Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Social & legal aspects of computing > General
Most of the business sectors consider the Digital Twin concept as the next big thing in the industry. A current state analysis of their digital counterparts helps in the prediction of the future of physical assets. Organizations obtain better insights on their product performance through the implementation of Digital Twins, and the applications of the technology are frequently in sectors such as manufacturing, automobile, retail, health care, smart cities, industrial IoT, etc. This book explores the latest developments and covers the significant challenges, issues, and advances in Digital Twin Technology. It will be an essential resource for anybody involved in related industries, as well as anybody interested in learning more about this nascent technology. This book includes: The future, present, and past of Digital Twin Technology. Digital twin technologies across the Internet of Drones, which developed various perceptive and autonomous capabilities, towards different control strategies such as object detection, navigation, security, collision avoidance, and backup. These approaches help to deal with the expansive growth of big data solutions. The recent digital twin concept in agriculture, which offers the vertical framing by IoT installation development to enhance the problematic food supply situation. It also allows for significant energy savings practices. It is highly required to overcome those challenges in developing advanced imaging methods of disease detection & prediction to achieve more accuracy in large land areas of crops. The welfare of upcoming archetypes such as digitalization in forensic analysis. The ideas of digital twin have arisen to style the corporeal entity and associated facts reachable software and customers over digital platforms. Wind catchers as earth building: Digital Twins vs. green sustainable architecture.
The book Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures (R) covers a wide range of research topics on the security of the Internet of Things nodes along with the latest research development in the domain of Internet of Things. It also covers various algorithms, techniques, and schemes in the field of computer science with state-of-the-art tools and technologies. This book mainly focuses on the security challenges of the Internet of Things devices and the countermeasures to overcome security vulnerabilities. Also, it highlights trust management issues on the Internet of Things nodes to build secured Internet of Things systems. The book also covers the necessity of a system model for the Internet of Things devices to ensure security at the hardware level.
YouTube has afforded new ways of documenting, performing and circulating musical creativity. This first sustained exploration of YouTube and music shows how record companies, musicians and amateur users have embraced YouTube's potential to promote artists, stage performances, build artistic (cyber)identity, initiate interactive composition, refresh music pedagogy, perform fandom, influence musical tourism and soundtrack our everyday lives. Speaking from a variety of perspectives, musicologists, film scholars, philosophers, new media theorists, cultural geographers and psychologists use case studies to situate YouTube as a vital component of contemporary musical culture. This book works together with its companion text Remediating Sound: Repeatable Culture, YouTube and Music.
This important new book explores contemporary concerns about the protection of national security. It examines the role, influence, and impact of Big Tech on politics, power, and individual rights. The volume considers the manner in which digital technology and its business models have shaped public policy and charts its future course. In this vital text for legislators and policymakers, Andrea Monti and Raymond Wacks draw on several case studies to analyse the changing nature of national security and revisit the traditional idea of the sovereignty of the State. They highlight some of the limitations of the conventional understanding of public policy, national security, and the rule of law to reveal the role of digital technology as an enabler as well as discriminator in governance and social disorder. Further, the chapters in the book explore the tenuous balance between individual freedom and national security; the key role of data protection in safeguarding digital data; Big Tech's appropriation of national security policy; the debate relating to datagathering technologies and encryption; and offers an unsettling answer to the question 'what is a leak?' A stimulating read, this key text will be of immense interest to scholars of politics, cyberculture, and national security, as well as to policy analysts, lawyers, and journalists.
Boards and business leaders expect their key advisors to deliver fresh insights, and increasingly expect them to demonstrate foresight. To achieve what is expected, it is crucial to understand the dynamics of conversations in the boardroom and around the audit committee table. This book provides those unique perspectives. The journey from the 'mailroom to the boardroom' follows the story of a young banker who moved into the internal auditing profession as part of the 'new breed', then rose through the ranks into senior leadership and chief audit executive roles, before assuming audit committee and board roles that had an immense influence on governance, risk, compliance, and audit professionals. Success does not always follow a smooth and uneventful trajectory, and this story reflects insights from both the ups and the downs of the journey. Each chapter shares insights, better practices, case studies, practical examples, and real-life challenges and draws them together into 101 building blocks, each one providing crucial career-long learnings. The storytelling provides insights to people at all levels on the importance of positioning oneself to step into leadership roles, helps them understand how to evaluate and pursue potential career growth opportunities, provides tips on how to holistically manage and advance their career, and inspires higher-level thinking that enhances governance, risk, compliance and audit practices.
Highlights cultural differences in terms of Quality of Life Provides a guide to the current field of global well-being and to future research Suggests improvements in Quality of Life Recognizes the presence of cultural differences resulting from social status, age, gender, class, race, and ethnicity Offers background information for governments, professionals, and policy makers
Software Quality Assurance: Integrating Testing, Security, and Audit focuses on the importance of software quality and security. It defines various types of testing, recognizes factors that propose value to software quality, and provides theoretical and real-world scenarios that offer value and contribute quality to projects and applications. The practical synopsis on common testing tools helps readers who are in testing jobs or those interested in pursuing careers as testers. It also helps test leaders, test managers, and others who are involved in planning, estimating, executing, and maintaining software. The book is divided into four sections: The first section addresses the basic concepts of software quality, validation and verification, and audits. It covers the major areas of software management, software life cycle, and life cycle processes. The second section is about testing. It discusses test plans and strategy and introduces a step-by-step test design process along with a sample test case. It also examines what a tester or test lead needs to do before and during test execution and how to report after completing the test execution. The third section deals with security breaches and defects that may occur. It discusses documentation and classification of incidences as well as how to handle an occurrence. The fourth and final section provides examples of security issues along with a security policy document and addresses the planning aspects of an information audit. This section also discusses the definition, measurement, and metrics of reliability based on standards and quality metrics methodology CMM models. It discusses the ISO 15504 standard, CMMs, PSP, and TSP and includes an appendix containing a software process improvement sample document.
A step-by-step guide for succeeding on the for ''business'' social media network "LinkedIn Marketing: An Hour a Day" helps you create, customize, and optimize a presence on LinkedIn, the world's largest social network for professionals. In this detailed, step-by-step book, LinkedIn expert Viveka von Rosen reveals how to use this powerful platform to ensure that you or your company get noticed by the right audience. Discover previously undocumented tips and tricks for community growth and management, including how to best use Groups, events, and other LinkedIn features and applications.Offers a complete resource for anyone who wants to market and recruit on the world's largest professional network Features hands-on tutorials, case studies, examples, tips, and tactics Reveals how to monitor and maintain a vibrant LinkedIn presence Includes effective tactics for recruiters, job seekers, and entrepreneurs, as well as legal, real estate, and nonprofit professionals Incorporates an exploration of the LinkedIn advertising platform, API, and mobile platform This soup-to-nuts guidebook for tackling every stage of the LinkedIn process ensures your online presence will get noticed.
A Sensible Guide to Program Management Professional (PgMP) (R) Success is for program managers preparing to take the PgMP exam based on The Standard for Program Management - 4th Edition (PgM4 Standard). It is designed for busy professionals whose responsibilities have taken them into the realm of coordinating, facilitating, managing, and leading programs. Program managers are leaders who are directly managing large amounts of project resources for their organizations. This study guide addresses three main concerns facing PgMP exam candidates: What are the essential concepts, processes, and tools that form the foundation of today's program management? Since program management is still an emerging profession with professionals often working in different ways, what does this mean for a "standard" exam? More specifically, how does that impact your ability to pass the PgMP exam? What is the best way to prepare for the PgMP exam? To address the first concern, this book highlights the underlying rationale for program management: why it exists in organizations; why it is becoming ever more important; what programs are, especially for the purpose of passing the exam; how to think like a portfolio manager; and what the most important concepts, processes, and tools are for this profession. By simplifying complex ideas and communicating them in plain English with relevant examples, this book aims to help readers not only to pass the PgMP exam but also to serve as an essential guide for program managers. For the second concern, this book differs from other study guides by describing the author's personal experience as a program manager and addressing the most pressing questions for each of the performance domains in The Standard for Program Management. To address the last concern, this book contains 420 practice questions, access to an online exam simulator and an online PgMP community, and a time-tested approach for passing the PgMP exam.
This book critically assesses how the rise of the collaborative economy in the European Union Digital Single Market is disrupting consolidated legal acquisitions, such as classical internal market categories, as well as the applicability of consumer protection, data protection, and labour and competition law. It argues that the collaborative economy will, sooner or later, require some sort of regulatory intervention from the European Union. This regulatory intervention, far from stifling innovation, will benefit online platforms, service providers and users by providing them with a clearer and more predictable environment in which to conduct their business. Although primarily intended for academics, this book also appeals to a wider readership, including, but not limited to, national and international regulators, private firms and lobbies as well as online platforms, consumer associations and trade unions.
Make friends and sell things to people through social media Social media technology is restlessly inventive, providing thousands of awesome ways for you to market your business inexpensively and on a large scale--often directly into the pockets of consumers. But in the proliferating, ever-changing world of tweets, influencers, handles, and alerts, it can be hard to know where to begin and then to evaluate what's actually working for you. In the new edition of Social Media Marketing for Dummies, leading SMM voices Shiv Singh and Stephanie Diamond clear away the confusion and show you the smartest, most effective ways to plan, launch, manage, and assess your campaigns--and then iterate and optimize for increased success. Incorporating the latest trends and presented in a friendly, easily digestible step-by-step style, you'll find the ultimate blueprint for developing your best SMM strategy. In no time, you'll find out how to line up with Facebook, Twitter, Tumblr, and Google, develop a unique and compelling voice, and influence your key audience all the way to the bank. Choose the best SMM combination for you Avoid common mistakes and pitfalls Track your customers from awareness to retention Try out the latest stuff that really works Whether your organization is large or small, it simply doesn't pay to be shy. Find your voice, get social, and chat your way to attracting and keeping new customers today!
In today's society where the development of digital technologies is emerging, it is important to take into consideration the development of individual wellbeing when it comes to engagement with the digital environment. This book represents one of the first scientific attempts to understand how the rapid deployment of digital technologies and their uptake by society have modified our relationships with ourselves, each other, and our environment. As a result, our individual and social wellbeing are now intimately connected with the state of our information environment and the digital technologies that mediate our interaction with it, which poses pressing ethical questions concerning the impact of digital technologies on our wellbeing that need to be addressed.
Examining Internet culture in the People's Republic of China, Taiwan, Hong Kong, and the US, this book analyzes videos which entertain both English and Chinese-speaking viewers to gain a better understanding of cultural similarities and differences. Each of the chapters in the volume studies streaming videos from YouTube and its Chinese counterparts, Todou and Youku, with the book using a combination of interpretative analysis of content, commentary, and ethnographic interviews. Employing a diverse range of examples, from Michael Jackson musical mash-ups of Cultural Revolution visuals, to short clips of Hitler ranting about twenty-first century issues with Chinese subtitles, this book goes on to explore the ways in which traditional beliefs regarding gender, romance, religion, and politics intersect. Looking at how these issues have changed over the years in response to new technologies and political economies, it also demonstrates how they engage in regional, transnational, and global dialogues. Comparing and incorporating the production of videos with traditional media, such as television and cinema, Internet Video Culture in China will be useful to students and scholars of Internet and digital anthropology, as well as Cultural Studies and Chinese Studies more generally.
The past decade has seen a dramatic increase in the amount and variety of information that is generated and stored electronically by business enterprises. Storing this increased volume of information has not been a problem to date, but as these information stores grow larger and larger, multiple challenges arise for senior management: namely, questions such as "How much is our data worth?" "Are we storing our data in the most cost-effective way?" "Are we managing our data effectively and efficiently?" "Do we know which data is most important?" "Are we extracting business insight from the right data?" "Are our data adding to the value of our business?" "Are our data a liability?" "What is the potential for monetizing our data?" and "Do we have an appropriate risk management plan in place to protect our data?" To answer these value-based questions, data must be treated with the same rigor and discipline as other tangible and intangible assets. In other words, corporate data should be treated as a potential asset and should have its own asset valuation methodology that is accepted by the business community, the accounting and valuation community, and other important stakeholder groups. Valuing Data: An Open Framework is a first step in that direction. Its purpose is to: Provide the reader with some background on the nature of data Present the common categories of business data Explain the importance of data management Report the current thinking on data valuation Offer some business reasons to value data Present an "open framework"-along with some proposed methods-for valuing data The book does not aim to prescribe exactly how data should be valued monetarily, but rather it is a "starting point" for a discussion of data valuation with the objective of developing a stakeholder consensus, which, in turn, will become accepted standards and practices.
Can security automata (robots and AIs) make moral decisions to apply force on humans correctly? If they can make such decisions, ought they be used to do so? Will security automata increase or decrease aggregate risk to humans? What regulation is appropriate? Addressing these important issues this book examines the political and technical challenges of the robotic use of force. The book presents accessible practical examples of the 'machine ethics' technology likely to be installed in military and police robots and also in civilian robots with everyday security functions such as childcare. By examining how machines can pass 'reasonable person' tests to demonstrate measurable levels of moral competence and display the ability to determine the 'spirit' as well as the 'letter of the law', the author builds upon existing research to define conditions under which robotic force can and ought to be used to enhance human security. The scope of the book is thus far broader than 'shoot to kill' decisions by autonomous weapons, and should attract readers from the fields of ethics, politics, and legal, military and international affairs. Researchers in artificial intelligence and robotics will also find it useful.
Macromedia Flash is fast becoming the Web's most widely used platform for creating rich media with animation and motion graphics, but mastering Flash isn't easy. Most entry-level books teach through simple examples that concentrate on either animation or scripting, but rarely both together. To get the most from Flash 8, you not only need to be proficient in programming/interface design, you need the creativity for story telling and the artistic insights to design fluid animation. "Flash 8: Projects for Learning Animation and Interactivity" teaches Flash design rather than simply Flash itself. With a standalone series of walkthroughs and tutorials for Flash beginners coming from a graphics field, this book teaches Flash in the context of real-world projects. Rather than learn a Flash tool for the sake of it, you learn which areas of Flash are important, and which are less used, simply by seeing how typical content is actually created. And rather than a text-heavy approach, this graphically rich book leads you through hands-on examples by illustration. Each project in the book starts with goals and broad sketches before moving to design and scripting. This helps you understand design intent - the why of the process - rather than just learning the interfaces and the how of it all. Along the way, you'll create Flash content that includes traditional animation techniques (as seen in full-length animated features), and ActionScript-based interactive animation, such as custom web site interface designs. You also learn how to combine both traditional animation techniques and ActionScript to create feature-rich Flash assets from the ground up. Co-authored by educational developers with years of experience creating compelling content, interfaces, and applications, "Flash 8: Projects for Learning Animation and Interactivity" offers a content-driven approach that is also inspiration-driven. You learn because you're accomplishing something tangible, not because you think you need to know how a tool works. If you want to understand how various features of Flash come together to create a final end design, this book provides you with both the insight and the know-how.
The globalizing world needs responsible young generations who will be agents of social development; so universities are faced with the need to design innovative educational approaches and include academic learning courses that encourage young students to develop awareness and critical thinking. The opportunities to share love, kindness and respect with the local people and all living beings and to exchange ideas, experiences, different perspectives and perceptions through interaction with the students of a university in a different country help to develop mutual learning.
Access and Control in Digital Humanities explores a range of important questions about who controls data, who is permitted to reproduce or manipulate data, and what sorts of challenges digital humanists face in making their work accessible and useful. Contributors to this volume present case studies and theoretical approaches from their experience with applications for digital technology in classrooms, museums, archives, in the field and with the general public. Offering potential answers to the issues of access and control from a variety of perspectives, the volume acknowledges that access is subject to competing interests of a variety of stakeholders. Museums, universities, archives, and some communities all place claims on how data can or cannot be shared through digital initiatives and, given the collaborative nature of most digital humanities projects, those in the field need to be cognizant of the various and often competing interests and rights that shape the nature of access and how it is controlled. Access and Control in Digital Humanities will be of interest to researchers, academics and graduate students working in a variety of fields, including digital humanities, library and information science, history, museum and heritage studies, conservation, English literature, geography and legal studies.
Being watched and watching others is a universal feature of all human societies. How does the phenomenon of surveillance affect, interact with, and change the world of business? This concise book unveils a key idea in the history and future of management. For centuries managers have claimed the right to monitor employees, but in the digital era, this management activity has become enhanced beyond recognition. Drawing on extensive research into organizational surveillance, the author distils and analyses existing thinking on the concept with his own empirical work. Drawing together perspectives from philosophy, cutting-edge social theory, and empirical research on workplace surveillance, Surveillance is the definitive introduction to an intriguing topic that will interest readers across the social sciences and beyond.
Being watched and watching others is a universal feature of all human societies. How does the phenomenon of surveillance affect, interact with, and change the world of business? This concise book unveils a key idea in the history and future of management. For centuries managers have claimed the right to monitor employees, but in the digital era, this management activity has become enhanced beyond recognition. Drawing on extensive research into organizational surveillance, the author distils and analyses existing thinking on the concept with his own empirical work. Drawing together perspectives from philosophy, cutting-edge social theory, and empirical research on workplace surveillance, Surveillance is the definitive introduction to an intriguing topic that will interest readers across the social sciences and beyond.
In a unique, and at times highly polemical way, the author demonstrates how the media generally influences thinking and what kind of content they put into peoples' heads. He aims to encourage a better understanding of oneself, one's environment, and the world but above all, a better understanding of freedom, the condition of democracy - or dictatorship. This is probably the first book in the media and communication studies which, through scientific provocation, makes the readers delve deeply into their intelligence, teaches them how to use it, and allows them to decide whether they have a weak, average, or insightful mind. The book sets one of the most important trends: it tells how the media think and how they shape their audiences.
Approximately 80 percent of the world's population now owns a cell phone, which can hold evidence or contain logs about communications concerning a crime. Cameras, PDAs, and GPS devices can also contain information related to corporate policy infractions and crimes. Aimed to prepare investigators in the public and private sectors, Digital Forensics for Handheld Devices examines both the theoretical and practical aspects of investigating handheld digital devices. This book touches on all areas of mobile device forensics, including topics from the legal, technical, academic, and social aspects of the discipline. It provides guidance on how to seize data, examine it, and prepare it as evidence for court. This includes the use of chain of custody forms for seized evidence and Faraday Bags for digital devices to prevent further connectivity and tampering of evidence. Emphasizing the policies required in the work environment, the author provides readers with a clear understanding of the differences between a corporate investigation and a criminal investigation. The book also: Offers best practices for establishing an incident response policy and seizing data from company or privately owned digital devices Provides guidance in establishing dedicated examinations free of viruses, spyware, and connections to other devices that could taint evidence Supplies guidance on determining protocols for complicated crime scenes with external media and devices that may have connected with the handheld device Considering important privacy issues and the Fourth Amendment, this book facilitates an understanding of how to use digital forensic tools to investigate the complete range of available digital devices, including flash drives, cell phones, PDAs, digital cameras, and netbooks. It includes examples of commercially available digital forensic tools and ends with a discussion of the education and certifications required for various careers in mobile device forensics.
The threat against the homeland continues and the private investigator plays a critical part in this effort. This includes in providing criminal, civil and background investigation, protective service, security consulting and electronic sweeps. The text will provide an overview of the role of private investigation in protection of the homeland and show how such skill can be utilized by business and government in this effort.
Physically Unclonable Functions (PUFs) translate unavoidable variations in certain parameters of materials, waves, or devices into random and unique signals. They have found many applications in the Internet of Things (IoT), authentication systems, FPGA industry, several other areas in communications and related technologies, and many commercial products. Statistical Trend Analysis of Physically Unclonable Functions first presents a review on cryptographic hardware and hardware-assisted cryptography. The review highlights PUF as a mega trend in research on cryptographic hardware design. Afterwards, the authors present a combined survey and research work on PUFs using a systematic approach. As part of the survey aspect, a state-of-the-art analysis is presented as well as a taxonomy on PUFs, a life cycle, and an established ecosystem for the technology. In another part of the survey, the evolutionary history of PUFs is examined, and strategies for further research in this area are suggested. In the research side, this book presents a novel approach for trend analysis that can be applied to any technology or research area. In this method, a text mining tool is used which extracts 1020 keywords from the titles of the sample papers. Then, a classifying tool classifies the keywords into 295 meaningful research topics. The popularity of each topic is then numerically measured and analyzed over the course of time through a statistical analysis on the number of research papers related to the topic as well as the number of their citations. The authors identify the most popular topics in four different domains; over the history of PUFs, during the recent years, in top conferences, and in top journals. The results are used to present an evolution study as well as a trend analysis and develop a roadmap for future research in this area. This method gives an automatic popularity-based statistical trend analysis which eliminates the need for passing personal judgments about the direction of trends, and provides concrete evidence to the future direction of research on PUFs. Another advantage of this method is the possibility of studying a whole lot of existing research works (more than 700 in this book). This book will appeal to researchers in text mining, cryptography, hardware security, and IoT.
Proof techniques in cryptography are very difficult to understand, even for students or researchers who major in cryptography. In addition, in contrast to the excessive emphases on the security proofs of the cryptographic schemes, practical aspects of them have received comparatively less attention. This book addresses these two issues by providing detailed, structured proofs and demonstrating examples, applications and implementations of the schemes, so that students and practitioners may obtain a practical view of the schemes. Seong Oun Hwang is a professor in the Department of Computer Engineering and director of Artificial Intelligence Security Research Center, Gachon University, Korea. He received the Ph.D. degree in computer science from the Korea Advanced Institute of Science and Technology (KAIST), Korea. His research interests include cryptography, cybersecurity, networks, and machine learning. Intae Kim is an associate research fellow at the Institute of Cybersecurity and Cryptology, University of Wollongong, Australia. He received the Ph.D. degree in electronics and computer engineering from Hongik University, Korea. His research interests include cryptography, cybersecurity, and networks. Wai Kong Lee is an assistant professor in UTAR (University Tunku Abdul Rahman), Malaysia. He received the Ph.D. degree in engineering from UTAR, Malaysia. In between 2009 - 2012, he served as an R&D engineer in several multinational companies including Agilent Technologies (now known as Keysight) in Malaysia. His research interests include cryptography engineering, GPU computing, numerical algorithms, Internet of Things (IoT) and energy harvesting. |
You may like...
The Hyperlinked Life (Frames Series…
Barna Group, Jun Young, …
Paperback
Data Governance in AI, FinTech and…
Joseph Lee, Aline Darbellay
Hardcover
R3,302
Discovery Miles 33 020
Legal Challenges of Big Data
Joe Cannataci, Valeria Falce, …
Hardcover
R3,496
Discovery Miles 34 960
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi
Paperback
|