0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (133)
  • R250 - R500 (488)
  • R500+ (1,444)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > General

Avatar, Assembled - The Social and Technical Anatomy of Digital Bodies (Paperback, New edition): Jaime Banks Avatar, Assembled - The Social and Technical Anatomy of Digital Bodies (Paperback, New edition)
Jaime Banks
R1,401 Discovery Miles 14 010 Ships in 10 - 15 working days

Avatar, Assembled is a curated volume that unpacks videogame and virtual world avatars-not as a monolithic phenomenon (as they are usually framed) but as sociotechnical assemblages, pieced together from social (human-like) features like voice and gesture to technical (machine-like) features like graphics and glitches. Each chapter accounts for the empirical, theoretical, technical, and popular understandings of these avatar "components"-60 in total-altogether offering a nuanced explication of avatars-as-assemblages as they matter in contemporary society and in individual experience. The volume is a "crossover" piece in that, while it delves into complex ideas, it is written in a way that will be accessible and interesting to students, researchers, designers, and practitioners alike.

7 Steps to Sharing Your School's Story on Social Media (Hardcover): Jason Kotch, Edward Cosentino 7 Steps to Sharing Your School's Story on Social Media (Hardcover)
Jason Kotch, Edward Cosentino
R2,649 Discovery Miles 26 490 Ships in 10 - 15 working days

7 Steps to Sharing Your School's Story on Social Media empowers school leaders to use social media through a simple and accessible plan that increases engagement and enhances the school's vision and mission. In a step-by-step guide for easy implementation, this book provides the nuts and bolts, as well as the strategic planning necessary, to ensure intentionality and impact of your social media presence. The authors explain how to measure impact and improve your strategies to ensure important information about your school is conveyed accurately, clearly, and effectively. Whether you use the 7 steps in order or you're just looking for some invigorating new ideas or you want to find new ways to connect, collaborate, and share, there is something for every school leader in this book.

7 Steps to Sharing Your School's Story on Social Media (Paperback): Jason Kotch, Edward Cosentino 7 Steps to Sharing Your School's Story on Social Media (Paperback)
Jason Kotch, Edward Cosentino
R946 Discovery Miles 9 460 Ships in 10 - 15 working days

7 Steps to Sharing Your School's Story on Social Media empowers school leaders to use social media through a simple and accessible plan that increases engagement and enhances the school's vision and mission. In a step-by-step guide for easy implementation, this book provides the nuts and bolts, as well as the strategic planning necessary, to ensure intentionality and impact of your social media presence. The authors explain how to measure impact and improve your strategies to ensure important information about your school is conveyed accurately, clearly, and effectively. Whether you use the 7 steps in order or you're just looking for some invigorating new ideas or you want to find new ways to connect, collaborate, and share, there is something for every school leader in this book.

Networked Selves - Trajectories of Blogging in the United States and France (Hardcover, New edition): Ignacio Siles Networked Selves - Trajectories of Blogging in the United States and France (Hardcover, New edition)
Ignacio Siles
R2,347 Discovery Miles 23 470 Ships in 10 - 15 working days

Networked Selves is an original analysis of one of the most defining cultural features of our time: how people turn to the Web to construct a public self. It examines the trajectory of a practice that embodies this sociocultural shift in fundamental ways: blogging. The book traces the evolution of the Web as a means to publicly perform a self through an analysis of the emergence, development, and transformation of blogging from the mid-1990s to the early years of the 2010s. It discusses processes that have shaped practices of subjectivity on the Web over two decades in two countries: the United States and France. Through this comparative analysis, the book shows that the cultural identity of blogging as a practice of subjectivity in these countries is neither inevitable nor neutral. Instead, it demonstrates that the development of the Web required the forging of various articulations between specific conceptions of self, publicness, and technology. These articulations were responses to both transformations in the daily life of actors and larger economic, political, and cultural processes-notably neoliberalization. The book also explains how the cultural imaginary around blogs came into being in the United States and how it has also functioned as a model for actors in other countries, such as France. Networked Selves discusses how and why actors in the technology field in France have gradually abandoned traditional makers of exceptionalism that were key in the development of the country's national identity and favored notions that characterize the United States instead.

Supply Chain Risk Management - Applying Secure Acquisition Principles to Ensure a Trusted Technology Product (Hardcover): Ken... Supply Chain Risk Management - Applying Secure Acquisition Principles to Ensure a Trusted Technology Product (Hardcover)
Ken Sigler, Dan Shoemaker, Anne Kohnke
R4,354 Discovery Miles 43 540 Ships in 10 - 15 working days

The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how to establish systematic control over the supply chain and how to build auditable trust into the products and services acquired by the organization. It details a capability maturity development process that will install an increasingly competent process and an attendant set of activities and tasks within the technology acquisition process. It defines a complete and correct set of processes, activities, tasks and monitoring and reporting systems.

Cyber Security Essentials (Hardcover): James Graham, Ryan Olson, Rick Howard Cyber Security Essentials (Hardcover)
James Graham, Ryan Olson, Rick Howard
R4,796 Discovery Miles 47 960 Ships in 10 - 15 working days

The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures.To accomplish this, the team of security professionals from VeriSign's iDefense Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security, its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff. Providing a fundamental understanding of the theory behind the key issues impacting cyber security, the book: Covers attacker methods and motivations, exploitation trends, malicious code techniques, and the latest threat vectors Addresses more than 75 key security concepts in a series of concise, well-illustrated summaries designed for most levels of technical understanding Supplies actionable advice for the mitigation of threats Breaks down the code used to write exploits into understandable diagrams This book is not about the latest attack trends or botnets. It's about the reasons why these problems continue to plague us. By better understanding the logic presented in these pages, readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the threats and attacks on the horizon.

Digital Etiquette For Dummies (Paperback): E Butow Digital Etiquette For Dummies (Paperback)
E Butow
R451 Discovery Miles 4 510 Ships in 10 - 15 working days

Mind your online P's and Q's with this expert digital manners guide Conducting yourself online can be challenging. It sometimes seems like the web and social media is tailor-made to cause upset and anger. But, with the right guide, anyone can learn how to be a beacon of civility and politeness online. In Digital Etiquette For Dummies, a team of online communication experts share their combined insights into improving your presence on social media, writing emails that exude positivity and clarity, behaving correctly in virtual meetings, and much more. You'll become a paragon of politeness as you learn to apply the timeless rules of etiquette to the unique environment of the web, social media, email, Zoom, and smartphones. In this book, you'll also: Learn near-universal etiquette rules for email, social media, cellphones, and more Discover ways to make sure that your polite attitude isn't being lost in the text-only context of a business email Avoid common social media pitfalls and digital faux pas that can trip up even the most careful communicators A great handbook for anyone who uses digital communication in business or in their personal life (so, pretty much everyone), Digital Etiquette For Dummies also belongs on the reading lists of those trying to improve their online interactions on social media.

Conditions of Mediation - Phenomenological Perspectives on Media (Hardcover, New edition): Scott Rodgers Conditions of Mediation - Phenomenological Perspectives on Media (Hardcover, New edition)
Scott Rodgers
R2,228 Discovery Miles 22 280 Ships in 10 - 15 working days

Phenomenology has become one of the most important philosophical traditions underpinning recent theory and research on new media, whether or not the word is used explicitly. Conditions of Mediation brings together, for the first time in a single publication, the diversity of phenomenological media research-from social platforms and wearable media to diasporic identity formation and the ethics of consumer technologies. The new orthodoxy in media studies emphasizes the experience of media-whether as forms, texts, technics or protocols-marking a departure from traditional approaches preoccupied with media content or its structural contexts. But phenomenologically informed approaches go beyond merely asking what people do with media. They ask a more profound question: what constitutes the conditions of mediated experience in the first place? Beginning with an accessible introduction, this book invites readers to explore a wide range of phenomenological perspectives on media via two critical dialogues involving key thinkers alongside a series of theoretically sophisticated and empirically grounded chapters. In so doing, interdisciplinary media studies is brought into conversation with the work of philosophers such as Edmund Husserl, Martin Heidegger and Maurice Merleau-Ponty, as well as phenomenologically-inspired thinkers such as Erving Goffman, Pierre Bourdieu, Tim Ingold, Henri Lefebvre, Friedrich Kittler, Marshall McLuhan and Bernard Stiegler.

Media, Propaganda and the Politics of Intervention (Hardcover, New edition): Florian Zollmann Media, Propaganda and the Politics of Intervention (Hardcover, New edition)
Florian Zollmann
R2,352 Discovery Miles 23 520 Ships in 10 - 15 working days

Prominent media scholars have argued that the dissemination of propaganda is an important function of the news media. Yet, despite public controversies about 'fake news' and 'misinformation', there has been very little discussion on techniques of propaganda. Building on critical theory, most notably Herman and Chomsky's Propaganda Model, Florian Zollmann's pioneering study brings propaganda back to the forefront of the debate. On the basis of a forensic examination of 1,911 newspaper articles, Zollmann investigates US, UK and German media reporting of the military operations in Kosovo, Iraq, Libya, Syria and Egypt. The book demonstrates how 'humanitarian intervention' and 'R2P' are only evoked in the news media if so called 'enemy' countries of Western states are the perpetrators of human rights violations. Zollmann's work evidences that the news media plays a crucial propaganda role in facilitating a selective process of shaming during the build-up towards military interventions. This process has led to an erosion of internationally agreed norms of non-intervention, as enshrined in the UN Charter.

Vein Pattern Recognition - A Privacy-Enhancing Biometric (Paperback): Chuck Wilson Vein Pattern Recognition - A Privacy-Enhancing Biometric (Paperback)
Chuck Wilson
R1,045 Discovery Miles 10 450 Ships in 10 - 15 working days

As one of the most promising biometric technologies, vein pattern recognition (VPR) is quickly taking root around the world and may soon dominate applications where people focus is key. Among the reasons for VPR's growing acceptance and use: it is more accurate than many other biometric methods, it offers greater resistance to spoofing, it focuses on people and their privacy, and has few negative cultural connotations. Vein Pattern Recognition: A Privacy-Enhancing Biometric provides a comprehensive and practical look at biometrics in general and at vein pattern recognition specifically. It discusses the emergence of this reliable but underutilized technology and evaluates its capabilities and benefits. The author, Chuck Wilson, an industry veteran with more than 25 years of experience in the biometric and electronic security fields, examines current and emerging VPR technology along with the myriad applications of this dynamic technology. Wilson explains the use of VPR and provides an objective comparison of the different biometric methods in use today-including fingerprint, eye, face, voice recognition, and dynamic signature verification. Highlighting current VPR implementations, including its widespread acceptance and use for identity verification in the Japanese banking industry, the text provides a complete examination of how VPR can be used to protect sensitive information and secure critical facilities. Complete with best-practice techniques, the book supplies invaluable guidance on selecting the right combination of biometric technologies for specific applications and on properly implementing VPR as part of an overall security system.

Web 25 - Histories from the First 25 Years of the World Wide Web (Hardcover, New edition): Niels Brugger Web 25 - Histories from the First 25 Years of the World Wide Web (Hardcover, New edition)
Niels Brugger
R2,229 Discovery Miles 22 290 Ships in 10 - 15 working days

Web 25: Histories from the First 25 Years of the World Wide Web celebrates the 25th anniversary of the Web. Since the beginning of the 1990s, the Web has played an important role in the development of the Internet as well as in the development of most societies at large, from its early grey and blue webpages introducing the hyperlink for a wider public, to today's multifacted uses of the Web as an integrated part of our daily lives. This is the first book to look back at 25 years of Web evolution, and it tells some of the histories about how the Web was born and has developed. It takes the reader on an exciting time travel journey to learn more about the prehistory of the hyperlink, the birth of the Web, the spread of the early Web, and the Web's introduction to the general public in mainstream media. Furthermore, case studies of blogs, literature, and traditional media going online are presented alongside methodological reflections on how the past Web can be studied, as well as accounts of how one of the most important source types of our time is provided, namely the archived Web. Web 25: Histories from the First 25 Years of the World Wide Web is a must-read for anyone interested in how our online present has been shaped by the past.

Web 25 - Histories from the First 25 Years of the World Wide Web (Paperback, New edition): Niels Brugger Web 25 - Histories from the First 25 Years of the World Wide Web (Paperback, New edition)
Niels Brugger
R1,325 Discovery Miles 13 250 Ships in 10 - 15 working days

Web 25: Histories from the First 25 Years of the World Wide Web celebrates the 25th anniversary of the Web. Since the beginning of the 1990s, the Web has played an important role in the development of the Internet as well as in the development of most societies at large, from its early grey and blue webpages introducing the hyperlink for a wider public, to today's multifacted uses of the Web as an integrated part of our daily lives. This is the first book to look back at 25 years of Web evolution, and it tells some of the histories about how the Web was born and has developed. It takes the reader on an exciting time travel journey to learn more about the prehistory of the hyperlink, the birth of the Web, the spread of the early Web, and the Web's introduction to the general public in mainstream media. Furthermore, case studies of blogs, literature, and traditional media going online are presented alongside methodological reflections on how the past Web can be studied, as well as accounts of how one of the most important source types of our time is provided, namely the archived Web. Web 25: Histories from the First 25 Years of the World Wide Web is a must-read for anyone interested in how our online present has been shaped by the past.

Internet Research Ethics for the Social Age - New Challenges, Cases, and Contexts (Paperback, New edition): Katharina... Internet Research Ethics for the Social Age - New Challenges, Cases, and Contexts (Paperback, New edition)
Katharina Kinder-Kurlanda, Michael Zimmer
R1,332 Discovery Miles 13 320 Ships in 10 - 15 working days

The continuous evolution of internet and related social media technologies and platforms have opened up vast new means for communication, socialization, expression, and collaboration. They also have provided new resources for researchers seeking to explore, observe, and measure human opinions, activities, and interactions. However, those using the internet and social media for research - and those tasked with facilitating and monitoring ethical research such as ethical review boards - are confronted with a continuously expanding set of ethical dilemmas. Internet Research Ethics for the Social Age: New Challenges, Cases, and Contexts directly engages with these discussions and debates, and stimulates new ways to think about - and work towards resolving - the novel ethical dilemmas we face as internet and social media-based research continues to evolve. The chapters in this book - from an esteemed collection of global scholars and researchers - offer extensive reflection about current internet research ethics and suggest some important reframings of well-known concepts such as justice, privacy, consent, and research validity, as well as providing concrete case studies and emerging research contexts to learn from.

Sympathy for the Cyberbully - How the Crusade to Censor Hostile and Offensive Online Speech Abuses Freedom of Expression... Sympathy for the Cyberbully - How the Crusade to Censor Hostile and Offensive Online Speech Abuses Freedom of Expression (Hardcover, New edition)
Arthur S. Hayes
R2,229 Discovery Miles 22 290 Ships in 10 - 15 working days

In the first systematic account of judicial rulings striking down cyberbullying laws in the United States and Canada, Sympathy for the Cyberbully offers an unapologetic defense of online acid-tongued disparagers and youthful and adult sexters. In the first decade of the 21st century, legitimate concerns about the harmful effects of cyberbullying degenerated into a moral panic. The most troubling aspect of the panic has been a spate of censorship-the enactment of laws which breach long-standing constitutional principles, by authorizing police to arrest and juries to convict, and schools to suspend, individuals for engaging in online expression that would be constitutionally protected had it been communicated offline. These hastily drawn statutes victimize harsh critics of elected officials, scholars, school officials and faculty, distributors of constitutionally protected pornography, adolescents "talking smack," and teens who engage in the consensual exchange of nude images, even in states where teens of a certain age enjoy the right to engage in sexual relations. The victims' stories are told here. Sympathy for the Cyberbully is suitable for undergraduate, graduate and law school courses in media law, First Amendment law and free expression.

Sympathy for the Cyberbully - How the Crusade to Censor Hostile and Offensive Online Speech Abuses Freedom of Expression... Sympathy for the Cyberbully - How the Crusade to Censor Hostile and Offensive Online Speech Abuses Freedom of Expression (Paperback, New edition)
Arthur S. Hayes
R1,324 Discovery Miles 13 240 Ships in 10 - 15 working days

In the first systematic account of judicial rulings striking down cyberbullying laws in the United States and Canada, Sympathy for the Cyberbully offers an unapologetic defense of online acid-tongued disparagers and youthful and adult sexters. In the first decade of the 21st century, legitimate concerns about the harmful effects of cyberbullying degenerated into a moral panic. The most troubling aspect of the panic has been a spate of censorship-the enactment of laws which breach long-standing constitutional principles, by authorizing police to arrest and juries to convict, and schools to suspend, individuals for engaging in online expression that would be constitutionally protected had it been communicated offline. These hastily drawn statutes victimize harsh critics of elected officials, scholars, school officials and faculty, distributors of constitutionally protected pornography, adolescents "talking smack," and teens who engage in the consensual exchange of nude images, even in states where teens of a certain age enjoy the right to engage in sexual relations. The victims' stories are told here. Sympathy for the Cyberbully is suitable for undergraduate, graduate and law school courses in media law, First Amendment law and free expression.

I Am Not a Wolf (Paperback): Dan Sheehan I Am Not a Wolf (Paperback)
Dan Sheehan; Illustrated by Sage Coffey
R356 R336 Discovery Miles 3 360 Save R20 (6%) Ships in 18 - 22 working days
Complex Worlds - Digital Culture, Rhetoric and Professional Communication (Paperback): Andrienne Lamberti Complex Worlds - Digital Culture, Rhetoric and Professional Communication (Paperback)
Andrienne Lamberti; Series edited by Charles Sides; Edited by Anne Richards
R1,440 Discovery Miles 14 400 Ships in 10 - 15 working days

'Complex Worlds: Digital Culture, Rhetoric, and Professional Communication' is a collection of thought-provoking scholarly essays by teachers and industry practitioners in professional communication and technology-oriented fields. Scrupulously edited for a range of readers, the collection aims to help familiarize advanced students, teachers, and researchers in professional communication, computers and writing, literacy, and sister disciplines with key issues in digital theory and practice. An emphasis on the situations of and audiences for digital communication identifies 'Complex Worlds' as a rhetorical approach. In an era when globalizing markets and digital technologies are transforming culture around the world, readers should find the collection both engaging and timely. The collections' twelve essays constitute a diverse and thematically coherent set of inquiries. Included are explorations of topics such as cyber activism, digital 'dispositio', citizen and open-source journalism, broadband affordances, XML, digital resumes, avant garde performance art, best pedagogical practices, and intercultural communication between East and West, North and South. The text is especially well suited for advanced courses in professional and applied writing, contemporary rhetorics, and digital culture. The complexity highlighted in the collection's title is brought into relief by authors who address how the digital is daily unmaking our assumptions about the boundaries between work and school, the global and the local, the private and the public. 'Complex Worlds' offers readers an opportunity to build on their rhetorical awareness by expanding their understanding of the means, aims, and strategies of effective communication--today and in the future.

An Introduction to Visual Communication - From Cave Art to Second Life (2nd edition) (Paperback, New edition): Susan B. Barnes An Introduction to Visual Communication - From Cave Art to Second Life (2nd edition) (Paperback, New edition)
Susan B. Barnes
R1,338 Discovery Miles 13 380 Ships in 10 - 15 working days

Technological changes have radically altered the ways in which people use visual images. Since the invention of photography, imagery has increasingly been used for entertainment, journalism, information, medical diagnostics, instruction, branding and communication. These functions move the image beyond aesthetic issues associated with art and into the realm of communication studies. This introductory textbook introduces students to the terminology of visual literacy, methods for analyzing visual media, and theories on the relationship between visual communication and culture. Exploring the meanings associated with visual symbols and the relationship of visual communication to culture, this book provides students with a better understanding of the visually oriented world in which they live. From cave art to virtual reality, all visual media are discussed with methods for evaluation. Student-friendly features such as boxed topics, key terms, web resources, and suggestions for exercises are provided throughout.

Formative Research in Social Marketing - Innovative Methods to Gain Consumer Insights (Hardcover, 1st ed. 2017): Krzysztof... Formative Research in Social Marketing - Innovative Methods to Gain Consumer Insights (Hardcover, 1st ed. 2017)
Krzysztof Kubacki, Sharyn Rundle-Thiele
R4,047 Discovery Miles 40 470 Ships in 10 - 15 working days

This book brings together the state of the art and current debates in the field of formative research, and examines many of the innovative methods largely overlooked in the available literature. This book will help social marketing to move beyond surveys and focus groups. The book addresses the needs of social marketing academics and practitioners alike by providing a robust and critical academic discussion of cutting-edge research methods, while demonstrating at the same time how each respective method can help us arrive at a deeper understanding of the issues that social marketing interventions are seeking to remedy. Each chapter includes a scholarly discussion of key formative research methods, a list of relevant internet resources, and three key readings for those interested in extending their understanding of the method. Most chapters also feature a short case study demonstrating how the methods are used.

Building A Global Information Assurance Program (Hardcover): Douglas E. Campbell, Raymond J. Curts Building A Global Information Assurance Program (Hardcover)
Douglas E. Campbell, Raymond J. Curts
R4,806 Discovery Miles 48 060 Ships in 10 - 15 working days

Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function. These government and business entities are beginning to realize the value of information assurance (IA) as a tool to ensure that the right information gets to the right people, at the right time, with a reasonable expectation that it is timely, accurate, authentic, and uncompromised. Intended for those interested in the construction and operation of an IA or Information Security (InfoSec) program, Building a Global Information Assurance Program describes the key building blocks of an IA development effort including: Information Attributes System Attributes Infrastructure or Architecture Interoperability IA Tools Cognitive Hierarchies Decision Cycles Organizational Considerations Operational Concepts Because of their extensive and diverse backgrounds, the authors bring a unique perspective to current IT issues. The text presents their proprietary process based on the systems development life cycle (SDLC) methodology specifically tailored for an IA program. This process is a structured, cradle-to-grave approach to IA program development, from program planning and design to implementation, support, and phase out. Building a Global Information Assurance Program provides a proven series of steps and tasks that you can follow to build quality IA programs faster, at lower costs, and with less risk.

Building an Information Security Awareness Program (Hardcover): Mark B. Desman Building an Information Security Awareness Program (Hardcover)
Mark B. Desman
R4,785 Discovery Miles 47 850 Ships in 10 - 15 working days

In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what can happen to them if they ignore them. The key, of course, is continuous awareness of the problems and the solutions. Building an Information Security Awareness Program addresses these concerns. A reference and self-study guide, it goes step-by-step through the methodology for developing, distributing, and monitoring an information security awareness program. It includes detailed instructions on determining what media to use and where to locate it, and it describes how to efficiently use outside sources to optimize the output of a small staff. The author stresses the importance of security and the entire organizations' role and responsibility in protecting it. He presents the material in a fashion that makes it easy for nontechnical staff members to grasp the concepts. These attributes render Building an Information Security Awareness Program an immensely valuable reference in the arsenal of the IS professional.

Network and Data Security for Non-Engineers (Hardcover): Frank M. Groom, Kevin Groom, Stephan S. Jones Network and Data Security for Non-Engineers (Hardcover)
Frank M. Groom, Kevin Groom, Stephan S. Jones
R5,068 Discovery Miles 50 680 Ships in 10 - 15 working days

Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.

Securing and Controlling Cisco Routers (Hardcover): Peter T. Davis Securing and Controlling Cisco Routers (Hardcover)
Peter T. Davis
R4,848 Discovery Miles 48 480 Ships in 10 - 15 working days

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology. At the end of most chapters, readers will find the unique opportunity to practice what they have learned. Readers will be able to log on to a real router, practice commands, and gather information as shown in the chapter. To further round out this understanding of routers, Securing and Controlling Cisco Routers reviews Trojan Ports and Services and provides additional resources such as Web sites, mailing lists, bibliographies, glossaries, acronyms, and abbreviations.

Multimedia Security - Watermarking, Steganography, and Forensics (Paperback): Frank Y. Shih Multimedia Security - Watermarking, Steganography, and Forensics (Paperback)
Frank Y. Shih
R2,536 Discovery Miles 25 360 Ships in 10 - 15 working days

Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and expert insights on multimedia security technology used to prove that content is authentic and has not been altered. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, this book presents a wealth of everyday protection application examples in fields including multimedia mining and classification, digital watermarking, steganography, and digital forensics. Giving readers an in-depth overview of different aspects of information security mechanisms and methods, this resource also serves as an instructional tool on how to use the fundamental theoretical framework required for the development of extensive advanced techniques. The presentation of several robust algorithms illustrates this framework, helping readers to quickly master and apply fundamental principles. Presented case studies cover: The execution (and feasibility) of techniques used to discover hidden knowledge by applying multimedia duplicate mining methods to large multimedia content Different types of image steganographic schemes based on vector quantization Techniques used to detect changes in human motion behavior and to classify different types of small-group motion behavior Useful for students, researchers, and professionals, this book consists of a variety of technical tutorials that offer an abundance of graphs and examples to powerfully convey the principles of multimedia security and steganography. Imparting the extensive experience of the contributors, this approach simplifies problems, helping readers more easily understand even the most complicated theories. It also enables them to uncover novel concepts involved in the implementation of algorithms, which can lead to the discovery of new problems and new means of solving them.

Collective Action 2.0 - The Impact of Social Media on Collective Action (Paperback): Shaked Spier Collective Action 2.0 - The Impact of Social Media on Collective Action (Paperback)
Shaked Spier
R1,463 Discovery Miles 14 630 Ships in 10 - 15 working days

Collective Action 2.0 explores the issues related to information and communication technologies (ICTs) in detail, providing a balanced insight into how ICTs leverage and interact with collective action, which will have an impact on the current discourse. Recent events in different authoritarian regimes, such as Iran and Egypt, have drawn global attention to a developing phenomenon in collective action: People tend to organize through different social media platforms for political protest and resistance. This phenomenon describes a change in social structure and behavior tied to ICT. Social media platforms have been used to leverage collective action, which has in some cases arguably lead, to political revolution. The phenomenon also indicates that the way information is organized affects the organization of social structures with which it interoperates. The phenomenon also has another side, which is the use of social media for activist suppression, state and corporate surveillance, commodifi cation of social processes, demobilization, or for the mobilization of collective action toward undesirable ends.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Research Anthology on Agile Software…
Information R Management Association Hardcover R14,523 Discovery Miles 145 230
Open Source Technology - Concepts…
Irma Hardcover R17,101 Discovery Miles 171 010
Iberia, Land of Glaciers - How The…
Marc Oliva, David Palacios, … Paperback R3,342 Discovery Miles 33 420
Handwriting: Learn Cursive!
Inc Peter Pauper Press Paperback R214 Discovery Miles 2 140
Wind Generated Ocean Waves, Volume 2
I.R. Young Hardcover R3,103 Discovery Miles 31 030
Mr. Germ
Jacki Elam Hardcover R496 Discovery Miles 4 960
Creativity in Computing and DataFlow…
Suyel Namasudra, Veljko Milutinovic Hardcover R4,204 Discovery Miles 42 040
Active Geophysical Monitoring
Hitoshi Mikada, Michael S. Zhdanov, … Paperback R3,867 Discovery Miles 38 670
Open Source Technology - Concepts…
Irma Hardcover R17,102 Discovery Miles 171 020
Quantifying and Managing Soil Functions…
Donald L. Sparks Hardcover R4,220 Discovery Miles 42 200

 

Partners