Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Social & legal aspects of computing > General
The aim of the monograph is to present the application and practical development of the concept of remediation. Two decades after its original proposal by J.D Bolter and R. Grusin, remediation remains one of the major tools of understanding new media. The authors of this book examine the subject from the perspective of Central and Eastern Europe. Examples are drawn from artistic and literary practices in Croatia, Czech Republic, Poland, Russia, Slovakia and Slovenia. Theoretical frameworks solidify and extend the concept of remediation to new phenomena and areas of critical discourse, from biomedia and genetic transcoding to the remediation of textual media in Catholic Liturgy. As a result, the notion of medium, the nature of mediation and the essence of storytelling are redefined.
The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures.To accomplish this, the team of security professionals from VeriSign's iDefense Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security, its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff. Providing a fundamental understanding of the theory behind the key issues impacting cyber security, the book: Covers attacker methods and motivations, exploitation trends, malicious code techniques, and the latest threat vectors Addresses more than 75 key security concepts in a series of concise, well-illustrated summaries designed for most levels of technical understanding Supplies actionable advice for the mitigation of threats Breaks down the code used to write exploits into understandable diagrams This book is not about the latest attack trends or botnets. It's about the reasons why these problems continue to plague us. By better understanding the logic presented in these pages, readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the threats and attacks on the horizon.
In today's global and digitalized world, the investigation of relational trust as part of social connections has remained a popular and interdisciplinary academic topic. This book explores the idea of trust as a basic type of information processing that might be as old as human existence but has gained new attention with the emergence of online communication channels. The result is a strategic reconsideration of the brain's role in the formation of social relationships and a new look at how information might shape our confidence in others.
Information Security and Optimization maintains a practical perspective while offering theoretical explanations. The book explores concepts that are essential for academics as well as organizations. It discusses aspects of techniques and tools-definitions, usage, and analysis-that are invaluable for scholars ranging from those just beginning in the field to established experts. What are the policy standards? What are vulnerabilities and how can one patch them? How can data be transmitted securely? How can data in the cloud or cryptocurrency in the blockchain be secured? How can algorithms be optimized? These are some of the possible queries that are answered here effectively using examples from real life and case studies. Features: A wide range of case studies and examples derived from real-life scenarios that map theoretical explanations with real incidents. Descriptions of security tools related to digital forensics with their unique features, and the working steps for acquiring hands-on experience. Novel contributions in designing organization security policies and lightweight cryptography. Presentation of real-world use of blockchain technology and biometrics in cryptocurrency and personalized authentication systems. Discussion and analysis of security in the cloud that is important because of extensive use of cloud services to meet organizational and research demands such as data storage and computing requirements. Information Security and Optimization is equally helpful for undergraduate and postgraduate students as well as for researchers working in the domain. It can be recommended as a reference or textbook for courses related to cybersecurity.
A heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the foundation of security. This book sheds light upon security threats, defenses, and remediation on various networking and data processing domains, including wired networks, wireless networks, mobile ad-hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control. The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at: Access control methods in cloud-enabled Internet of Things Secure routing algorithms for mobile ad-hoc networks Building security trust in mobile ad-hoc networks using soft computing methods The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain Password authentication and keystroke biometrics Health care data analytics over Big Data Bluetooth: and its open issues for managing security services in heterogenous networks Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace.
This book contributes to the discourse about science communication strategies from different perspectives. It provides models, projects and case studies of international academicians and practitioners from different fields. The book is divided into two parts. The first part sets the focus on case studies and best practises of science communication and storytelling. The second part presents 40 different popular science texts about different topics written by students within the scope of the course "Science Writing and Journalism" in the Department of Communication and Design at Bilkent University in Ankara. The students wrote popular science texts based on academic papers and sources and present them with a big variety of popularization strategies.
The crypto wars have raged for half a century. In the 1970s, digital privacy activists prophesied the emergence of an Orwellian State, made possible by computer-mediated mass surveillance. The antidote: digital encryption. The U.S. government warned encryption would not only prevent surveillance of law-abiding citizens, but of criminals, terrorists, and foreign spies, ushering in a rival dystopian future. Both parties fought to defend the citizenry from what they believed the most perilous threats. The government tried to control encryption to preserve its surveillance capabilities; privacy activists armed citizens with cryptographic tools and challenged encryption regulations in the courts. No clear victor has emerged from the crypto wars. Governments have failed to forge a framework to govern the, at times conflicting, civil liberties of privacy and security in the digital age-an age when such liberties have an outsized influence on the citizen-State power balance. Solving this problem is more urgent than ever. Digital privacy will be one of the most important factors in how we architect twenty-first century societies-its management is paramount to our stewardship of democracy for future generations. We must elevate the quality of debate on cryptography, on how we govern security and privacy in our technology-infused world. Failure to end the crypto wars will result in societies sleepwalking into a future where the citizen-State power balance is determined by a twentieth-century status quo unfit for this century, endangering both our privacy and security. This book provides a history of the crypto wars, with the hope its chronicling sets a foundation for peace.
If business functions such as management, human resources, logistics and finance cannot manage digital transformation well, there may be a danger of extinction for companies. In the future, business life will continue to be affected by digital transformation. In this long journey, it is necessary to consider digital transformation as a moving target, a strategy that is constantly evolving, changing and needs to be updated. For this reason, businesses that have not yet implemented their digital transformation strategies or are still doing so need to know the challenges they will face in digital transformation. The book aims to address the dark points that businesses should pay attention to rather than the benefits of digital transformation.
Enterprise servers play a mission-critical role in modern computing environments, especially from a business continuity perspective. Several models of IT capability have been introduced over the last two decades. Enhancing Business Continuity and IT Capability: System Administration and Server Operating Platforms proposes a new model of IT capability. It presents a framework that establishes the relationship between downtime on one side and business continuity and IT capability on the other side, as well as how system administration and modern server operating platforms can help in improving business continuity and IT capability. This book begins by defining business continuity and IT capability and their importance in modern business, as well as by giving an overview of business continuity, disaster recovery planning, contingency planning, and business continuity maturity models. It then explores modern server environments and the role of system administration in ensuring higher levels of system availability, system scalability, and business continuity. Techniques for enhancing availability and business continuity also include Business impact analysis Assessing the downtime impact Designing an optimal business continuity solution IT auditing as a process of gathering data and evidence to evaluate whether the company's information systems infrastructure is efficient and effective and whether it meets business goals The book concludes with frameworks and guidelines on how to measure and assess IT capability and how IT capability affects a firm's performances. Cases and white papers describe real-world scenarios illustrating the concepts and techniques presented in the book.
Surfing the Anthropocene shows how the "big tension" between the speed and scale of digital media characterizes affective life on the public screen today. An innovative look launched in the wake of the 2016 US presidential election, Eric S. Jenkins illustrates how the big tension is reflected in how we feel and talk about digital media. Exploring a variety of modes from following news on Twitter to discussion on Facebook, activism to witnessing police shooting videos, the book demonstrates how responses to the big tension make political activity more like videogames, with an "immeditative" temporality and "attentional" spatiality contrasted with meditative and tending modes such as gardening. As a near-monoculture of immeditative, attentional modes emerge, consumerism and affect privilege become reinforced in ways that make addressing the problems of the Anthropocene especially draining and difficult. Original concepts throughout the book, including the big tension but also the affected subject, translucency, and homo modus, are sure to influence thinking about digital media. If you wonder why life today feels particularly urgent, heated, and intense, Surfing the Anthropocene offers a compelling answer-the big tension-as well as a way to reimagine digital experience with an eye towards surviving, rather than just surfing, the Anthropocene.
Surfing the Anthropocene shows how the "big tension" between the speed and scale of digital media characterizes affective life on the public screen today. An innovative look launched in the wake of the 2016 US presidential election, Eric S. Jenkins illustrates how the big tension is reflected in how we feel and talk about digital media. Exploring a variety of modes from following news on Twitter to discussion on Facebook, activism to witnessing police shooting videos, the book demonstrates how responses to the big tension make political activity more like videogames, with an "immeditative" temporality and "attentional" spatiality contrasted with meditative and tending modes such as gardening. As a near-monoculture of immeditative, attentional modes emerge, consumerism and affect privilege become reinforced in ways that make addressing the problems of the Anthropocene especially draining and difficult. Original concepts throughout the book, including the big tension but also the affected subject, translucency, and homo modus, are sure to influence thinking about digital media. If you wonder why life today feels particularly urgent, heated, and intense, Surfing the Anthropocene offers a compelling answer-the big tension-as well as a way to reimagine digital experience with an eye towards surviving, rather than just surfing, the Anthropocene.
Melvin Greer and Kevin Jackson have assembled a comprehensive guide to industry-specific cybersecurity threats and provide a detailed risk management framework required to mitigate business risk associated with the adoption of cloud computing. This book can serve multiple purposes, not the least of which is documenting the breadth and severity of the challenges that today's enterprises face, and the breadth of programmatic elements required to address these challenges. This has become a boardroom issue: Executives must not only exploit the potential of information technologies, but manage their potential risks. Key Features * Provides a cross-industry view of contemporary cloud computing security challenges, solutions, and lessons learned * Offers clear guidance for the development and execution of industry-specific cloud computing business and cybersecurity strategies * Provides insight into the interaction and cross-dependencies between industry business models and industry-specific cloud computing security requirements
The use of new information and communication technologies both inside the courts and in private online dispute resolution services is quickly changing everyday conflict management. However, the implications of the increasingly disruptive role of technology in dispute resolution remain largely undiscussed. In this book, assistant professor of law and digitalisation Riikka Koulu examines the multifaceted phenomenon of dispute resolution technology, focusing specifically on private enforcement, which modern technology enables on an unforeseen scale. The increase in private enforcement confounds legal structures and challenges the nation-state's monopoly on violence. And, in this respect, the author argues that the technology-driven privatisation of enforcement - from direct enforcement of e-commerce platforms to self-executing smart contracts in the blockchain - brings the ethics of law's coercive nature out into the open. This development constitutes a new, and dangerous, grey area of conflict management, which calls for transparency and public debate on the ethical implications of dispute resolution technology.
This book aims to indicate several problems related to apparent ideology understandings that are accepted in communication studies. To this end, we endeavored to touch on produced meanings and power of ideology within media that has transformed in Turkey as from 2000. Samples from different channels of Turkish media rather than theoretical discussion were chosen to trace ideological structurings within Turkish media. It was also cared for studies in the book to complete each other; by this means, we also wanted to provide convenience for the reader to comprehend the ideological structuring of transformation in Turkish media after 2000.
*2021 Financial Times Best Book of the Year* A bold exploration and call-to-arms over the widening gap between AI, automation, and big data--and our ability to deal with its effects We are living in the first exponential age. High-tech innovations are created at dazzling speeds; technological forces we barely understand remake our homes and workplaces; centuries-old tenets of politics and economics are upturned by new technologies. It all points to a world that is getting faster at a dizzying pace. Azeem Azhar, renowned technology analyst and host of the Exponential View podcast, offers a revelatory new model for understanding how technology is evolving so fast, and why it fundamentally alters the world. He roots his analysis in the idea of an "exponential gap" in which technological developments rapidly outpace our society's ability to catch up. Azhar shows that this divide explains many problems of our time--from political polarization to ballooning inequality to unchecked corporate power. With stunning clarity of vision, he delves into how the exponential gap is a near-inevitable consequence of the rise of AI, automation, and other exponential technologies, like renewable energy, 3D printing, and synthetic biology, which loom over the horizon. And he offers a set of policy solutions that can prevent the growing exponential gap from fragmenting, weakening, or even destroying our societies. The result is a wholly new way to think about technology, one that will transform our understanding of the economy, politics, and the future.
Owing to the proliferation of screens and networked culture, young fans have moved beyond being simply media consumers. Today they are content interpreters and creators-living in a remix culture, reconstructing transmedia narratives, and interacting with culture industries. Young fans' relationship to technology has transformed their discourses, interpersonal relationships, and the way they participate in communities. This book delves into these issues, looking at social and cultural approaches to human development to study the identities and activities of fan communities among young people. The book explores communities related to Harry Potter, One Direction, Fortnite, Warhammer, TikTok, and television programs. Drawing on an ethnographic approach and big data analysis, Adolescent Fans demonstrates how digital technology has changed not only fan behavior, but also research practices used to understand what it means to be a young fan.
Owing to the proliferation of screens and networked culture, young fans have moved beyond being simply media consumers. Today they are content interpreters and creators-living in a remix culture, reconstructing transmedia narratives, and interacting with culture industries. Young fans' relationship to technology has transformed their discourses, interpersonal relationships, and the way they participate in communities. This book delves into these issues, looking at social and cultural approaches to human development to study the identities and activities of fan communities among young people. The book explores communities related to Harry Potter, One Direction, Fortnite, Warhammer, TikTok, and television programs. Drawing on an ethnographic approach and big data analysis, Adolescent Fans demonstrates how digital technology has changed not only fan behavior, but also research practices used to understand what it means to be a young fan.
In sub-Saharan Africa, mobile technology has developed at a rapid pace and the numbers of mobile users have increased faster than those in the rest of the world. The underlying question of how mobile journalism and social media may support African citizens and contribute to social change forms the basis of this book. A qualitative content analysis provides the methodological framework to interpret the interviews with professional and citizen journalists and media experts. The results suggest that mobile and social media contribute to the plurality of journalism in Zimbabwe, Zambia and South Africa. Mobile and social media reporters are aware of ethical questions and journalistic standards; at the same time, they connect with local communities and adopt an advocative and subjective approach.
This book aims to bring to the reader an overview of different applications of brain-computer interfaces (BCIs) based on more than 20 years of experience working on these interfaces. The author provides a review of the human brain and EEG signals, describing the human brain, anatomically and physiologically, with the objective of showing some of the patterns of EEG (electroencephalogram) signals used to control BCIs. It then introduces BCIs and different applications, such as a BCI based on ERD/ERS Patterns in rhythms (used to command a robotic wheelchair with an augmentative and alternative communication (AAC) system onboard it); a BCI based on dependent-SSVEP to command the same robotic wheelchair; a BCI based on SSVEP to command a telepresence robot and its onboard AAC system; a BCI based on SSVEP to command an autonomous car; a BCI based on independent-SSVEP (using Depth-of-Field) to command the same robotic wheelchair; the use of compressive technique in SSVEP-based BCI; a BCI based on motor imagery (using different techniques) to command a robotic monocycle and a robotic exoskeleton; and the first steps to build a neurorehabilitation system based on motor imagery of pedalling together an in immersive virtual environment. This book is intended for researchers, professionals and students working on assistive technology.
Putting technology front and centre in our thinking about law, this book introduces Law 3.0: the future of the legal landscape. Technology not only disrupts the traditional idea of what it is 'to think like a lawyer,' as per Law 1.0; it presents major challenges to regulators who are reasoning in a Law 2.0 mode. As this book demonstrates, the latest developments in technology offer regulators the possibility of employing a technical fix rather than just relying on rules - thus, we are introducing Law 3.0. Law 3.0 represents, so to speak, the state we are in and the conversation that we now need to have, and this book identifies some of the key points for discussion in that conversation. Thinking like a lawyer might continue to be associated with Law 1.0, but from 2020 onward, Law 3.0 is the conversation that we all need to join. And, as this book argues, law and the evolution of legal reasoning cannot be adequately understood unless we grasp the significance of technology in shaping both legal doctrine and our regulatory thinking. This is a book for those studying, or about to study, law - as well as others with interests in the legal, political, and social impact of technology.
The Crypto Market Ecosystem has emerged as the most profound application of blockchain technology in finance. This textbook adopts an integrated approach, linking traditional functions of the current financial system (payments, traded assets, fundraising, regulation) with the respective functions in the crypto market, in order to facilitate the reader in their understanding of how this new ecosystem works. The book walks the reader through the main features of the blockchain technology, the definitions, classifications, and distinct characteristics of cryptocurrencies and tokens, how these are evaluated, how funds are raised in the cryptocurrency ecosystem (ICOs), and what the main regulatory approaches are. The authors have compiled more than 100 sources from different sub-fields of economics, finance, and regulation to create a coherent textbook that provides the reader with a clear and easily understandable picture of the new world of encrypted finance and its applications. The book is primarily aimed at business and finance students, who already have an understanding of the basic principles of how the financial system works, but also targets a more general readership, by virtue of its broader scope and engaging and accessible tone.
This book investigates how social media are reconfiguring dying, death, and mourning. Taking a narrative approach, it argues that dying, death, and mourning are shared online as small stories of the moment, which are organized around transgressive moments and events with motivational, participatory, or connective scope. Through the different case studies discussed, this book presents an empirical framework for analyzing small stories of dying, death and mourning as practices of sharing which become associated with specific modes of affective positioning, i.e. modulations of different degrees of distance or proximity to the death event and the dead, the networked audience(s), and the affective self. The book calls for the study of affect as integral to narrative activity and opens up broader questions about how stories and emotion are mobilized in digital cultures for accruing audiences, value (social or economic), and visibility. It will be of interest to researchers in narrative analysis, the anthropology and sociology of emotion, digital communication, media and cultural studies, and (digital) death and dying.
Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in the field. This blue-ribbon reference discusses the most influential advancements in computer security policy, firewalls, and security issues related to passwords. It addresses crime and misconduct on the Internet, considers the development of infrastructures that may prevent breaches of security and law, and illustrates the vulnerability of networked computers to new virus attacks despite widespread deployment of antivirus software, firewalls, and other network security equipment. |
You may like...
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi
Paperback
Research Handbook on the Law and…
Ioannis Kokkoris, Claudia Lemus
Hardcover
R6,078
Discovery Miles 60 780
Research Handbook on the Law of…
Woodrow Barfield, Ugo Pagallo
Paperback
R1,471
Discovery Miles 14 710
IT Contracts and Dispute Management - A…
Steven Baker, Lawrence Akka, …
Hardcover
R5,447
Discovery Miles 54 470
Life and the Law in the Era of…
Mireille Hildebrandt, Kieron O'Hara
Paperback
R1,020
Discovery Miles 10 200
Novel Beings - Regulatory Approaches for…
David R. Lawrence, Sarah Morley
Hardcover
R3,015
Discovery Miles 30 150
|