0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (148)
  • R250 - R500 (528)
  • R500+ (1,578)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > General

The Politics and Technology of Cyberspace (Hardcover): Danny Steed The Politics and Technology of Cyberspace (Hardcover)
Danny Steed
R1,807 Discovery Miles 18 070 Ships in 9 - 15 working days

Addressing the problems surrounding cyber security and cyberspace, this book bridges the gap between the technical and political worlds to increase our understanding of this major security concern in our IT-dependent society, and the risks it presents. Only by establishing a sound technical understanding of what is and is not possible can a properly informed discussion take place, and political visions toward cyberspace accurately map and predict the future of cyber security. Combining research from the technical world that creates cyberspace with that of the political world, which seeks to understand the consequences and uses of cyberspace, Steed analyses and explains the circumstances that have led to current situations whereby IT-dependent societies are vulnerable to, and regularly victims of, hacking, terrorism, espionage, and cyberwar. Two fundamental questions are considered throughout the book: what circumstances led to this state of affairs? And what solutions exist for the future of cyberspace? In tackling these questions, Steed also analyses the emergent and increasingly competing political positions on offer to stabilise the landscape of cyberspace. This interdisciplinary work will appeal to researchers and students of Security Studies, Intelligence Studies, Strategic Studies and International Relations as well as cybersecurity practitioners charged with developing policy options.

Secrets of a Cyber Security Architect (Hardcover): Brook S. E. Schoenfield Secrets of a Cyber Security Architect (Hardcover)
Brook S. E. Schoenfield
R1,830 Discovery Miles 18 300 Ships in 12 - 17 working days

Any organization with valuable data has been or will be attacked, probably successfully, at some point and with some damage. And, don't all digitally connected organizations have at least some data that can be considered "valuable"? Cyber security is a big, messy, multivariate, multidimensional arena. A reasonable "defense-in-depth" requires many technologies; smart, highly skilled people; and deep and broad analysis, all of which must come together into some sort of functioning whole, which is often termed a security architecture. Secrets of a Cyber Security Architect is about security architecture in practice. Expert security architects have dozens of tricks of their trade in their kips. In this book, author Brook S. E. Schoenfield shares his tips and tricks, as well as myriad tried and true bits of wisdom that his colleagues have shared with him. Creating and implementing a cyber security architecture can be hard, complex, and certainly frustrating work. This book is written to ease this pain and show how to express security requirements in ways that make the requirements more palatable and, thus, get them accomplished. It also explains how to surmount individual, team, and organizational resistance. The book covers: What security architecture is and the areas of expertise a security architect needs in practice The relationship between attack methods and the art of building cyber defenses Why to use attacks and how to derive a set of mitigations and defenses Approaches, tricks, and manipulations proven successful for practicing security architecture Starting, maturing, and running effective security architecture programs Secrets of the trade for the practicing security architecture Tricks to surmount typical problems Filled with practical insight, Secrets of a Cyber Security Architect is the desk reference every security architect needs to thwart the constant threats and dangers confronting every digitally connected organization.

Data-centric Living - Algorithms, Digitization and Regulation (Hardcover): V. Sridhar Data-centric Living - Algorithms, Digitization and Regulation (Hardcover)
V. Sridhar
R4,081 Discovery Miles 40 810 Ships in 12 - 17 working days

This book explores how data about our everyday online behaviour are collected and how they are processed in various ways by algorithms powered by Artificial Intelligence (AI) and Machine Learning (ML). The book investigates the socioeconomic effects of these technologies, and the evolving regulatory landscape that is aiming to nurture the positive effects of these technology evolutions while at the same time curbing possible negative practices. The volume scrutinizes growing concerns on how algorithmic decisions can sometimes be biased and discriminative; how autonomous systems can possibly disrupt and impact the labour markets, resulting in job losses in several traditional sectors while creating unprecedented opportunities in others; the rapid evolution of social media that can be addictive at times resulting in associated mental health issues; and the way digital Identities are evolving around the world and their impact on provisioning of government services. The book also provides an in-depth understanding of regulations around the world to protect privacy of data subjects in the online world; a glimpse of how data is used as a digital public good in combating Covid pandemic; and how ethical standards in autonomous systems are evolving in the digital world. A timely intervention in this fast-evolving field, this book will be useful for scholars and researchers of digital humanities, business and management, internet studies, data sciences, political studies, urban sociology, law, media and cultural studies, sociology, cultural anthropology, and science and technology studies. It will also be of immense interest to the general readers seeking insights on daily digital lives.

Wireless Crime and Forensic Investigation (Paperback): Gregory Kipper Wireless Crime and Forensic Investigation (Paperback)
Gregory Kipper
R1,772 Discovery Miles 17 720 Ships in 12 - 17 working days

Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However, based on the broad reach of wireless, stopping someone from passively listening is just as critical. Intrusion detection systems, firewalls, and forensics are just a few of the key areas that must be understood and applied to proactively solve the wireless problem. From short text messaging to war driving, Wireless Crime and Forensic Investigation explores all aspects of wireless technology, how it is used in daily life, and how it will be used in the future. The book provides a one-stop resource on the types of wireless crimes that are being committed and forensic investigation techniques for wireless devices and wireless networks. The author's straightforward and easy to read style seamlessly integrates the topics of wireless security and computer forensics. He provides a solid understanding of modern wireless technologies, wireless security techniques and wireless crime techniques, as well as conducting forensic analysis on wireless devices and networks. Each chapter, while part of a greater whole, can stand on its own, making researching wireless technologies, security, crime, or forensics easy. With a problem space as big and complex as wireless, proactive measures must be put in place, and put in place immediately. To protect your organization, you need to be well versed in the new technology sooner rather than later. You can pay now or you can pay later. Later always costs more. This book not only has all the information required to become proficient in wireless technology, but also provides the information required for conducting a forensic analysis in a wireless environment.

Bookishness - Loving Books in a Digital Age (Paperback): Jessica Pressman Bookishness - Loving Books in a Digital Age (Paperback)
Jessica Pressman
R636 Discovery Miles 6 360 Ships in 12 - 17 working days

Twenty-first-century culture is obsessed with books. In a time when many voices have joined to predict the death of print, books continue to resurface in new and unexpected ways. From the proliferation of "shelfies" to Jane Austen-themed leggings and from decorative pillows printed with beloved book covers to bookwork sculptures exhibited in prestigious collections, books are everywhere and are not just for reading. Writers have caught up with this trend: many contemporary novels depict books as central characters or fetishize paper and print thematically and formally. In Bookishness, Jessica Pressman examines the new status of the book as object and symbol. She explores the rise of "bookishness" as an identity and an aesthetic strategy that proliferates from store-window decor to experimental writing. Ranging from literature to kitsch objects, stop-motion animation films to book design, Pressman considers the multivalent meanings of books in contemporary culture. Books can represent shelter from-or a weapon against-the dangers of the digital; they can act as memorials and express a sense of loss. Examining the works of writers such as Jonathan Safran Foer, Jennifer Egan, Mark Z. Danielewski, and Leanne Shapton, Pressman illuminates the status of the book as a fetish object and its significance for understanding contemporary fakery. Bringing together media studies, book history, and literary criticism, Bookishness explains how books still give meaning to our lives in a digital age.

Auditing Information and Cyber Security Governance - A Controls-Based Approach (Hardcover): Robert E Davis Auditing Information and Cyber Security Governance - A Controls-Based Approach (Hardcover)
Robert E Davis
R2,021 Discovery Miles 20 210 Ships in 12 - 17 working days

"A much-needed service for society today. I hope this book reaches information managers in the organization now vulnerable to hacks that are stealing corporate information and even holding it hostage for ransom." - Ronald W. Hull, author, poet, and former professor and university administrator A comprehensive entity security program deploys information asset protection through stratified technological and non-technological controls. Controls are necessary for counteracting threats, opportunities, and vulnerabilities risks in a manner that reduces potential adverse effects to defined, acceptable levels. This book presents a methodological approach in the context of normative decision theory constructs and concepts with appropriate reference to standards and the respective guidelines. Normative decision theory attempts to establish a rational framework for choosing between alternative courses of action when the outcomes resulting from the selection are uncertain. Through the methodological application, decision theory techniques can provide objectives determination, interaction assessments, performance estimates, and organizational analysis. A normative model prescribes what should exist according to an assumption or rule.

Smart Technologies and the End(s) of Law - Novel Entanglements of Law and Technology (Paperback): Mireille Hildebrandt Smart Technologies and the End(s) of Law - Novel Entanglements of Law and Technology (Paperback)
Mireille Hildebrandt
R1,005 Discovery Miles 10 050 Ships in 12 - 17 working days

Do conceptions of the Rule of Law reflect timeless truths, or are they in fact contingent on a particular information and communications infrastructure - one that we are fast leaving behind? Hildebrandt has engineered a provocative encounter between law and networked digital technologies that cuts to the heart of the dilemma confronting legal institutions in a networked world.' - Julie E. Cohen, Georgetown University, US'Many contemporary authors are wrestling with two technological developments which will change our society beyond recognition: big data analytics and smart technologies. Few though understand, or can explain, these developments in the way Mireille Hildebrandt does. In ambitiously bringing together legal theory, psychology, social ethnology and of course smart agency and ambient intelligence, Hildebrandt gives the most complete study of these vitally important developments. Books are often described as 'must read' though few actually are; this one genuinely is.' - Andrew Murray, London School of Economics, UK This timely book tells the story of the smart technologies that reconstruct our world, by provoking their most salient functionality: the prediction and preemption of our day-to-day activities, preferences, health and credit risks, criminal intent and spending capacity. Mireille Hildebrandt claims that we are in transit between an information society and a data-driven society, which has far reaching consequences for the world we depend on. She highlights how the pervasive employment of machine-learning technologies that inform so-called 'data-driven agency' threaten privacy, identity, autonomy, non-discrimination, due process and the presumption of innocence. The author argues how smart technologies undermine, reconfigure and overrule the ends of the law in a constitutional democracy, jeopardizing law as an instrument of justice, legal certainty and the public good. Nevertheless, the book calls on lawyers, computer scientists and civil society not to reject smart technologies, explaining how further engaging these technologies may help to reinvent the effective protection of the Rule of Law. Academics and researchers interested in the philosophy of law and technology will find this book both discerning and relevant. Practitioners and policy makers in the areas of law, computer science and engineering will benefit from the insight into smart technologies and their impact today.

Hashtag Authentic - Finding creativity and building a community on Instagram and beyond (Hardcover): Sara Tasker Hashtag Authentic - Finding creativity and building a community on Instagram and beyond (Hardcover)
Sara Tasker 1
R542 R372 Discovery Miles 3 720 Save R170 (31%) Ships in 12 - 17 working days

In Hashtag Authentic, social media guru Sara Tasker provides tips, advice, and guidance on how to turn your personal Instagram account into a profitable creative outlet. Since setting up her Instagram account (@me_and_orla) while on maternity leave in 2013, Sara has become a celebrated influencer and iPhoneographer, and through her calm, atmospheric, and authentic style has garnered legions of followers. Here, Sara presents the lessons she has learned along the way. Sara's nurturing voice and enchanting photography provide guidance on: storytelling, with tips on finding your own visual style and personal niche; making pictures, including composing for Instagram, finding the best light, and getting the most out of your camera phone; archiving your life, with tips organized by themes like Craft & Making, Family & Pets, and Food & Ingredients; and sharing your world, detailing the keys to Instagram success and beyond. Hashtag Authentic is both an inspiring manual and an interactive tool for finding an online voice, growing a tribe, and becoming an influencer.

Operational Auditing - Principles and Techniques for a Changing World (Hardcover, 2nd edition): Hernan Murdock Operational Auditing - Principles and Techniques for a Changing World (Hardcover, 2nd edition)
Hernan Murdock
R2,031 Discovery Miles 20 310 Ships in 12 - 17 working days

Operational Auditing: Principles and Techniques for a Changing World, 2nd edition, explains the proven approaches and essential procedures to perform risk-based operational audits. It shows how to effectively evaluate the relevant dynamics associated with programs and processes, including operational, strategic, technological, financial and compliance objectives and risks. This book merges traditional internal audit concepts and practices with contemporary quality control methodologies, tips, tools and techniques. It explains how internal auditors can perform operational audits that result in meaningful findings and useful recommendations to help organizations meet objectives and improve the perception of internal auditors as high-value contributors, appropriate change agents and trusted advisors. The 2nd edition introduces or expands the previous coverage of: * Control self-assessments. * The 7 Es framework for operational quality. * Linkages to ISO 9000. * Flowcharting techniques and value-stream analysis * Continuous monitoring. * The use of Key Performance Indicators (KPIs) and Key Risk Indicators (KRIs). * Robotic process automation (RPA), artificial intelligence (AI) and machine learning (ML); and * Adds a new chapter that will examine the role of organizational structure and its impact on effective communications, task allocation, coordination, and operational resiliency to more effectively respond to market demands.

Managing Your Professional Identity Online - A Guide for Faculty, Staff, and Administrators (Paperback): Kathryn E. Linder Managing Your Professional Identity Online - A Guide for Faculty, Staff, and Administrators (Paperback)
Kathryn E. Linder; Foreword by Laura Pasquini
R968 Discovery Miles 9 680 Ships in 12 - 17 working days

In higher education, professional online identities have become increasingly important. A rightly worded tweet can cause an academic blog post to go viral. A wrongly worded tweet can get a professor fired. Regular news items in The Chronicle of Higher Education and Inside Higher Ed provide evidence that reputations are both built and crushed via online platforms. Ironically, given the importance of digital identities to job searches, the promotion and distribution of scholarly work, pedagogical innovation, and many other components of an academic life, higher education professionals receive little to no training about how to best represent themselves in a digital space. Managing Your Professional Identity Online: A Guide for Higher Education fills this gap by offering higher education professionals the information and guidance they need to: craft strong online biographical statements for a range of platforms; prioritize where and how they want to represent themselves online in a professional capacity; intentionally and purposefully create an effective brand for their professional identity online; develop online profiles that are consistent, professional, accurate, organized, of good quality, and representative of their academic lives; regularly update and maintain an online presence; post appropriately in a range of online platforms and environments; and< successfully promote their professional accomplishments. Managing Your Professional Identity Online is practical and action-oriented. In addition to offering a range of case studies demonstrating concrete examples of effective practices, the book is built around activities, templates, worksheets, rubrics, and bonus materials that walk readers through a step-by-step guide of how to design, build, and maintain professional online identities.

The Politics and Technology of Cyberspace (Paperback): Danny Steed The Politics and Technology of Cyberspace (Paperback)
Danny Steed
R725 Discovery Miles 7 250 Ships in 12 - 17 working days

Addressing the problems surrounding cyber security and cyberspace, this book bridges the gap between the technical and political worlds to increase our understanding of this major security concern in our IT-dependent society, and the risks it presents. Only by establishing a sound technical understanding of what is and is not possible can a properly informed discussion take place, and political visions toward cyberspace accurately map and predict the future of cyber security. Combining research from the technical world that creates cyberspace with that of the political world, which seeks to understand the consequences and uses of cyberspace, Steed analyses and explains the circumstances that have led to current situations whereby IT-dependent societies are vulnerable to, and regularly victims of, hacking, terrorism, espionage, and cyberwar. Two fundamental questions are considered throughout the book: what circumstances led to this state of affairs? And what solutions exist for the future of cyberspace? In tackling these questions, Steed also analyses the emergent and increasingly competing political positions on offer to stabilise the landscape of cyberspace. This interdisciplinary work will appeal to researchers and students of Security Studies, Intelligence Studies, Strategic Studies and International Relations as well as cybersecurity practitioners charged with developing policy options.

Information Technology Control and Audit, Fifth Edition (Hardcover, 5th edition): Angel R. Otero Information Technology Control and Audit, Fifth Edition (Hardcover, 5th edition)
Angel R. Otero
R2,198 Discovery Miles 21 980 Ships in 12 - 17 working days

The new fifth edition of Information Technology Control and Audit has been significantly revised to include a comprehensive overview of the IT environment, including revolutionizing technologies, legislation, audit process, governance, strategy, and outsourcing, among others. This new edition also outlines common IT audit risks, procedures, and involvement associated with major IT audit areas. It further provides cases featuring practical IT audit scenarios, as well as sample documentation to design and perform actual IT audit work. Filled with up-to-date audit concepts, tools, techniques, and references for further reading, this revised edition promotes the mastery of concepts, as well as the effective implementation and assessment of IT controls by organizations and auditors. For instructors and lecturers there are an instructor's manual, sample syllabi and course schedules, PowerPoint lecture slides, and test questions. For students there are flashcards to test their knowledge of key terms and recommended further readings. Go to http://routledgetextbooks.com/textbooks/9781498752282/ for more information.

The Oxford Handbook of Philosophy of Technology (Hardcover): Shannon Vallor The Oxford Handbook of Philosophy of Technology (Hardcover)
Shannon Vallor
R4,656 Discovery Miles 46 560 Ships in 10 - 15 working days

The Oxford Handbook of Philosophy of Technology gives readers a view into this increasingly vital and urgently needed domain of philosophical understanding, offering an in-depth collection of leading and emerging voices in the philosophy of technology. The thirty-two contributions in this volume cut across and connect diverse philosophical traditions and methodologies. They reveal the often-neglected importance of technology for virtually every subfield of philosophy, including ethics, epistemology, philosophy of science, metaphysics, aesthetics, philosophy of language, and political theory. The Handbook also gives readers a new sense of what philosophy looks like when fully engaged with the disciplines and domains of knowledge that continue to transform the material and practical features and affordances of our world, including engineering, arts and design, computing, and the physical and social sciences. The chapters reveal enduring conceptual themes concerning technology's role in the shaping of human knowledge, identity, power, values, and freedom, while bringing a philosophical lens to the profound transformations of our existence brought by innovations ranging from biotechnology and nuclear engineering to artificial intelligence, virtual reality, and robotics. This new collection challenges the reader with provocative and original insights on the history, concepts, problems, and questions to be brought to bear upon humanity's complex and evolving relationship to technology.

Research Handbook on the Law of Artificial Intelligence (Hardcover): Woodrow Barfield, Ugo Pagallo Research Handbook on the Law of Artificial Intelligence (Hardcover)
Woodrow Barfield, Ugo Pagallo
R8,111 Discovery Miles 81 110 Ships in 12 - 17 working days

The field of artificial intelligence has made tremendous advances in the last few decades, but as smart as AI is now, it is getting exponentially smarter and becoming more autonomous in its actions. This raises a host of challenges to current legal doctrine, including whether the output of AI entities should count as 'speech', the extent to which AI should be regulated under antitrust and criminal law statutes, and whether AI should be considered an independent agent and responsible for its actions under the law of tort or agency. Containing chapters written by leading U.S., EU, and International law scholars, the Research Handbook presents current law, statutes, and regulations on the role of law in an age of increasingly smart AI, addressing issues of law that are critical to the evolution of AI and its role in society. To provide a broad coverage of the topic, the Research Handbook draws upon free speech doctrine, criminal law, issues of data protection and privacy, legal rights for increasingly smart AI systems, and a discussion of jurisdiction for AI entities that will not be 'content' to stay within the geographical boundaries of any nation state or be tied to a particular physical location. Using numerous examples and case studies, the chapter authors discuss the political and jurisdictional decisions that will have to be made as AI proliferates into society and transforms our government and social institutions. The Research Handbook will also introduce designers of artificially intelligent systems to the legal issues that apply to the make-up and use of AI from the technologies, algorithms, and analytical techniques. This essential guide to the U.S., EU, and other International law, regulations, and statutes which apply to the emerging field of 'law and AI' will be a valuable reference for scholars and students interested in information and intellectual property law, privacy, and data protection as well as to legal theorists and social scientists who write about the future direction and implications of AI. The Research Handbook will also serve as an important reference for legal practitioners in different jurisdictions who may litigate disputes involving AI, and to computer scientists and engineers actively involved in the design and use of the next generation of AI systems. Contributors include: W. Barfield, S. Bayern, S.J. Blodgett-Ford, R.G.A. Bone, T. Burri, A. Chin, J.A. Cubert, M. de Cock Buning, S. De Conca, S-.A. Elvy, A. Ezrachi, R. Leenes, Y. Lev-Aretz, A.R. Lodder, R.P. Loui, T.M. Massaro, L.T. McCarty, J.O. McGinnis, F. Moslein, H. Norton, N. Packin, U. Pagallo, S. Quattrocolo, W. Samore, F. Shimpo, M.E. Stucke, R. van den Hoven van Genderen, L. Vertinsky, A. von Ungern-Sternberg, J.F. Weaver, Y-.H. Weng, I. Wildhaber

The Squiggly Career - The 5 Skills You Need To Succeed In Work Today (Paperback): Helen Tupper, Sarah Ellis The Squiggly Career - The 5 Skills You Need To Succeed In Work Today (Paperback)
Helen Tupper, Sarah Ellis 1
R512 R415 Discovery Miles 4 150 Save R97 (19%) Ships in 9 - 15 working days

A practical and engaging guide to building a meaningful and successful career.

Want to build a meaningful career that you love? Careers are changing; they are no longer linear and there's no such thing as a 'job for life'. Squiggly careers, where people jump constantly between roles, industries and locations, are becoming the new normal. Squiggly careers are filled with opportunity and excitement, but they can also be ambiguous and overwhelming if we don't know how to make the most of them.

In The Squiggly Career, personal development experts Helen Tupper and Sarah Ellis will teach you how to:

  • Identify your Values
  • Play to your Super Strengths
  • Address your Confidence gremlins
  • Design your support solar systems (Networks)
  • Explore your Future Possibilities

Packed with insights about the changing-face of work, exercises to aid your growth, and tips and inspiration from highly successful people, this book will help you be happier, and ultimately more successful in your career.

Security and Privacy in the Internet of Things (Hardcover): Syed Rameem Zahra, Mohammad Ahsan Chishti Security and Privacy in the Internet of Things (Hardcover)
Syed Rameem Zahra, Mohammad Ahsan Chishti
R3,591 Discovery Miles 35 910 Ships in 12 - 17 working days

This book provides a comprehensive study of the security and privacy research advancements in Internet of Things (IoT). The book lays the context for discussion by introducing the vulnerable intrinsic features of IoT. By providing a comprehensive discussion of the vulnerable features, the book highlights the problem areas of IoT related to security and privacy. * Covers all aspects of security * Algorithms, protocols and technologies used in IoT have been explained and the security flaws in them analyzed with solutions * Discusses ways for achieving better access control and trust in the IoT ecosystem * Contributes exhaustive strategic plans to deal with security issues of IoT * Gathers contributions from leading-edge researchers from academia and industry Graduates, researchers, people from the industry and security professionals who want to explore the IoT security field will find this book useful. The book will give an in-depth insight in to what has happened, what new is happening and what opportunities exist in the field.

Securing IoT and Big Data - Next Generation Intelligence (Hardcover): Vijayalakshmi Saravanan, Alagan Anpalagan, T Poongodi,... Securing IoT and Big Data - Next Generation Intelligence (Hardcover)
Vijayalakshmi Saravanan, Alagan Anpalagan, T Poongodi, Firoz Khan
R4,058 Discovery Miles 40 580 Ships in 12 - 17 working days

This book covers IoT and Big Data from a technical and business point of view. The book explains the design principles, algorithms, technical knowledge, and marketing for IoT systems. It emphasizes applications of big data and IoT. It includes scientific algorithms and key techniques for fusion of both areas. Real case applications from different industries are offering to facilitate ease of understanding the approach. The book goes on to address the significance of security algorithms in combing IoT and big data which is currently evolving in communication technologies. The book is written for researchers, professionals, and academicians from interdisciplinary and transdisciplinary areas. The readers will get an opportunity to know the conceptual ideas with step-by-step pragmatic examples which makes ease of understanding no matter the level of the reader.

Security in IoT Social Networks (Paperback): Fadi Al-Turjman, B.D. Deebak Security in IoT Social Networks (Paperback)
Fadi Al-Turjman, B.D. Deebak
R2,714 Discovery Miles 27 140 Ships in 12 - 17 working days

Security in IoT Social Networks takes a deep dive into security threats and risks, focusing on real-world social and financial effects. Mining and analyzing enormously vast networks is a vital part of exploiting Big Data. This book provides insight into the technological aspects of modeling, searching, and mining for corresponding research issues, as well as designing and analyzing models for resolving such challenges. The book will help start-ups grow, providing research directions concerning security mechanisms and protocols for social information networks. The book covers structural analysis of large social information networks, elucidating models and algorithms and their fundamental properties. Moreover, this book includes smart solutions based on artificial intelligence, machine learning, and deep learning for enhancing the performance of social information network security protocols and models. This book is a detailed reference for academicians, professionals, and young researchers. The wide range of topics provides extensive information and data for future research challenges in present-day social information networks.

Status Update - Celebrity, Publicity, and Branding in the Social Media Age (Paperback): Alice E. Marwick Status Update - Celebrity, Publicity, and Branding in the Social Media Age (Paperback)
Alice E. Marwick
R670 Discovery Miles 6 700 Ships in 10 - 15 working days

Social media, once heralded as revolutionary and democratic, have instead proved exclusionary and elitist Social media technologies such as YouTube, Twitter, and Facebook promised a new participatory online culture. Yet, technology insider Alice Marwick contends in this insightful book, "Web 2.0" only encouraged a preoccupation with status and attention. Her original research-which includes conversations with entrepreneurs, Internet celebrities, and Silicon Valley journalists-explores the culture and ideology of San Francisco's tech community in the period between the dot com boom and the App store, when the city was the world's center of social media development. Marwick argues that early revolutionary goals have failed to materialize: while many continue to view social media as democratic, these technologies instead turn users into marketers and self-promoters, and leave technology companies poised to violate privacy and to prioritize profits over participation. Marwick analyzes status-building techniques-such as self-branding, micro-celebrity, and life-streaming-to show that Web 2.0 did not provide a cultural revolution, but only furthered inequality and reinforced traditional social stratification, demarcated by race, class, and gender.

Blockchain, Big Data and Machine Learning - Trends and Applications (Hardcover): Neeraj Kumar, N. Gayathri, B. Balamurugan, Md... Blockchain, Big Data and Machine Learning - Trends and Applications (Hardcover)
Neeraj Kumar, N. Gayathri, B. Balamurugan, Md Arafatur Rahman
R4,068 Discovery Miles 40 680 Ships in 12 - 17 working days

Present book covers new paradigms in Blockchain, Big Data and Machine Learning concepts including applications and case studies. It explains dead fusion in realizing the privacy and security of blockchain based data analytic environment. Recent research of security based on big data, blockchain and machine learning has been explained through actual work by practitioners and researchers, including their technical evaluation and comparison with existing technologies. The theoretical background and experimental case studies related to real-time environment are covered as well. Aimed at Senior undergraduate students, researchers and professionals in computer science and engineering and electrical engineering, this book: Converges Blockchain, Big Data and Machine learning in one volume. Connects Blockchain technologies with the data centric applications such Big data and E-Health. Easy to understand examples on how to create your own blockchain supported by case studies of blockchain in different industries. Covers big data analytics examples using R. Includes lllustrative examples in python for blockchain creation.

IoT Security Paradigms and Applications - Research and Practices (Hardcover): Sudhir Kumar Sharma, Bharat Bhushan, Narayan C... IoT Security Paradigms and Applications - Research and Practices (Hardcover)
Sudhir Kumar Sharma, Bharat Bhushan, Narayan C Debnath
R4,361 Discovery Miles 43 610 Ships in 12 - 17 working days

Integration of IoT (Internet of Things) with big data and cloud computing has brought forward numerous advantages and challenges such as data analytics, integration, and storage. This book highlights these challenges and provides an integrating framework for these technologies, illustrating the role of blockchain in all possible facets of IoT security. Furthermore, it investigates the security and privacy issues associated with various IoT systems along with exploring various machine learning-based IoT security solutions. This book brings together state-of-the-art innovations, research activities (both in academia and in industry), and the corresponding standardization impacts of 5G as well. Aimed at graduate students, researchers in computer science and engineering, communication networking, IoT, machine learning and pattern recognition, this book Showcases the basics of both IoT and various security paradigms supporting IoT, including Blockchain Explores various machine learning-based IoT security solutions and highlights the importance of IoT for industries and smart cities Presents various competitive technologies of Blockchain, especially concerned with IoT security Provides insights into the taxonomy of challenges, issues, and research directions in IoT-based applications Includes examples and illustrations to effectively demonstrate the principles, algorithm, applications, and practices of security in the IoT environment

The Data-Driven Blockchain Ecosystem - Fundamentals, Applications, and Emerging Technologies (Hardcover): Alex Khang, Subrata... The Data-Driven Blockchain Ecosystem - Fundamentals, Applications, and Emerging Technologies (Hardcover)
Alex Khang, Subrata Chowdhury, Seema Sharma
R3,192 Discovery Miles 31 920 Ships in 12 - 17 working days

This book focuses on futuristic approaches and designs for real-time systems and applications, as well as the fundamental concepts of including advanced techniques and tools in models of data-driven blockchain ecosystems. The Data-Driven Blockchain Ecosystem: Fundamentals, Applications, and Emerging Technologies discusses how to implement and manage processes for releasing and delivering blockchain applications. It presents the core of blockchain technology, IoT-based and AI-based blockchain systems, and various manufacturing areas related to Industry 4.0. The book illustrates how to apply design principles to develop and manage blockchain networks, and also covers the role that cloud computing plays in blockchain applications. All major technologies involved in blockchain-embedded applications are included in this book, which makes it useful to engineering students, researchers, academicians, and professionals interested in the core of blockchain technology.

Confident Digital Content - How to Create and Manage Amazing Social Media and Web Content for a Futureproof Career (Paperback,... Confident Digital Content - How to Create and Manage Amazing Social Media and Web Content for a Futureproof Career (Paperback, 2nd Revised Edition)
Adam Waters 1
R525 R420 Discovery Miles 4 200 Save R105 (20%) Ships in 5 - 10 working days

Are you considering a career in social media? Are you an entrepreneur or freelancer looking to boost your online content marketing? Maybe you're looking for your next career pivot, or you're simply seeking skills to give your CV that competitive edge? Wherever you are in your career, Confident Digital Content can help. Covering the essentials of online content, this book takes you through everything you need to know - from how to write effectively for online platforms, to video, audio, graphic design and photography. Featuring inspiring case studies from individuals at companies including CNN International, Mumsnet, Bunster's Hot Sauce and HuffPost UK, this practical beginner's guide includes guidance on content marketing strategy, metrics and community management. This updated second edition also features advice on the latest trends, including fake news, the importance of stories, and social listening analysis, and a new chapter on campaign planning for digital. Though trends, fads and hashtags change, the principles of great online content remain the same - let Confident Digital Content give you the grounding you need to ace your social channels and supercharge your career. About the Confident series... From coding and web design to data, digital content and cyber security, the Confident books are the perfect beginner's resource for enhancing your professional life, whatever your career path.

Data Publics - Public Plurality in an Era of Data Determinacy (Hardcover): Peter Moertenboeck, Helge Mooshammer Data Publics - Public Plurality in an Era of Data Determinacy (Hardcover)
Peter Moertenboeck, Helge Mooshammer
R3,920 Discovery Miles 39 200 Ships in 12 - 17 working days

Data has emerged as a key component that determines how interactions across the world are structured, mediated and represented. This book examines these new data publics and the areas in which they become operative, via analysis of politics, geographies, environments and social media platforms. By claiming to offer a mechanism to translate every conceivable occurrence into an abstract code that can be endlessly manipulated, digitally processed data has caused conventional reference systems which hinge on our ability to mark points of origin, to rapidly implode. Authors from a range of disciplines provide insights into such a political economy of data capitalism; the political possibilities of techno-logics beyond data appropriation and data refusal; questions of visual, spatial and geographical organization; emergent ways of life and the environments that sustain them; and the current challenges of data publics, which is explored via case studies of three of the most influential platforms in the social media economy today: Facebook, Instagram and Whatsapp. Data Publics will be of great interest to academics and students in the fields of computer science, philosophy, sociology, media and communication studies, architecture, visual culture, art and design, and urban and cultural studies.

Selfies - Why We Love (and Hate) Them (Paperback): Katrin Tiidenberg Selfies - Why We Love (and Hate) Them (Paperback)
Katrin Tiidenberg
R542 Discovery Miles 5 420 Ships in 9 - 15 working days

This book brings a rich and nuanced analysis of selfie culture. It shows how selfies gain their meanings, illustrates different selfie practices, explores how selfies make us feel and why they have the power to make us feel anything, and unpacks how selfie practices and selfie related norms have changed or might change in the future. As humans, we have a long history of being drawn to images, of communicating visually, and being enchanted with (our own) faces. Every day we share hundreds of millions of photos on Facebook, Instagram and Snapchat. Selfies are continually and passionately talked about. People take vast amounts of selfies, and generate more attention than most other social media content. But selfies are persistently attacked as being unworthy of all of this attention: they lack artistic merit; indicate a pathological fascination with one's self; or attribute to dangerously stupid behaviour. This book explores the social, cultural and technological context surrounding selfies and their subsequent meaning.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Regulating Social Network Sites - Data…
Asma Vranaki Hardcover R3,147 Discovery Miles 31 470
Selfies, Sexts And Smartphones - A…
Emma Sadleir Paperback R270 R211 Discovery Miles 2 110
Computational Legal Studies - The…
Ryan Whalen Hardcover R3,661 Discovery Miles 36 610
Like, Comment, Subscribe - Inside…
Mark Bergen Paperback R350 R277 Discovery Miles 2 770
Digital Platforms and Global Law
Fabio Bassan Hardcover R2,487 Discovery Miles 24 870
IT Contracts and Dispute Management - A…
Steven Baker, Lawrence Akka, … Hardcover R5,696 Discovery Miles 56 960
WFH: Working From Home - How To Build A…
Harriet Minter Paperback R355 R280 Discovery Miles 2 800
Tomorrow, and Tomorrow, and Tomorrow…
Gabrielle Zevin Paperback  (1)
R465 R391 Discovery Miles 3 910
Squishmallows Official Collectors' Guide
Squishmallows Hardcover R337 Discovery Miles 3 370
The Secret History of Mac Gaming…
Bitmap Books Hardcover R934 Discovery Miles 9 340

 

Partners