![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
A hilarious, quirky, and unflinchingly honest memoir about one young woman's terrible and life-changing decisions while hoping (and sometimes failing) to find herself, in the style of Never Have I Ever and Adulting. Join Dana Schwartz on a journey revisiting all of the terrible decisions she made in her early twenties through the internet's favorite method of self-knowledge: the quiz. Part-memoir, part-VERY long personality test, CHOOSE YOUR OWN DISASTER is a manifesto about the millennial experience and modern feminism and how the easy advice of "you can be anything you want!" is actually pretty fucking difficult when there are so many possible versions of yourself it seems like you could be. Dana has no idea who she is, but at least she knows she's a Carrie, a Ravenclaw, a Raphael, a Belle, a former emo kid, a Twitter addict, and a millennial just trying her best.
Teaches object-oriented programming (OOP) from the ground up A step-by-step guide addressed to all programming skill levels Readers will learn to create dynamic, reusable services with Flash ActionScript More information and additional chapters can be found on the author's Web site, www.billdrol.comPlease click here to read a review about this title. "Object-Oriented Macromedia Flash MX" teaches object-oriented programming skills using Flash MX ActionScript. It assumes no previous programming experience and encourages Flash users who normally avoid ActionScript. Author William Drol develops a series of related applications using numerous step-by-step instructions and demonstrates the importance of good planning, documentation, and clean coding. Flash MX is the most powerful and widely used client software for the Web, and it's the only one that runs on virtually every browser on every platform. As such, it is the ideal platform for sophisticated Web applications, especially when paired with XML. Sophisticated applications demand a solid understanding of object-oriented programming techniques, regardless of the language and platform used. This may be the only Flash book entirely devoted to object-oriented programming. This book is for readers who want to do more than load and publish the pre-built Flash MX templates, who want to make sure their work is reusable, who want to learn solid programming techniques and, above all, who want to build the next generation of Web-based applications. By the time readers finish "Object-Oriented Macromedia Flash MX," readers will be able to develop highly reusable applications and services that leverage the dynamic features in Flash MX ActionScript.
Create imaginative and lively animation for the web with Essential Flash 5.0 fast!The latest release of Macromedia's Flash, version 5.0, adds new features to the popular web applications software - such as enhanced colour controls, better selection highlights, draggable guides, pen tool, shared libraries, new panels, and expanded ActionScript capabilities. Essential Flash 5.0 fast provides a simple yet thorough introduction to the world of Flash. With clear and concise examples, Fiaz Hussain explains: - The Flash development environment- How to create simple and complex objects- Using the shape editing tools and colour- All about symbols and their instances- Layers and animation- Interactivity, including ActionScripting- How to optimise Flash movies for fast downloads
Das Handbuch prasentiert die Kernbereiche des E-Commerce-Rechts in den meisten EU-Mitgliedstaaten und den USA. Behandelt werden das Vertragsrecht, der Verbraucherschutz, das Urheberrecht, das Recht gegen den unlauteren Wettbewerb, das Kartellrecht, die Providerhaftung, der Geldtransfer und der Datenschutz. Die Landerberichte folgen einem gemeinsamen Fragenkatalog. Aufgrund der daraus resultierenden einheitlichen Struktur findet der Leser schnell und ubersichtlich Antwort auf seine Rechtsfragen in allen Staaten. Die Beitrage wurden von Experten auf dem Gebiet des elektronischen Geschaftsverkehrs aus den einzelnen Mitgliedstaaten verfasst."
Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today, we identify vulnerabilities in our software systems, infrastructure, and enterprise strategies. Those vulnerabilities are addressed through various and often creative means. Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman's more than three decades of multinational experience, the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility, he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps, especially those that are inherent in a larger organization. Completely updated, the second edition provides a fundamental understanding of technology risks-including a new chapter on cloud vulnerabilities and risk management-from an interloper's perspective. This book is a guide for security practitioners, security or network engineers, security officers, and CIOs seeking understanding of VM and its role in the organization. To serve various audiences, it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy, although serving the executive well, provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise.
Stories of cyberattacks dominate the headlines. Whether it is theft of massive amounts of personally identifiable information or the latest intrusion of foreign governments in U.S. government and industrial sites, cyberattacks are now important. For professionals and the public, knowing how the attacks are launched and succeed is vital to ensuring cyber security. The book provides a concise summary in a historical context of the major global cyber security attacks since 1980. Each attack covered contains an overview of the incident in layman terms, followed by a technical details section, and culminating in a lessons learned and recommendations section.
Enjoy the top social media sites with ease and security Done correctly, social media is a way to connect friends, family, and the world while still maintaining security and privacy. Facebook, Twitter, & Instagram For Seniors For Dummies, 3rd Edition offers advice on how to enjoy the three most popular social media options while avoiding worry about who sees what you share. Written by social media expert Marsha Collier, this book walks you through establishing accounts, making connections, and sharing content including photos and video. You learn the settings to adjust on each platform to maintain privacy and filter out the content you don't want. This book also explains the subtle art of avoiding or blocking people on social platforms without jeopardizing your real-world relationships! Take control of what you share Connect with others Take and share your best pictures Use social media as a news source Social media sites are great fun once you learn how to cut through the clutter--and this book shows you how!
This book explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security professionals. This research takes a deeper dive beneath the surface of the analysis to uncover novel ways to mitigate data security vulnerabilities, connect the dots and identify patterns in the data on breaches. This analysis will assist security professionals not only in benchmarking their risk management programs but also in identifying forward looking security measures to narrow the path of future vulnerabilities.
Digital Innovations in Healthcare Education and Training discusses and debates the contemporary knowledge on the evolution of digital education, learning and the web and its integration and role within modern healthcare education and training. The book encompasses topics such as healthcare and medical education theories and methodologies, social learning as a formal and informal digital innovation, and the role of semantics in digital education. In addition, it examines how simulation, serious games, and virtual patients change learnings in healthcare, and how learning analytics and big data in healthcare education leads to personalized learning. Online pedagogy principles and applications, participatory educational design and educational technology as health intervention are bridged together to complement this collaborative effort. This book is a valuable resource for a broad audience, both technical and non-technical, including healthcare and medical tutors, health professionals, clinicians, web scientists, engineers, computer scientists and any other relevant professional interested in using and creating digital innovations for healthcare education and training.
Illegal online file sharing costs companies tens of billions of dollars of lost revenues around the world annually and results in lost productivity, various psychological issues, and significant reduction of incentives to create and innovate. Legislative, technical, and enforcement efforts have failed. This book presents psychological theories about why people illegally share files online; analyzes and characterizes optimal sanctions for illegal online file sharing; introduces new models for pricing of network-access and digital-content to help reduce illegal online file sharing; introduces new content control and P2P systems; and explains why game theory does not work in pricing of network access.
This book covers blockchain from the underlying principles to how it enables applications to survive and surf on its shoulder. Having covered the fundamentals of blockchain, the book turns to cryptocurrency. It thoroughly examines Bitcoin before presenting six other major currencies in a rounded discussion. The book then bridges between technology and finance, concentrating on how blockchain-based applications, including cryptocurrencies, have pushed hard against mainstream industries in a bid to cement their positions permanent. It discusses blockchain as underlying banking technology, crypto mining and offering, cryptocurrency as investment instruments, crypto regulations, and markets.
Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Alberti, Vigenere, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Navajo code. Additionally, the book presents modern methods like RSA, ElGamal, and stream ciphers, as well as the Diffie-Hellman key exchange and Advanced Encryption Standard. When possible, the book details methods for breaking both classical and modern methods. The new edition expands upon the material from the first edition which was oriented for students in non-technical fields. At the same time, the second edition supplements this material with new content that serves students in more technical fields as well. Thus, the second edition can be fully utilized by both technical and non-technical students at all levels of study. The authors include a wealth of material for a one-semester cryptology course, and research exercises that can be used for supplemental projects. Hints and answers to selected exercises are found at the end of the book. Features: Requires no prior programming knowledge or background in college-level mathematics Illustrates the importance of cryptology in cultural and historical contexts, including the Enigma machine, Turing bombe, and Navajo code Gives straightforward explanations of the Advanced Encryption Standard, public-key ciphers, and message authentication Describes the implementation and cryptanalysis of classical ciphers, such as substitution, transposition, shift, affine, Alberti, Vigenere, and Hill
Featuring chapter contributions from: Brian Clark, Jay Baer, John Jantsch, Kim Garst, Sonia Simone, Donna Moritz, Denise Wakeman, Barbara Rozgonyi, Brian Dean, Syed Balkhi, Eric Ward, Andrea Vahl, Beth Hayden, Lou Bortone, Viveka von Rosen, Stephan Hovnanian, Jason van Orden, Sue B. Zimmerman, Bob Baker, Kim Dushinski, Ian Cleary, and Craig Valentine. Eager business owners gain access to the playbooks of 23 of today's most respected and well-known online marketers, who reveal their most valuable online strategies and tactics for capturing new customers and influencing ongoing purchases from current ones. Each chapter is a coaching session designed to help business owners avoid the pitfalls and mistakes by the experts who have been there and done that. Readers learn how to develop a personal media brand, build a total online presence, and create a social media strategy that increases traffic. They also discover how to develop and use content that converts visitors into buyers and ultimately loyal customers, succeed with SEO, pay-per-click, and linking strategies that get websites ranked. Also included is information on leveraging social networking apps, including Facebook, online video, and Instagram, and avoiding the mistakes made by new online businesses.
This book reflects the advanced and multidisciplinary process of app development. Easy to read and filled with concrete tools, models and tips for practical usage as well as for teaching digital concept development and innovation.
Are you considering a career in social media? Are you an entrepreneur or freelancer looking to boost your online content marketing? Maybe you're looking for your next career pivot, or you're simply seeking skills to give your CV that competitive edge? Wherever you are in your career, Confident Digital Content can help. Covering the essentials of online content, this book takes you through everything you need to know - from how to write effectively for online platforms, to video, audio, graphic design and photography. Featuring inspiring case studies from individuals at companies including CNN International, Mumsnet, Bunster's Hot Sauce and HuffPost UK, this practical beginner's guide includes guidance on content marketing strategy, metrics and community management. This updated second edition also features advice on the latest trends, including fake news, the importance of stories, and social listening analysis, and a new chapter on campaign planning for digital. Though trends, fads and hashtags change, the principles of great online content remain the same - let Confident Digital Content give you the grounding you need to ace your social channels and supercharge your career. About the Confident series... From coding and web design to data, digital content and cyber security, the Confident books are the perfect beginner's resource for enhancing your professional life, whatever your career path.
This unique compendium focuses on the acquisition and analysis of social media data. The approaches concern both the data-intensive characteristics and graphical structures of social media. The book addresses the critical problems in social media analysis, which representatively cover its lifecycle.The must-have volume is an excellent reference text for professionals, researchers, academics and graduate students in AI and databases.
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in cyber security -- investigations of security breaches yield valuable information that can be used to design more secure and resilient systems.Advances in Digital Forensics XVII describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: themes and issues, forensic techniques, filesystem forensics, cloud forensics, social media forensics, multimedia forensics, and novel applications. This book is the seventeenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of thirteen edited papers from the Seventeenth Annual IFIP WG 11.9 International Conference on Digital Forensics, held virtually in the winter of 2021. Advances in Digital Forensics XVII is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.
This book focuses on image based security techniques, namely visual cryptography, watermarking, and steganography. This book is divided into four sections. The first section explores basic to advanced concepts of visual cryptography. The second section of the book covers digital image watermarking including watermarking algorithms, frameworks for modeling watermarking systems, and the evaluation of watermarking techniques. The next section analyzes steganography and steganalysis, including the notion, terminology and building blocks of steganographic communication. The final section of the book describes the concept of hybrid approaches which includes all image-based security techniques. One can also explore various advanced research domains related to the multimedia security field in the final section. The book includes many examples and applications, as well as implementation using MATLAB, wherever required. Features: Provides a comprehensive introduction to visual cryptography, digital watermarking and steganography in one book Includes real-life examples and applications throughout Covers theoretical and practical concepts related to security of other multimedia objects using image based security techniques Presents the implementation of all important concepts in MATLAB
Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Empirical methods, including data analytics, allow extracting knowledge and insights from the data that organizations collect from their processes and tools, and from the opinions of the experts who practice these processes and methods. This book introduces the reader to the fundamentals of empirical research methods, and demonstrates how these methods can be used to hone a secure software development lifecycle based on empirical data and published best practices.
A vivid look at China's shifting place in the global political economy of technology production How did China's mass manufacturing and "copycat" production become transformed, in the global tech imagination, from something holding the nation back to one of its key assets? Prototype Nation offers a rich transnational analysis of how the promise of democratized innovation and entrepreneurial life has shaped China's governance and global image. With historical precision and ethnographic detail, Silvia Lindtner reveals how a growing distrust in Western models of progress and development, including Silicon Valley and the tech industry after the financial crisis of 2007-8, shaped the rise of the global maker movement and the vision of China as a "new frontier" of innovation. Lindtner's investigations draw on more than a decade of research in experimental work spaces-makerspaces, coworking spaces, innovation hubs, hackathons, and startup weekends-in China, the United States, Africa, Europe, Taiwan, and Singapore, as well as in key sites of technology investment and industrial production-tech incubators, corporate offices, and factories. She examines how the ideals of the maker movement, to intervene in social and economic structures, served the technopolitical project of prototyping a "new" optimistic, assertive, and global China. In doing so, Lindtner demonstrates that entrepreneurial living influences governance, education, policy, investment, and urban redesign in ways that normalize the persistence of sexism, racism, colonialism, and labor exploitation. Prototype Nation shows that by attending to the bodies and sites that nurture entrepreneurial life, technology can be extricated from the seemingly endless cycle of promise and violence. Cover image: Courtesy of Cao Fei, Vitamin Creative Space and Spru th Magers
A disappearance Ewan Stokes disappeared after a football match 15 years ago. No one knows where he went - or why - but every year on the anniversary of his disappearance, random mysterious sightings are reported across Europe. A cult following An online cult following has grown up around the mystery, sharing tips and sightings. Rumour has it that 'Stokesy' is coming back. And he wants revenge. Riled by the prospect of his return, unrest grows. His followers blame his ex-girlfriend, Maisie, for his disappearance and they want her to pay. A woman in danger As the 15th anniversary of Stokesy's disappearance approaches, there are more sightings, followed by apparently random acts of violence. The campaign of intimidation against Maisie grows. Frightened, she reaches out to the police but she has long been the victim of the cult's anger and her pleas for help have gone unheeded for years. A psychologist with a special gift Dr Cora Lael is brought in to help DS Minshull and South Suffolk CID before the situation gets out of hand. Can her special intuition unlock the key to Stokesy's disappearance, save Maisie and stop Stokesy wreaking his revenge?
The Dark Side of Media and Technology: A 21st Century Guide to Media and Technological Literacy is Herculean in its effort to survey for landmines in a rapidly changing media landscape. The book identifies four dark outcomes related to media and technology use in the 21st century, and balances the dark side with four points of light that are the keys to taking ownership of a media- and technology-saturated world. The text contains an impressive list of multi-disciplinary experts and cutting-edge researchers who approach 25 separate dark side issues with concise, highly readable chapters, replete with unique recommendations for navigating our mediated present and future. The Dark Side of Media and Technology is grounded in theory and current research, but possesses an appeal similar to a page-turning dystopian novel; as a result, this volume should be of interest to scholars, students, and curious lay-readers alike. It should be the "go-to" text for anyone who is interested in learning what the research says about how we use media and technology, as well as how media and technology use us.
The Dark Side of Media and Technology: A 21st Century Guide to Media and Technological Literacy is Herculean in its effort to survey for landmines in a rapidly changing media landscape. The book identifies four dark outcomes related to media and technology use in the 21st century, and balances the dark side with four points of light that are the keys to taking ownership of a media- and technology-saturated world. The text contains an impressive list of multi-disciplinary experts and cutting-edge researchers who approach 25 separate dark side issues with concise, highly readable chapters, replete with unique recommendations for navigating our mediated present and future. The Dark Side of Media and Technology is grounded in theory and current research, but possesses an appeal similar to a page-turning dystopian novel; as a result, this volume should be of interest to scholars, students, and curious lay-readers alike. It should be the "go-to" text for anyone who is interested in learning what the research says about how we use media and technology, as well as how media and technology use us.
In Blockchain Democracy, William Magnuson provides a breathtaking tour of the world of blockchain and bitcoin, from their origins in the online scribblings of a shadowy figure named Satoshi Nakamoto, to their furious rise and dramatic crash in the 2010s, to their ignominious connections to the dark web and online crime. Magnuson argues that blockchain's popularity stands as a testament both to the depth of distrust of government today, and also to the fervent and undying belief that technology and the world of cyberspace can provide an answer. He demonstrates how blockchain's failings provide broader lessons about what happens when technology runs up against the stubborn realities of law, markets, and human nature. This book should be read by anyone interested in understanding how technology is changing our democracy, and how democracy is changing our technology. |
You may like...
Research Anthology on Strategies for…
Information R Management Association
Hardcover
R13,711
Discovery Miles 137 110
Security in IoT Social Networks
Fadi Al-Turjman, B.D. Deebak
Paperback
R2,634
Discovery Miles 26 340
|