and explores how the variety of available social media content can be analyzed and implemented. The book tackles a range of topics including social media's role in healthcare, the gathering of shared information, and the integration of clinical and social media data. Application examples of social media for health monitoring, along with its usage in patient treatment are also provided. The book also considers the ethical and legal issues of gathering and utilizing social media data, along with the risks and challenges that must be considered when integrating social media data into healthcare choices. With an increased interest internationally in E-Health, Health 2.0, Medicine 2.0 and the recent birth of the discipline of Web Science, this book will be a valuable resource for researchers and practitioners investigating this emerging topic.

Digital Activism and the Global Middle Class - Generation Hashtag (Hardcover): Lukas Schlogl Digital Activism and the Global Middle Class - Generation Hashtag (Hardcover)
Lukas Schlogl
R4,215 Discovery Miles 42 150 Ships in 10 - 15 working days

This book examines the causes of a growing wave of digital activism across developing countries, arguing that it is driven by social change, rather than technological advancement alone Beginning with an investigation into the modernisation of 'middle-income countries' and its ramifications for political culture, the book examines large-scale social media protest during political controversies in Indonesia It departs from a narrow 'digital divide' framing whereby Internet access produces Internet activism and introduces the concepts of 'digital self-expression' and of 'middle-class struggles' to capture the value-stratified nature of political engagement in the online sphere Drawing on a blend of 'big-data' text analyses, representative opinion research and socioeconomic household analyses, a rich picture of the determinants of digital activism emerges This truly cross-disciplinary book will appeal particularly to students and scholars in Political Science, Sociology, International Development, and Communication, but also to anyone eager to learn about political activism, social transformation, and new media from a global perspective

Innovations and Social Media Analytics in a Digital Society (Hardcover): Maria Jose Sousa, Celio Goncalo Marques Innovations and Social Media Analytics in a Digital Society (Hardcover)
Maria Jose Sousa, Celio Goncalo Marques
R3,789 Discovery Miles 37 890 Ships in 10 - 15 working days

Includes Social Media Analytics Case Studies Reviews Social Media Analytics Applications Reviews Trends of Innovation in Social Media Analytics Describes Skills in Social Media Analytics Includes Real-world examples

Data - New Trajectories in Law (Paperback): Robert Herian Data - New Trajectories in Law (Paperback)
Robert Herian
R734 Discovery Miles 7 340 Ships in 10 - 15 working days

This book explores the phenomenon of data - big and small - in the contemporary digital, informatic and legal-bureaucratic context. Challenging the way in which legal interest in data has focused on rights and privacy concerns, this book examines the contestable, multivocal and multifaceted figure of the contemporary data subject. The book analyses "data" and "personal data" as contemporary phenomena, addressing the data realms, such as stores, institutions, systems and networks, out of which they emerge. It interrogates the role of law, regulation and governance in structuring both formal and informal definitions of the data subject, and disciplining data subjects through compliance with normative standards of conduct. Focusing on the 'personal' in and of data, the book pursues a re-evaluation of the nature, role and place of the data subject qua legal subject in on and offline societies: one that does not begin and end with the inviolability of individual rights but returns to more fundamental legal principles suited to considerations of personhood, such as stewardship, trust, property and contract. The book's concern with the production, use, abuse and alienation of personal data within the context of contemporary communicative capitalism will appeal to scholars and students of law, science and technology studies, and sociology; as well as those with broader political interests in this area.

Say What!? Communicate with Tact and Impact - What to Say to Get Results at Any Point in an Audit (Paperback): Ann M. Butera Say What!? Communicate with Tact and Impact - What to Say to Get Results at Any Point in an Audit (Paperback)
Ann M. Butera
R1,181 Discovery Miles 11 810 Ships in 10 - 15 working days

This book addresses the important role of communication within the context of performing an audit, project, or review (i.e., planning, detailed testing, and reporting). Intended for audit, information security, enterprise, and operational risk professionals at all levels, including those just starting out, Say What!? Communicate with Tact and Impact: What to Say to Get Results at Any Point in an Audit contains an array of practical and time-tested approaches that foster efficient and effective communication at any point during an engagement. The practical and memorable techniques are culled from author Ann M. Butera's CRP experience as a trusted advisor who has taught thousands of professionals how to develop and hone their interpersonal, communication, and empathic skills. Those familiar with the Five Tier Competency ModelTM she developed will recognize these techniques as a deep dive on the competencies comprising Tier 3: Project Management and Tier 5: Managing Constituent Relations. The author discusses the following behaviors in one's dealings with executives, process owners, control performers, and colleagues: Demonstrating executive presence Becoming the trusted advisor Influencing others Communicating with tact, confidence, and impact Facilitating productive meetings and discussions Overcoming resistance and objections Managing and resolving conflict Knowing when to let a topic go and move on This book is a guide for professionals who want to interact proactively and persuasively with those they work with, audit, or review. It describes techniques that can be used during virtual, in-person, telephone, or video conferences (as opposed to emails, workpapers, and reports). It provides everyone (newer associates in particular) with the interpersonal skills needed to (1) develop and build relationships with their internal constituents and clients, (2) facilitate conversations and discussions before and during meetings, and (3) handle impromptu questions with confidence and executive presence and make positive first impressions. The topics and techniques discussed are accompanied by case studies, examples, and exercises to give the readers the opportunity to develop plans to bridge the gap between theory and practice. The readers can use the book as a reliable resource when subject matter experts or training guides are not readily available.

Data Publics - Public Plurality in an Era of Data Determinacy (Paperback): Peter Moertenboeck, Helge Mooshammer Data Publics - Public Plurality in an Era of Data Determinacy (Paperback)
Peter Moertenboeck, Helge Mooshammer
R1,302 Discovery Miles 13 020 Ships in 10 - 15 working days

Data has emerged as a key component that determines how interactions across the world are structured, mediated and represented. This book examines these new data publics and the areas in which they become operative, via analysis of politics, geographies, environments and social media platforms. By claiming to offer a mechanism to translate every conceivable occurrence into an abstract code that can be endlessly manipulated, digitally processed data has caused conventional reference systems which hinge on our ability to mark points of origin, to rapidly implode. Authors from a range of disciplines provide insights into such a political economy of data capitalism; the political possibilities of techno-logics beyond data appropriation and data refusal; questions of visual, spatial and geographical organization; emergent ways of life and the environments that sustain them; and the current challenges of data publics, which is explored via case studies of three of the most influential platforms in the social media economy today: Facebook, Instagram and Whatsapp. Data Publics will be of great interest to academics and students in the fields of computer science, philosophy, sociology, media and communication studies, architecture, visual culture, art and design, and urban and cultural studies.

Gender and Security in Digital Space - Navigating Access, Harassment, and Disinformation (Hardcover): Gulizar Haciyakupoglu,... Gender and Security in Digital Space - Navigating Access, Harassment, and Disinformation (Hardcover)
Gulizar Haciyakupoglu, Yasmine Wong
R3,788 Discovery Miles 37 880 Ships in 10 - 15 working days

Digital space offers new avenues, opportunities, and platforms in the fight for gender equality, and for the social, economic, and political participation of women and marginalised communities. However, the very same space plays host to gender inequalities and security threats with gendered implications. This edited volume ventures into complexities at the intersection of gender, security, and digital space, with a particular focus on the persistent problems of access, harassment, and disinformation. Scholars and practitioners in this volume tackle various facets of the issue, presenting an array of research, experiences, and case studies that span the globe. This knowledge lends itself to potential policy considerations in tackling inequalities and threats with gendered implications in cyber space towards digital spaces that are safe and equal. This book is a must-read for students, scholars, and practitioners seeking to expand their knowledge on the gendered threats in digital space and potential remedies against them.

Les mutations des discours mediatiques : approche contrastive et interculturelle (English, French, Hardcover, New edition):... Les mutations des discours mediatiques : approche contrastive et interculturelle (English, French, Hardcover, New edition)
Dominique Dias, Nadine Rentel
R1,314 Discovery Miles 13 140 Ships in 10 - 15 working days

Les genres discursifs, penses comme outil theorique necessaire pour faciliter la production et la reception des textes, evoluent dans le temps, mais egalement dans l'espace. Chaque aire linguistique et culturelle possede des specificites generiques qui se manifestent dans la realisation des discours mediatiques. En raison de la digitalisation grandissante, les discours mediatiques sont de plus en plus diffuses et consommes sous leur forme numerique, ce qui implique une reconfiguration des pratiques de production et de reception. Le present ouvrage se propose d'examiner les enjeux interculturels de ces discours mediatiques. Les textes reunis dans cet ouvrage font ressortir les contrastes entre le francais et l'allemand, mais egalement entre le francais et d'autres langues.

Vulnerability Management (Paperback, 2nd edition): Park Foreman Vulnerability Management (Paperback, 2nd edition)
Park Foreman
R1,451 Discovery Miles 14 510 Ships in 10 - 15 working days

Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today, we identify vulnerabilities in our software systems, infrastructure, and enterprise strategies. Those vulnerabilities are addressed through various and often creative means. Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman's more than three decades of multinational experience, the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility, he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps, especially those that are inherent in a larger organization. Completely updated, the second edition provides a fundamental understanding of technology risks-including a new chapter on cloud vulnerabilities and risk management-from an interloper's perspective. This book is a guide for security practitioners, security or network engineers, security officers, and CIOs seeking understanding of VM and its role in the organization. To serve various audiences, it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy, although serving the executive well, provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise.

Security and Resilience of Cyber Physical Systems (Hardcover): Krishan Kumar, Sunny Behal, Abhinav Bhandari, Sajal Bhatia Security and Resilience of Cyber Physical Systems (Hardcover)
Krishan Kumar, Sunny Behal, Abhinav Bhandari, Sajal Bhatia
R2,649 Discovery Miles 26 490 Ships in 10 - 15 working days

In this era of 5G digital communication, the implementation of industry 4.0 is the need of the hour. The main aim of this industrial revolution is to completely automate the industry for better productivity, correct decision making and increased efficiency. All the concepts of industry 4.0 can only be implemented with the help of Cyber Physical System aka CPS. This is a smart system in which complete mechanism is monitored and controlled by computer-based algorithms. Confidentiality, Integrity and Availability are the three major concern for providing the add on security to any organization or a system. It has become a biggest challenge among the security professionals to secure these cyber physical systems. Hackers and bad guys are planning various kinds of attacks on daily basis on these systems. This book addresses the various security and privacy issues involved in the cyber physical system. There is need to explore the interdisciplinary analysis to ensure the resilience of these systems including different types of cyber threats to these systems. The book highlights the importance of security in preventing, detecting, characterizing and mitigating different types of cyber threats on CPS. The book offers a simple to understand various organized chapters related to the CPS and their security for graduate students, faculty, research scholars and industry professionals. The book offers comprehensive coverage of the most essential topics, including: Cyber Physical Systems and Industrial Internet of Things (IIoT) Role of Internet of Things and their security issues in Cyber Physical Systems. Role of Big data analytic to develop real time solution for CPS. DDoS attacks and their solutions in CPS. Emulator Mininet for simulating CPS. Spark-based DDoS Classification System for Cyber-Physical Systems

Cyber Security Applications for Industry 4.0 (Hardcover): R. Sujatha, G. Prakash, Noor Zaman Jhanjhi Cyber Security Applications for Industry 4.0 (Hardcover)
R. Sujatha, G. Prakash, Noor Zaman Jhanjhi
R3,373 Discovery Miles 33 730 Ships in 10 - 15 working days

Cyber Security Applications for Industry 4.0 (CSAI 4.0) provides integrated features of various disciplines in Computer Science, Mechanical, Electrical, and Electronics Engineering which are defined to be Smart systems. It is paramount that Cyber-Physical Systems (CPS) provide accurate, real-time monitoring and control for smart applications and services. With better access to information from real-time manufacturing systems in industrial sectors, the CPS aim to increase the overall equipment effectiveness, reduce costs, and improve efficiency. Industry 4.0 technologies are already enabling numerous applications in a variety of industries. Nonetheless, legacy systems and inherent vulnerabilities in an organization's technology, including limited security mechanisms and logs, make the move to smart systems particularly challenging. Features: Proposes a conceptual framework for Industry 4.0-based Cyber Security Applications concerning the implementation aspect Creates new business models for Industrialists on Control Systems and provides productive workforce transformation Outlines the potential development and organization of Data Protection based on strategies of cybersecurity features and planning to work in the new area of Industry 4.0 Addresses the protection of plants from the frost and insects, automatic hydroponic irrigation techniques, smart industrial farming and crop management in agriculture relating to data security initiatives The book is primarily aimed at industry professionals, academicians, and researchers for a better understanding of the secure data transition between the Industry 4.0 enabled connected systems and their limitations

Women Studies (Paperback, New edition): Nur Emine Koc, Aysegul Akaydin Women Studies (Paperback, New edition)
Nur Emine Koc, Aysegul Akaydin
R1,315 Discovery Miles 13 150 Ships in 10 - 15 working days

The aim of our book is to gather and draw attention on the women-themed works from all around the world and to make emphasis on how women is embroidered within especially communication, cultural and literary studies; further more, with our book, we try to put an end to generalised gender based works and to give different point of view to intersectionality and discrimination against women.

Digital Indonesia - Connectivity and Divergence (Hardcover): Edwin Jurriens, Ross Tapsell Digital Indonesia - Connectivity and Divergence (Hardcover)
Edwin Jurriens, Ross Tapsell
R1,259 R1,045 Discovery Miles 10 450 Save R214 (17%) Ships in 18 - 22 working days

This book places Indonesia at the forefront of the global debate about the impact of ""disruptive"" digital technologies. Digital technology is fast becoming the core of life, work, culture and identity. Yet, while the number of Indonesians using the internet has followed the upward global trend, some groups - the poor, the elderly, women, the less well-educated, people living in remote communities - are disadvantaged. This interdisciplinary collection of essays by leading researchers and scholars, as well as e-governance and e-commerce insiders, examines the impact of digitalisation on the media industry, governance, commerce, informal sector employment, education, cybercrime, terrorism, religion, artistic and cultural expression, and much more. It presents groundbreaking analysis of the impact of digitalisation in one of the worlds most diverse, geographically vast nations. In weighing arguments about the opportunities and challenges presented by digitalisation, it puts the very idea of a technological revolution into critical perspective.

How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Paperback): Ravi Das How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Paperback)
Ravi Das
R1,430 Discovery Miles 14 300 Ships in 10 - 15 working days

Written by an author that has real world experience in launching a cyber consulting company. Comprehensive coverage ranging all the way from the legal formation to be used to which segment of the Cybersecurity Industry should be targeted. Explains how CISOs can market their services and get key customers.

Ethical Digital Technology in Practice (Hardcover): Simon Rogerson Ethical Digital Technology in Practice (Hardcover)
Simon Rogerson
R4,075 Discovery Miles 40 750 Ships in 10 - 15 working days

Unique selling point: Exploration of the societal and ethical issues surrounding the use and development of digital technology Core audience: IT managers and executives; academic researchers; students of IT Place in the market: Professional title with appeal to academics and students

Security Risk Models for Cyber Insurance (Paperback): Caroline Baylon, Jose Vila, David Rios Insua Security Risk Models for Cyber Insurance (Paperback)
Caroline Baylon, Jose Vila, David Rios Insua
R1,458 Discovery Miles 14 580 Ships in 10 - 15 working days

Tackling the cybersecurity challenge is a matter of survival for society at large. Cyber attacks are rapidly increasing in sophistication and magnitude-and in their destructive potential. New threats emerge regularly, the last few years having seen a ransomware boom and distributed denial-of-service attacks leveraging the Internet of Things. For organisations, the use of cybersecurity risk management is essential in order to manage these threats. Yet current frameworks have drawbacks which can lead to the suboptimal allocation of cybersecurity resources. Cyber insurance has been touted as part of the solution - based on the idea that insurers can incentivize companies to improve their cybersecurity by offering premium discounts - but cyber insurance levels remain limited. This is because companies have difficulty determining which cyber insurance products to purchase, and insurance companies struggle to accurately assess cyber risk and thus develop cyber insurance products. To deal with these challenges, this volume presents new models for cybersecurity risk management, partly based on the use of cyber insurance. It contains: A set of mathematical models for cybersecurity risk management, including (i) a model to assist companies in determining their optimal budget allocation between security products and cyber insurance and (ii) a model to assist insurers in designing cyber insurance products. The models use adversarial risk analysis to account for the behavior of threat actors (as well as the behavior of companies and insurers). To inform these models, we draw on psychological and behavioural economics studies of decision-making by individuals regarding cybersecurity and cyber insurance. We also draw on organizational decision-making studies involving cybersecurity and cyber insurance. Its theoretical and methodological findings will appeal to researchers across a wide range of cybersecurity-related disciplines including risk and decision analysis, analytics, technology management, actuarial sciences, behavioural sciences, and economics. The practical findings will help cybersecurity professionals and insurers enhance cybersecurity and cyber insurance, thus benefiting society as a whole. This book grew out of a two-year European Union-funded project under Horizons 2020, called CYBECO (Supporting Cyber Insurance from a Behavioral Choice Perspective).

Cybercrime and Cybersecurity in the Global South (Hardcover): N Kshetri Cybercrime and Cybersecurity in the Global South (Hardcover)
N Kshetri
R3,299 Discovery Miles 32 990 Ships in 10 - 15 working days

Global cybercrime is arguably the biggest underworld industry of our times. Global forces and technologies such as mobile phones, social media and cloud computing are shaping the structure of the global cybercrime industry estimated at US$1 trillion. Nir Kshetri documents and compares the patterns, characteristics and processes of cybercrime activities in major regions and economies in the Global South such as China, India, the former Second World economies, Latin America and the Caribbean, Sub-Saharan Africa and Middle East and North Africa. Integrating theories from a wide range of disciplines, he explains initiatives at the global, supranational, national, sub-national and local levels.

Social Media in Iran - Politics and Society after 2009 (Paperback): David M. Faris, Babak Rahimi Social Media in Iran - Politics and Society after 2009 (Paperback)
David M. Faris, Babak Rahimi
R759 Discovery Miles 7 590 Ships in 10 - 15 working days
Critical Infrastructure Protection XIV - 14th IFIP WG 11.10 International Conference, ICCIP 2020, Arlington, VA, USA, March... Critical Infrastructure Protection XIV - 14th IFIP WG 11.10 International Conference, ICCIP 2020, Arlington, VA, USA, March 16-17, 2020, Revised Selected Papers (Hardcover, 1st ed. 2020)
Jason Staggs, Sujeet Shenoi
R2,701 Discovery Miles 27 010 Ships in 18 - 22 working days

The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed.Critical Infrastructure Protection XIV describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Aviation Infrastructure Security; Vehicle Infrastructure Security; Telecommunications Systems Security; Industrial Control Systems Security; Cyber-Physical Systems Security; and Infrastructure Modeling and Simulation. This book is the fourteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of sixteen edited papers from the Fourteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2020. Critical Infrastructure Protection XIV is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.

Security Analytics - A Data Centric Approach to Information Security (Hardcover): Mehak Khurana, Shilpa Mahajan Security Analytics - A Data Centric Approach to Information Security (Hardcover)
Mehak Khurana, Shilpa Mahajan
R4,216 Discovery Miles 42 160 Ships in 10 - 15 working days

The book gives a comprehensive overview of security issues in cyber physical systems by examining and analyzing the vulnerabilities. It also brings current understanding of common web vulnerabilities and its analysis while maintaining awareness and knowledge of contemporary standards, practices, procedures and methods of Open Web Application Security Project. This book is a medium to funnel creative energy and develop new skills of hacking and analysis of security and expedites the learning of the basics of investigating crimes, including intrusion from the outside and damaging practices from the inside, how criminals apply across devices, networks, and the internet at large and analysis of security data. Features Helps to develop an understanding of how to acquire, prepare, visualize security data. Unfolds the unventured sides of the cyber security analytics and helps spread awareness of the new technological boons. Focuses on the analysis of latest development, challenges, ways for detection and mitigation of attacks, advanced technologies, and methodologies in this area. Designs analytical models to help detect malicious behaviour. The book provides a complete view of data analytics to the readers which include cyber security issues, analysis, threats, vulnerabilities, novel ideas, analysis of latest techniques and technology, mitigation of threats and attacks along with demonstration of practical applications, and is suitable for a wide-ranging audience from graduates to professionals/practitioners and researchers.

tmux 2 (Paperback): Brian P. Hogan tmux 2 (Paperback)
Brian P. Hogan
R561 R470 Discovery Miles 4 700 Save R91 (16%) Ships in 10 - 15 working days

Your mouse is slowing you down. The time you spend context switching between your editor and your consoles eats away at your productivity. Take control of your environment with tmux, a terminal multiplexer that you can tailor to your workflow. With this updated second edition for tmux 2.2, you'll customize, script, and leverage tmux's unique abilities to craft a productive terminal environment that lets you keep your fingers on your keyboard's home row. You have a database console, web server, test runner, and text editor running at the same time, but switching between them and trying to find what you need takes up valuable time and breaks your concentration. By using tmux 2.2, you can improve your productivity and regain your focus. This book will show you how. This second edition includes many features requested by readers, including how to integrate plugins into your workflow, how to integrate tmux with Vim for seamless navigation - oh, and how to use tmux on Windows 10. Use tmux to manage multiple terminal sessions in a single window using only your keyboard. Manage and run programs side by side in panes, and create the perfect development environment with custom scripts so that when you're ready to work, your programs are waiting for you. Manipulate text with tmux's copy and paste buffers, so you can move text around freely between applications. Discover how easy it is to use tmux to collaborate remotely with others, and explore more advanced usage as you manage multiple tmux sessions, add custom scripts into the tmux status line, and integrate tmux with your system. Whether you're an application developer or a system administrator, you'll find many useful tricks and techniques to help you take control of your terminal.

Streaming and Copyright Law - An end-user perspective (Hardcover): Lasantha Ariyarathna Streaming and Copyright Law - An end-user perspective (Hardcover)
Lasantha Ariyarathna
R4,221 Discovery Miles 42 210 Ships in 10 - 15 working days

This book examines the challenges posed to Australian copyright law by streaming, from the end-user perspective. It compares the Australian position with the European Union and United States to draw lessons from them, regarding how they have dealt with streaming and copyright. By critically examining the technological functionality of streaming and the failure of copyright enforcement against the masses, it argues for strengthening end-user rights. The rising popularity of streaming has resulted in a revolutionary change to how digital content, such as sound recordings, cinematographic films, and radio and television broadcasts, is used on the internet. Superseding the conventional method of downloading, using streaming to access digital content has challenged copyright law, because it is not clear whether end-user acts of streaming constitute copyright infringement. These prevailing grey areas between copyright and streaming often make end-users feel doubtful about accessing digital content through streaming. It is uncertain whether exercising the right of reproduction is appropriately suited for streaming, given the ambiguities of "embodiment" and scope of "substantial part". Conversely, the fair dealing defence in Australia cannot be used aptly to defend end-users' acts of streaming digital content, because end-users who use streaming to access digital content can rarely rely on the defence of fair dealing for the purposes of criticism or review, news reporting, parody or satire, or research or study. When considering a temporary copy exception, end-users are at risk of being held liable for infringement when using streaming to access a website that contains infringing digital content, even if they lack any knowledge about the content's infringing nature. Moreover, the grey areas in circumventing geo-blocking have made end-users hesitant to access websites through streaming because it is not clear whether technological protection measures apply to geo-blocking. End-users have a severe lack of knowledge about whether they can use circumvention methods, such as virtual private networks, to access streaming websites without being held liable for copyright infringement. Despite the intricacies between copyright and access to digital content, the recently implemented website-blocking laws have emboldened copyright owners while suppressing end-users' access to digital content. This is because the principles of proportionality and public interest have been given less attention when determining website-blocking injunctions.

The Pathology of Communicative Capitalism (Hardcover, 1st ed. 2015): David W. Hill The Pathology of Communicative Capitalism (Hardcover, 1st ed. 2015)
David W. Hill
R1,372 Discovery Miles 13 720 Ships in 18 - 22 working days

This book diagnoses the social, mental and political consequences of working and economic organizations that generate value from communication. It calls for the role of communication technologies to be reimagined in order to create a healthier, fairer society.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Online Political Hate Speech in Europe…
Giovanni Ziccardi Hardcover R3,246 Discovery Miles 32 460
Financial Regulation and Technology - A…
Iain Sheridan Paperback R2,668 Discovery Miles 26 680
Social Media Marketing - A Quickstudy…
Edwards Poster R232 Discovery Miles 2 320
Like, Comment, Subscribe - Inside…
Mark Bergen Paperback R498 R473 Discovery Miles 4 730
Research Handbook on the Law and…
Ioannis Kokkoris, Claudia Lemus Hardcover R7,193 Discovery Miles 71 930
Infringement Nation - Copyright 2.0 and…
John Tehranian Hardcover R2,229 Discovery Miles 22 290
Advanced Introduction to Law and…
Woodrow Barfield, Ugo Pagallo Paperback R678 Discovery Miles 6 780
The Power Of Connection - Change Your…
Harry Barry Paperback R415 R370 Discovery Miles 3 700
Research Handbook on the Law of Virtual…
Woodrow Barfield, Marc J. Blitz Paperback R1,681 Discovery Miles 16 810
Computational Legal Studies - The…
Ryan Whalen Hardcover R4,162 Discovery Miles 41 620

 

Partners