![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
'Child Soldiers and the Lubanga Case' and 'The Tallinn Manual on the International Law Applicable to Cyber Warfare' are the two central themes of this volume. Each of these timely topics is addressed from three different angles, providing a truly comprehensive analysis of the subject. The book also features an article on the duty to investigate civilian casualties during armed conflict and its implementation in practice and an elaborate year in review, discussing developments that occurred in 2012. The Yearbook of International Humanitarian Law is the world's only annual publication devoted to the study of the laws governing armed conflict. It provides a truly international forum for high-quality, peer-reviewed academic articles focusing on this crucial branch of international law. Distinguished by contemporary relevance, the Yearbook of International Humanitarian Law bridges the gap between theory and practice and serves as a useful reference tool for scholars, practitioners, military personnel, civil servants, diplomats, human rights workers and students.
accessible for readers unfamiliar with both SDGs and ESG concepts; it will enable leaders and businesses to assess deployment and development of AI more easily
Today's urban environments are layered with data and algorithms that fundamentally shape how we perceive and move through space. But are our digitally dense environments continuing to amplify inequalities rather than alleviate them? This book looks at the key contours of information inequality, and who, what and where gets left out. Platforms like Google Maps and Wikipedia have become important gateways to understanding the world, and yet they are characterised by significant gaps and biases, often driven by processes of exclusion. As a result, their digital augmentations tend to be refractions rather than reflections: they highlight only some facets of the world at the expense of others. This doesn't mean that more equitable futures aren't possible. By outlining the mechanisms through which our digital and material worlds intersect, the authors conclude with a roadmap for what alternative digital geographies might look like.
This volume presents analyses of data protection systems and of 26 jurisdictions with data protection legislation in Africa, as well as additional selected countries without comprehensive data protection laws. In addition, it covers all sub-regional and regional data privacy policies in Africa. Apart from analysing data protection law, the book focuses on the socio-economic contexts, political settings and legal culture in which such laws developed and operate. It bases its analyses on the African legal culture and comparative international data privacy law. In Africa protection of personal data, the central preoccupation of data privacy laws, is on the policy agenda. The recently adopted African Union Cyber Security and Data Protection Convention 2014, which is the first and currently the only single treaty across the globe to address data protection outside Europe, serves as an illustration of such interest. In addition, there are data protection frameworks at sub-regional levels for West Africa, East Africa and Southern Africa. Similarly, laws on protection of personal data are increasingly being adopted at national plane. Yet despite these data privacy law reforms there is very little literature about data privacy law in Africa and its recent developments. This book fills that gap.
Starting with the inception of an education program and progressing through its development, implementation, delivery, and evaluation, Managing an Information Security and Privacy Awareness and Training Program, Second Edition provides authoritative coverage of nearly everything needed to create an effective training program that is compliant with applicable laws, regulations, and policies. Written by Rebecca Herold, a well-respected information security and privacy expert named one of the "Best Privacy Advisers in the World" multiple times by Computerworld magazine as well as a "Top 13 Influencer in IT Security" by IT Security Magazine, the text supplies a proven framework for creating an awareness and training program. It also:
Complete with case studies and examples from a range of businesses and industries, this all-in-one resource provides the holistic and practical understanding needed to identify and implement the training and awareness methods best suited to, and most effective for, your organization. Praise for: The first edition was outstanding. The new second edition is
even better ... the definitive and indispensable guide for
information security and privacy awareness and training
professionals, worth every cent. As with the first edition, we
recommend it unreservedly..
Aimed at people over the age of 50 and written by an expert in the field, Joli Ballew, this book covers the topic of laptop computers.
'A superb romcom, with relatable and loveable characters that literally burst from the pages. With laugh-out-loud moments, woven between a heartwarming and hopeful story, it charmed me from the first page' Carmel Harrington True love is only just a swipe away? Right? Iris lives by numbers. The only thing missing from her perfectly calibrated life is a partner - and not for lack of trying. After decades of disappointment, Iris practically has a PhD in online dating. But something still eludes her: that unquantifiable spark. Kim is too busy being the life of the party to look for love. Her terrible dates make great stories for her friends and co-workers, as long as she's not caught by her tyrannical boss, Iris. Connie, Kim's recently widowed mum, is single for the first time since the 1970s. The dating game has changed a lot since her day . . . Sick of being let down, Iris takes matters into her own hands - using her analytical skills to create the first real formula for love. With Kim and Connie on board, they launch Analyzed, a dating app like no other. As Analyzed takes the world by storm, are the three women in over their heads? Is love really just a numbers game? 'A laugh on every page, entirely empathetic characters and a warm heart in the middle of the story. I found this book highly entertaining and totally satisfying' Liz Nugent Praise for Claudia Carroll: 'Brilliantly funny' Sun 'An immensely talented writer' Sinead Moriarty 'Brilliant' Bella
Save some green by going green with these environmentally friendly gadgets With concern for the future of our environment growing stronger and more serious every day, there has never been a better time to take a new approach to some of the most popular gizmos and gadgets on the market and learn how you can convernt to electronics that have minimal environmental impact. Green gadgets encompass everything from iPods to energy-efficient home entertainment devices to solar laptop chargers and crank-powered gizmos. This helpful resource explains how to research green gadgets, make a smart purchasing decision, use products you already own in a more environmentally friendly way, and say goodbye to electronics that zap both energy and money.Explore the environmental and financial benefits of green gadgets with this friendly referenceDiscusses which gadgets save energy-and which ones create energyLearn ways to offset your carbon footprint when you can't reduce consumptionGet tips for understanding products labels and avoiding "greenwash"Discover how to calculate the energy and money your gadgets consume Get moving and start living green with this informative guide to environmentally and wallet-friendly gadgets Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
This book is open access and available on www.bloomsburycollections.com. It is funded by Knowledge Unlatched. In The Digital Logic of Death, Steven Pustay skillfully makes visible the immensely important but often overlooked role that moving images play in shaping our understanding of mortality. This relationship, he argues, is made all the more urgent by the technologies of the digital age, which have profoundly altered our ability to represent and contemplate death through moving images, resulting in an entirely new cultural logic of death. To draw out this new logic, Pustay presents accessible readings of otherwise dense and difficult philosophical approaches to death - such as those found in existentialism, psychoanalysis, and critical theory - by reading them through the lens of contemporary media. From art-house films like Irreversible and The Fountain to blockbusters like the Matrix trilogy, from television commercials for M&M's to pay-cable dramas like The Sopranos and Breaking Bad, from first-person shooters like Bioshock to indie-games like LIMBO, Pustay shows how moving images have shifted our understanding of death in general and our recognition of our own finiteness in particular.
In one modest-sized volume, this book offers three valuable sets of knowledge. First, it provides best practice guidance on virtually every large-scale task a modern manager may be involved in-from recruiting and hiring to onboarding and leading teams, and from employee engagement and retention to performance management and working with difficult employees. Second, it explains the essential concepts and practice of a range of effective leadership styles-including (but not limited to) servant leadership, crisis leadership, change agent leadership, and diversity and inclusion leadership. Third, it offers brief case studies from select CISOs and CSOs on how these management and leadership principles and practices play out in real-life workplace situations. The best practice essentials provided throughout this volume will empower aspiring leaders and also enable experienced managers to take their leadership to the next level. Many if not most CISOs and other leaders have had very little, if any, formal training in management and leadership. The select few that have such training usually obtained it through academic courses that take a theoretical, broad brush approach. In contrast, this book provides much actionable guidance in the nitty-gritty tasks that managers must do every day. Lack of management practical knowledge puts CISOs and CSOs at a disadvantage vis-a-vis other executives in the C-suite. They risk being pigeonholed as "security cops" rather than respected business leaders. Many articles on these subjects published in the press are too incomplete and filled with bad information. And combing through the few high-quality sources that are out there, such as Harvard Business Publishing, can take hundreds of dollars in magazine subscription and book purchase fees and weeks or months of reading time. This book puts all the essential information into your hands through a series of concise chapters authored by an award-winning writer.
An essential guide to studying symmetrical component theory * Provides concise treatment of symmetrical components * Describes major sequence models of power system components * Discusses Electromagnetic Transient Program (EMTP) models * Includes worked examples to illustrate the complexity of calculations, followed by matrix methods of solution which have been adopted for calculations on digital computers
In Intersectional Tech: Black Users in Digital Gaming, Kishonna L. Gray interrogates blackness in gaming at the intersections of race, gender, sexuality, and (dis)ability. Situating her argument within the context of the concurrent, seemingly unrelated events of Gamergate and the Black Lives Matter movement, Gray highlights the inescapable chains that bind marginalized populations to stereotypical frames and limited narratives in video games. Intersectional Tech explores the ways that the multiple identities of black gamers some obvious within the context of games, some more easily concealed affect their experiences of gaming. The normalization of whiteness and masculinity in digital culture inevitably leads to isolation, exclusion, and punishment of marginalized people. Yet, Gray argues, we must also examine the individual struggles of prejudice, discrimination, and microaggressions within larger institutional practices that sustain the oppression. These ""new"" racisms and a complementary colorblind ideology are a kind of digital Jim Crow, a new mode of the same strategies of oppression that have targeted black communities throughout American history. Drawing on extensive interviews that engage critically with identity development and justice issues in gaming, Gray explores the capacity for gaming culture to foster critical consciousness, aid in participatory democracy, and effect social change. Intersectional Tech is rooted in concrete situations of marginalized members within gaming culture. It reveals that despite the truths articulated by those who expose the sexism, racism, misogyny, and homophobia that are commonplace within gaming communities, hegemonic narratives continue to be privileged. This text, in contrast, centers the perspectives that are often ignored and provides a critical corrective to notions of gaming as a predominantly white and male space.
This topical book critically examines the regulatory framework for generic Top-Level Domains (gTLDs) on the Internet. The regulation drawn up by the Internet Corporation for Assigned Names and Numbers (ICANN) applies at a global level, complementing national and international law. These rules form part of a growing body of transnational private regulation. Generic Top-Level Domains offers a clear and engaging analysis of how ICANN has tackled a diverse set of regulatory issues related to the introduction of new gTLDs, such as property rights, competition and consumer protection. Studying recent case law, the book argues for a stronger focus on procedural fairness for future introductions of new gTLDs. It also highlights how ICANN's contractual framework regulates the registration and use of domain names and argues that ICANN's regulatory authority ought to be clarified in order to avoid regulatory overreach. Uniquely comprehensive, this book will appeal to students and scholars with an interest in Internet governance, domain name law and transnational private regulation. Practitioners working in the domain name industry will also find this a valuable resource.
Security without Obscurity: Frequently Asked Questions (FAQ) complements Jeff Stapleton's three other Security without Obscurity books to provide clear information and answers to the most commonly asked questions about information security (IS) solutions that use or rely on cryptography and key management methods. There are good and bad cryptography, bad ways of using good cryptography, and both good and bad key management methods. Consequently, information security solutions often have common but somewhat unique issues. These common and unique issues are expressed as an FAQ organized by related topic areas. The FAQ in this book can be used as a reference guide to help address such issues. Cybersecurity is based on information technology (IT) that is managed using IS controls, but there is information, misinformation, and disinformation. Information reflects things that are accurate about security standards, models, protocols, algorithms, and products. Misinformation includes misnomers, misunderstandings, and lack of knowledge. Disinformation can occur when marketing claims either misuse or abuse terminology, alluding to things that are inaccurate or subjective. This FAQ provides information and distills misinformation and disinformation about cybersecurity. This book will be useful to security professionals, technology professionals, assessors, auditors, managers, and hopefully even senior management who want a quick, straightforward answer to their questions. It will serve as a quick reference to always have ready on an office shelf. As any good security professional knows, no one can know everything.
Many of the most dynamic public companies, from Alibaba to Facebook to Visa, and the most valuable start-ups, such as Airbnb and Uber, are matchmakers that connect one group of customers with another group of customers. Economists call matchmakers multisided platforms because they provide physical or virtual platforms for multiple groups to get together. Dating sites connect people with potential matches, for example, and ride-sharing apps do the same for drivers and riders. Although matchmakers have been around for millennia, they're becoming more and more popular--and profitable--due to dramatic advances in technology, and a lot of companies that have managed to crack the code of this business model have become today's power brokers. Don't let the flashy successes fool you, though. Starting a matchmaker is one of the toughest business challenges, and almost everyone who tries to build one, fails. In Matchmakers, David Evans and Richard Schmalensee, two economists who were among the first to analyze multisided platforms and discover their principles, and who've consulted for some of the most successful platform businesses in the world, explain how matchmakers work best in practice, why they do what they do, and how entrepreneurs can improve their chances for success. Whether you're an entrepreneur, an investor, a consumer, or an executive, your future will involve more and more multisided platforms, and Matchmakers--rich with stories from platform winners and losers--is the one book you'll need in order to navigate this appealing but confusing world.
Today's high-speed and rapidly changing development environments demand equally high-speed security practices. Still, achieving security remains a human endeavor, a core part of designing, generating and verifying software. Dr. James Ransome and Brook S.E. Schoenfield have built upon their previous works to explain that security starts with people; ultimately, humans generate software security. People collectively act through a particular and distinct set of methodologies, processes, and technologies that the authors have brought together into a newly designed, holistic, generic software development lifecycle facilitating software security at Agile, DevOps speed. -Eric. S. Yuan, Founder and CEO, Zoom Video Communications, Inc. It is essential that we embrace a mantra that ensures security is baked in throughout any development process. Ransome and Schoenfield leverage their abundance of experience and knowledge to clearly define why and how we need to build this new model around an understanding that the human element is the ultimate key to success. -Jennifer Sunshine Steffens, CEO of IOActive Both practical and strategic, Building in Security at Agile Speed is an invaluable resource for change leaders committed to building secure software solutions in a world characterized by increasing threats and uncertainty. Ransome and Schoenfield brilliantly demonstrate why creating robust software is a result of not only technical, but deeply human elements of agile ways of working. -Jorgen Hesselberg, author of Unlocking Agility and Cofounder of Comparative Agility The proliferation of open source components and distributed software services makes the principles detailed in Building in Security at Agile Speed more relevant than ever. Incorporating the principles and detailed guidance in this book into your SDLC is a must for all software developers and IT organizations. -George K Tsantes, CEO of Cyberphos, former partner at Accenture and Principal at EY Detailing the people, processes, and technical aspects of software security, Building in Security at Agile Speed emphasizes that the people element remains critical because software is developed, managed, and exploited by humans. This book presents a step-by-step process for software security that uses today's technology, operational, business, and development methods with a focus on best practice, proven activities, processes, tools, and metrics for any size or type of organization and development practice.
Is your enterprise's strategy for cybersecurity just crossing its fingers and hoping nothing bad ever happens? If so...you're not alone. Getting cybersecurity right is all too often an afterthought for Fortune 500 firms, bolted on and hopefully creating a secure environment. We all know this approach doesn't work, but what should a smart enterprise do to stay safe? Today, cybersecurity is no longer just a tech issue. In reality, it never was. It's a management issue, a leadership issue, a strategy issue: It's a "must have right"...a survival issue. Business leaders and IT managers alike need a new paradigm to work together and succeed. After years of distinguished work as a corporate executive, board member, author, consultant, and expert witness in the field of risk management and cybersecurity, David X Martin is THE pioneering thought leader in the new field of CyRMSM. Martin has created an entirely new paradigm that approaches security as a business problem and aligns it with business needs. He is the go-to guy on this vitally important issue. In this new book, Martin shares his experience and expertise to help you navigate today's dangerous cybersecurity terrain, and take proactive steps to prepare your company-and yourself -to survive, thrive, and keep your data (and your reputation) secure.
A heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the foundation of security. This book sheds light upon security threats, defenses, and remediation on various networking and data processing domains, including wired networks, wireless networks, mobile ad-hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control. The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at: Access control methods in cloud-enabled Internet of Things Secure routing algorithms for mobile ad-hoc networks Building security trust in mobile ad-hoc networks using soft computing methods The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain Password authentication and keystroke biometrics Health care data analytics over Big Data Bluetooth: and its open issues for managing security services in heterogenous networks Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace.
Tackling the cybersecurity challenge is a matter of survival for society at large. Cyber attacks are rapidly increasing in sophistication and magnitude-and in their destructive potential. New threats emerge regularly, the last few years having seen a ransomware boom and distributed denial-of-service attacks leveraging the Internet of Things. For organisations, the use of cybersecurity risk management is essential in order to manage these threats. Yet current frameworks have drawbacks which can lead to the suboptimal allocation of cybersecurity resources. Cyber insurance has been touted as part of the solution - based on the idea that insurers can incentivize companies to improve their cybersecurity by offering premium discounts - but cyber insurance levels remain limited. This is because companies have difficulty determining which cyber insurance products to purchase, and insurance companies struggle to accurately assess cyber risk and thus develop cyber insurance products. To deal with these challenges, this volume presents new models for cybersecurity risk management, partly based on the use of cyber insurance. It contains: A set of mathematical models for cybersecurity risk management, including (i) a model to assist companies in determining their optimal budget allocation between security products and cyber insurance and (ii) a model to assist insurers in designing cyber insurance products. The models use adversarial risk analysis to account for the behavior of threat actors (as well as the behavior of companies and insurers). To inform these models, we draw on psychological and behavioural economics studies of decision-making by individuals regarding cybersecurity and cyber insurance. We also draw on organizational decision-making studies involving cybersecurity and cyber insurance. Its theoretical and methodological findings will appeal to researchers across a wide range of cybersecurity-related disciplines including risk and decision analysis, analytics, technology management, actuarial sciences, behavioural sciences, and economics. The practical findings will help cybersecurity professionals and insurers enhance cybersecurity and cyber insurance, thus benefiting society as a whole. This book grew out of a two-year European Union-funded project under Horizons 2020, called CYBECO (Supporting Cyber Insurance from a Behavioral Choice Perspective).
In the past decade, artificial intelligence (AI) has become a disruptive force around the world, offering enormous potential for innovation but also creating hazards and risks for individuals and the societies in which they live. This volume addresses the most pressing philosophical, ethical, legal, and societal challenges posed by AI. Contributors from different disciplines and sectors explore the foundational and normative aspects of responsible AI and provide a basis for a transdisciplinary approach to responsible AI. This work, which is designed to foster future discussions to develop proportional approaches to AI governance, will enable scholars, scientists, and other actors to identify normative frameworks for AI to allow societies, states, and the international community to unlock the potential for responsible innovation in this critical field. This book is also available as Open Access on Cambridge Core.
A vital toolkit for managing the news cycle and finding a happier and calmer life at a time when the news is more upsetting than ever STOP READING THE NEWS is a vital toolkit for managing the upsetting coronavirus news cycle and finding equilibrium and calm at a time of chaos and uncertainty In 2013 Rolf Dobelli stood in front of a roomful of journalists and proclaimed that he did not read the news. It caused a riot. Now the author of the bestselling The Art of Thinking Clearly finally sets down his philosophy in detail. And he practises what he preaches: he hasn't read the news for a decade. Stop Reading the News is Dobelli's manifesto about the dangers of the most toxic form of information - news. He shows the damage it does to our concentration and well-being, and how a misplaced sense of duty can misdirect our behaviour. Most importantly, he offers the reader the guidance on how to live without news, and the many potential gains to be had: less disruption, more time, less anxiety, more insights. In a world of increasing disruption and division, Stop Reading the News is a welcome voice of calm and wisdom.
Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy. Topics include addressing vulnerabilities, building a secure enterprise, blocking intrusions, ethical and legal issues, and business continuity. Updates include topics such as cyber risks in mobile telephony, steganography, cybersecurity as an added value, ransomware defense, review of recent cyber laws, new types of cybercrime, plus new chapters on digital currencies and encryption key management.
Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations.
Social media applications can be weaponized with very little skill. Social media warfare has become a burden that nation states, government agencies, and corporations need to face. To address the social media warfare threat in a reasonable manner that reduces uncertainty requires dedication and attention over a very long-term. To stay secure, they need to develop the capability to defend against social media warfare attacks. Addressing unconventional warfare strategies and tactics takes time and experience, plus planning and dedication. This book will help managers develop a sound understanding of how social media warfare can impact their nation or their organization.
As the distributed architecture underpinning the initial Bitcoin anarcho-capitalist, libertarian project, 'blockchain' entered wider public imagination and vocabulary only very recently. Yet in a short space of time it has become more mainstream and synonymous with a spectacular variety of commercial and civic 'problem'/'solution' concepts and ideals. From commodity provenance, to electoral fraud prevention, to a wholesale decentralisation of power and the banishing of the exploitative practices of 'middlemen', blockchain stakeholders are nothing short of evangelical in their belief that it is a force for good. For these reasons and more the technology has captured the attention of entrepreneurs, venture capitalists, global corporations and governments the world over. Blockchain may indeed offer a unique technical opportunity to change cultures of transparency and trust within cyberspace, and as 'revolutionary' and 'disruptive' has the potential to shift global socioeconomic and political conventions. But as a yet largely unregulated, solutionist-driven phenomenon, blockchain exists squarely within the boundaries of capitalist logic and reason, fast becoming central to the business models of many sources of financial and political power the technology was specifically designed to undo, and increasingly allied to neoliberal strategies with scant regard for collective, political or democratic accountability in the public interest. Regulating Blockchain casts a critical eye over the technology, its 'ecosystem' of stakeholders, and offers a challenge to the prevailing discourse proclaiming it to be the great techno-social enabler of our times. |
You may like...
SAS Certification Prep Guide…
Joni N Shreve, Donna Dea Holland
Hardcover
R2,889
Discovery Miles 28 890
Did Not Our Heart Burn Within Us? - A…
Charles R. Lundelius
Hardcover
Created to Worship - God's Invitation to…
Brent D. Peterson
Paperback
|