Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Social & legal aspects of computing > General
Alright guys? It's me, Arron. Or as some people call me, 'that guy with the phone, the skinny jeans and the really fat head on Facebook'. In a world that seems to be freefalling without a parachute towards utter chaos, I'm here to remind you that when life gives you lemons, make lemonade. No, in fact, when life gives you lemons, make a fool out of yourself in the lemonade aisle.* Because there's more to life than Brexit, Bake Off and banging on about being vegan. Yes, with this book - which is my take on the world - you will learn how to survive a proper lads' holiday, become a master in the art of takeaway ordering and find out about the pitfalls of seriously inappropriate tattoos. So do yourself a favour: turn off the news, cancel that juice cleanse, open your eyes to the brilliant, hilarious world we live in and most importantly . . . buy this book. SEE YA LATER! Arron x *Actually, don't do exactly that, that's my thing.
Distributed Denial of Service (DDoS) attacks have become more destructive, wide-spread and harder to control over time. This book allows students to understand how these attacks are constructed, the security flaws they leverage, why they are effective, how they can be detected, and how they can be mitigated. Students use software defined networking (SDN) technology to created and execute controlled DDoS experiments. They learn how to deploy networks, analyze network performance, and create resilient systems. This book is used for graduate level computer engineering instruction at Clemson University. It augments the traditional graduate computing curricula by integrating: Internet deployment, network security, ethics, contemporary social issues, and engineering principles into a laboratory based course of instruction. Unique features of this book include: A history of DDoS attacks that includes attacker motivations Discussion of cyber-war, censorship, and Internet black-outs SDN based DDoS laboratory assignments Up-to-date review of current DDoS attack techniques and tools Review of the current laws that globally relate to DDoS Abuse of DNS, NTP, BGP and other parts of the global Internet infrastructure to attack networks Mathematics of Internet traffic measurement Game theory for DDoS resilience Construction of content distribution systems that absorb DDoS attacks This book assumes familiarity with computing, Internet design, appropriate background in mathematics, and some programming skills. It provides analysis and reference material for networking engineers and researchers. By increasing student knowledge in security, and networking; it adds breadth and depth to advanced computing curricula.
In Digital Data Collection and Information Privacy Law, Mark Burdon argues for the reformulation of information privacy law to regulate new power consequences of ubiquitous data collection. Examining developing business models, based on collections of sensor data - with a focus on the 'smart home' - Burdon demonstrates the challenges that are arising for information privacy's control-model and its application of principled protections of personal information exchange. By reformulating information privacy's primary role of individual control as an interrupter of modulated power, Burdon provides a foundation for future law reform and calls for stronger information privacy law protections. This book should be read by anyone interested in the role of privacy in a world of ubiquitous and pervasive data collection.
Focused on the mathematical foundations of social media analysis, Graph-Based Social Media Analysis provides a comprehensive introduction to the use of graph analysis in the study of social and digital media. It addresses an important scientific and technological challenge, namely the confluence of graph analysis and network theory with linear algebra, digital media, machine learning, big data analysis, and signal processing. Supplying an overview of graph-based social media analysis, the book provides readers with a clear understanding of social media structure. It uses graph theory, particularly the algebraic description and analysis of graphs, in social media studies. The book emphasizes the big data aspects of social and digital media. It presents various approaches to storing vast amounts of data online and retrieving that data in real-time. It demystifies complex social media phenomena, such as information diffusion, marketing and recommendation systems in social media, and evolving systems. It also covers emerging trends, such as big data analysis and social media evolution. Describing how to conduct proper analysis of the social and digital media markets, the book provides insights into processing, storing, and visualizing big social media data and social graphs. It includes coverage of graphs in social and digital media, graph and hyper-graph fundamentals, mathematical foundations coming from linear algebra, algebraic graph analysis, graph clustering, community detection, graph matching, web search based on ranking, label propagation and diffusion in social media, graph-based pattern recognition and machine learning, graph-based pattern classification and dimensionality reduction, and much more. This book is an ideal reference for scientists and engineers working in social media and digital media production and distribution. It is also suitable for use as a textbook in undergraduate or graduate courses on digital media, social media, or social networks.
While the Institute of Internal Auditors (IIA) has provided standards and guidelines for the practice of internal audit through the International Professional Practice Framework (IPPF), internal auditors and Chief Audit Executives (CAEs) continue to experience difficulties when attempting to balance the requirements of the IPPF with management expectations. The true challenge for any internal auditor is to appropriately apply the Standards while exerting adequate independence and objectivity in the face of management pressure. In Leading the Internal Audit Function, Lynn Fountain presents lessons learned from her extensive experience as an internal auditor, internal audit manager, and CAE to help internal auditors understand the challenges, issues, and potential alternative solutions when executing the role. The book identifies more than 50 challenges for auditors and discusses potential alternative actions the auditor can take when they experience a similar challenge. The book explains how to: Build a value-oriented function that abides by the standards and supports the objectives and goals of the organization. Execute the many aspects of the internal audit, including assurance and consulting work. Build a risk-based audit process. Develop and sustain the internal audit team. Develop and manage relationships with management and the audit committee. Manage internal audit's role in corporate governance, compliance, and fraud. Leading the Internal Audit Function includes real-life examples, scenarios, and lessons learned from internal auditors and CAEs to emphasize the importance of carefully managing all aspects of the internal audit. The author summarizes her many lessons learned into ten "commandments" for both CAEs and internal auditors. By following the guidelines in this book, you should be well-equipped to gain management support, perform effective and ethical audits, and uphold IIA Standards.
This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, looks at information security management system standards, risk management associated with information security, and information security awareness within an organization. The authors aim to improve the overall ability of organizations to participate, forecast, and actively assess their information security circumstances. It is important to note that securing and keeping information from parties who do not have authorization to access such information is an extremely important issue. To address this issue, it is essential for an organization to implement an ISMS standard such as ISO 27001 to address the issue comprehensively. The authors of this new volume have constructed a novel security framework (ISF) and subsequently used this framework to develop software called Integrated Solution Modeling (ISM), a semi-automated system that will greatly help organizations comply with ISO 27001 faster and cheaper than other existing methods. In addition, ISM does not only help organizations to assess their information security compliance with ISO 27001, but it can also be used as a monitoring tool, helping organizations monitor the security statuses of their information resources as well as monitor potential threats. ISM is developed to provide solutions to solve obstacles, difficulties, and expected challenges associated with literacy and governance of ISO 27001. It also functions to assess the RISC level of organizations towards compliance with ISO 27001. The information provide here will act as blueprints for managing information security within business organizations. It will allow users to compare and benchmark their own processes and practices against these results shown and come up with new, critical insights to aid them in information security standard (ISO 27001) adoption.
Go from Instagram newbie to star! Instagram is the fastest-growing social network in the world, soaring from 500 million to 1 billion active users in just two years. Users flock to the site thanks to its simplicity and use of the most popular social media features--image and video sharing, community, and personal insight. Instagram For Dummies is here if you're ready to get acquainted with the platform or want to find ways to do more with your Instagram account. Written by an team led by top Instagram trainer Jenn Herman, this book gives you tips for creating great Instagram images, personalizing your posts, connecting with the Instagram community, and working with Stories and IGTV. Access Instagram on a computer or mobile device Set up your profile Connect with others Share your stories Shoot better Instagram images From handling core functions to connecting with the Instagram community, this book shares the secrets you need to shine on social media like no other!
The A to Z Facebook guide for users, marketers, and developers alike Facebook has more than a billion users worldwide. Whether you enjoy spending time on Facebook every day, use it to advertise and market your product, or develop Facebook apps, this go-to guide has something you need. Its six minibooks cover creating a personal timeline, connecting with others, connecting Facebook to other social media, building a fan page, marketing a business on Facebook, and developing Facebook apps. It's fully updated to cover the latest Facebook changes, including Graph Search, mobile apps, Timeline enhancements, and news feed redesign. * Facebook has more than one billion active users who share more than 30 billion pieces of content each month * More than 37 million brands have Pages on Facebook * This complete guide has been fully updated to cover Facebook's latest changes, including Graph Search, mobile apps for both users and Page managers, a redesigned news feed, and enhancements to the Timeline * Minibooks cover creating a personal timeline, connecting with others, connecting Facebook to other social media, building a fan page, marketing a business on Facebook, and developing Facebook apps Facebook All-in-One For Dummies, 2nd Edition is packed with helpful information, great ideas, and ways to help you get even more out of Facebook.
Digitalization and computerization are now pervasive in science. This has deep consequences for our understanding of scientific knowledge and of the scientific process, and challenges longstanding assumptions and traditional frameworks of thinking of scientific knowledge. Digital media and computational processes challenge our conception of the way in which perception and cognition work in science, of the objectivity of science, and the nature of scientific objects. They bring about new relationships between science, art and other visual media, and new ways of practicing science and organizing scientific work, especially as new visual media are being adopted by science studies scholars in their own practice. This volume reflects on how scientists use images in the computerization age, and how digital technologies are affecting the study of science.
Vintage Game Consoles tells the story of the most influential videogame platforms of all time, including the Apple II, Commodore 64, Nintendo Entertainment System, Game Boy, Sega Genesis, Sony PlayStation, and many more. It uncovers the details behind the consoles, computers, handhelds, and arcade machines that made videogames possible. Drawing on extensive research and the authors' own lifelong experience with videogames, Vintage Game Consoles explores each system's development, history, fan community, its most important games, and information for collectors and emulation enthusiasts. It also features hundreds of exclusive full-color screenshots and images that help bring each system's unique story to life. Vintage Game Consoles is the ideal book for gamers, students, and professionals who want to know the story behind their favorite computers, handhelds, and consoles, without forgetting about why they play in the first place - the fun
Explores new perspectives on social media entertainment There is a new class of cultural producers-YouTube vloggers, Twitch gameplayers, Instagram influencers, TikTokers, Chinese wanghong, and others-who are part of a rapidly emerging and highly disruptive industry of monetized "user-generated" content. As this new wave of native social media entrepreneurs emerge, so do new formations of culture and the ways they are studied. In this volume, contributors draw on scholarship in media and communication studies, science and technology studies, and social media, Internet, and platform studies, in order to define this new field of study and the emergence of creator culture. Creator Culture introduces readers to new paradigms of social media entertainment from critical perspectives, demonstrating both relations to and differentiations from the well-established media forms and institutions traditionally within the scope of media studies. This volume does not seek to impose a uniform perspective; rather, the goal is to stimulate in-depth, globally-focused engagement with this burgeoning industry and establish a dynamic research agenda for scholars, teachers, and students, as well as creators and professionals across the media, communication, creative, and social media industries. Contributors include: Jean Burgess, Zoe Glatt, Sarah Banet-Weiser, Brent Luvaas, Carlos A. Scolari, Damian Fraticelli, Jose M. Tomasena, Junyi Lv, Hector Postigo, Brooke Erin Duffy, Megan Sawey, Jarrod Walzcer, Sangeet Kumar, Sriram Mohan, Aswin Punathambekar, Mohamed El Marzouki, Elaine Jing Zhao, Arturo Arriagada, Jeremy Shtern, Stephanie Hill
At home, work, and out in our ever-changing world, we're all just doing our best. In this modern parody, Frog and Toad are here to commiserate and lend some laughter. Full of wry humor and deep compassion for our modern vulnerabilities, the stories in Frog and Toad Are Doing Their Best perfectly capture the heartwarming authenticity of Lobel's famous amphibian friends while revealing razor-sharp truths about the world we live in today. Through Frog and Toad, we see the anxieties that are woven throughout our everyday existence, from our well-meaning but often-failed attempts at practicing self-care to our struggle to balance the gifts and burdens of technology. Toad ponders a variety of questionable schemes to pay off his credit cards, while Frog spends too much time scrolling through the newsfeed on his phone. But despite their daily frustrations and existential concerns, they know that having a friend to share life's burdens makes even the darkest days brighter. "I love children's literature, so of course I love Frog and Toad and I laughed out loud reading this spoof about the pair's new adventures." -GRETCHEN RUBIN, five time New York Times bestselling author
Autonomous vehicles have attracted a great deal of attention in the media, however there are some inconsistencies between the perception of autonomous vehicles? capabilities and their actual functions. This book provides an accessible explanation of how autonomous vehicles function, suggesting appropriate regulatory responses to the existing and emerging technology. Hannah YeeFen Lim explores the current capabilities of autonomous vehicles and importantly, highlights their inherent limitations. Lim provides a concise and easy to follow overview of the technology behind autonomous vehicles which encompasses hardware and software aspects, including machine learning algorithms. Having laid the technical foundation, the following chapters assess the current legal standards in negligence law that are applicable to autonomous vehicles taking the current technical limitations of the vehicles into account. Lim concludes by exploring the ethical issues associated with autonomous vehicles and proposes appropriate regulatory approaches. This book will be of great value to policy makers seeking a deeper understanding of the technology behind autonomous vehicles in order to inform and guide the development of laws and regulations. Legal practitioners will benefit from the discussion of recent use cases and applicable negligence law. Legal scholars researching artificial intelligence will also find the author?s easy to understand technical explanations and discourse on ethical considerations invaluable.
Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge--and he teaches you "the art of invisibility." Mitnick is the world's most famous--and formerly the Most Wanted--computer hacker. He has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point he was on a three-year run from the FBI. Now, though, Mitnick is reformed and is widely regarded as the expert on the subject of computer security. He knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening. In THE ART OF INVISIBILITY Mitnick provides both online and real life tactics and inexpensive methods to protect you and your family, in easy step-by-step instructions. He even talks about more advanced "elite" techniques, which, if used properly, can maximize your privacy. Invisibility isn't just for superheroes--privacy is a power you deserve and need in this modern age.
How cats became the undisputed mascot of the internet. The advertising slogan of the social news site Reddit is "Come for the cats. Stay for the empathy." Journalists and their readers seem to need no explanation for the line, "The internet is made of cats." Everyone understands the joke, but few know how it started. A Unified Theory of Cats on the Internet is the first book to explore the history of how the cat became the internet's best friend. Internet cats can differ in dramatic ways, from the goth cats of Twitter to the glamourpusses of Instagram to the giddy, nonsensical silliness of Nyan Cat. But they all share common traits and values. Bringing together fun anecdotes, thoughtful analyses, and hidden histories of the communities that built the internet, Elyse White shows how japonisme, punk culture, cute culture, and the battle among different communities for the soul of the internet informed the sensibility of online felines. Internet cats offer a playful-and useful-way to understand how culture shapes and is shaped by technology. Western culture has used cats for centuries as symbols of darkness, pathos, and alienation, and the communities that helped build the internet explicitly constructed themselves as outsiders, with snark and alienation at the core of their identity. Thus cats became the sine qua non of cultural literacy for the Extremely Online, not to mention an everyday medium of expression for the rest of us. Whatever direction the internet takes next, the "series of tubes" is likely to remain cat-shaped.
This book will help students develop their understanding of how the internet is impacting on social work education and practice in 21st century. Essential reading for students interested in the influence of digital technology and social media, including the impact of digital divides, this book looks at how the value-base of social work can have a positive effect on service users and carers who engage with digital services.
What's your story? The most successful brands aren't created, they are unearthed. Successful branding is based on authenticity. So how do you reveal your own brand? First, by searching yourself for answers to questions like these: What do you do better than anyone? What are you most proud of? What makes you lose track of time? In Digital You: Real Personal Branding in the Virtual Age, branding authority William Arruda describes the 21st century world of personal branding and guides you to define, express, and expand your personal brand for the virtual world. Branding is not about being famous, Arruda explains; it's about being selectively famous. It's about more than social media excess. When you understand the true value of personal branding, you can use it as a serious career development strategy. Digital You offers a deep dive to understanding and defining your unique promise of value-making a great first impression, mastering multimedia, and, ultimately, expanding your network and promoting thought leadership. You'll learn how to develop, design, and sustain a personal brand throughout the fluid movements of any career. Understand how to be clear about your digital brand and your unique promise of value so you can increase your success and happiness at work and in life. It's time to stop worrying about career extinction and start crafting a brand of distinction.
In the future, how many identities will you have? How many do you want? Digital technology is causing us to think differently about who we are and who we could become, but with the right knowledge we can turn this incredible capacity to our advantage. 'Who am I?' is one of the most fundamental questions of all. But it is becoming increasingly difficult to answer as technology enables us to negotiate and create many different versions of ourselves. In our digital, data-driven world, Facebook gets a say in verifying who we are, science can alter our biology, and advances in AI are revolutionizing not only how we interact online but with the physical world around us. Understanding and defining ourselves is becoming confusing but, as this fascinating book argues, it is possible to embrace this new era of transformation while preserving our autonomy. In The Future of You, Professional futurist Tracey Follows shows how our personal freedoms and potential will be transformed over the coming decades. From health passports, bio-hacking and relationships with machines to mind clones, digital voting and virtual legacies beyond the grave, we need to understand these vital issues today so that we might design the future of our identity tomorrow. 'This fascinating book explores the way that emerging technologies such as AI might affect the nature of personal identity and personhood. It paints an intriguing, thought-provoking, and occasionally disturbing picture.' Michael Wooldridge, author of The Road to Conscious
Boards and business leaders expect their key advisors to deliver fresh insights, and increasingly expect them to demonstrate foresight. To achieve what is expected, it is crucial to understand the dynamics of conversations in the boardroom and around the audit committee table. This book provides those unique perspectives. The journey from the 'mailroom to the boardroom' follows the story of a young banker who moved into the internal auditing profession as part of the 'new breed', then rose through the ranks into senior leadership and chief audit executive roles, before assuming audit committee and board roles that had an immense influence on governance, risk, compliance, and audit professionals. Success does not always follow a smooth and uneventful trajectory, and this story reflects insights from both the ups and the downs of the journey. Each chapter shares insights, better practices, case studies, practical examples, and real-life challenges and draws them together into 101 building blocks, each one providing crucial career-long learnings. The storytelling provides insights to people at all levels on the importance of positioning oneself to step into leadership roles, helps them understand how to evaluate and pursue potential career growth opportunities, provides tips on how to holistically manage and advance their career, and inspires higher-level thinking that enhances governance, risk, compliance and audit practices.
From a New York Times investigative reporter, this "authoritative and devastating account of the impacts of social media" (New York Times Book Review) tracks the high-stakes inside story of how Big Tech's breakneck race to drive engagement-and profits-at all costs fractured the world. The Chaos Machine is "an essential book for our times" (Ezra Klein). We all have a vague sense that social media is bad for our minds, for our children, and for our democracies. But the truth is that its reach and impact run far deeper than we have understood. Building on years of international reporting, Max Fisher tells the gripping and galling inside story of how Facebook, Twitter, YouTube, and other social network preyed on psychological frailties to create the algorithms that drive everyday users to extreme opinions and, increasingly, extreme actions. As Fisher demonstrates, the companies' founding tenets, combined with a blinkered focus on maximizing engagement, have led to a destabilized world for everyone. Traversing the planet, Fisher tracks the ubiquity of hate speech and its spillover into violence, ills that first festered in far-off locales, to their dark culmination in America during the pandemic, the 2020 election, and the Capitol Insurrection. Through it all, the social-media giants refused to intervene in any meaningful way, claiming to champion free speech when in fact what they most prized were limitless profits. The result, as Fisher shows, is a cultural shift toward a world in which people are polarized not by beliefs based on facts, but by misinformation, outrage, and fear. His narrative is about more than the villains, however. Fisher also weaves together the stories of the heroic outsiders and Silicon Valley defectors who raised the alarm and revealed what was happening behind the closed doors of Big Tech. Both panoramic and intimate, The Chaos Machine is the definitive account of the meteoric rise and troubled legacy of the tech titans, as well as a rousing and hopeful call to arrest the havoc wreaked on our minds and our world before it's too late.
The whole world knows the face of the young man with the bright black eyes. He is in the process of becoming an icon, a symbol, similar to the famous photo of Che Guevara. The face is that of Raif Badawi, who was nominated for the 2015 Nobel Peace Prize. Arrested in Saudi Arabia, he was sentenced to ten years' imprisonment and 1000 lashes - a de facto death sentence. The woman who succeeded in getting such people as Barack Obama and Prince Charles to appeal personally to the Saudi King for Badawi's release is his wife, Ensaf Haidar, who began the campaign to free her husband with a self-painted poster in front of a small church in Sherbrooke, Canada. When Raif Badawi and Ensaf Haidar fell in love with each other as adolescents, they did so in violation of every moral precept in the strictly Islamic Kingdom of Saudi Arabia. During their clandestine love affair, the young couple had no idea that, more than a decade later, Ensaf's love for Raif would attract the attention of politicians from around the world as the blogger's wife now mobilises global public opinion in an effort to save her husband from murder at the hands of the Saudi judiciary. With a courage born of desperation, she is fighting from exile in Canada to secure the release of the father of her three children, and is bringing great pressure to bear on the murderous regime in her native country. Ensaf Haidar tells Raif's and her own story: the story of their shared liberal ideas and her fight for her husband's release.
Governing Privacy in Knowledge Commons explores how privacy impacts knowledge production, community formation, and collaborative governance in diverse contexts, ranging from academia and IoT, to social media and mental health. Using nine new case studies and a meta-analysis of previous knowledge commons literature, the book integrates the Governing Knowledge Commons framework with Helen Nissenbaum's Contextual Integrity framework. The multidisciplinary case studies show that personal information is often a key component of the resources created by knowledge commons. Moreover, even when it is not the focus of the commons, personal information governance may require community participation and boundaries. Taken together, the chapters illustrate the importance of exit and voice in constructing and sustaining knowledge commons through appropriate personal information flows. They also shed light on the shortcomings of current notice-and-consent style regulation of social media platforms. This title is also available as Open Access on Cambridge Core. |
You may like...
Novel Beings - Regulatory Approaches for…
David R. Lawrence, Sarah Morley
Hardcover
R3,151
Discovery Miles 31 510
|