![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
The book Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures (R) covers a wide range of research topics on the security of the Internet of Things nodes along with the latest research development in the domain of Internet of Things. It also covers various algorithms, techniques, and schemes in the field of computer science with state-of-the-art tools and technologies. This book mainly focuses on the security challenges of the Internet of Things devices and the countermeasures to overcome security vulnerabilities. Also, it highlights trust management issues on the Internet of Things nodes to build secured Internet of Things systems. The book also covers the necessity of a system model for the Internet of Things devices to ensure security at the hardware level.
This important new book explores contemporary concerns about the protection of national security. It examines the role, influence, and impact of Big Tech on politics, power, and individual rights. The volume considers the manner in which digital technology and its business models have shaped public policy and charts its future course. In this vital text for legislators and policymakers, Andrea Monti and Raymond Wacks draw on several case studies to analyse the changing nature of national security and revisit the traditional idea of the sovereignty of the State. They highlight some of the limitations of the conventional understanding of public policy, national security, and the rule of law to reveal the role of digital technology as an enabler as well as discriminator in governance and social disorder. Further, the chapters in the book explore the tenuous balance between individual freedom and national security; the key role of data protection in safeguarding digital data; Big Tech's appropriation of national security policy; the debate relating to datagathering technologies and encryption; and offers an unsettling answer to the question 'what is a leak?' A stimulating read, this key text will be of immense interest to scholars of politics, cyberculture, and national security, as well as to policy analysts, lawyers, and journalists.
The creative citizen unbound introduces the concept of 'creative citizenship' to explore the potential of civically-minded creative individuals in the era of social media and in the context of an expanding creative economy. Contributors examine the value and nature of creative citizenship, not only in terms of its contribution to civic life and to social capital but also to various and more contested definitions of value, both economic and cultural.
This book enables students to grasp the holistic enterprise of social media as it pertains to social, legal, marketing, and management issues. The book also helps students better understand the research process in social media scholarship and make connections with academic research and applied practice in sport studies.
The creative citizen unbound introduces the concept of `creative citizenship' to explore the potential of civically-minded creative individuals in the era of social media and in the context of an expanding creative economy. Contributors examine the value and nature of creative citizenship, not only in terms of its contribution to civic life and to social capital but also to various and more contested definitions of value, both economic and cultural.
A Sensible Guide to Program Management Professional (PgMP) (R) Success is for program managers preparing to take the PgMP exam based on The Standard for Program Management - 4th Edition (PgM4 Standard). It is designed for busy professionals whose responsibilities have taken them into the realm of coordinating, facilitating, managing, and leading programs. Program managers are leaders who are directly managing large amounts of project resources for their organizations. This study guide addresses three main concerns facing PgMP exam candidates: What are the essential concepts, processes, and tools that form the foundation of today's program management? Since program management is still an emerging profession with professionals often working in different ways, what does this mean for a "standard" exam? More specifically, how does that impact your ability to pass the PgMP exam? What is the best way to prepare for the PgMP exam? To address the first concern, this book highlights the underlying rationale for program management: why it exists in organizations; why it is becoming ever more important; what programs are, especially for the purpose of passing the exam; how to think like a portfolio manager; and what the most important concepts, processes, and tools are for this profession. By simplifying complex ideas and communicating them in plain English with relevant examples, this book aims to help readers not only to pass the PgMP exam but also to serve as an essential guide for program managers. For the second concern, this book differs from other study guides by describing the author's personal experience as a program manager and addressing the most pressing questions for each of the performance domains in The Standard for Program Management. To address the last concern, this book contains 420 practice questions, access to an online exam simulator and an online PgMP community, and a time-tested approach for passing the PgMP exam.
In today's society where the development of digital technologies is emerging, it is important to take into consideration the development of individual wellbeing when it comes to engagement with the digital environment. This book represents one of the first scientific attempts to understand how the rapid deployment of digital technologies and their uptake by society have modified our relationships with ourselves, each other, and our environment. As a result, our individual and social wellbeing are now intimately connected with the state of our information environment and the digital technologies that mediate our interaction with it, which poses pressing ethical questions concerning the impact of digital technologies on our wellbeing that need to be addressed.
Proof techniques in cryptography are very difficult to understand, even for students or researchers who major in cryptography. In addition, in contrast to the excessive emphases on the security proofs of the cryptographic schemes, practical aspects of them have received comparatively less attention. This book addresses these two issues by providing detailed, structured proofs and demonstrating examples, applications and implementations of the schemes, so that students and practitioners may obtain a practical view of the schemes. Seong Oun Hwang is a professor in the Department of Computer Engineering and director of Artificial Intelligence Security Research Center, Gachon University, Korea. He received the Ph.D. degree in computer science from the Korea Advanced Institute of Science and Technology (KAIST), Korea. His research interests include cryptography, cybersecurity, networks, and machine learning. Intae Kim is an associate research fellow at the Institute of Cybersecurity and Cryptology, University of Wollongong, Australia. He received the Ph.D. degree in electronics and computer engineering from Hongik University, Korea. His research interests include cryptography, cybersecurity, and networks. Wai Kong Lee is an assistant professor in UTAR (University Tunku Abdul Rahman), Malaysia. He received the Ph.D. degree in engineering from UTAR, Malaysia. In between 2009 - 2012, he served as an R&D engineer in several multinational companies including Agilent Technologies (now known as Keysight) in Malaysia. His research interests include cryptography engineering, GPU computing, numerical algorithms, Internet of Things (IoT) and energy harvesting.
A Sensible Guide to Program Management Professional (PgMP) (R) Success is for program managers preparing to take the PgMP exam based on The Standard for Program Management - 4th Edition (PgM4 Standard). It is designed for busy professionals whose responsibilities have taken them into the realm of coordinating, facilitating, managing, and leading programs. Program managers are leaders who are directly managing large amounts of project resources for their organizations. This study guide addresses three main concerns facing PgMP exam candidates: What are the essential concepts, processes, and tools that form the foundation of today's program management? Since program management is still an emerging profession with professionals often working in different ways, what does this mean for a "standard" exam? More specifically, how does that impact your ability to pass the PgMP exam? What is the best way to prepare for the PgMP exam? To address the first concern, this book highlights the underlying rationale for program management: why it exists in organizations; why it is becoming ever more important; what programs are, especially for the purpose of passing the exam; how to think like a portfolio manager; and what the most important concepts, processes, and tools are for this profession. By simplifying complex ideas and communicating them in plain English with relevant examples, this book aims to help readers not only to pass the PgMP exam but also to serve as an essential guide for program managers. For the second concern, this book differs from other study guides by describing the author's personal experience as a program manager and addressing the most pressing questions for each of the performance domains in The Standard for Program Management. To address the last concern, this book contains 420 practice questions, access to an online exam simulator and an online PgMP community, and a time-tested approach for passing the PgMP exam.
Become a LinkedIn power user and harness the potential of social selling With the impact of COVID, remote working has become big, and so has the use of digital/virtual sales tools. More sales teams want and need to understand how to use social media platforms like LinkedIn to sell, and most do not use it properly. The Ultimate LinkedIn Sales Guide is the go-to book and guide for utilizing LinkedIn to sell. It covers all aspects of social and digital selling, including building the ultimate LinkedIn profile, using the searching functions to find customers, sending effective LinkedIn messages (written, audio & video), creating great content that generates sales, and all the latest tips and tricks, strategies and tools. With the right LinkedIn knowledge, you can attract customers and generate leads, improving your sales numbers from the comfort and safety of your computer. No matter what you are selling, LinkedIn can connect you to buyers. If you're savvy, you can stay in touch with clients and generate more repeat sales, build trust, and create engaging content that will spread by word-of-mouth--the most powerful sales strategy around. This book will teach you how to do all that and more. In The Ultimate LinkedIn Sales Guide you will learn how to: Use the proven 4 Pillars of Social Selling Success to improve your existing LinkedIn activities or get started on a firm footing Create the Ultimate LinkedIn Profile, complete with a strong personal brand that could catapult you to industry leader status Generate leads using LinkedIn, then build and manage relationships with connected accounts to turn those leads into customers Utilize little-known LinkedIn "power tools" to grow your network, send effective messages, and write successful LinkedIn articles And so much more! The Ultimate LinkedIn Sales Guide is a must read for anyone wishing to utilise LinkedIn to improve sales.
This book explores the phenomenon of data - big and small - in the contemporary digital, informatic and legal-bureaucratic context. Challenging the way in which legal interest in data has focused on rights and privacy concerns, this book examines the contestable, multivocal and multifaceted figure of the contemporary data subject. The book analyses "data" and "personal data" as contemporary phenomena, addressing the data realms, such as stores, institutions, systems and networks, out of which they emerge. It interrogates the role of law, regulation and governance in structuring both formal and informal definitions of the data subject, and disciplining data subjects through compliance with normative standards of conduct. Focusing on the 'personal' in and of data, the book pursues a re-evaluation of the nature, role and place of the data subject qua legal subject in on and offline societies: one that does not begin and end with the inviolability of individual rights but returns to more fundamental legal principles suited to considerations of personhood, such as stewardship, trust, property and contract. The book's concern with the production, use, abuse and alienation of personal data within the context of contemporary communicative capitalism will appeal to scholars and students of law, science and technology studies, and sociology; as well as those with broader political interests in this area.
The globalizing world needs responsible young generations who will be agents of social development; so universities are faced with the need to design innovative educational approaches and include academic learning courses that encourage young students to develop awareness and critical thinking. The opportunities to share love, kindness and respect with the local people and all living beings and to exchange ideas, experiences, different perspectives and perceptions through interaction with the students of a university in a different country help to develop mutual learning.
Being watched and watching others is a universal feature of all human societies. How does the phenomenon of surveillance affect, interact with, and change the world of business? This concise book unveils a key idea in the history and future of management. For centuries managers have claimed the right to monitor employees, but in the digital era, this management activity has become enhanced beyond recognition. Drawing on extensive research into organizational surveillance, the author distils and analyses existing thinking on the concept with his own empirical work. Drawing together perspectives from philosophy, cutting-edge social theory, and empirical research on workplace surveillance, Surveillance is the definitive introduction to an intriguing topic that will interest readers across the social sciences and beyond.
Being watched and watching others is a universal feature of all human societies. How does the phenomenon of surveillance affect, interact with, and change the world of business? This concise book unveils a key idea in the history and future of management. For centuries managers have claimed the right to monitor employees, but in the digital era, this management activity has become enhanced beyond recognition. Drawing on extensive research into organizational surveillance, the author distils and analyses existing thinking on the concept with his own empirical work. Drawing together perspectives from philosophy, cutting-edge social theory, and empirical research on workplace surveillance, Surveillance is the definitive introduction to an intriguing topic that will interest readers across the social sciences and beyond.
In a unique, and at times highly polemical way, the author demonstrates how the media generally influences thinking and what kind of content they put into peoples' heads. He aims to encourage a better understanding of oneself, one's environment, and the world but above all, a better understanding of freedom, the condition of democracy - or dictatorship. This is probably the first book in the media and communication studies which, through scientific provocation, makes the readers delve deeply into their intelligence, teaches them how to use it, and allows them to decide whether they have a weak, average, or insightful mind. The book sets one of the most important trends: it tells how the media think and how they shape their audiences.
Placing contemporary technological developments in their historical context, this book argues for the importance of law in their regulation. Technological developments are focused upon overcoming physical and human constraints. There are no normative constraints inherent in the quest for ongoing and future technological development. In contrast, law proffers an essential normative constraint. Just because we can do something, does not mean that we should. Through the application of critical legal theory and jurisprudence to pro-actively engage with technology, this book demonstrates why legal thinking should be prioritised in emerging technological futures. This book articulates classic skills and values such as ethics and justice to ensure that future and ongoing legal engagements with socio-technological developments are tempered by legal normative constraints. Encouraging them to foreground questions of justice and critique when thinking about law and technology, the book addresses law students and teachers, lawyers and critical thinkers concerned with the proliferation of technology in our lives.
As an educator and researcher, I have tried to create awareness to pupils, teachers and families through seminars and workshops since 2012. I believe that Internet and social media are actually precious and useful. If individuals use digital environments consciously, they can even be counted as educational institutions. Unfortunately, most of the pupils, teachers and parents had great concerns regarding digital environments, which decreased after they obtained information about "digital citizenship". So, I decided to write a book not only for teachers or parents who guided for safety at digital environments, but also for youths to understand digital citizenship. The book is written in the hope that it would be helpful for anyone who hold concerns about digital environments.
Information Security and Optimization maintains a practical perspective while offering theoretical explanations. The book explores concepts that are essential for academics as well as organizations. It discusses aspects of techniques and tools-definitions, usage, and analysis-that are invaluable for scholars ranging from those just beginning in the field to established experts. What are the policy standards? What are vulnerabilities and how can one patch them? How can data be transmitted securely? How can data in the cloud or cryptocurrency in the blockchain be secured? How can algorithms be optimized? These are some of the possible queries that are answered here effectively using examples from real life and case studies. Features: A wide range of case studies and examples derived from real-life scenarios that map theoretical explanations with real incidents. Descriptions of security tools related to digital forensics with their unique features, and the working steps for acquiring hands-on experience. Novel contributions in designing organization security policies and lightweight cryptography. Presentation of real-world use of blockchain technology and biometrics in cryptocurrency and personalized authentication systems. Discussion and analysis of security in the cloud that is important because of extensive use of cloud services to meet organizational and research demands such as data storage and computing requirements. Information Security and Optimization is equally helpful for undergraduate and postgraduate students as well as for researchers working in the domain. It can be recommended as a reference or textbook for courses related to cybersecurity.
The aim of the monograph is to present the application and practical development of the concept of remediation. Two decades after its original proposal by J.D Bolter and R. Grusin, remediation remains one of the major tools of understanding new media. The authors of this book examine the subject from the perspective of Central and Eastern Europe. Examples are drawn from artistic and literary practices in Croatia, Czech Republic, Poland, Russia, Slovakia and Slovenia. Theoretical frameworks solidify and extend the concept of remediation to new phenomena and areas of critical discourse, from biomedia and genetic transcoding to the remediation of textual media in Catholic Liturgy. As a result, the notion of medium, the nature of mediation and the essence of storytelling are redefined.
The crypto wars have raged for half a century. In the 1970s, digital privacy activists prophesied the emergence of an Orwellian State, made possible by computer-mediated mass surveillance. The antidote: digital encryption. The U.S. government warned encryption would not only prevent surveillance of law-abiding citizens, but of criminals, terrorists, and foreign spies, ushering in a rival dystopian future. Both parties fought to defend the citizenry from what they believed the most perilous threats. The government tried to control encryption to preserve its surveillance capabilities; privacy activists armed citizens with cryptographic tools and challenged encryption regulations in the courts. No clear victor has emerged from the crypto wars. Governments have failed to forge a framework to govern the, at times conflicting, civil liberties of privacy and security in the digital age-an age when such liberties have an outsized influence on the citizen-State power balance. Solving this problem is more urgent than ever. Digital privacy will be one of the most important factors in how we architect twenty-first century societies-its management is paramount to our stewardship of democracy for future generations. We must elevate the quality of debate on cryptography, on how we govern security and privacy in our technology-infused world. Failure to end the crypto wars will result in societies sleepwalking into a future where the citizen-State power balance is determined by a twentieth-century status quo unfit for this century, endangering both our privacy and security. This book provides a history of the crypto wars, with the hope its chronicling sets a foundation for peace.
The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts from around the world who contribute their knowledge regarding different IoT security aspects. It answers the question "How do we use efficient algorithms, models, and implementations to cover the four important aspects of IoT security, i.e., confidentiality, authentication, integrity, and availability?" The book consists of five parts covering attacks and threats, privacy preservation, trust and authentication, IoT data security, and social awareness. The first part introduces all types of IoT attacks and threats and demonstrates the principle of countermeasures against those attacks. It provides detailed introductions to specific attacks such as malware propagation and Sybil attacks. The second part addresses privacy-preservation issues related to the collection and distribution of data, including medical records. The author uses smart buildings as an example to discuss privacy-protection solutions. The third part describes different types of trust models in the IoT infrastructure, discusses access control to IoT data, and provides a survey of IoT authentication issues. The fourth part emphasizes security issues during IoT data computation. It introduces computational security issues in IoT data processing, security design in time series data aggregation, key generation for data transmission, and concrete security protocols during data access. The fifth and final part considers policy and human behavioral features and covers social-context-based privacy and trust design in IoT platforms as well as policy-based informed consent in the IoT.
Biometrics in a Data Driven World: Trends, Technologies, and Challenges aims to inform readers about the modern applications of biometrics in the context of a data-driven society, to familiarize them with the rich history of biometrics, and to provide them with a glimpse into the future of biometrics. The first section of the book discusses the fundamentals of biometrics and provides an overview of common biometric modalities, namely face, fingerprints, iris, and voice. It also discusses the history of the field, and provides an overview of emerging trends and opportunities. The second section of the book introduces readers to a wide range of biometric applications. The next part of the book is dedicated to the discussion of case studies of biometric modalities currently used on mobile applications. As smartphones and tablet computers are rapidly becoming the dominant consumer computer platforms, biometrics-based authentication is emerging as an integral part of protecting mobile devices against unauthorized access, while enabling new and highly popular applications, such as secure online payment authorization. The book concludes with a discussion of future trends and opportunities in the field of biometrics, which will pave the way for advancing research in the area of biometrics, and for the deployment of biometric technologies in real-world applications. The book is designed for individuals interested in exploring the contemporary applications of biometrics, from students to researchers and practitioners working in this field. Both undergraduate and graduate students enrolled in college-level security courses will also find this book to be an especially useful companion.
In today's global and digitalized world, the investigation of relational trust as part of social connections has remained a popular and interdisciplinary academic topic. This book explores the idea of trust as a basic type of information processing that might be as old as human existence but has gained new attention with the emergence of online communication channels. The result is a strategic reconsideration of the brain's role in the formation of social relationships and a new look at how information might shape our confidence in others. |
You may like...
Research Handbook on the Law and…
Ioannis Kokkoris, Claudia Lemus
Hardcover
R7,193
Discovery Miles 71 930
IT Contracts and Dispute Management - A…
Steven Baker, Lawrence Akka, …
Hardcover
R6,463
Discovery Miles 64 630
|