![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
By combing through the journals that Hannah has kept for much of her life, this collection of narrative essays deliver a fuller picture of her life, her experiences, and the things she's figured out about family, faith, love, sexuality, self-worth, friendship and fame. Revealing what makes Hannah tick, this sometimes cringe-worthy, poignant collection of stories is sure to deliver plenty of Hannah's wit and wisdom, and hopefully encourage you to try your hand at her patented brand of reckless optimism. Personal note: Hello, my darlings! I am incredibly pleased to present BUFFERING: Unshared Tales of a Life Fully Loaded! As a big fan of memoirs, I wanted to try my hand at writing about the events of my life that deserve a little more consideration than can be accomplished in 140-characters or a 6-minute vlog. Now on the cusp of turning 30, I'm ready to expose some parts of my life that I haven't shared before. Before, it was all about privacy, process and time. And now the time has come! I'm ready to put myself out there, for you. I'm a little nervous about all these vulnerable words going into the world, these tales about my love life, the wrestling I've done with faith, how I feel about sex and my family and myself. I've had a lot of trials, a lot of errors, but also a lot of passion. Here's the thing - I've always found comfort in the stories shared by others, so I hope my stories, now that I feel ready to tell them, will bring you some comfort too. And when you read this book please remember: Buffering is just the time it takes to process. Enjoy! Love, Hannah
Winner of the 2017 N. Katherine Hayles Award for Criticism of Electronic Literature A CHOICE Outstanding Academic Title 2018 The digital age has had a profound impact on literary culture, with new technologies opening up opportunities for new forms of literary art from hyperfiction to multi-media poetry and narrative-driven games. Bringing together leading scholars and artists from across the world, The Bloomsbury Handbook of Electronic Literature is the first authoritative reference handbook to the field. Crossing disciplinary boundaries, this book explores the foundational theories of the field, contemporary artistic practices, debates and controversies surrounding such key concepts as canonicity, world systems, narrative and the digital humanities, and historical developments and new media contexts of contemporary electronic literature. Including guides to major publications in the field, The Bloomsbury Handbook of Electronic Literature is an essential resource for scholars of contemporary culture in the digital era.
Cyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop provides a comprehensive technical guide on up-to-date new secure defending theories and technologies, novel design, and systematic understanding of secure architecture with practical applications. The book consists of 10 chapters, which are divided into three parts. The first three chapters extensively introduce secure state estimation technologies, providing a systematic presentation on the latest progress in security issues regarding state estimation. The next five chapters focus on the design of secure feedback control technologies in industrial control systems, displaying an extraordinary difference from that of traditional secure defending approaches from the viewpoint of network and communication. The last two chapters elaborate on the systematic secure control architecture and algorithms for various concrete application scenarios. The authors provide detailed descriptions on attack model and strategy analysis, intrusion detection, secure state estimation and control, game theory in closed-loop systems, and various cyber security applications. The book is useful to anyone interested in secure theories and technologies for industrial control systems.
This volume deals with the very novel issue of cyber laundering. The book investigates the problem of cyber laundering legally and sets out why it is of a grave legal concern locally and internationally. The book looks at the current state of laws and how they do not fully come to grips with the problem. As a growing practice in these modern times, and manifesting through technological innovations, cyber laundering is the birth child of money laundering and cybercrime. It concerns how the internet is used for 'washing' illicit proceeds of crime. In addition to exploring the meaning and ambits of the problem with concrete real-life examples, more importantly, a substantial part of the work innovates ways in which the dilemma can be curbed legally. This volume delves into a very grey area of law, daring a yet unthreaded territory and scouring undiscovered paths where money laundering, cybercrime, information technology and international law converge. In addition to unearthing such complexity, the hallmark of this book is in the innovative solutions and dynamic remedies it postulates.
The information society is a key issue in everyday life and a phenomenon enc- passing social, cultural, economic, and legal facettes. Currently, an information society's legal framework is gradually crystallizing under the newly introduced term of "Internet governance." During the last few years, intensive discussions about the contents of Internet governance have addressed manifold aspects of a possible regulatory regime. In light of the general comprehension that an international treaty structure is mi- ing and that self-regulation as a normative model does not sufce in all respects, new architectural and constitutional theories have been developed; furthermore, the international body of the Internet Governance Forum (IGF) came to life. N- withstanding the available literature on IGF, however, a thorough and systematic study sheding light on the main topics of Internet governance (such as legitimacy, transparency, accountability, and participation) and on the key regulatory issues (for example critical Internet resources, access, protection of civil liberties/- man rights, realization of security, safety and privacy standards, as well as the overcoming of the digital divide) from a legal perspective is not yet at hand. The present publication aims at discussing these legal challenges. This book has benefted from many inputs and encouragements from colleagues that I am deeply grateful for. In particular, I am indebted to the very meaningful discussions and valuable support in the preparation of the publication by my - search assistants lic. iur Mirin . a Grosz and lic. iurR . omana Weber, to lic. iur.
With 101 tips explaining the dos and don'ts of virtual meetings, delivered with abundant humour, You're On Mute will help you master video calls in "the new normal." If life on Zoom is getting you down and you're dreading the next inevitable invite to a Teams meeting, don't panic, help is at hand. Whether you need to stop doing that weird wave at the end of meetings or want to break the habit of being transfixed by your own face in the corner of the screen, the fun advice inside this book has got you covered. Advice includes: Mastering online etiquette - from the right way to say hello to the right time to hang up How to make multi-generational family video calls workable for both grandparents and children ("You're still on mute, grandma!") Ensuring your next video quiz is an entertaining test of knowledge rather than a painful test of endurance Best practices for work-related video calls, from being sensitive to camera-shy coworkers to the ideal backdrop for a job interview Successfully navigating an online romance, covering first dates to long-term relationships Avoiding the "must not dos" of video calls, whether it's the serious matter of security or the shame of surprise screen sharing In no time you'll be living your best life online, bringing your A game to any virtual work meeting, catch-up with family, quiz with friends, online date and more.
The Asset Protection and Security Management Handbook is a must for all professionals involved in the protection of assets. For those new to the security profession, the text covers the fundamental aspects of security and security management providing a firm foundation for advanced development. For the experienced security practitioner, it provides the tools necessary for developing effective solutions and responses to the growing number of challenges encountered by today's security professionals.
This book explores the different treatment of writing by women and writing by men in twenty-first-century Spain. Focusing on contemporary Spanish authors Ana Maria Matute (1926-2014), Rosa Montero (1952-), and Lucia Etxebarria (1966-), the author examines how Spanish women writers are marketed in Spain and, in particular, how current marketing strategies reinforce traditional structures of femininity. Through an analysis of their work and lives in the context of the Franco Regime, the Transition to democracy and contemporary Spain, this book provides an innovative study of the construction of the public personae of these key female writers. As social media and the internet transform authors' relationship with their readers, the rapidly shifting publishing industry offers an important context for the difficult balance between high levels of reception and visibility and the persistence of traditional gender stereotypes.
Multilayer networks is a rising topic in Network Science which characterizes the structure and the function of complex systems formed by several interacting networks. Multilayer networks research has been propelled forward by the wide realm of applications in social, biological and infrastructure networks and the large availability of network data, as well as by the significance of recent results, which have produced important advances in this rapidly growing field. This book presents a comprehensive account of this emerging field. It provides a theoretical introduction to the main results of multilayer network science.
The concept of immersive multimedia, which is closely related to concepts of augmented reality, brings opportunities in art, education, entertainment, and technology. As such, it is vital to explore the connections between consumers of media content and information parts that come from multimedia platforms. Trends, Experiences, and Perspectives in Immersive Multimedia and Augmented Reality is a critical scholarly resource that offers solutions to the problems that appear in both theoretical and practical dimensions of immersive multimedia experiences on an interdisciplinary platform. Featuring coverage on a broad range of topics such as cyber behavior, human-computer interaction, and transmedia, this book is geared towards digital artists, media professionals, developers, academicians, researchers, and upper-level graduate students seeking current research on the exploration of immersive multimedia through the perspectives of technology, communications, and art.
This edited collection brings together academics and practitioners to explore the uses of Digital Storytelling, which places the greatest possible emphasis on the voice of the storyteller. Case studies are used as a platform to investigate questions of concept, theory and practice, and to shine an interrogative light on this emergent form of participatory media. The collection examines the creative and academic roots of Digital Storytelling before drawing on a range of international examples to consider the way in which the practice has established itself and evolved in different settings across the world.
Multimedia, which may be defined as interactive digital media, is a synthesis of traditional forms of art and communication with the rapidly-evolving fields of computing and networking. A variety of technical and social/cultural disciplines are involved: audio, graphic, hardware, human factors, networking, software, telecommunications, and video. A large and often incomprehensible vocabulary has resulted from the convergence of these diverse disciplines. Comprehensive, concise and clearly written, The Dictionary of Multimedia presents and defines the "language" that has resulted from this convergence -- from A: B: C notation to z-sorting. Industry-standard acronyms are also spelled out and defined. Extended definitions of important concepts such as MIDI Fire Wire, and MPEG are included. Features of the new Second Edition include: more than 4,000 terms (50% more than in the 1998 edition); additional illustrations and graphic examples; in-depth treatment of Internet technologies: XML, HTML 4.0, JavaScript; new standards: MPEG-2 and other video codecs, DVD, VRML, Dolby Audio; new bus architectures and operating systems; updated treatment of the latest hardware; JAVA programming references; etc.
Social media pervades people's awareness and everyday lives while also influencing societal and cultural patterns. In response to the social media age, advertising agents are creating new strategies that best suit changing consumer relationships. The Handbook of Research on Effective Advertising Strategies in the Social Media Age focuses on the radically evolving field of advertising within the new media environment. Covering new strategies, structural transformation of media, and changing advertising ethics, this book is a timely publication for policymakers, government officials, academicians, researchers, and school practitioners interested in furthering their research exposure and analyzing the rapidly evolving advertising sector and its reflection on social media.
This book stems from the CyberBRICS project, which is the first major attempt to produce a comparative analysis of Internet regulations in the BRICS countries - namely, Brazil, Russia, India, China, and South Africa. The project has three main objectives: 1) to map existing regulations; 2) to identify best practices; and 3) to develop policy recommendations in the various areas that compose cybersecurity governance, with a particular focus on the strategies adopted by the BRICS countries to date. Each study covers five essential dimensions of cybersecurity: data protection, consumer protection, cybercrime, the preservation of public order, and cyberdefense. The BRICS countries were selected not only for their size and growing economic and geopolitical relevance but also because, over the next decade, projected Internet growth is expected to occur predominantly in these countries. Consequently, the technology, policy and governance arrangements defined by the BRICS countries are likely to impact not only the 3.2 billion people living in them, but also the individuals and businesses that choose to utilize increasingly popular applications and services developed in BRICS countries according to BRICS standards. Researchers, regulators, start-up innovators and other Internet stakeholders will find this book a valuable guide to the inner workings of key cyber policies in this rapidly growing region.
The book is relevant for various regions including the US, UK, Australia, Western European nations and New Zealand. Key informants offer insights for policy and practice. Rich theoretical analysis further contextualizes findings and provides analysis to advance the field.
Evolutionary Psychology and Digital Games: Digital Hunter-Gatherers is the first edited volume that systematically applies evolutionary psychology to the study of the use and effects of digital games. The book is divided into four parts: Theories and Methods Emotion and Morality Social Interaction Learning and Motivation These topics reflect the main areas of digital games research as well as some of the basic categories of psychological research. The book is meant as a resource for researchers and graduate students in psychology, anthropology, media studies and communication as well as video game designers who are interested in learning more about the evolutionary roots of player behaviors and experiences.
When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks-using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell. The book taps into Bruce Middleton's decades of experience with computer security, including penetration testing of military networks, the White House, utilities, manufacturing facilities, CIA headquarters, the Defense Information Systems Agency, and NASA. Mr. Middleton begins with a chapter on defensive measures/privacy issues and then moves on to describe a cyber-attack on one of his labs and how he responded to the attack. Next, the book explains how to research a target without directly "touching" that target. Once you've learned all you can, the text describes how to gather even more information using a more direct approach. From there, it covers mathematical analysis, considers target exploitation, and discusses Chinese and Syrian cyber-attacks. Providing authoritative guidance on cyberforensics, reverse engineering, and penetration testing, the book categorizes testing tools according to their use within the standard penetration testing framework. For each of the above-mentioned categories, you will find basic and advanced tools and procedures to help you identify security vulnerabilities in today's networks. After reading this book, you will understand how to perform an organized and efficient penetration test. You will also learn techniques used to bypass anti-virus software and capture keystrokes of remote systems. Explaining how to put together your own penetration testing lab, the text concludes by describing how to utilize various iPhone apps to perform reconnaissance activities on wireless networks.
3D printing poses many challenges to the traditional law of intellectual property (IP). This book develops a technical method to help overcome some of these legal challenges and difficulties. This is a collection of materials from empirical interviews, workshops and publications that have been carried out in one of the world's leading research projects into the legal impact of 3D printing. The project was designed to establish what legal challenges 3D printing companies thought they faced, and having done that, to establish a technical framework for a solution.
Digital Existence: Ontology, Ethics and Transcendence in Digital Culture advances debates on digital culture and digital religion in two complementary ways. First, by focalizing the themes 'ontology,' 'ethics' and 'transcendence,' it builds on insights from research on digital religion in order to reframe the field and pursue an existential media analysis that further pushes beyond the mandatory focus in mainstream media studies on the social, cultural, political and economic dimensions of digitalization. Second, the collection also implies a broadening of the scope of the debate in the field of media, religion and culture - and digital religion in particular - beyond 'religion,' to include the wider existential dimensions of digital media. It is the first volume on our digital existence in the budding field of existential media studies.
This book provides a comprehensive guide to procuring, utilizing and monetizing intellectual property rights, tailored for readers in the high-tech consumer electronics and software industries, as well as technology startups. Numerous, real examples, case studies and scenarios are incorporated throughout the book to illustrate the topics discussed. Readers will learn what to consider throughout the various creative phases of a product's lifespan from initial research and development initiatives through post-production. Readers will gain an understanding of the intellectual property protections afforded to U.S. corporations, methods to pro-actively reduce potential problems, and guidelines for future considerations to reduce legal spending, prevent IP theft, and allow for greater profitability from corporate innovation and inventiveness.
Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to duplicate and understand how the attack works. It enables experimenting with hacking techniques without fear of corrupting computers or violating any laws. Written in a lab manual style, the book begins with the installation of the VMware Workstation product and guides the users through detailed hacking labs enabling them to experience what a hacker actually does during an attack. It covers social engineering techniques, footprinting techniques, and scanning tools. Later chapters examine spoofing techniques, sniffing techniques, password cracking, and attack tools. Identifying wireless attacks, the book also explores Trojans, Man-in-the-Middle (MTM) attacks, and Denial of Service (DoS) attacks. Learn how to secure your computers with this comprehensive guide on hacking techniques and countermeasures By understanding how an attack occurs the reader can better understand how to defend against it. This book shows how an attack is conceptualized, formulated, and performed. It offers valuable information for constructing a system to defend against attacks and provides a better understanding of securing your own computer or corporate network.
From Style Rookie to Style Bubble, personal style blogs exploded onto the scene in the mid-2000s giving voice to young and stylish writers who had their own unique take on the seasonal fashion cycle and how to curate an individual style within the shifting swirl of trends. Personal Style Blogs examines the history and rise of style blogging and looks closely at the relationship between bloggers and their (often anonymous) readers as well as the response of the fashion industry to style bloggers' amateur and often unauthorized fashion reportage. The book charts the development of the style blogosphere and its transformation from an alternative, experimental space to one dominated by the fashion industry. Complete with examples of several famous fashion bloggers, such as Susie Lau, Rumi Neely and Tavi Gevinson, the author explores notions of individuality, aesthetics and performance on both sides of the digital platform. Findlay asks: what can style blogging teach us about women's writing and the performance of a private self online? And what drives style bloggers to carve a space for themselves online?
Address Errors before Users Find ThemUsing a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of "smart" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test. The book guides you step by step starting with the basics. It explains patterns and techniques ranging from simple mind mapping to sophisticated test labs. For traditional testers moving into the mobile and embedded area, the book bridges the gap between IT and mobile/embedded system testing. It illustrates how to apply both traditional and new approaches. For those working with mobile/embedded systems without an extensive background in testing, the book brings together testing ideas, techniques, and solutions that are immediately applicable to testing smart and mobile devices.
The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference. The changes in the technology of information security and the increasing threats to security make a complete and up-to-date understanding of this material essential. Volume 4 supplements the information in the earlier volumes of this handbook, updating it and keeping it current. Organized by the ten domains of the Common Body of Knowledge (CBK) on which the CISSP exam is based, this volume gives you the information you need to understand what makes information secure and how to secure it. Because the knowledge required to master information security - the CBK - is growing so quickly, there is little duplication of material among the four volumes. As a study guide or resource that you can use on the job, the Information Security Management Handbook, Fourth Edition, Volume 4 is the book you will refer to over and over again. |
You may like...
Quality in Online Programs - Approaches…
Swapna Kumar, Patricia Arnold
Hardcover
R3,993
Discovery Miles 39 930
Silver Threads - 25 Years of…
Beverly Kane, Jean Millay, …
Hardcover
Research Anthology on Digital…
Information Reso Management Association
Hardcover
R21,626
Discovery Miles 216 260
The Greatest Yoga Tips In The World
David Gellineau, David Robson
DVD
Successful Fundraising for the Academic…
Kathryn Dilworth, Laura Henzl
Paperback
R1,455
Discovery Miles 14 550
|