![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
Aimed at people over the age of 50 and written by an expert in the field, Joli Ballew, this book covers the topic of laptop computers.
This book is open access and available on www.bloomsburycollections.com. It is funded by Knowledge Unlatched. In The Digital Logic of Death, Steven Pustay skillfully makes visible the immensely important but often overlooked role that moving images play in shaping our understanding of mortality. This relationship, he argues, is made all the more urgent by the technologies of the digital age, which have profoundly altered our ability to represent and contemplate death through moving images, resulting in an entirely new cultural logic of death. To draw out this new logic, Pustay presents accessible readings of otherwise dense and difficult philosophical approaches to death - such as those found in existentialism, psychoanalysis, and critical theory - by reading them through the lens of contemporary media. From art-house films like Irreversible and The Fountain to blockbusters like the Matrix trilogy, from television commercials for M&M's to pay-cable dramas like The Sopranos and Breaking Bad, from first-person shooters like Bioshock to indie-games like LIMBO, Pustay shows how moving images have shifted our understanding of death in general and our recognition of our own finiteness in particular.
In one modest-sized volume, this book offers three valuable sets of knowledge. First, it provides best practice guidance on virtually every large-scale task a modern manager may be involved in-from recruiting and hiring to onboarding and leading teams, and from employee engagement and retention to performance management and working with difficult employees. Second, it explains the essential concepts and practice of a range of effective leadership styles-including (but not limited to) servant leadership, crisis leadership, change agent leadership, and diversity and inclusion leadership. Third, it offers brief case studies from select CISOs and CSOs on how these management and leadership principles and practices play out in real-life workplace situations. The best practice essentials provided throughout this volume will empower aspiring leaders and also enable experienced managers to take their leadership to the next level. Many if not most CISOs and other leaders have had very little, if any, formal training in management and leadership. The select few that have such training usually obtained it through academic courses that take a theoretical, broad brush approach. In contrast, this book provides much actionable guidance in the nitty-gritty tasks that managers must do every day. Lack of management practical knowledge puts CISOs and CSOs at a disadvantage vis-a-vis other executives in the C-suite. They risk being pigeonholed as "security cops" rather than respected business leaders. Many articles on these subjects published in the press are too incomplete and filled with bad information. And combing through the few high-quality sources that are out there, such as Harvard Business Publishing, can take hundreds of dollars in magazine subscription and book purchase fees and weeks or months of reading time. This book puts all the essential information into your hands through a series of concise chapters authored by an award-winning writer.
An essential guide to studying symmetrical component theory * Provides concise treatment of symmetrical components * Describes major sequence models of power system components * Discusses Electromagnetic Transient Program (EMTP) models * Includes worked examples to illustrate the complexity of calculations, followed by matrix methods of solution which have been adopted for calculations on digital computers
In Intersectional Tech: Black Users in Digital Gaming, Kishonna L. Gray interrogates blackness in gaming at the intersections of race, gender, sexuality, and (dis)ability. Situating her argument within the context of the concurrent, seemingly unrelated events of Gamergate and the Black Lives Matter movement, Gray highlights the inescapable chains that bind marginalized populations to stereotypical frames and limited narratives in video games. Intersectional Tech explores the ways that the multiple identities of black gamers some obvious within the context of games, some more easily concealed affect their experiences of gaming. The normalization of whiteness and masculinity in digital culture inevitably leads to isolation, exclusion, and punishment of marginalized people. Yet, Gray argues, we must also examine the individual struggles of prejudice, discrimination, and microaggressions within larger institutional practices that sustain the oppression. These ""new"" racisms and a complementary colorblind ideology are a kind of digital Jim Crow, a new mode of the same strategies of oppression that have targeted black communities throughout American history. Drawing on extensive interviews that engage critically with identity development and justice issues in gaming, Gray explores the capacity for gaming culture to foster critical consciousness, aid in participatory democracy, and effect social change. Intersectional Tech is rooted in concrete situations of marginalized members within gaming culture. It reveals that despite the truths articulated by those who expose the sexism, racism, misogyny, and homophobia that are commonplace within gaming communities, hegemonic narratives continue to be privileged. This text, in contrast, centers the perspectives that are often ignored and provides a critical corrective to notions of gaming as a predominantly white and male space.
In the past decade, artificial intelligence (AI) has become a disruptive force around the world, offering enormous potential for innovation but also creating hazards and risks for individuals and the societies in which they live. This volume addresses the most pressing philosophical, ethical, legal, and societal challenges posed by AI. Contributors from different disciplines and sectors explore the foundational and normative aspects of responsible AI and provide a basis for a transdisciplinary approach to responsible AI. This work, which is designed to foster future discussions to develop proportional approaches to AI governance, will enable scholars, scientists, and other actors to identify normative frameworks for AI to allow societies, states, and the international community to unlock the potential for responsible innovation in this critical field. This book is also available as Open Access on Cambridge Core.
Security without Obscurity: Frequently Asked Questions (FAQ) complements Jeff Stapleton's three other Security without Obscurity books to provide clear information and answers to the most commonly asked questions about information security (IS) solutions that use or rely on cryptography and key management methods. There are good and bad cryptography, bad ways of using good cryptography, and both good and bad key management methods. Consequently, information security solutions often have common but somewhat unique issues. These common and unique issues are expressed as an FAQ organized by related topic areas. The FAQ in this book can be used as a reference guide to help address such issues. Cybersecurity is based on information technology (IT) that is managed using IS controls, but there is information, misinformation, and disinformation. Information reflects things that are accurate about security standards, models, protocols, algorithms, and products. Misinformation includes misnomers, misunderstandings, and lack of knowledge. Disinformation can occur when marketing claims either misuse or abuse terminology, alluding to things that are inaccurate or subjective. This FAQ provides information and distills misinformation and disinformation about cybersecurity. This book will be useful to security professionals, technology professionals, assessors, auditors, managers, and hopefully even senior management who want a quick, straightforward answer to their questions. It will serve as a quick reference to always have ready on an office shelf. As any good security professional knows, no one can know everything.
Today's high-speed and rapidly changing development environments demand equally high-speed security practices. Still, achieving security remains a human endeavor, a core part of designing, generating and verifying software. Dr. James Ransome and Brook S.E. Schoenfield have built upon their previous works to explain that security starts with people; ultimately, humans generate software security. People collectively act through a particular and distinct set of methodologies, processes, and technologies that the authors have brought together into a newly designed, holistic, generic software development lifecycle facilitating software security at Agile, DevOps speed. -Eric. S. Yuan, Founder and CEO, Zoom Video Communications, Inc. It is essential that we embrace a mantra that ensures security is baked in throughout any development process. Ransome and Schoenfield leverage their abundance of experience and knowledge to clearly define why and how we need to build this new model around an understanding that the human element is the ultimate key to success. -Jennifer Sunshine Steffens, CEO of IOActive Both practical and strategic, Building in Security at Agile Speed is an invaluable resource for change leaders committed to building secure software solutions in a world characterized by increasing threats and uncertainty. Ransome and Schoenfield brilliantly demonstrate why creating robust software is a result of not only technical, but deeply human elements of agile ways of working. -Jorgen Hesselberg, author of Unlocking Agility and Cofounder of Comparative Agility The proliferation of open source components and distributed software services makes the principles detailed in Building in Security at Agile Speed more relevant than ever. Incorporating the principles and detailed guidance in this book into your SDLC is a must for all software developers and IT organizations. -George K Tsantes, CEO of Cyberphos, former partner at Accenture and Principal at EY Detailing the people, processes, and technical aspects of software security, Building in Security at Agile Speed emphasizes that the people element remains critical because software is developed, managed, and exploited by humans. This book presents a step-by-step process for software security that uses today's technology, operational, business, and development methods with a focus on best practice, proven activities, processes, tools, and metrics for any size or type of organization and development practice.
It's not too late to get on the TikTok train! You may know TikTok as the home of the latest dance crazes and cute puppy videos. But do you know how to go about harnessing the power of its massive audience for more than showing off your own dance moves? And are you too late to the TikTok game to make an impact? In TikTok For Dummies, expert digital strategist and author Jesse Stay delivers an easy-to-read and robust discussion of how you can engage with TikTok's millions of users in a fun and productive way. He'll walk you through the steps of creating and securing an account, finding the best content to engage with, and creating your own videos that reflect you or your business in the best possible light. You'll discover how to: Install the app and create a profile that attracts followers and views Learn about the latest security issues and keep yourself safe on the platform Find the best content that's most relevant to you so you can engage with the community Create your own videos that resonate with the TikTok audience and have viral potential Perfect for anyone ready to dive into the world of TikTok, either for fun or for professional reasons, TikTok For Dummies is the easiest and most reliable way to go beyond the dances and learn the ins and outs of the popular app.
Is your enterprise's strategy for cybersecurity just crossing its fingers and hoping nothing bad ever happens? If so...you're not alone. Getting cybersecurity right is all too often an afterthought for Fortune 500 firms, bolted on and hopefully creating a secure environment. We all know this approach doesn't work, but what should a smart enterprise do to stay safe? Today, cybersecurity is no longer just a tech issue. In reality, it never was. It's a management issue, a leadership issue, a strategy issue: It's a "must have right"...a survival issue. Business leaders and IT managers alike need a new paradigm to work together and succeed. After years of distinguished work as a corporate executive, board member, author, consultant, and expert witness in the field of risk management and cybersecurity, David X Martin is THE pioneering thought leader in the new field of CyRMSM. Martin has created an entirely new paradigm that approaches security as a business problem and aligns it with business needs. He is the go-to guy on this vitally important issue. In this new book, Martin shares his experience and expertise to help you navigate today's dangerous cybersecurity terrain, and take proactive steps to prepare your company-and yourself -to survive, thrive, and keep your data (and your reputation) secure.
'All new technology is accompanied with great expectations on the one hand and great fear on the other. Thierry Geerts reduces the digital revolution to its true proportions and shows that we control the impact of technology ourselves: technology becomes what we make of it. Few are better placed than the author to clearly define the potential, the tasks, and the responsibility that awaits each and every one of us.' - Caroline Pauwels, rector of the VUB 'After Digitalis drew up the contours of the new digital world, Homo digitalis now describes how we can appropriate it so that digitalisation will benefit humanity. But instead of trying to convince at all costs, Thierry Geerts puts things in perspective. With great expertise, he guides us through numerous groundbreaking initiatives that start-ups and companies in Europe have often developed.'- Alain Gerlache, journalist 'This book couldn't have come out at a better time. Change can be scary for many, but above all, it brings many opportunities. Thierry Geerts fantastically explains how Digitalis can be an inclusive place where social mobility and equality are self-evident. Now it's up to our entrepreneurs, policymakers, and each of us as individuals to gear up and resolutely opt for the digital future.' - Yasmien Naciri, entrepreneur and marketer 'Think about the reasons for technology. That is the challenge that Thierry Geerts takes on with gusto and enthusiasm in this fascinating book.' - Laurent Hublet, co-founder and CEO of BeCentral, the largest digitalis campus in Europe In Homo digitalis, Thierry Geerts, CEO of Google Belgium and Luxembourg, looks at the dangers and opportunities of the digital revolution. Without taboos and with an eye to the future, he offers thoughtful examples of how digitalisation affects us as people and as a society. His conclusion is clear: technology is neutral, and it's up to people to use it consciously and confidently. If we do that, digitalisation will make us happier, with more time for creativity, personal development, healthcare, and the things that really matter. Then we'll become more human and we homo sapiens will turn into homo digitalis.
Tackling the cybersecurity challenge is a matter of survival for society at large. Cyber attacks are rapidly increasing in sophistication and magnitude-and in their destructive potential. New threats emerge regularly, the last few years having seen a ransomware boom and distributed denial-of-service attacks leveraging the Internet of Things. For organisations, the use of cybersecurity risk management is essential in order to manage these threats. Yet current frameworks have drawbacks which can lead to the suboptimal allocation of cybersecurity resources. Cyber insurance has been touted as part of the solution - based on the idea that insurers can incentivize companies to improve their cybersecurity by offering premium discounts - but cyber insurance levels remain limited. This is because companies have difficulty determining which cyber insurance products to purchase, and insurance companies struggle to accurately assess cyber risk and thus develop cyber insurance products. To deal with these challenges, this volume presents new models for cybersecurity risk management, partly based on the use of cyber insurance. It contains: A set of mathematical models for cybersecurity risk management, including (i) a model to assist companies in determining their optimal budget allocation between security products and cyber insurance and (ii) a model to assist insurers in designing cyber insurance products. The models use adversarial risk analysis to account for the behavior of threat actors (as well as the behavior of companies and insurers). To inform these models, we draw on psychological and behavioural economics studies of decision-making by individuals regarding cybersecurity and cyber insurance. We also draw on organizational decision-making studies involving cybersecurity and cyber insurance. Its theoretical and methodological findings will appeal to researchers across a wide range of cybersecurity-related disciplines including risk and decision analysis, analytics, technology management, actuarial sciences, behavioural sciences, and economics. The practical findings will help cybersecurity professionals and insurers enhance cybersecurity and cyber insurance, thus benefiting society as a whole. This book grew out of a two-year European Union-funded project under Horizons 2020, called CYBECO (Supporting Cyber Insurance from a Behavioral Choice Perspective).
A heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the foundation of security. This book sheds light upon security threats, defenses, and remediation on various networking and data processing domains, including wired networks, wireless networks, mobile ad-hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control. The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at: Access control methods in cloud-enabled Internet of Things Secure routing algorithms for mobile ad-hoc networks Building security trust in mobile ad-hoc networks using soft computing methods The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain Password authentication and keystroke biometrics Health care data analytics over Big Data Bluetooth: and its open issues for managing security services in heterogenous networks Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace.
A vital toolkit for managing the news cycle and finding a happier and calmer life at a time when the news is more upsetting than ever STOP READING THE NEWS is a vital toolkit for managing the upsetting coronavirus news cycle and finding equilibrium and calm at a time of chaos and uncertainty In 2013 Rolf Dobelli stood in front of a roomful of journalists and proclaimed that he did not read the news. It caused a riot. Now the author of the bestselling The Art of Thinking Clearly finally sets down his philosophy in detail. And he practises what he preaches: he hasn't read the news for a decade. Stop Reading the News is Dobelli's manifesto about the dangers of the most toxic form of information - news. He shows the damage it does to our concentration and well-being, and how a misplaced sense of duty can misdirect our behaviour. Most importantly, he offers the reader the guidance on how to live without news, and the many potential gains to be had: less disruption, more time, less anxiety, more insights. In a world of increasing disruption and division, Stop Reading the News is a welcome voice of calm and wisdom.
Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy. Topics include addressing vulnerabilities, building a secure enterprise, blocking intrusions, ethical and legal issues, and business continuity. Updates include topics such as cyber risks in mobile telephony, steganography, cybersecurity as an added value, ransomware defense, review of recent cyber laws, new types of cybercrime, plus new chapters on digital currencies and encryption key management.
Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations.
Social media applications can be weaponized with very little skill. Social media warfare has become a burden that nation states, government agencies, and corporations need to face. To address the social media warfare threat in a reasonable manner that reduces uncertainty requires dedication and attention over a very long-term. To stay secure, they need to develop the capability to defend against social media warfare attacks. Addressing unconventional warfare strategies and tactics takes time and experience, plus planning and dedication. This book will help managers develop a sound understanding of how social media warfare can impact their nation or their organization.
As the distributed architecture underpinning the initial Bitcoin anarcho-capitalist, libertarian project, 'blockchain' entered wider public imagination and vocabulary only very recently. Yet in a short space of time it has become more mainstream and synonymous with a spectacular variety of commercial and civic 'problem'/'solution' concepts and ideals. From commodity provenance, to electoral fraud prevention, to a wholesale decentralisation of power and the banishing of the exploitative practices of 'middlemen', blockchain stakeholders are nothing short of evangelical in their belief that it is a force for good. For these reasons and more the technology has captured the attention of entrepreneurs, venture capitalists, global corporations and governments the world over. Blockchain may indeed offer a unique technical opportunity to change cultures of transparency and trust within cyberspace, and as 'revolutionary' and 'disruptive' has the potential to shift global socioeconomic and political conventions. But as a yet largely unregulated, solutionist-driven phenomenon, blockchain exists squarely within the boundaries of capitalist logic and reason, fast becoming central to the business models of many sources of financial and political power the technology was specifically designed to undo, and increasingly allied to neoliberal strategies with scant regard for collective, political or democratic accountability in the public interest. Regulating Blockchain casts a critical eye over the technology, its 'ecosystem' of stakeholders, and offers a challenge to the prevailing discourse proclaiming it to be the great techno-social enabler of our times.
* The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. * The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. * This is a unique approach to end-to-end security and fills a niche in the market.
*** THE INTERNATIONAL BESTSELLER *** 'Destined to be a classic' Nouriel Roubini 'Brilliant, powerful and hopeful' Philippa Perry 'Explosive, timely and urgent' Daily Telegraph Even before a global pandemic introduced us to terms like social distancing, loneliness was already becoming the defining condition of the twenty-first century. But it's also one we have the power to reverse. Combining a decade of research with first-hand reporting, Noreena Hertz takes us from a 'how to communicate in real life' class for smartphone-addicted university students to bouncy castles at Belgian far-right gatherings, from paying for cuddles in the U.S. to nursing home residents knitting bonnets for their robot caregivers in Japan. The Lonely Century explores how our increasing dependence on technology, radical changes to the workplace and decades of policies that have placed self-interest above the collective good are damaging our communities and making us more isolated than ever before. With bold solutions for us as individuals as well as for businesses and governments, Noreena Hertz offers a hopeful and empowering vision for ow to heal our fractured world and come together again. 'If we could issue a reading list to 10 Downing Street, I'd put this book near the top.' Guardian 'Causing a deserved stir' Financial Times 'Revealing, empathetic and timely' Jonathan Freedland 'Read it, then pass it onto a friend.' Charlie Brooker
Winner of the 2017 N. Katherine Hayles Award for Criticism of Electronic Literature A CHOICE Outstanding Academic Title 2018 The digital age has had a profound impact on literary culture, with new technologies opening up opportunities for new forms of literary art from hyperfiction to multi-media poetry and narrative-driven games. Bringing together leading scholars and artists from across the world, The Bloomsbury Handbook of Electronic Literature is the first authoritative reference handbook to the field. Crossing disciplinary boundaries, this book explores the foundational theories of the field, contemporary artistic practices, debates and controversies surrounding such key concepts as canonicity, world systems, narrative and the digital humanities, and historical developments and new media contexts of contemporary electronic literature. Including guides to major publications in the field, The Bloomsbury Handbook of Electronic Literature is an essential resource for scholars of contemporary culture in the digital era.
The #1 New York Times bestselling author of Grain Brain and his physician son explore how modern culture threatens to rewire our brains and damage our health, offering a practical plan for healing. Contemporary life provides us with infinite opportunities, along with endless temptations. We can eat whatever we want, whenever we want. We can immerse ourselves in the vast, enticing world of digital media. We can buy goods and services with the touch of a button or the swipe of a finger. But living in this 24/7 hyper-reality poses serious risks to our physical and mental states, our connections to others and even to the world at large. Brain Wash builds from a simple premise: Our brains are being gravely manipulated, resulting in behaviours that leave us more lonely, anxious, depressed, distrustful, illness-prone and overweight than ever before. Based on the latest science, the book identifies the mental hijacking that undermines each and every one of us and presents the tools necessary to think more clearly, make better decisions, strengthen bonds with others and develop healthier habits. Featuring a 10-day boot camp program, including a meal plan and 40 delicious recipes, Brain Wash is the key to cultivating a more purposeful and fulfilling life. 'By showing us how to consciously rewire our brains for connection, compassion, and better decisions, Brain Wash provides a framework for reclaiming joy and health in the modern world.' - Deepak Chopra, author of Metahuman 'Brain Wash reveals how our day-to-day decisions are deeply influenced and actively manipulated by the modern world. But more importantly, it is a powerful manual that allows each of us to reclaim control of our choices and make better decisions that will pave the way for health and happiness. While we generally know what's best for ourselves, acting on this knowledge is a constant struggle. Brain Wash allows us to turn this knowledge into action. I highly recommend this innovative book.' - Daniel G. Amen, MD, founder, Amen Clinics and author of The End of Mental Illness
Cyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop provides a comprehensive technical guide on up-to-date new secure defending theories and technologies, novel design, and systematic understanding of secure architecture with practical applications. The book consists of 10 chapters, which are divided into three parts. The first three chapters extensively introduce secure state estimation technologies, providing a systematic presentation on the latest progress in security issues regarding state estimation. The next five chapters focus on the design of secure feedback control technologies in industrial control systems, displaying an extraordinary difference from that of traditional secure defending approaches from the viewpoint of network and communication. The last two chapters elaborate on the systematic secure control architecture and algorithms for various concrete application scenarios. The authors provide detailed descriptions on attack model and strategy analysis, intrusion detection, secure state estimation and control, game theory in closed-loop systems, and various cyber security applications. The book is useful to anyone interested in secure theories and technologies for industrial control systems. |
You may like...
Research Anthology on Social Media's…
Information Resources Management Association
Hardcover
R9,426
Discovery Miles 94 260
Multigenerational Online Behavior and…
Information Reso Management Association
Hardcover
R7,998
Discovery Miles 79 980
Management of Cybersecurity
Michael E. Whitman, Herbert J Mattord
Paperback
Multisensory Experiences - Where the…
Carlos Velasco, Marianna Obrist
Hardcover
R1,169
Discovery Miles 11 690
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi
Paperback
|