0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (125)
  • R250 - R500 (451)
  • R500+ (1,355)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > General

Windows Networking Tools - The Complete Guide to Management, Troubleshooting, and Security (Hardcover): Gilbert Held Windows Networking Tools - The Complete Guide to Management, Troubleshooting, and Security (Hardcover)
Gilbert Held
R5,084 Discovery Miles 50 840 Ships in 10 - 15 working days

Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security explains how to use built-in Windows networking tools and third-party networking products to diagnose network problems, address performance issues, and enhance the overall security of your system and network. It starts with a review of the major components of the TCP/IP protocol suite, as well as IP and MAC addressing, to provide a clear understanding of the various networking tools and how they are used in a LAN and a TCP/IP networking environment. Although the book focuses on built-in Windows networking tools, it also investigates a number of third-party products that can enhance the performance of your computer. It identifies tools to help you to understand the traffic flow and operational status of your network , illustrates the use of numerous tools, and shows you several methods to protect your computers from malicious software. It also examines one of the best programs for examining the flow of data on a network Wireshark and explains how to use this program to scan for open ports and discover vulnerability issues. In addition to helping you gain insight into existing problems, the text highlights built-in Windows networking tools that can help to determine if you can expect future bandwidth bottlenecks or other problems to occur under different growth scenarios. Placing the proven methods of an industry veteran at your fingertips, the book includes a chapter devoted to software programs that can enhance the security of your network. It explains how to negate the operation of unwanted advertisement trackers as well as how to minimize and alleviate the various types of hacking from keyboard loggers to network viruses. In the event your computational device is lost or stolen a cryptographic program is described that results in data becoming meaningless to the person or persons attempting to read your

Brain Wash - Detox Your Mind for Clearer Thinking, Deeper Relationships and Lasting Happiness (Paperback): David Perlmutter Brain Wash - Detox Your Mind for Clearer Thinking, Deeper Relationships and Lasting Happiness (Paperback)
David Perlmutter
R368 R327 Discovery Miles 3 270 Save R41 (11%) Ships in 10 - 15 working days

The #1 New York Times bestselling author of Grain Brain and his physician son explore how modern culture threatens to rewire our brains and damage our health, offering a practical plan for healing. Contemporary life provides us with infinite opportunities, along with endless temptations. We can eat whatever we want, whenever we want. We can immerse ourselves in the vast, enticing world of digital media. We can buy goods and services with the touch of a button or the swipe of a finger. But living in this 24/7 hyper-reality poses serious risks to our physical and mental states, our connections to others and even to the world at large. Brain Wash builds from a simple premise: Our brains are being gravely manipulated, resulting in behaviours that leave us more lonely, anxious, depressed, distrustful, illness-prone and overweight than ever before. Based on the latest science, the book identifies the mental hijacking that undermines each and every one of us and presents the tools necessary to think more clearly, make better decisions, strengthen bonds with others and develop healthier habits. Featuring a 10-day boot camp program, including a meal plan and 40 delicious recipes, Brain Wash is the key to cultivating a more purposeful and fulfilling life. 'By showing us how to consciously rewire our brains for connection, compassion, and better decisions, Brain Wash provides a framework for reclaiming joy and health in the modern world.' - Deepak Chopra, author of Metahuman 'Brain Wash reveals how our day-to-day decisions are deeply influenced and actively manipulated by the modern world. But more importantly, it is a powerful manual that allows each of us to reclaim control of our choices and make better decisions that will pave the way for health and happiness. While we generally know what's best for ourselves, acting on this knowledge is a constant struggle. Brain Wash allows us to turn this knowledge into action. I highly recommend this innovative book.' - Daniel G. Amen, MD, founder, Amen Clinics and author of The End of Mental Illness

Technocrime and Criminological Theory (Hardcover): Kevin Steinmetz, Matt R. Nobles Technocrime and Criminological Theory (Hardcover)
Kevin Steinmetz, Matt R. Nobles
R6,749 Discovery Miles 67 490 Ships in 10 - 15 working days

Cybercrime, computer crime, Internet crime, and technosecurity have been of increasing concern to citizens, corporations, and governments since their emergence in the 1980s. Addressing both the conventional and radical theories underlying this emerging criminological trend, including feminist theory, social learning theory, and postmodernism, this text paves the way for those who seek to tackle the most pertinent areas in technocrime. Technocrime and Criminological Theory challenges readers to confront the conflicts, gaps, and questions faced by both scholars and practitioners in the field. This book serves as an ideal primer for scholars beginning to study technocrime or as a companion for graduate level courses in technocrime or deviance studies.

The Total CISSP Exam Prep Book - Practice Questions, Answers, and Test Taking Tips and Techniques (Hardcover): Thomas R.... The Total CISSP Exam Prep Book - Practice Questions, Answers, and Test Taking Tips and Techniques (Hardcover)
Thomas R. Peltier, Patrick D. Howard, Bob Cartwright
R5,215 Discovery Miles 52 150 Ships in 10 - 15 working days

Until now, those preparing to take the Certified Information Systems Security Professional (CISSP) examination were not afforded the luxury of studying a single, easy-to-use manual. Written by ten subject matter experts (SMEs) - all CISSPs - this test prep book allows CISSP candidates to test their current knowledge in each of the ten security domains that make up the Common Body of Knowledge (CBK) from which the CISSP examination is based on. The Total CISSP Exam Prep Book: Practice Questions, Answers, and Test Taking Tips and Techniques provides an outline of the subjects, topics, and sub-topics contained within each domain in the CBK, and with it you can readily identify terms and concepts that you will need to know for the exam. The book starts with a review of each of the ten domains and provides 25 sample questions with answers and references for each. It discusses successful approaches for preparing for the exam based on experiences of those who have recently passed the exam. It then provides a complete 250-question practice exam with answers. Explanations are provided to clarify why the correct answers are correct, and why the incorrect answers are incorrect. With a total of 500 sample questions, The Total CISSP Exam Prep Book gives you a full flavor of what it will take to pass the exam.

Security for Service Oriented Architectures (Hardcover): Walter Williams Security for Service Oriented Architectures (Hardcover)
Walter Williams
R5,359 Discovery Miles 53 590 Ships in 10 - 15 working days

Although integrating security into the design of applications has proven to deliver resilient products, there are few books available that provide guidance on how to incorporate security into the design of an application. Filling this need, Security for Service Oriented Architectures examines both application and security architectures and illustrates the relationship between the two. Supplying authoritative guidance on how to design distributed and resilient applications, the book provides an overview of the various standards that service oriented and distributed applications leverage, including SOAP, HTML 5, SAML, XML Encryption, XML Signature, WS-Security, and WS-SecureConversation. It examines emerging issues of privacy and discusses how to design applications within a secure context to facilitate the understanding of these technologies you need to make intelligent decisions regarding their design.This complete guide to security for web services and SOA considers the malicious user story of the abuses and attacks against applications as examples of how design flaws and oversights have subverted the goals of providing resilient business functionality. It reviews recent research on access control for simple and conversation-based web services, advanced digital identity management techniques, and access control for web-based workflows. Filled with illustrative examples and analyses of critical issues, this book provides both security and software architects with a bridge between software and service-oriented architectures and security architectures, with the goal of providing a means to develop software architectures that leverage security architectures.It is also a reliable source of reference on Web services standards. Coverage includes the four types of architectures, implementing and securing SOA, Web 2.0, other SOA platforms, auditing SOAs, and defending and detecting attacks.

Mastering the Five Tiers of Audit Competency - The Essence of Effective Auditing (Hardcover): Ann Butera Mastering the Five Tiers of Audit Competency - The Essence of Effective Auditing (Hardcover)
Ann Butera
R5,764 Discovery Miles 57 640 Ships in 10 - 15 working days

Risk-based operational audits and performance audits require a broad array of competencies. This book provides auditors and risk professionals with the understanding required to improve results during risk-based audits.Mastering the Five Tiers of Audit Competency: The Essence of Effective Auditing is an anthology of powerful risk-based auditing practices. Filled with practical do and don't techniques, it encompasses the interpersonal aspects of risk-based auditing, not just the technical content.This book details the behaviors you need to demonstrate and the habitual actions you need to take at each phase in an audit to manage the people relationships as well as the work itself. Each section of this book is devoted to a component of the audit: planning, detailed risk and control assessment, testing, audit report writing, project management, audit team management, and client relationship management.The book leverages The Whole Person Project, Inc.'s 30 years of hands-on organizational development experience and custom-designed internal audit training programs to aid those just starting out in audit as well as more experienced auditors. It also contains templates you can use to set performance goals and assess your progress towards achieving those goals.This book will spark ideas that can enhance performance, improve working relationships, and make it easier to complete audits that improve your organization's risk management culture and practices. Explaining how to make positive and sustained changes to the way you approach your work, the book includes a summary of the key points and a brief quiz to help you remember salient ideas in each chapter.Presenting proven methods and advice that can help you immediately save time, reduce stress, and produce reliable, quality results, this book is an ideal resource for anyone looking to make positive changes and adopt more productive work habits

Healthcare Fraud Investigation Guidebook (Hardcover): Charles E. Piper Healthcare Fraud Investigation Guidebook (Hardcover)
Charles E. Piper
R5,758 Discovery Miles 57 580 Ships in 10 - 15 working days

Some have estimated that healthcare fraud in the United States results in losses of approximately $80 billion a year. Although there are many books available that describe how to "detect" healthcare fraud, few address what must be done after the fraud is detected. Filling this need, Charles Piper's Healthcare Fraud Investigation Guidebook details not only how to detect healthcare fraud, but also how to "investigate" and prove the wrongdoing to increase the likelihood of successful prosecution in court.The book starts by covering the history of healthcare insurance and the various types of fraud schemes. It presents Charles Piper's unique approach to investigating (The Piper Method) which allows readers to conduct as many as 10 simultaneous investigations for each case. It emphasizes the importance of simultaneously searching for waste and abuse as well as systemic weaknesses and deficiencies that caused or contributed to the problem or wrongdoing under investigation and then make recommendations for improvement. It also provides: Questions to ask whistleblowers, complainants, employers, employees, and healthcare providers who are suspects Tips on investigative case planning, goals, and strategies Sample visual aids for use when briefing others about your investigative findings Guidance on presenting information obtained from healthcare investigations and on how to testify in court Techniques for uncovering previously undetected fraud The book includes a sample case study that walks readers through a mock case from the time the case is received through the end. The case study demonstrates how to initiate, plan, and conduct a thorough and complete healthcare fraud investigation while incorporating Piper's proven methodology.Sharing insights gained through Charles Piper's decades of experience as a federal special agent and certified fraud examiner, th

Security Strategy - From Requirements to Reality (Hardcover): Bill Stackpole, Eric Oksendahl Security Strategy - From Requirements to Reality (Hardcover)
Bill Stackpole, Eric Oksendahl
R5,360 Discovery Miles 53 600 Ships in 10 - 15 working days

Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and place of strategy in an information security program and arms security managers and practitioners with a set of security tactics to support the implementation of strategic planning initiatives, goals, and objectives. The book focuses on security strategy planning and execution to provide a clear and comprehensive look at the structures and tools needed to build a security program that enables and enhances business processes. Divided into two parts, the first part considers business strategy and the second part details specific tactics. The information in both sections will help security practitioners and mangers develop a viable synergy that will allow security to take its place as a valued partner and contributor to the success and profitability of the enterprise. Confusing strategies and tactics all too often keep organizations from properly implementing an effective information protection strategy. This versatile reference presents information in a way that makes it accessible and applicable to organizations of all sizes. Complete with checklists of the physical security requirements that organizations should consider when evaluating or designing facilities, it provides the tools and understanding to enable your company to achieve the operational efficiencies, cost reductions, and brand enhancements that are possible when an effective security strategy is put into action.

Physical Security and Safety - A Field Guide for the Practitioner (Hardcover): Truett A Ricks, Bobby E. Ricks, Jeffrey Dingle Physical Security and Safety - A Field Guide for the Practitioner (Hardcover)
Truett A Ricks, Bobby E. Ricks, Jeffrey Dingle
R5,763 Discovery Miles 57 630 Ships in 10 - 15 working days

How-To Guide Written By Practicing Professionals Physical Security and Safety: A Field Guide for the Practitioner introduces the basic principles of safety in the workplace, and effectively addresses the needs of the responsible security practitioner. This book provides essential knowledge on the procedures and processes needed for loss reduction, protection of organizational assets, and security and safety management. Presents Vital Information on Recognizing and Understanding Security Needs The book is divided into two parts. The first half of the text, Security and Safety Planning, explores the theory and concepts of security and covers: threat decomposition, identifying security threats and vulnerabilities, protection, and risk assessment. The second half, Infrastructure Protection, examines the overall physical protection program and covers: access and perimeter control, alarm systems, response force models, and practical considerations for protecting information technology (IT). Addresses general safety concerns and specific issues covered by Occupational Safety and Health Administration (OSHA) and fire protection regulations Discusses security policies and procedures required for implementing a system and developing an attitude of effective physical security Acts as a handbook for security applications and as a reference of security considerations Physical Security and Safety: A Field Guide for the Practitioner offers relevant discourse on physical security in the workplace, and provides a guide for security, risk management, and safety professionals.

Ethics and the Internal Auditor's Political Dilemma - Tools and Techniques to Evaluate a Company's Ethical Culture... Ethics and the Internal Auditor's Political Dilemma - Tools and Techniques to Evaluate a Company's Ethical Culture (Hardcover)
Lynn Fountain
R5,495 Discovery Miles 54 950 Ships in 10 - 15 working days

This book helps auditors understand the reality of performing the internal audit role and the importance of properly managing ethical standards. It provides many examples of ethical conflicts and proposes alternative actions for the internal auditor. Internal auditors are well-schooled on the IIA Standards, but the reality is that the pressure placed on internal auditors related to execution of work and upholding ethical standards can be very difficult. Regardless of best practice or theory, auditors must be personally prepared to manage through issues they run across.

Web Security - A WhiteHat Perspective (Hardcover): Hanqing Wu, Liz Zhao Web Security - A WhiteHat Perspective (Hardcover)
Hanqing Wu, Liz Zhao
R5,385 Discovery Miles 53 850 Ships in 10 - 15 working days

In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target. This catastrophic event, deemed one of the biggest data breaches ever, clearly showed that many companies need to significantly improve their information security strategies. Web Security: A White Hat Perspective presents a comprehensive guide to web security technology and explains how companies can build a highly effective and sustainable security system. In this book, web security expert Wu Hanqing reveals how hackers work and explains why companies of different scale require different security methodologies. With in-depth analysis of the reasons behind the choices, the book covers client script security, server applications security, and Internet company security operations. It also includes coverage of browser security, cross sites script attacks, click jacking, HTML5/PHP security, injection attacks, authentication, session management, access control, web frame security, DDOS, leaks, Internet transactions security, and the security development lifecycle.

Managing A Network Vulnerability Assessment (Hardcover): Thomas R. Peltier, Justin Peltier, John A Blackley Managing A Network Vulnerability Assessment (Hardcover)
Thomas R. Peltier, Justin Peltier, John A Blackley
R5,073 Discovery Miles 50 730 Ships in 10 - 15 working days

The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders. Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them. By following the procedures outlined in this guide, a company can pinpoint what individual parts of their network need to be hardened, and avoid expensive and unnecessary purchases.

Unauthorized Access - The Crisis in Online Privacy and Security (Hardcover): Richard Warner, Robert Sloan Unauthorized Access - The Crisis in Online Privacy and Security (Hardcover)
Richard Warner, Robert Sloan
R5,509 Discovery Miles 55 090 Ships in 10 - 15 working days

Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in clear, straightforward language. The authors two renowned experts on computer security and law explore the well-established connection between social norms, privacy, security, and technological structure. This approach is the key to understanding information security and informational privacy, providing a practical framework to address ethical and legal issues. The authors also discuss how rapid technological developments have created novel situations that lack relevant norms and present ways to develop these norms for protecting informational privacy and ensuring sufficient information security. Bridging the gap among computer scientists, economists, lawyers, and public policy makers, this book provides technically and legally sound public policy guidance about online privacy and security. It emphasizes the need to make trade-offs among the complex concerns that arise in the context of online privacy and security.

Social Networking as a Criminal Enterprise (Hardcover): Catherine D. Marcum, George E. Higgins Social Networking as a Criminal Enterprise (Hardcover)
Catherine D. Marcum, George E. Higgins
R5,771 Discovery Miles 57 710 Ships in 10 - 15 working days

As social networking continues to evolve and expand, the opportunities for deviant and criminal behavior have multiplied. Social Networking as a Criminal Enterprise explores how new avenues for social networking criminality have affected our criminal justice system. With insight from field experts, this book examines: The history of social networking and the process of developing an online identity Schools of criminological theory and how they relate to criminality on social networking websites Forms of criminal behavior that can be performed utilizing social networking websites Criminality via texting, identity theft, and hacking Adolescents as offenders and victims in cyberbullying and digital piracy Online sexual victimization, including child pornography and sexual solicitation of youth The book concludes by discussing law enforcement's response, including new techniques and training, type of evidence, and use of experts. It also discusses how the corrections system has been affected by these types of offenders. Discussion questions at the end of each chapter encourage critical thinking and case studies help place the material in context. Ideal for students and scholars, the book offers a comprehensive examination of how the emergence of social networking has affected criminality online, and how it has impacted the criminal justice system.

Secure Java - For Web Application Development (Hardcover): Abhay Bhargav, B. V Kumar Secure Java - For Web Application Development (Hardcover)
Abhay Bhargav, B. V Kumar
R5,496 Discovery Miles 54 960 Ships in 10 - 15 working days

Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure programming, risk assessment, and threat modeling explaining how to integrate these practices into a secure software development life cycle. From the risk assessment phase to the proof of concept phase, the book details a secure web application development process. The authors provide in-depth implementation guidance and best practices for access control, cryptography, logging, secure coding, and authentication and authorization in web application development. Discussing the latest application exploits and vulnerabilities, they examine various options and protection mechanisms for securing web applications against these multifarious threats. The book is organized into four sections: Provides a clear view of the growing footprint of web applications Explores the foundations of secure web application development and the risk management process Delves into tactical web application security development with Java EE Deals extensively with security testing of web applications This complete reference includes a case study of an e-commerce company facing web application security challenges, as well as specific techniques for testing the security of web applications. Highlighting state-of-the-art tools for web application security testing, it supplies valuable insight on how to meet important security compliance requirements, including PCI-DSS, PA-DSS, HIPAA, and GLBA. The book also includes an appendix that covers the application security guidelines for the payment card industry standards.

Boundaries of Self and Reality Online - Implications of Digitally Constructed Realities (Hardcover): Jayne Gackenbach,... Boundaries of Self and Reality Online - Implications of Digitally Constructed Realities (Hardcover)
Jayne Gackenbach, Johnathan Bown
R1,584 Discovery Miles 15 840 Ships in 10 - 15 working days

As technology continues to rapidly advance, individuals and society are profoundly changed. So too are the tools used to measure this universe and, therefore, our understanding of reality improves. Boundaries of Self and Reality Online examines the idea that technological advances associated with the Internet are moving us in multiple domains toward various "edges." These edges range from self, to society, to relationships, and even to the very nature of reality. Boundaries are dissolving and we are redefining the elements of identity. The book begins with explorations of the digitally constructed self and the relationship between the individual and technological reality. Then, the focus shifts to society at large and includes a contribution from Chinese researchers about the isolated Chinese Internet. The later chapters of the book explore digital reality at large, including discussions on virtual reality, Web consciousness, and digital physics.

Wireless Multimedia Communication Systems - Design, Analysis, and Implementation (Paperback): Zoran S. Bojkovic, Bojan M.... Wireless Multimedia Communication Systems - Design, Analysis, and Implementation (Paperback)
Zoran S. Bojkovic, Bojan M. Bakmaz, K.R. Rao
R3,110 Discovery Miles 31 100 Ships in 10 - 15 working days

Rapid progress in software, hardware, mobile networks, and the potential of interactive media poses many questions for researchers, manufacturers, and operators of wireless multimedia communication systems. Wireless Multimedia Communication Systems: Design, Analysis, and Implementation strives to answer those questions by not only covering the underlying concepts involved in the design, analysis, and implementation of wireless multimedia communication systems, but also by tackling advanced topics such as mobility management, security components, and smart grids. Offering an accessible treatment of the latest research, this book: Presents specific wireless multimedia communication schemes that have proven to be useful Discusses important standardization processing activities regarding wireless networking Includes wireless mesh and multimedia sensor network architectures, protocols, and design optimizations Highlights the challenges associated with meeting complex connectivity requirements Contains numerous figures, tables, examples, references, and a glossary of acronyms Providing coverage of significant technological advances in their initial steps along with a survey of the fundamental principles and practices, Wireless Multimedia Communication Systems: Design, Analysis, and Implementation aids senior-level and graduate-level engineering students and practicing professionals in understanding the processes and furthering the development of today's wireless multimedia communication systems.

The Art of Ethics in the Information Society - Mind You (Paperback, 0): Liisa Albertha Wilhelmina Janssens The Art of Ethics in the Information Society - Mind You (Paperback, 0)
Liisa Albertha Wilhelmina Janssens; Contributions by Nicky Assmann, Tanne Bree, Wouter Dammers, Frederik Wilde, …
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

New technologies are often implemented before their ethical consequences have been fully understood. In this volume, experts working in the sciences, arts, and philosophy of technology share novel perspectives on how we can best identify and navigate the new ethical crossroads emerging in our information society. With an eye toward the future, the contributors present an essential and unique view on the interplay between ethics and modern technology.

Pugtato Babysits the Snouts (Hardcover): Sophie Corrigan Pugtato Babysits the Snouts (Hardcover)
Sophie Corrigan
R437 Discovery Miles 4 370 Ships in 18 - 22 working days

What do you get when you cross imaginative and loveable characters, enchanting and inspiring illustrations and a giggle-inducing story? ...Pugtato, a simple, good spud and a hilarious mashup of pet and vegetable characters by the inimitable illustrator Sophie Corrigan! Join Pugtato as he takes on the job of babysitting the Brussels Snouts. Pugtato thinks babysitting will be easy ... how much trouble can baby Brussels Snouts get into? But as the day unfolds, the rambunctious little Snouts decide to show Pugtato they are not little babies, and prove that size doesn't matter when it comes to having lots of fun with your good spuddies. Pugtato Babysits the Snouts delivers: A delightful, giggle-inducing, rhyming, read-aloud story perfect for kids ages 4-8 Imaginative, silly pet and vegetable mashups such as Pugtato, Tomatoad, Carrat, Cowbbage, Croccoli, Unicorn on the Cob and more! A beautiful, eye-catching cover, rich with color and embossed texture Young children will learn invaluable lessons from Pugtato about: Friendship Acceptance Responsibility Creativity You'll also want to follow Pugtato's adventures in Pugtato, Let's Be Best Spuddies, Pugtato Finds a Thing, and Pugtato and Friends Audio Collection: 3 Books in 1.

Regulating Artificial Intelligence (Hardcover, 1st ed. 2020): Thomas Wischmeyer, Timo Rademacher Regulating Artificial Intelligence (Hardcover, 1st ed. 2020)
Thomas Wischmeyer, Timo Rademacher
R3,842 Discovery Miles 38 420 Ships in 18 - 22 working days

This book assesses the normative and practical challenges for artificial intelligence (AI) regulation, offers comprehensive information on the laws that currently shape or restrict the design or use of AI, and develops policy recommendations for those areas in which regulation is most urgently needed. By gathering contributions from scholars who are experts in their respective fields of legal research, it demonstrates that AI regulation is not a specialized sub-discipline, but affects the entire legal system and thus concerns all lawyers. Machine learning-based technology, which lies at the heart of what is commonly referred to as AI, is increasingly being employed to make policy and business decisions with broad social impacts, and therefore runs the risk of causing wide-scale damage. At the same time, AI technology is becoming more and more complex and difficult to understand, making it harder to determine whether or not it is being used in accordance with the law. In light of this situation, even tech enthusiasts are calling for stricter regulation of AI. Legislators, too, are stepping in and have begun to pass AI laws, including the prohibition of automated decision-making systems in Article 22 of the General Data Protection Regulation, the New York City AI transparency bill, and the 2017 amendments to the German Cartel Act and German Administrative Procedure Act. While the belief that something needs to be done is widely shared, there is far less clarity about what exactly can or should be done, or what effective regulation might look like. The book is divided into two major parts, the first of which focuses on features common to most AI systems, and explores how they relate to the legal framework for data-driven technologies, which already exists in the form of (national and supra-national) constitutional law, EU data protection and competition law, and anti-discrimination law. In the second part, the book examines in detail a number of relevant sectors in which AI is increasingly shaping decision-making processes, ranging from the notorious social media and the legal, financial and healthcare industries, to fields like law enforcement and tax law, in which we can observe how regulation by AI is becoming a reality.

Information Wars - How We Lost the Global Battle Against Disinformation and What We Can Do about It (Paperback): Richard Stengel Information Wars - How We Lost the Global Battle Against Disinformation and What We Can Do about It (Paperback)
Richard Stengel
R434 R412 Discovery Miles 4 120 Save R22 (5%) Ships in 18 - 22 working days

Disinformation is as old as humanity. When Satan told Eve nothing would happen if she bit the apple, that was disinformation. But the rise of social media has made disinformation even more pervasive and pernicious in our current era. In a disturbing turn of events, governments are increasingly using disinformation to create their own false narratives, and democracies are proving not to be very good at fighting it. During the final three years of the Obama administration, Richard Stengel, the former editor of Time and an Under Secretary of State, was on the front lines of this new global information war. At the time, he was the single person in government tasked with unpacking, disproving, and combating both ISIS's messaging and Russian disinformation. Then, in 2016, as the presidential election unfolded, Stengel watched as Donald Trump used disinformation himself, weaponizing the grievances of Americans who felt left out by modernism. In fact, Stengel quickly came to see how all three players had used the same playbook: ISIS sought to make Islam great again; Putin tried to make Russia great again; and we all know about Trump. In a narrative that is by turns dramatic and eye-opening, Information Wars walks readers through of this often frustrating battle. Stengel moves through Russia and Ukraine, Saudi Arabia and Iraq, and introduces characters from Putin to Hillary Clinton, John Kerry and Mohamed bin Salman to show how disinformation is impacting our global society. He illustrates how ISIS terrorized the world using social media, and how the Russians launched a tsunami of disinformation around the annexation of Crimea - a scheme that became the model for their interference with the 2016 presidential election. An urgent book for our times, Information Wars stresses that we must find a way to combat this ever growing threat to democracy.

Global Standard Setting in Internet Governance (Hardcover): Alison Harcourt, George Christou, Seamus Simpson Global Standard Setting in Internet Governance (Hardcover)
Alison Harcourt, George Christou, Seamus Simpson 1
R2,664 Discovery Miles 26 640 Ships in 10 - 15 working days

The book addresses representation of the public interest in Internet standard developing organisations (SDOs). Much of the existing literature on Internet governance focuses on international organisations such as the United Nations (UN), the Internet Governance Forum (IGF) and the Internet Corporation for Assigned Names and Numbers (ICANN). The literature covering standard developing organisations has to date focused on organisational aspects. This book breaks new ground with investigation of standard development within SDO fora. Case studies centre on standards relating to privacy and security, mobile communications, Intellectual Property Rights (IPR) and copyright. The book lifts the lid on internet standard setting with detailed insight into a world which, although highly technical, very much affects the way in which citizens live and work on a daily basis. In doing this it adds significantly to the trajectory of research on Internet standards and SDOs that explore the relationship between politics and protocols. The analysis contributes to academic debates on democracy and the internet, global self-regulation and civil society, and international decision-making processes in unstructured environments. The book advances work on the Multiple Streams Framework (MS) by applying it to decision-making in non-state environments, namely SDOs which have long been dominated by private actors. The book is aimed at academic audiences in political science, computer science, communications, and science and technology studies as well as representatives from civil society, the civil service, government, engineers and experts working within SDO fora. It will also be accessible to students at the postgraduate and undergraduate levels.

The Love Algorithm - The perfect winter romcom, new from international bestselling author 2022 (Paperback): Claudia Carroll The Love Algorithm - The perfect winter romcom, new from international bestselling author 2022 (Paperback)
Claudia Carroll
R265 R243 Discovery Miles 2 430 Save R22 (8%) Ships in 9 - 17 working days

'A superb romcom, with relatable and loveable characters that literally burst from the pages. With laugh-out-loud moments, woven between a heartwarming and hopeful story, it charmed me from the first page' Carmel Harrington True love is only just a swipe away? Right? Iris lives by numbers. The only thing missing from her perfectly calibrated life is a partner - and not for lack of trying. After decades of disappointment, Iris practically has a PhD in online dating. But something still eludes her: that unquantifiable spark. Kim is too busy being the life of the party to look for love. Her terrible dates make great stories for her friends and co-workers, as long as she's not caught by her tyrannical boss, Iris. Connie, Kim's recently widowed mum, is single for the first time since the 1970s. The dating game has changed a lot since her day . . . Sick of being let down, Iris takes matters into her own hands - using her analytical skills to create the first real formula for love. With Kim and Connie on board, they launch Analyzed, a dating app like no other. As Analyzed takes the world by storm, are the three women in over their heads? Is love really just a numbers game? 'A laugh on every page, entirely empathetic characters and a warm heart in the middle of the story. I found this book highly entertaining and totally satisfying' Liz Nugent Praise for Claudia Carroll: 'Brilliantly funny' Sun 'An immensely talented writer' Sinead Moriarty 'Brilliant' Bella

I Am Not a Wolf (Paperback): Dan Sheehan I Am Not a Wolf (Paperback)
Dan Sheehan; Illustrated by Sage Coffey
R356 R336 Discovery Miles 3 360 Save R20 (6%) Ships in 18 - 22 working days
The Older Person's Guide to New Stuff - From Android to Zoella, a complete guide to the modern world for the easily... The Older Person's Guide to New Stuff - From Android to Zoella, a complete guide to the modern world for the easily perplexed (Hardcover)
Mark Leigh 1
R297 Discovery Miles 2 970 Ships in 10 - 15 working days

STRUGGLING TO STAY IN TOUCH WITH ELDERLY PARENTS DURING THE LOCKDOWN? WANTING TO HELP ISOLATED RELATIVES WITH ONLINE ORDERING? THIS IS THE PERFECT GUIDE FOR ANYONE GRAPPLING FOR THE FIRST TIME WITH FACETIME, GOOGLE HANGOUTS OR ANY OTHER ASPECT OF THE MODERN WORLD. A handy guide for anyone who says, 'The Facebook' or 'The Google' or who asks, 'Do they deliver emails on Sunday?' This is a book for the elderly and not-so-elderly who are bamboozled not just by the technology of the contemporary world, but also various modern concepts and conceits that the more youthful take for granted. It explains a host of modern concepts and technologies that have entered everyday use and parlance but which are alien (and possibly frightening) not just to the elderly - but probably also to anyone over 45. These concepts are universal and should therefore appeal to readers in the UK, Australia, US and Europe. The definitions are all real, but entertaining, making use of easy-to-understand 'real world' references or examples to explain them.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Applied Data Mining for Business and…
P Giudici Hardcover R3,655 Discovery Miles 36 550
Intelligent Data Analysis for e-Learning…
Jorge Miguel, Santi Caballe, … Paperback R2,520 R2,325 Discovery Miles 23 250
Scratch Golfer 2.0 - How I Cut 50 Shots…
Howexpert, Michael Leonard Hardcover R719 Discovery Miles 7 190
Traits of Character and Notes of…
Francis Jacox Paperback R643 Discovery Miles 6 430
Big Data Applications and Use Cases
Patrick C K Hung Hardcover R3,576 R3,316 Discovery Miles 33 160
Ray Billows - The Cinderella Kid - The…
Tom Buggy Hardcover R508 R477 Discovery Miles 4 770
Cross-Cultural Analysis of Image-Based…
Lisa Keller, Robert Keller, … Hardcover R3,285 Discovery Miles 32 850
Tiger Woods
Jeff Benedict, Armen Keteyian Paperback  (1)
R506 R480 Discovery Miles 4 800
Managing and Processing Big Data in…
Rajkumar Kannan, Raihan Ur Rasool, … Hardcover R5,052 Discovery Miles 50 520
Data Mining with Ontologies…
Hector Oscar Nigro, Sandra Gonzalez Cisaro, … Hardcover R4,565 Discovery Miles 45 650

 

Partners