![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
The book gives a comprehensive overview of security issues in cyber physical systems by examining and analyzing the vulnerabilities. It also brings current understanding of common web vulnerabilities and its analysis while maintaining awareness and knowledge of contemporary standards, practices, procedures and methods of Open Web Application Security Project. This book is a medium to funnel creative energy and develop new skills of hacking and analysis of security and expedites the learning of the basics of investigating crimes, including intrusion from the outside and damaging practices from the inside, how criminals apply across devices, networks, and the internet at large and analysis of security data. Features Helps to develop an understanding of how to acquire, prepare, visualize security data. Unfolds the unventured sides of the cyber security analytics and helps spread awareness of the new technological boons. Focuses on the analysis of latest development, challenges, ways for detection and mitigation of attacks, advanced technologies, and methodologies in this area. Designs analytical models to help detect malicious behaviour. The book provides a complete view of data analytics to the readers which include cyber security issues, analysis, threats, vulnerabilities, novel ideas, analysis of latest techniques and technology, mitigation of threats and attacks along with demonstration of practical applications, and is suitable for a wide-ranging audience from graduates to professionals/practitioners and researchers.
* Structured approach from fundamental knowledge to entanglements between the concepts and the business needs * Simple and straight to the point presentation with diagrams and figures to help the understanding * Key points to take into account to design and implement an audit strategy based on company size * An overarching book on audit providing links between the different ways to audit a company * No boring or complex audit technical knowledge nor IT technical knowledge * Historical backgrounds to demonstrate that if the digital wave is new however the underlying risks are not.
Your mouse is slowing you down. The time you spend context switching between your editor and your consoles eats away at your productivity. Take control of your environment with tmux, a terminal multiplexer that you can tailor to your workflow. With this updated second edition for tmux 2.2, you'll customize, script, and leverage tmux's unique abilities to craft a productive terminal environment that lets you keep your fingers on your keyboard's home row. You have a database console, web server, test runner, and text editor running at the same time, but switching between them and trying to find what you need takes up valuable time and breaks your concentration. By using tmux 2.2, you can improve your productivity and regain your focus. This book will show you how. This second edition includes many features requested by readers, including how to integrate plugins into your workflow, how to integrate tmux with Vim for seamless navigation - oh, and how to use tmux on Windows 10. Use tmux to manage multiple terminal sessions in a single window using only your keyboard. Manage and run programs side by side in panes, and create the perfect development environment with custom scripts so that when you're ready to work, your programs are waiting for you. Manipulate text with tmux's copy and paste buffers, so you can move text around freely between applications. Discover how easy it is to use tmux to collaborate remotely with others, and explore more advanced usage as you manage multiple tmux sessions, add custom scripts into the tmux status line, and integrate tmux with your system. Whether you're an application developer or a system administrator, you'll find many useful tricks and techniques to help you take control of your terminal.
This book examines the challenges posed to Australian copyright law by streaming, from the end-user perspective. It compares the Australian position with the European Union and United States to draw lessons from them, regarding how they have dealt with streaming and copyright. By critically examining the technological functionality of streaming and the failure of copyright enforcement against the masses, it argues for strengthening end-user rights. The rising popularity of streaming has resulted in a revolutionary change to how digital content, such as sound recordings, cinematographic films, and radio and television broadcasts, is used on the internet. Superseding the conventional method of downloading, using streaming to access digital content has challenged copyright law, because it is not clear whether end-user acts of streaming constitute copyright infringement. These prevailing grey areas between copyright and streaming often make end-users feel doubtful about accessing digital content through streaming. It is uncertain whether exercising the right of reproduction is appropriately suited for streaming, given the ambiguities of "embodiment" and scope of "substantial part". Conversely, the fair dealing defence in Australia cannot be used aptly to defend end-users' acts of streaming digital content, because end-users who use streaming to access digital content can rarely rely on the defence of fair dealing for the purposes of criticism or review, news reporting, parody or satire, or research or study. When considering a temporary copy exception, end-users are at risk of being held liable for infringement when using streaming to access a website that contains infringing digital content, even if they lack any knowledge about the content's infringing nature. Moreover, the grey areas in circumventing geo-blocking have made end-users hesitant to access websites through streaming because it is not clear whether technological protection measures apply to geo-blocking. End-users have a severe lack of knowledge about whether they can use circumvention methods, such as virtual private networks, to access streaming websites without being held liable for copyright infringement. Despite the intricacies between copyright and access to digital content, the recently implemented website-blocking laws have emboldened copyright owners while suppressing end-users' access to digital content. This is because the principles of proportionality and public interest have been given less attention when determining website-blocking injunctions.
This book diagnoses the social, mental and political consequences of working and economic organizations that generate value from communication. It calls for the role of communication technologies to be reimagined in order to create a healthier, fairer society.
Deep Fakes: Algorithms and Society focuses on the use of artificial intelligence technologies to produce fictitious photorealistic audiovisual clips that are indistinguishable from traditional video media. For over a century, the indexical relationship of the photographic image, and its related media of film and video, to the scene of capture has served as a basis for truth claims. Historically, the iconicity of these images has featured a causal traceback to actual light rays in a particular time and space, which were fixed by chemical reactions or digital sensors to the resultant image. Today, photorealistic audiovisual media can be generated from deep learning networks that sever any connection to an actual event. Should society instantiate new regimes to manage this new challenge to our sense of reality and the traditional evidential capacities of the 'mechanical image'? How do these images generate information disorder while also providing the basis for legitimate tools used in entertainment and creative industries? Scholars and students from many backgrounds, as well as policymakers, journalists and the general reading public, will find a multidisciplinary approach to questions posed by deep fake research from Communication, International Studies, Writing and Rhetoric.
As long as humans write software, the key to successful software security is making the software development program process more efficient and effective. Although the approach of this textbook includes people, process, and technology approaches to software security, Practical Core Software Security: A Reference Framework stresses the people element of software security, which is still the most important part to manage as software is developed, controlled, and exploited by humans. The text outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. It focuses on what humans can do to control and manage a secure software development process using best practices and metrics. Although security issues will always exist, students learn how to maximize an organization's ability to minimize vulnerabilities in software products before they are released or deployed by building security into the development process. The authors have worked with Fortune 500 companies and have often seen examples of the breakdown of security development lifecycle (SDL) practices. The text takes an experience-based approach to apply components of the best available SDL models in dealing with the problems described above. Software security best practices, an SDL model, and framework are presented in this book. Starting with an overview of the SDL, the text outlines a model for mapping SDL best practices to the software development life cycle (SDLC). It explains how to use this model to build and manage a mature SDL program. Exercises and an in-depth case study aid students in mastering the SDL model. Professionals skilled in secure software development and related tasks are in tremendous demand today. The industry continues to experience exponential demand that should continue to grow for the foreseeable future. This book can benefit professionals as much as students. As they integrate the book's ideas into their software security practices, their value increases to their organizations, management teams, community, and industry.
The internet has launched the world into an era into which enormous amounts of data are generated every day through technologies with both positive and negative consequences. This often refers to big data . This book explores big data in organisations operating in the criminology and criminal justice fields. Big data entails a major disruption in the ways we think about and do things, which certainly applies to most organisations including those operating in the criminology and criminal justice fields. Big data is currently disrupting processes in most organisations - how different organisations collaborate with one another, how organisations develop products or services, how organisations can identify, recruit, and evaluate talent, how organisations can make better decisions based on empirical evidence rather than intuition, and how organisations can quickly implement any transformation plan, to name a few. All these processes are important to tap into, but two underlying processes are critical to establish a foundation that will permit organisations to flourish and thrive in the era of big data - creating a culture more receptive to big data and implementing a systematic data analytics-driven process within the organisation. Written in a clear and direct style, this book will appeal to students and scholars in criminology, criminal justice, sociology, and cultural studies but also to government agencies, corporate and non-corporate organisations, or virtually any other institution impacted by big data.
Cryptocurrency & Social Media Have Married and This is What It Looks Like Social media is a multi-billion-dollar industry where the platforms profit from user-generated content. Cryptocurrencies have arrived to end the exploitation. Cryptosocial: How Cryptocurrencies Are Changing Social Media surveys the history of social media and cryptocurrencies to show how these two unrelated technologies had a chance meeting that is changing the world. If you're one of the millions of people growing tired of legacy social media and how they take advantage of their own users, this book will open your eyes to the alternatives offering greater happiness, more freedom, and better personal and financial security. Read this book and you'll learn: What cryptosocial is all about. Which platforms and protocols you should pay attention to. Why cryptosocial media is the best alternative for Facebook, Twitter, and Snapchat. How to start using cryptosocial media. What you need to participate in decentralized social media platforms. And how you can profit from your own content, gain more control over your identity, and maintain security over your online data and personal assets.
1) This book presents a two-fold approach to the topic. On one hand it discusses the fundamentals and theoretical concepts of 5G with respect to the IoT, and on the other hand it showcases some impactful and trending research in this field. Clearly, IoT is an interdisciplinary field and therefore this book would be useful to different stakeholders related to mobile communications and IoT networking architecture. 2) IoT is one of the most trending topics worldwide and 5G is coming into force across the world. Hence there would be demand for this topic 3) As compared to competition, the proposed book has updated content. It is written completely with the consideration of 5G inclusion worldwide in 2020, state-of-the-art research across the globe presented in diverse chapters, dual approach of conceptual and research/implementational perspectives put together.
This book addresses the important role of communication within the context of performing an audit, project, or review (i.e., planning, detailed testing, and reporting). Intended for audit, information security, enterprise, and operational risk professionals at all levels, including those just starting out, Say What!? Communicate with Tact and Impact: What to Say to Get Results at Any Point in an Audit contains an array of practical and time-tested approaches that foster efficient and effective communication at any point during an engagement. The practical and memorable techniques are culled from author Ann M. Butera's CRP experience as a trusted advisor who has taught thousands of professionals how to develop and hone their interpersonal, communication, and empathic skills. Those familiar with the Five Tier Competency ModelTM she developed will recognize these techniques as a deep dive on the competencies comprising Tier 3: Project Management and Tier 5: Managing Constituent Relations. The author discusses the following behaviors in one's dealings with executives, process owners, control performers, and colleagues: Demonstrating executive presence Becoming the trusted advisor Influencing others Communicating with tact, confidence, and impact Facilitating productive meetings and discussions Overcoming resistance and objections Managing and resolving conflict Knowing when to let a topic go and move on This book is a guide for professionals who want to interact proactively and persuasively with those they work with, audit, or review. It describes techniques that can be used during virtual, in-person, telephone, or video conferences (as opposed to emails, workpapers, and reports). It provides everyone (newer associates in particular) with the interpersonal skills needed to (1) develop and build relationships with their internal constituents and clients, (2) facilitate conversations and discussions before and during meetings, and (3) handle impromptu questions with confidence and executive presence and make positive first impressions. The topics and techniques discussed are accompanied by case studies, examples, and exercises to give the readers the opportunity to develop plans to bridge the gap between theory and practice. The readers can use the book as a reliable resource when subject matter experts or training guides are not readily available.
Secure data science, which integrates cyber security and data science, is becoming one of the critical areas in both cyber security and data science. This is because the novel data science techniques being developed have applications in solving such cyber security problems as intrusion detection, malware analysis, and insider threat detection. However, the data science techniques being applied not only for cyber security but also for every application area-including healthcare, finance, manufacturing, and marketing-could be attacked by malware. Furthermore, due to the power of data science, it is now possible to infer highly private and sensitive information from public data, which could result in the violation of individual privacy. This is the first such book that provides a comprehensive overview of integrating both cyber security and data science and discusses both theory and practice in secure data science. After an overview of security and privacy for big data services as well as cloud computing, this book describes applications of data science for cyber security applications. It also discusses such applications of data science as malware analysis and insider threat detection. Then this book addresses trends in adversarial machine learning and provides solutions to the attacks on the data science techniques. In particular, it discusses some emerging trends in carrying out trustworthy analytics so that the analytics techniques can be secured against malicious attacks. Then it focuses on the privacy threats due to the collection of massive amounts of data and potential solutions. Following a discussion on the integration of services computing, including cloud-based services for secure data science, it looks at applications of secure data science to information sharing and social media. This book is a useful resource for researchers, software developers, educators, and managers who want to understand both the high level concepts and the technical details on the design and implementation of secure data science-based systems. It can also be used as a reference book for a graduate course in secure data science. Furthermore, this book provides numerous references that would be helpful for the reader to get more details about secure data science.
The use of data science and urban analytics has become a defining feature of smart cities. This timely book is a clear guide to the use of social media data for urban analytics. The book presents the foundations of urban analytics with social media data, along with real-world applications and insights on the platforms we use today. It looks at social media analytics platforms, cyberphysical data analytics platforms, crowd detection platforms, City-as-a-Platform, and city-as-a-sensor for platform urbanism. The book provides examples to illustrate how we apply and analyse social media data to determine disaster severity, assist authorities with pandemic policy, and capture public perception of smart cities. This will be a useful reference for those involved with and researching social, data, and urban analytics and informatics.
Written by successful Second Life resort owner Irie Tsure, this comprehensive guide will accompany you on the tricky journey from Newbie to practising expert in the virtual world of Second Life. Teach Yourself Making Money in the Second Life World is intended to cover every skill required to enjoy and prosper within this virtual world but in particular focuses on those entrepreneurial activities, strategies and skills which can help you get ahead in business in Second Life. This book is packed with advice for virtual entrepreneurs looking to develop independent businesses within SL, perfect for individuals or small companies interested in entering SL and succeeding there. Authored by an established, popular business savvy and creative SL character, areas covered include: The Second Life economy Intellectual property rights Creating retail objects Creating fashion items including clothing, hair and footwear Scripting Creating animations including QAvimator and how to upload an animation Putting it all together including the creative process Retail outlets and venues including how,to rent or to buy space,store design and layout, selling your products in-world,opening a resort or nightclub, streaming music into Second Life,including your own music, developing the business,minimising lag, community and staff Land management including: finding, buying and selling land in Second Life, obtaining a private island, making money from virtual land, managing a Shopping Mall, checking and improving a region's performance Real-world brands in Second Life - examining the opportunities etc Marketing in second life including: branding, Second Life groups, promoting your business Appendices: A Irie's summary of success; B My past, our present and the future; C: Useful keyboard shortcuts Most other books are written by techies or tourists, not by an author who has actually made the SL experience work for themselves. This is the real McCoy.
In May 2021, Jim Gosler, known as the Godfather and commander of US agencies' cyber offensive capability, said, ''Either the Intelligence Community (IC) would grow and adapt, or the Internet would eat us alive.'' Mr Gosler was speaking at his retirement only several months before the terrorist attacks of 9/11. He possibly did not realise the catalyst or the tsunami that he and his tens of thousands of US IC offensive website operatives had created and commenced. Over the last two decades, what Mr Gosler and his army of Internet keyboard warriors created would become the modus operandi for every faceless, nameless, state-sponsored or individual cybercriminal to replicate against an unwary, ill-protected, and ignorant group of executives and security professionals who knew little to nothing about the clandestine methods of infiltration and weaponisation of the Internet that the US and UK agencies led, all in the name of security. This book covers many cyber and ransomware attacks and events, including how we have gotten to the point of massive digital utilisation, particularly during the global lockdown and COVID-19 pandemic, to online spending that will see twice the monetary amount lost to cybercrime than what is spent online. There is little to no attribution, and with the IC themselves suffering cyberattacks, they are all blamed on being sophisticated ones, of course. We are witnessing the undermining of our entire way of life, our economies, and even our liberties. The IC has lots to answer for and unequivocally created the disastrous situation we are currently in. They currently have little to no answer. We need-no, we must demand-change. That change must start by ensuring the Internet and all connections to it are secure and no longer allow easy access and exfiltration for both the ICs and cybercriminals.
Exploring startup journalism and digital media platform trends in China, Taiwan and Southeast Asia, this book offers a practical insight into how to launch and run successful news operations as digitisation spreads through the region. Drawing from a range of case studies of news and journalism startups, including Malaysiakini, Hong Kong Free Press, The News Lens of Taiwan, Thailand's The Standard, Ciwei Gongshe of China, Indonesia's IDN Media, Sabay of Cambodia and Frontier Myanmar, this book provides tips on how to launch a news media startup, how to find funding and how to sustain and scale the enterprise. Blending a theoretical approach with core business and newsgathering expertise, the author offers an engaging overview of contemporary entrepreneurial concepts and their vital relationship in finding new markets for journalism today. Entrepreneurial journalism in greater China and Southeast Asia is an invaluable resource for both students and professionals interested in new media, startups and the Asian media market.
This book provides step by step directions for organizations to adopt a security and compliance related architecture according to mandatory legal provisions and standards prescribed for their industry, as well as the methodology to maintain the compliances. It sets a unique mechanism for monitoring controls and a dashboard to maintain the level of compliances. It aims at integration and automation to reduce the fatigue of frequent compliance audits and build a standard baseline of controls to comply with the applicable standards and regulations to which the organization is subject. It is a perfect reference book for professionals in the field of IT governance, risk management, and compliance. The book also illustrates the concepts with charts, checklists, and flow diagrams to enable management to map controls with compliances.
To fit a changing society, the conventional ways we date and mate have given way to brand new methods. People nowadays marry later in life, choose not to marry at all, seek partners after divorce, outlive spouses, relocate to new areas and even endure pandemics. This signifies that we are moving toward larger dating pools, something made possible through public personal advertising. This text details personal advertising in print and digital media, as well as online dating services, speed dating, the use of mobile dating apps and other topics. Interviews reveal the appeal and limitations of personal advertising for meeting people. This book offers a window into the development of trust and relationships, as well as the increasing role technology plays in shaping how people meet and mate in the modern world.
This book aims to prepare you to defend yourself against the tactics cybercriminals use, and gives you advice on what you can do if you, or your business, falls victim to cybercrime. With a focus on cyber fraud and cyber extortion, this book explores cybercrime from attack methods to impact, with the use of real-world case studies alongside practical suggestions on preventative measures, warning signs of cybercrime and next steps if you find yourself a victim.
In one modest-sized volume, this book offers three valuable sets of knowledge. First, it provides best practice guidance on virtually every large-scale task a modern manager may be involved in-from recruiting and hiring to onboarding and leading teams, and from employee engagement and retention to performance management and working with difficult employees. Second, it explains the essential concepts and practice of a range of effective leadership styles-including (but not limited to) servant leadership, crisis leadership, change agent leadership, and diversity and inclusion leadership. Third, it offers brief case studies from select CISOs and CSOs on how these management and leadership principles and practices play out in real-life workplace situations. The best practice essentials provided throughout this volume will empower aspiring leaders and also enable experienced managers to take their leadership to the next level. Many if not most CISOs and other leaders have had very little, if any, formal training in management and leadership. The select few that have such training usually obtained it through academic courses that take a theoretical, broad brush approach. In contrast, this book provides much actionable guidance in the nitty-gritty tasks that managers must do every day. Lack of management practical knowledge puts CISOs and CSOs at a disadvantage vis-a-vis other executives in the C-suite. They risk being pigeonholed as "security cops" rather than respected business leaders. Many articles on these subjects published in the press are too incomplete and filled with bad information. And combing through the few high-quality sources that are out there, such as Harvard Business Publishing, can take hundreds of dollars in magazine subscription and book purchase fees and weeks or months of reading time. This book puts all the essential information into your hands through a series of concise chapters authored by an award-winning writer.
As recently as 1968, computer scientists were uncertain how best to interconnect even two computers. The notion that within a few decades the challenge would be how to interconnect millions of computers around the globe was too far-fetched to contemplate. Yet, by 1988, that is precisely what was happening. The products and devices developed in the intervening years-such as modems, multiplexers, local area networks, and routers-became the linchpins of the global digital society. How did such revolutionary innovation occur? This book tells the story of the entrepreneurs who were able to harness and join two factors: the energy of computer science researchers supported by governments and universities, and the tremendous commercial demand for Internetworking computers. The centerpiece of this history comes from unpublished interviews from the late 1980s with over 80 computing industry pioneers, including Paul Baran, J.C.R. Licklider, Vint Cerf, Robert Kahn, Larry Roberts, and Robert Metcalfe. These individuals give us unique insights into the creation of multi-billion dollar markets for computer-communications equipment, and they reveal how entrepreneurs struggled with failure, uncertainty, and the limits of knowledge.
Social Media Analytics and Practical Applications: The Change to the Competition Landscape provides a framework that allows you to understand and analyze the impact of social media in various industries. It illustrates how social media analytics can help firms build transformational strategies and cope with the challenges of social media technology. By focusing on the relationship between social media and other technology models, such as wisdom of crowds, healthcare, fintech and blockchain, machine learning methods, and 5G, this book is able to provide applications used to understand and analyze the impact of social media. Various industries are called out and illustrate how social media analytics can help firms build transformational strategies and at the same time cope with the challenges that are part of the landscape. The book discusses how social media is a driving force in shaping consumer behavior and spurring innovations by embracing and directly engaging with consumers on social media platforms. By closely reflecting on emerging practices, the book shows how to take advantage of recent advancements and how business operations are being revolutionized. Social Media Analytics and Practical Applications is written for academicians and professionals involved in social media and social media analytics.
We're inundated with advice on how to cut back on our screen time, and urged instead to embrace nature, human relationships and being present in the moment. But has anyone actually considered those realities? They sound like a lot of work. In her new book, Jennifer McCartney gives thanks for phones, iPads, laptops, the menu tablets at Chili's and all screens everywhere. We can now follow a baby alpaca on a webcam, watch a viral video on TikTok, find an ex on Facebook, measure our pupillary distances, answer any question without engaging our brains-there's so much to learn; with little to no effort. The Internet practically runs itself! We use it for work, for family, for research. We're really, really good at being online! And that's something to celebrate. With her usual balance of pithy wisdom, aptitude tests and hilarious commentary, McCartney embraces our new reality. After all, as Descartes might have said, "I scroll, therefore I am."
The ever-increasing use of technology is challenging the current status of the law, bringing about new problems and questions. The book addresses this trend from the perspective of International law and European Union law and is divided into three main thematic sections. The first section focuses on the legal implications of the use of technology either for law enforcement purposes or in the context of military activities, and examines how this use adds a new dimension to perennial issues, such as the uneasy balance between security concerns and the protection of individual rights, and defining the exact scope of certain State obligations. In so doing, it takes into account a range of current and potential scenarios at the international, regional and domestic level, including the use of killer robots, databases, drones and technology in general to patrol borders, exchange information on criminal suspects, maintain public order, target suspected terrorists and conduct military activities. In turn, the second section examines the role of institutional and non-institutional actors in establishing substantive normative standards for the use of high-tech applications. In this respect, it focuses both on the role that European courts have played so far, and on how other actors' initiatives can contribute to the construction of a new legal framework for technology-related activities. Lastly, the third section has a two-fold focus: the first part investigates how the increasing reliance on technology is affecting traditional rules on international responsibility, and is challenging, in particular, the attribution of wrongful conduct to States and international organizations. The second part addresses issues of jurisdiction and justiciability. Given the scope of its coverage, this timely book addresses an important lacuna in the current legal scholarship, exploring some of the most recent applications of technology and the legal issues arising as a result. Readers will gain novel insights into the challenges posed to International law and European law by the growing reliance on technology, taking into account both its uses and misuses. |
You may like...
Research Handbook on the Law of…
Woodrow Barfield, Ugo Pagallo
Paperback
R1,539
Discovery Miles 15 390
Legal Challenges of Big Data
Joe Cannataci, Valeria Falce, …
Hardcover
R4,157
Discovery Miles 41 570
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi
Paperback
|