0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (115)
  • R250 - R500 (436)
  • R500+ (1,413)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > General

The Changing Face of Problematic Internet Use - An Interpersonal Approach (Paperback, New edition): Scott E Caplan The Changing Face of Problematic Internet Use - An Interpersonal Approach (Paperback, New edition)
Scott E Caplan
R1,134 Discovery Miles 11 340 Ships in 10 - 15 working days

Since the advent of the Internet and increasingly mobile devices, we have witnessed dramatic changes in computer-mediated technologies and their roles in our lives. In the late 1990s, researchers began to identify problematic forms of Internet use, such as difficulty controlling the amount of time spent online. Today, people live in a perpetually digital and permanently connected world that presents many serious types of problematic Internet use besides deficient self-regulation. Thousands of studies have been published on interpersonal problems such as cyberbullying, cyberstalking, relationship conflicts about online behavior, and the increasingly problematic use of mobile devices during in-person interactions. The Changing Face of Problematic Internet Use: An Interpersonal Approach also examines future trends, including the recent development of being constantly connected to mobile devices and social networks. Research in these areas is fraught with controversy, inconsistencies, and findings that are difficult to compare and summarize. This book offers students and researchers an organized, theory-based, synthesis of research on these problems and explains how interpersonal theory and research help us better understand the problems that online behavior plays in our personal lives and social interactions.

The Joy of Missing Out - Finding Balance in a Wired World (Paperback): Christina Crook The Joy of Missing Out - Finding Balance in a Wired World (Paperback)
Christina Crook
R415 Discovery Miles 4 150 Ships in 10 - 15 working days

There's no doubt that technology has overrun our lives. Over the past few decades, the world has embraced "progress" and we're living with the resultant clicking, beeping, anxiety-inducing frenzy. But a creative backlash is gathering steam, helping us cope with the avalanche of data that threatens to overwhelm us daily through our computers, tablets, and smartphones.

"Digital Detox" considers the technologically focused life, with its impacts on our children, relationships, communities, health, work, and more, and suggests opportunities for those of us longing to cultivate a richer on- and off-line existence. By examining the connected world through the lens of her own internet fast, Christina Crook creates a convincing case for increasing intentionality in our day-to-day lives. Using historical data, typewritten letters, chapter challenges, and personal accounts, she invites us to explore a new way of living, beyond our steady state of distracted connectedness.

Most of us can't throw away our smartphone or cut ourselves off from the internet. But we can all rethink our relationship with the digital world, discovering new ways of introducing balance and discipline to the role of technology in our lives. This book is a must-read for anyone wishing to rediscover quietness of mind and seeking a sense of peace amidst the cacophony of the modern world.

Christina Crook is a wordsmith and communications professional and instigator of the project "Letters from a Luddite," which chronicled her thirty-one day internet fast and fueled her passion for exploring the intersection of technology, relationships, and joy.

Security and Privacy in Smart Grids (Paperback): Yang Xiao Security and Privacy in Smart Grids (Paperback)
Yang Xiao
R1,822 Discovery Miles 18 220 Ships in 10 - 15 working days

Presenting the work of prominent researchers working on smart grids and related fields around the world, Security and Privacy in Smart Grids identifies state-of-the-art approaches and novel technologies for smart grid communication and security. It investigates the fundamental aspects and applications of smart grid security and privacy and reports on the latest advances in the range of related areas-making it an ideal reference for students, researchers, and engineers in these fields. The book explains grid security development and deployment and introduces novel approaches for securing today's smart grids. Supplying an overview of recommendations for a technical smart grid infrastructure, the book describes how to minimize power consumption and utility expenditure in data centers. It also: Details the challenges of cybersecurity for smart grid communication infrastructures Covers the regulations and standards relevant to smart grid security Explains how to conduct vulnerability assessments for substation automation systems Considers smart grid automation, SCADA system security, and smart grid security in the last mile The book's chapters work together to provide you with a framework for implementing effective security through this growing system. Numerous figures, illustrations, graphs, and charts are included to aid in comprehension. With coverage that includes direct attacks, smart meters, and attacks via networks, this versatile reference presents actionable suggestions you can put to use immediately to prevent such attacks.

Managing Trust in Cyberspace (Paperback): Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey Managing Trust in Cyberspace (Paperback)
Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey
R1,898 Discovery Miles 18 980 Ships in 10 - 15 working days

In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis for cooperation to develop. Bringing together expertise from technology-oriented sciences, law, philosophy, and social sciences, Managing Trust in Cyberspace addresses fundamental issues underpinning computational trust models and covers trust management processes for dynamic open systems and applications in a tutorial style that aids in understanding. Topics include trust in autonomic and self-organized networks, cloud computing, embedded computing, multi-agent systems, digital rights management, security and quality issues in trusting e-government service delivery, and context-aware e-commerce applications. The book also presents a walk-through of online identity management and examines using trust and argumentation in recommender systems. It concludes with a comprehensive survey of anti-forensics for network security and a review of password security and protection. Researchers and practitioners in fields such as distributed computing, Internet technologies, networked systems, information systems, human computer interaction, human behavior modeling, and intelligent informatics especially benefit from a discussion of future trust management research directions including pervasive and ubiquitous computing, wireless ad-hoc and sensor networks, cloud computing, social networks, e-services, P2P networks, near-field communications (NFC), electronic knowledge management, and nano-communication networks.

A Unified Theory of Cats on the Internet (Paperback): E. J White A Unified Theory of Cats on the Internet (Paperback)
E. J White
R331 Discovery Miles 3 310 Ships in 10 - 15 working days

How cats became the undisputed mascot of the internet. The advertising slogan of the social news site Reddit is "Come for the cats. Stay for the empathy." Journalists and their readers seem to need no explanation for the line, "The internet is made of cats." Everyone understands the joke, but few know how it started. A Unified Theory of Cats on the Internet is the first book to explore the history of how the cat became the internet's best friend. Internet cats can differ in dramatic ways, from the goth cats of Twitter to the glamourpusses of Instagram to the giddy, nonsensical silliness of Nyan Cat. But they all share common traits and values. Bringing together fun anecdotes, thoughtful analyses, and hidden histories of the communities that built the internet, Elyse White shows how japonisme, punk culture, cute culture, and the battle among different communities for the soul of the internet informed the sensibility of online felines. Internet cats offer a playful-and useful-way to understand how culture shapes and is shaped by technology. Western culture has used cats for centuries as symbols of darkness, pathos, and alienation, and the communities that helped build the internet explicitly constructed themselves as outsiders, with snark and alienation at the core of their identity. Thus cats became the sine qua non of cultural literacy for the Extremely Online, not to mention an everyday medium of expression for the rest of us. Whatever direction the internet takes next, the "series of tubes" is likely to remain cat-shaped.

Spiritual News - Reporting Religion Around the World (Paperback, New edition): Yoel Cohen Spiritual News - Reporting Religion Around the World (Paperback, New edition)
Yoel Cohen
R1,534 Discovery Miles 15 340 Ships in 10 - 15 working days

The media's coverage of religion is an important question for academic researchers, given the central role which news media play in ensuring that people are up-to-date with religion news developments. Not only is there a lack of treatment of the subject in other countries, but there is also the absence of comparative study on news and religion. A key question is how the media, the political system, the religions themselves, the culture, and the economy influence how religion is reported in different countries. Spiritual News: Reporting Religion Around the World is intended to fill this gap. The book is divided into six parts: an introductory section; the newsgathering process; religion reporting in different regions; media events concerning religion; political and social change and the role of religion news; future trends.

Conducting Network Penetration and Espionage in a Global Environment (Paperback): Bruce Middleton Conducting Network Penetration and Espionage in a Global Environment (Paperback)
Bruce Middleton
R1,807 Discovery Miles 18 070 Ships in 10 - 15 working days

When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks-using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell. The book taps into Bruce Middleton's decades of experience with computer security, including penetration testing of military networks, the White House, utilities, manufacturing facilities, CIA headquarters, the Defense Information Systems Agency, and NASA. Mr. Middleton begins with a chapter on defensive measures/privacy issues and then moves on to describe a cyber-attack on one of his labs and how he responded to the attack. Next, the book explains how to research a target without directly "touching" that target. Once you've learned all you can, the text describes how to gather even more information using a more direct approach. From there, it covers mathematical analysis, considers target exploitation, and discusses Chinese and Syrian cyber-attacks. Providing authoritative guidance on cyberforensics, reverse engineering, and penetration testing, the book categorizes testing tools according to their use within the standard penetration testing framework. For each of the above-mentioned categories, you will find basic and advanced tools and procedures to help you identify security vulnerabilities in today's networks. After reading this book, you will understand how to perform an organized and efficient penetration test. You will also learn techniques used to bypass anti-virus software and capture keystrokes of remote systems. Explaining how to put together your own penetration testing lab, the text concludes by describing how to utilize various iPhone apps to perform reconnaissance activities on wireless networks.

Valuing Data - An Open Framework (Hardcover): Dewey Ray Valuing Data - An Open Framework (Hardcover)
Dewey Ray
R2,569 Discovery Miles 25 690 Ships in 10 - 15 working days

The past decade has seen a dramatic increase in the amount and variety of information that is generated and stored electronically by business enterprises. Storing this increased volume of information has not been a problem to date, but as these information stores grow larger and larger, multiple challenges arise for senior management: namely, questions such as "How much is our data worth?" "Are we storing our data in the most cost-effective way?" "Are we managing our data effectively and efficiently?" "Do we know which data is most important?" "Are we extracting business insight from the right data?" "Are our data adding to the value of our business?" "Are our data a liability?" "What is the potential for monetizing our data?" and "Do we have an appropriate risk management plan in place to protect our data?" To answer these value-based questions, data must be treated with the same rigor and discipline as other tangible and intangible assets. In other words, corporate data should be treated as a potential asset and should have its own asset valuation methodology that is accepted by the business community, the accounting and valuation community, and other important stakeholder groups. Valuing Data: An Open Framework is a first step in that direction. Its purpose is to: Provide the reader with some background on the nature of data Present the common categories of business data Explain the importance of data management Report the current thinking on data valuation Offer some business reasons to value data Present an "open framework"-along with some proposed methods-for valuing data The book does not aim to prescribe exactly how data should be valued monetarily, but rather it is a "starting point" for a discussion of data valuation with the objective of developing a stakeholder consensus, which, in turn, will become accepted standards and practices.

Fundraising - How to Raise Money for Your Library Using Social Media (Paperback): Joyce V. Garczynski Fundraising - How to Raise Money for Your Library Using Social Media (Paperback)
Joyce V. Garczynski
R1,749 Discovery Miles 17 490 Ships in 10 - 15 working days

Fundraising: How to Raise Money for Your Library Using Social Media introduces the phenomena that many members, supporters and fundraisers are not using social media to fundraise for their libraries, and may not be aware of its strengths and pitfalls. The book discusses why social media should be used to fundraise and how to successfully employ social media campaigns, also providing examples from library funding initiatives that libraries can follow. Since social media changes relatively quickly, library staff members, supporters and fundraisers need up-to-date information on how to craft messages for the platforms that they use. This book presents less on best practices for specific social media platform, focusing more on library social media fundraising strategies that have been found to be effective (for example, how libraries have successfully created fundraising campaigns with hashtags).

Videogames and Horror - From Amnesia to Zombies, Run! (Paperback): Dawn Stobbart Videogames and Horror - From Amnesia to Zombies, Run! (Paperback)
Dawn Stobbart
R1,243 R712 Discovery Miles 7 120 Save R531 (43%) Ships in 10 - 15 working days

Videogames are full of horrors - and of horror, a facet of the media that has been largely overlooked by the academic community in terms of lengthy studies in the fast-growing field of videogame scholarship. This book engages with the research of prominent scholars across the humanities to explore the presence, role and function of horror in videogames, and in doing so it demonstrates how videogames enter discussion on horror and offer a unique, radical space that horror is particularly suited to fill. The topics covered include the construction of stories in videogames, the role of the monster and, of course, how death is treated as a learning tool and as a facet of horror.

Digital Sports Journalism (Paperback): Charles Lambert Digital Sports Journalism (Paperback)
Charles Lambert
R1,239 Discovery Miles 12 390 Ships in 10 - 15 working days

Digital Sports Journalism gives detailed guidance on a range of digital practices for producing content for smartphones and websites. Each chapter discusses a skill that has become essential for sports journalists today, with student-friendly features throughout to support learning. These include case studies, examples of sports journalism from leading global publications, as well as top tips and practical exercises. The book also presents interviews with leading sport and club journalists with wide-ranging experience at the BBC, Copa90, Wimbledon Tennis, the Guardian and BT Sport, who discuss working with new technologies to cover sports stories and events. Chapters cover: live blogging; making and disseminating short videos; working for a sports club or governing body; finding and transmitting stories on social media; podcasting; longform online journalism. The job of a sports journalist has altered dramatically over the first two decades of the 21st century, with scope to write content across a new variety of digital platforms and mediums. Digital Sports Journalism will help students of journalism and professionals unlock the potential of these new media technologies.

Social Networks in China (Paperback): Xianhui Che, Barry Ip Social Networks in China (Paperback)
Xianhui Che, Barry Ip
R1,650 Discovery Miles 16 500 Ships in 10 - 15 working days

Social Networks in China provides an in-depth guide to Chinese social networks, covering behaviors, usage, key issues, and future developments. Chinese scholarship and cultural idiosyncrasies in technology remain a relatively under-researched area. While such issues may be sporadically reported in popular media, it is often difficult to obtain a true understanding of authentic Chinese behaviors and practices. One such study area delves into whether Chinese users utilize technology to socialize in the same ways as people from western societies. As no book currently exists to address issues concerning Chinese social networks, this book takes on that shortage and opportunity.

Marketing in the Digital Era (Hardcover, New edition): Zuzana Bacikova Marketing in the Digital Era (Hardcover, New edition)
Zuzana Bacikova
R1,368 Discovery Miles 13 680 Ships in 10 - 15 working days

With the digitalisation of society, marketing is experiencing a renaissance. Digital marketing has introduced a compactness absent in traditional marketing, even after the integration of the holistic marketing approach. Consumers nowadays make choices - between purchasing online and visiting a store. They pay attention to certain ads and decide to support a person or product on social media channels. This book presents the theoretical principles of digital marketing established to serve research plans, educational purposes and practical applications. It aims to support the terminological demarcation and to further the professional discussion.

Law and Technology in a Global Digital Society - Autonomous Systems, Big Data, IT Security and Legal Tech (Hardcover, 1st ed.... Law and Technology in a Global Digital Society - Autonomous Systems, Big Data, IT Security and Legal Tech (Hardcover, 1st ed. 2022)
Georg Borges, Christoph Sorge
R4,005 Discovery Miles 40 050 Ships in 10 - 15 working days

This book examines central aspects of the new technologies and the legal questions raised by them from both an international and an inter-disciplinary perspective. The technology revolution and the global networking of IT systems pose enormous challenges for the law. Current areas of discussion relate to autonomous systems, big data and issues surrounding legal tech. Ensuring data protection and IT security as well as the creation of a legal framework for the new technology as a whole can only be achieved through international and inter-disciplinary co-operation. The team of authors is made up of experienced, internationally renowned experts as well as young researchers and professionals who give valuable insights from numerous different jurisdictions. This book is written for jurists and those responsible for technology in public authorities and companies as well as practising lawyers and researchers.

Avatar, Assembled - The Social and Technical Anatomy of Digital Bodies (Paperback, New edition): Jaime Banks Avatar, Assembled - The Social and Technical Anatomy of Digital Bodies (Paperback, New edition)
Jaime Banks
R1,401 Discovery Miles 14 010 Ships in 10 - 15 working days

Avatar, Assembled is a curated volume that unpacks videogame and virtual world avatars-not as a monolithic phenomenon (as they are usually framed) but as sociotechnical assemblages, pieced together from social (human-like) features like voice and gesture to technical (machine-like) features like graphics and glitches. Each chapter accounts for the empirical, theoretical, technical, and popular understandings of these avatar "components"-60 in total-altogether offering a nuanced explication of avatars-as-assemblages as they matter in contemporary society and in individual experience. The volume is a "crossover" piece in that, while it delves into complex ideas, it is written in a way that will be accessible and interesting to students, researchers, designers, and practitioners alike.

Networked Selves - Trajectories of Blogging in the United States and France (Hardcover, New edition): Ignacio Siles Networked Selves - Trajectories of Blogging in the United States and France (Hardcover, New edition)
Ignacio Siles
R2,347 Discovery Miles 23 470 Ships in 10 - 15 working days

Networked Selves is an original analysis of one of the most defining cultural features of our time: how people turn to the Web to construct a public self. It examines the trajectory of a practice that embodies this sociocultural shift in fundamental ways: blogging. The book traces the evolution of the Web as a means to publicly perform a self through an analysis of the emergence, development, and transformation of blogging from the mid-1990s to the early years of the 2010s. It discusses processes that have shaped practices of subjectivity on the Web over two decades in two countries: the United States and France. Through this comparative analysis, the book shows that the cultural identity of blogging as a practice of subjectivity in these countries is neither inevitable nor neutral. Instead, it demonstrates that the development of the Web required the forging of various articulations between specific conceptions of self, publicness, and technology. These articulations were responses to both transformations in the daily life of actors and larger economic, political, and cultural processes-notably neoliberalization. The book also explains how the cultural imaginary around blogs came into being in the United States and how it has also functioned as a model for actors in other countries, such as France. Networked Selves discusses how and why actors in the technology field in France have gradually abandoned traditional makers of exceptionalism that were key in the development of the country's national identity and favored notions that characterize the United States instead.

A Socio-Legal Study of Hacking - Breaking and Remaking Law and Technology (Hardcover): Michael Anthony C. Dizon A Socio-Legal Study of Hacking - Breaking and Remaking Law and Technology (Hardcover)
Michael Anthony C. Dizon
R4,638 Discovery Miles 46 380 Ships in 10 - 15 working days

The relationship between hacking and the law has always been complex and conflict-ridden. This book examines the relations and interactions between hacking and the law with a view to understanding how hackers influence and are influenced by technology laws and policies. In our increasingly digital and connected world where hackers play a significant role in determining the structures, configurations and operations of the networked information society, this book delivers an interdisciplinary study of the practices, norms and values of hackers and how they conflict and correspond with the aims and aspirations of hacking-related laws. Describing and analyzing the legal and normative impact of hacking, as well as proposing new approaches to its regulation and governance, this book makes an essential contribution to understanding the socio-technical changes, and consequent legal challenges, faced by our contemporary connected society.

Beyond the Internet - Unplugging the Protest Movement Wave (Paperback): Rita Figueiras, Paula do Espirito Santo Beyond the Internet - Unplugging the Protest Movement Wave (Paperback)
Rita Figueiras, Paula do Espirito Santo
R1,600 Discovery Miles 16 000 Ships in 10 - 15 working days

The western economic and financial crisis began with the collapse of Lehman Brothers in 2008 and led the European Union countries into recession. After this, governments started to implement austerity measures, such as cuts in public spending, including public subsidies and jobs, and rising prices. In this context, Europe started to experience a wave of protest movements. Individuals started to use the manifold interactive digital media environment to both fight against the austerity measures and find alternative ways of claiming their democratic rights. Inspired by the 2011 Arab Spring and the Occupy Wall Street movement in New York (USA), the Occupy LSX encampment in Central London (UK), The Outraged (Los Indignados)/ 15M encampment in Central Madrid (Spain), the Syntagma Square's Outraged movement in Athens (Greece) and the March 12th Movement in Lisbon (Portugal), although short-lived, epitomize an emerging alternative politics and participation via the media. This wave has promoted a debate on how the realm of politics is changing, as citizens broaden their ideas of what political issues and participation mean. Beyond the Internet examines the technological dimension of the recent wave of protest movements in the United Kingdom, Spain, Portugal, Greece, and Ireland. Offering an opportunity to achieve a better understanding of the dynamics between society, politics and technology, this volume questions the essentialist attributes of the Internet that fuel the techno-centric discourse. The contributors illustrate how all these protest movements were active in the social media and garnered high levels of media attention and public visibility, in spite of their failure to achieve their political goals. As intra-elite dissent was pivotal in understanding the Arab uprisings, the coalition of national ruling elites with European institutions in terms of austerity strategy is essential in understanding the limits of media/technology power and, therefore, the dissociation between communication and representative power.

Conditions of Mediation - Phenomenological Perspectives on Media (Hardcover, New edition): Scott Rodgers Conditions of Mediation - Phenomenological Perspectives on Media (Hardcover, New edition)
Scott Rodgers
R2,228 Discovery Miles 22 280 Ships in 10 - 15 working days

Phenomenology has become one of the most important philosophical traditions underpinning recent theory and research on new media, whether or not the word is used explicitly. Conditions of Mediation brings together, for the first time in a single publication, the diversity of phenomenological media research-from social platforms and wearable media to diasporic identity formation and the ethics of consumer technologies. The new orthodoxy in media studies emphasizes the experience of media-whether as forms, texts, technics or protocols-marking a departure from traditional approaches preoccupied with media content or its structural contexts. But phenomenologically informed approaches go beyond merely asking what people do with media. They ask a more profound question: what constitutes the conditions of mediated experience in the first place? Beginning with an accessible introduction, this book invites readers to explore a wide range of phenomenological perspectives on media via two critical dialogues involving key thinkers alongside a series of theoretically sophisticated and empirically grounded chapters. In so doing, interdisciplinary media studies is brought into conversation with the work of philosophers such as Edmund Husserl, Martin Heidegger and Maurice Merleau-Ponty, as well as phenomenologically-inspired thinkers such as Erving Goffman, Pierre Bourdieu, Tim Ingold, Henri Lefebvre, Friedrich Kittler, Marshall McLuhan and Bernard Stiegler.

Media, Propaganda and the Politics of Intervention (Hardcover, New edition): Florian Zollmann Media, Propaganda and the Politics of Intervention (Hardcover, New edition)
Florian Zollmann
R2,352 Discovery Miles 23 520 Ships in 10 - 15 working days

Prominent media scholars have argued that the dissemination of propaganda is an important function of the news media. Yet, despite public controversies about 'fake news' and 'misinformation', there has been very little discussion on techniques of propaganda. Building on critical theory, most notably Herman and Chomsky's Propaganda Model, Florian Zollmann's pioneering study brings propaganda back to the forefront of the debate. On the basis of a forensic examination of 1,911 newspaper articles, Zollmann investigates US, UK and German media reporting of the military operations in Kosovo, Iraq, Libya, Syria and Egypt. The book demonstrates how 'humanitarian intervention' and 'R2P' are only evoked in the news media if so called 'enemy' countries of Western states are the perpetrators of human rights violations. Zollmann's work evidences that the news media plays a crucial propaganda role in facilitating a selective process of shaming during the build-up towards military interventions. This process has led to an erosion of internationally agreed norms of non-intervention, as enshrined in the UN Charter.

Pugtato Babysits the Snouts (Hardcover): Sophie Corrigan Pugtato Babysits the Snouts (Hardcover)
Sophie Corrigan
R437 Discovery Miles 4 370 Ships in 18 - 22 working days

What do you get when you cross imaginative and loveable characters, enchanting and inspiring illustrations and a giggle-inducing story? ...Pugtato, a simple, good spud and a hilarious mashup of pet and vegetable characters by the inimitable illustrator Sophie Corrigan! Join Pugtato as he takes on the job of babysitting the Brussels Snouts. Pugtato thinks babysitting will be easy ... how much trouble can baby Brussels Snouts get into? But as the day unfolds, the rambunctious little Snouts decide to show Pugtato they are not little babies, and prove that size doesn't matter when it comes to having lots of fun with your good spuddies. Pugtato Babysits the Snouts delivers: A delightful, giggle-inducing, rhyming, read-aloud story perfect for kids ages 4-8 Imaginative, silly pet and vegetable mashups such as Pugtato, Tomatoad, Carrat, Cowbbage, Croccoli, Unicorn on the Cob and more! A beautiful, eye-catching cover, rich with color and embossed texture Young children will learn invaluable lessons from Pugtato about: Friendship Acceptance Responsibility Creativity You'll also want to follow Pugtato's adventures in Pugtato, Let's Be Best Spuddies, Pugtato Finds a Thing, and Pugtato and Friends Audio Collection: 3 Books in 1.

Web 25 - Histories from the First 25 Years of the World Wide Web (Hardcover, New edition): Niels Brugger Web 25 - Histories from the First 25 Years of the World Wide Web (Hardcover, New edition)
Niels Brugger
R2,229 Discovery Miles 22 290 Ships in 10 - 15 working days

Web 25: Histories from the First 25 Years of the World Wide Web celebrates the 25th anniversary of the Web. Since the beginning of the 1990s, the Web has played an important role in the development of the Internet as well as in the development of most societies at large, from its early grey and blue webpages introducing the hyperlink for a wider public, to today's multifacted uses of the Web as an integrated part of our daily lives. This is the first book to look back at 25 years of Web evolution, and it tells some of the histories about how the Web was born and has developed. It takes the reader on an exciting time travel journey to learn more about the prehistory of the hyperlink, the birth of the Web, the spread of the early Web, and the Web's introduction to the general public in mainstream media. Furthermore, case studies of blogs, literature, and traditional media going online are presented alongside methodological reflections on how the past Web can be studied, as well as accounts of how one of the most important source types of our time is provided, namely the archived Web. Web 25: Histories from the First 25 Years of the World Wide Web is a must-read for anyone interested in how our online present has been shaped by the past.

Supply Chain Risk Management - Applying Secure Acquisition Principles to Ensure a Trusted Technology Product (Hardcover): Ken... Supply Chain Risk Management - Applying Secure Acquisition Principles to Ensure a Trusted Technology Product (Hardcover)
Ken Sigler, Dan Shoemaker, Anne Kohnke
R4,636 Discovery Miles 46 360 Ships in 10 - 15 working days

The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how to establish systematic control over the supply chain and how to build auditable trust into the products and services acquired by the organization. It details a capability maturity development process that will install an increasingly competent process and an attendant set of activities and tasks within the technology acquisition process. It defines a complete and correct set of processes, activities, tasks and monitoring and reporting systems.

Web 25 - Histories from the First 25 Years of the World Wide Web (Paperback, New edition): Niels Brugger Web 25 - Histories from the First 25 Years of the World Wide Web (Paperback, New edition)
Niels Brugger
R1,325 Discovery Miles 13 250 Ships in 10 - 15 working days

Web 25: Histories from the First 25 Years of the World Wide Web celebrates the 25th anniversary of the Web. Since the beginning of the 1990s, the Web has played an important role in the development of the Internet as well as in the development of most societies at large, from its early grey and blue webpages introducing the hyperlink for a wider public, to today's multifacted uses of the Web as an integrated part of our daily lives. This is the first book to look back at 25 years of Web evolution, and it tells some of the histories about how the Web was born and has developed. It takes the reader on an exciting time travel journey to learn more about the prehistory of the hyperlink, the birth of the Web, the spread of the early Web, and the Web's introduction to the general public in mainstream media. Furthermore, case studies of blogs, literature, and traditional media going online are presented alongside methodological reflections on how the past Web can be studied, as well as accounts of how one of the most important source types of our time is provided, namely the archived Web. Web 25: Histories from the First 25 Years of the World Wide Web is a must-read for anyone interested in how our online present has been shaped by the past.

Sympathy for the Cyberbully - How the Crusade to Censor Hostile and Offensive Online Speech Abuses Freedom of Expression... Sympathy for the Cyberbully - How the Crusade to Censor Hostile and Offensive Online Speech Abuses Freedom of Expression (Hardcover, New edition)
Arthur S. Hayes
R2,229 Discovery Miles 22 290 Ships in 10 - 15 working days

In the first systematic account of judicial rulings striking down cyberbullying laws in the United States and Canada, Sympathy for the Cyberbully offers an unapologetic defense of online acid-tongued disparagers and youthful and adult sexters. In the first decade of the 21st century, legitimate concerns about the harmful effects of cyberbullying degenerated into a moral panic. The most troubling aspect of the panic has been a spate of censorship-the enactment of laws which breach long-standing constitutional principles, by authorizing police to arrest and juries to convict, and schools to suspend, individuals for engaging in online expression that would be constitutionally protected had it been communicated offline. These hastily drawn statutes victimize harsh critics of elected officials, scholars, school officials and faculty, distributors of constitutionally protected pornography, adolescents "talking smack," and teens who engage in the consensual exchange of nude images, even in states where teens of a certain age enjoy the right to engage in sexual relations. The victims' stories are told here. Sympathy for the Cyberbully is suitable for undergraduate, graduate and law school courses in media law, First Amendment law and free expression.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Emigreer Of Bly - Is Die Gras Werklik…
Stephan Joubert Paperback R220 R197 Discovery Miles 1 970
Financial Mathematics - A Computational…
K. Pereira, N. Modhien, … Paperback R326 Discovery Miles 3 260
The Family Lawyer - 3-in-One Collection
James Patterson Paperback  (1)
R295 R271 Discovery Miles 2 710
Religion and Human Security - A Global…
James K. Wellman, Clark Lombardi Hardcover R1,924 Discovery Miles 19 240
Long Walk To Freedom - Commemorative…
Nelson Mandela Hardcover  (3)
R845 R708 Discovery Miles 7 080
Past Tense
Lee Child Paperback  (1)
R275 R254 Discovery Miles 2 540
Black Tax - Burden Or Ubuntu?
Niq Mhlongo Paperback  (2)
R340 R304 Discovery Miles 3 040
Epic Land - Namibia Exposed
Amy Schoeman Hardcover R556 Discovery Miles 5 560
Kirstenbosch - A Visitor's Guide
Colin Paterson-Jones, John Winter Paperback R170 R152 Discovery Miles 1 520
Crossroads - I Live Where I Like
Koni Benson Paperback R280 R259 Discovery Miles 2 590

 

Partners