![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today, we identify vulnerabilities in our software systems, infrastructure, and enterprise strategies. Those vulnerabilities are addressed through various and often creative means. Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman's more than three decades of multinational experience, the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility, he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps, especially those that are inherent in a larger organization. Completely updated, the second edition provides a fundamental understanding of technology risks-including a new chapter on cloud vulnerabilities and risk management-from an interloper's perspective. This book is a guide for security practitioners, security or network engineers, security officers, and CIOs seeking understanding of VM and its role in the organization. To serve various audiences, it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy, although serving the executive well, provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise.
This book explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security professionals. This research takes a deeper dive beneath the surface of the analysis to uncover novel ways to mitigate data security vulnerabilities, connect the dots and identify patterns in the data on breaches. This analysis will assist security professionals not only in benchmarking their risk management programs but also in identifying forward looking security measures to narrow the path of future vulnerabilities.
Illegal online file sharing costs companies tens of billions of dollars of lost revenues around the world annually and results in lost productivity, various psychological issues, and significant reduction of incentives to create and innovate. Legislative, technical, and enforcement efforts have failed. This book presents psychological theories about why people illegally share files online; analyzes and characterizes optimal sanctions for illegal online file sharing; introduces new models for pricing of network-access and digital-content to help reduce illegal online file sharing; introduces new content control and P2P systems; and explains why game theory does not work in pricing of network access.
Digital Innovations in Healthcare Education and Training discusses and debates the contemporary knowledge on the evolution of digital education, learning and the web and its integration and role within modern healthcare education and training. The book encompasses topics such as healthcare and medical education theories and methodologies, social learning as a formal and informal digital innovation, and the role of semantics in digital education. In addition, it examines how simulation, serious games, and virtual patients change learnings in healthcare, and how learning analytics and big data in healthcare education leads to personalized learning. Online pedagogy principles and applications, participatory educational design and educational technology as health intervention are bridged together to complement this collaborative effort. This book is a valuable resource for a broad audience, both technical and non-technical, including healthcare and medical tutors, health professionals, clinicians, web scientists, engineers, computer scientists and any other relevant professional interested in using and creating digital innovations for healthcare education and training.
Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Alberti, Vigenere, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Navajo code. Additionally, the book presents modern methods like RSA, ElGamal, and stream ciphers, as well as the Diffie-Hellman key exchange and Advanced Encryption Standard. When possible, the book details methods for breaking both classical and modern methods. The new edition expands upon the material from the first edition which was oriented for students in non-technical fields. At the same time, the second edition supplements this material with new content that serves students in more technical fields as well. Thus, the second edition can be fully utilized by both technical and non-technical students at all levels of study. The authors include a wealth of material for a one-semester cryptology course, and research exercises that can be used for supplemental projects. Hints and answers to selected exercises are found at the end of the book. Features: Requires no prior programming knowledge or background in college-level mathematics Illustrates the importance of cryptology in cultural and historical contexts, including the Enigma machine, Turing bombe, and Navajo code Gives straightforward explanations of the Advanced Encryption Standard, public-key ciphers, and message authentication Describes the implementation and cryptanalysis of classical ciphers, such as substitution, transposition, shift, affine, Alberti, Vigenere, and Hill
The key to understanding technology lies not in the future--but in the past. That's the contention of Lizzie O'Shea's Future Histories, a grand tour through past and present to explore the practical--and sometimes revolutionary--possibilities of our digital age. Searching for new ways to think about our networked world, O'Shea asks what the Paris Commune can tell us about the ethics of the Internet and finds inspiration in the revolutionary works of Thomas Paine and Frantz Fanon. She examines Elon Musk's futuristic visions only to find them mired in a musty Victorian-era utopianism. Instead of current-day capitalist visionaries, O'Shea returns us to the Romantic age of wonder, when art and science were as yet undivided, narrating the collaboration between Ada Lovelace--the brilliant daughter of Lord and Lady Byron--and polymath Charles Babbage, who together designed the world's first computer. In our brave new world of increased surveillance, biased algorithms, and fears of job automation, O'Shea weaves a usable past we can employ in the service of emancipating our digital tomorrows.
'Enter Ormerod's vital manual' - Pandora Sykes 'A statistic-packed investigation into a worldwide phenomenon... It is no exaggeration to say this book is essential reading for anyone' -METRO 'Who better to help us wade through the muddy waters of the great Insta-sham?' -ELLE Why Social Media is Ruining Your Life tackles head on the pressure cooker of comparison and unreachable levels of perfection that social media has created in our modern world. It uncovers how our relationship with social media has rewired our behavioural patterns, destroyed our confidence and shattered our attention spans. The book is a rallying cry that will provide you with the knowledge, tactics and weaponry you need to find a more healthy way to consume social media and reclaim your happiness.
*** "One of the marvels of this furious book is how insolent and funny Lavin is; she refuses to soft-pedal the monstrous views she encounters." - The New York Times "Shocking, angry, funny and wise... Talia Lavin takes no prisoners." - Danny Wallace, bestselling author of Yes Man "Lavin writes like her hands are on fire, forcing us to take a hard look at our ugliest truths." - Pamela Collof, The New York Times Magazine & Pro Publica White supremacists, Incels, White nationalists, National Socialists, Proud Boys, Christian extremists... In order to showcase their behaviour in their natural habitat, Talia Lavin goes undercover online as a blonde Nazi babe, a forlorn incel and a violent Aryan femme fatale. Lavin is every fascist's worst nightmare. She is loud, Jewish and unapologetically anti-racist, with the investigative skills to expose online hatemongers. While searching the dark web, she discovers a whites-only dating site, a popular extremist YouTube channel run by a teenager, the everyday heroes of the anti-fascist movement and much more. Lavin then turns the lens of anti-Semitism, racism, and white supremacy back on itself in an attempt to dismantle the online hate movement from the inside. Shocking, humorous, and merciless in equal measure, Culture Warlords explores some of the vilest subcultures on the Web - and shows us how we can fight back. Perfect for fans of Louis Theroux, Jon Ronson and Michael Moore, Lavin's debut book is a seamless balance of hard-hitting research, humour and shocking stories. It is a fascinating expose of the dark web and how it harbours the rage and views of far-right extremists today.
Are you considering a career in social media? Are you an entrepreneur or freelancer looking to boost your online content marketing? Maybe you're looking for your next career pivot, or you're simply seeking skills to give your CV that competitive edge? Wherever you are in your career, Confident Digital Content can help. Covering the essentials of online content, this book takes you through everything you need to know - from how to write effectively for online platforms, to video, audio, graphic design and photography. Featuring inspiring case studies from individuals at companies including CNN International, Mumsnet, Bunster's Hot Sauce and HuffPost UK, this practical beginner's guide includes guidance on content marketing strategy, metrics and community management. This updated second edition also features advice on the latest trends, including fake news, the importance of stories, and social listening analysis, and a new chapter on campaign planning for digital. Though trends, fads and hashtags change, the principles of great online content remain the same - let Confident Digital Content give you the grounding you need to ace your social channels and supercharge your career. About the Confident series... From coding and web design to data, digital content and cyber security, the Confident books are the perfect beginner's resource for enhancing your professional life, whatever your career path.
This unique compendium focuses on the acquisition and analysis of social media data. The approaches concern both the data-intensive characteristics and graphical structures of social media. The book addresses the critical problems in social media analysis, which representatively cover its lifecycle.The must-have volume is an excellent reference text for professionals, researchers, academics and graduate students in AI and databases.
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in cyber security -- investigations of security breaches yield valuable information that can be used to design more secure and resilient systems.Advances in Digital Forensics XVII describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: themes and issues, forensic techniques, filesystem forensics, cloud forensics, social media forensics, multimedia forensics, and novel applications. This book is the seventeenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of thirteen edited papers from the Seventeenth Annual IFIP WG 11.9 International Conference on Digital Forensics, held virtually in the winter of 2021. Advances in Digital Forensics XVII is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.
A vivid look at China's shifting place in the global political economy of technology production How did China's mass manufacturing and "copycat" production become transformed, in the global tech imagination, from something holding the nation back to one of its key assets? Prototype Nation offers a rich transnational analysis of how the promise of democratized innovation and entrepreneurial life has shaped China's governance and global image. With historical precision and ethnographic detail, Silvia Lindtner reveals how a growing distrust in Western models of progress and development, including Silicon Valley and the tech industry after the financial crisis of 2007-8, shaped the rise of the global maker movement and the vision of China as a "new frontier" of innovation. Lindtner's investigations draw on more than a decade of research in experimental work spaces-makerspaces, coworking spaces, innovation hubs, hackathons, and startup weekends-in China, the United States, Africa, Europe, Taiwan, and Singapore, as well as in key sites of technology investment and industrial production-tech incubators, corporate offices, and factories. She examines how the ideals of the maker movement, to intervene in social and economic structures, served the technopolitical project of prototyping a "new" optimistic, assertive, and global China. In doing so, Lindtner demonstrates that entrepreneurial living influences governance, education, policy, investment, and urban redesign in ways that normalize the persistence of sexism, racism, colonialism, and labor exploitation. Prototype Nation shows that by attending to the bodies and sites that nurture entrepreneurial life, technology can be extricated from the seemingly endless cycle of promise and violence. Cover image: Courtesy of Cao Fei, Vitamin Creative Space and Spru th Magers
•Step-by-step instructionsfor the tasks you care about most
The Dark Side of Media and Technology: A 21st Century Guide to Media and Technological Literacy is Herculean in its effort to survey for landmines in a rapidly changing media landscape. The book identifies four dark outcomes related to media and technology use in the 21st century, and balances the dark side with four points of light that are the keys to taking ownership of a media- and technology-saturated world. The text contains an impressive list of multi-disciplinary experts and cutting-edge researchers who approach 25 separate dark side issues with concise, highly readable chapters, replete with unique recommendations for navigating our mediated present and future. The Dark Side of Media and Technology is grounded in theory and current research, but possesses an appeal similar to a page-turning dystopian novel; as a result, this volume should be of interest to scholars, students, and curious lay-readers alike. It should be the "go-to" text for anyone who is interested in learning what the research says about how we use media and technology, as well as how media and technology use us.
The Dark Side of Media and Technology: A 21st Century Guide to Media and Technological Literacy is Herculean in its effort to survey for landmines in a rapidly changing media landscape. The book identifies four dark outcomes related to media and technology use in the 21st century, and balances the dark side with four points of light that are the keys to taking ownership of a media- and technology-saturated world. The text contains an impressive list of multi-disciplinary experts and cutting-edge researchers who approach 25 separate dark side issues with concise, highly readable chapters, replete with unique recommendations for navigating our mediated present and future. The Dark Side of Media and Technology is grounded in theory and current research, but possesses an appeal similar to a page-turning dystopian novel; as a result, this volume should be of interest to scholars, students, and curious lay-readers alike. It should be the "go-to" text for anyone who is interested in learning what the research says about how we use media and technology, as well as how media and technology use us.
Das Internet als supranationaler Raum offentlichen Rechts ist
keineswegs rechtsfrei, es stellt vielmehr das Recht vor Fragen
bisher nicht gekannter Komplexitat.
In Blockchain Democracy, William Magnuson provides a breathtaking tour of the world of blockchain and bitcoin, from their origins in the online scribblings of a shadowy figure named Satoshi Nakamoto, to their furious rise and dramatic crash in the 2010s, to their ignominious connections to the dark web and online crime. Magnuson argues that blockchain's popularity stands as a testament both to the depth of distrust of government today, and also to the fervent and undying belief that technology and the world of cyberspace can provide an answer. He demonstrates how blockchain's failings provide broader lessons about what happens when technology runs up against the stubborn realities of law, markets, and human nature. This book should be read by anyone interested in understanding how technology is changing our democracy, and how democracy is changing our technology.
Trust plays a critical part during the online shopping process. Engaging customers and building long-term brand trust is vital for enterprises that rely on e-commerce. But the rise of digital and social media platforms has created a new commercial environment, meaning current strategic models and branding practices are quickly becoming outdated and ineffectual. With greater corporate transparency, consumer empowerment and online activism come new commercial opportunities and pitfalls. Exploring both the positives and negatives, Digital Trust outlines the ways in which SMEs and e-SMEs can successfully and authentically engage within social media communities to influence their brand trust and reputation. Developed from the authors research, Digital Trust proposes new strategic models to create and reinforce consumer trust as well as build corporate value through social media platforms. The book provides an overview of how organizations can use these platforms to conduct their own research into increasing trust and engagement, with specific industry considerations taken into account, as well as explores the growing impact of e-currencies on businesses.
Making Our World: The Hacker and Maker Movements in Context describes and situates the political, historical, national, and organizational elements of hacking and making. Hackers and makers are often mythologized, leading to people misunderstanding them as folk heroes for the modern age. In response, this book describes and critiques these movements from a variety of interdisciplinary perspectives to help readers appreciate their worldwide scope and highly localized interpretations. Making Our World is essential reading for students and scholars of technology and society, particularly those interested in social movements and DIY cultures.
AMAZON BEST BOOKS OF 2019 PICK FORTUNE WRITERS AND EDITORS' RECOMMENDED BOOKS OF 2019 PICK 'A tour de force, an engrossing fusion of scholarly research, professional experience and revelations from intrepid firsthand reporting' -- New York Times USER FRIENDLY is a must-read for anyone who loves well-designed products-and for the innovators aspiring to make them. It seems like magic when some new gadget seems to know what we want before we know ourselves. But why does some design feel intrinsically good, and why do some designs last forever, while others disappear? User Friendly guides readers through the hidden rules governing how design shapes our behaviour, told through fascinating stories such as what the nuclear accident at Three Mile Island reveals about the logic of the smartphone; how the pressures of the Great Depression and World War II created our faith in social progress through better product design; and how a failed vision for Disney World yielded a new paradigm for designed experience.
From virtual assistants to social robots, people are increasingly interacting with intelligent and highly communicative technologies throughout their daily lives. This shift from communicating with people to communicating with people and machines challenges how scholars have theorized and studied communication. Human-Machine Communication: Rethinking Communication, Technology, and Ourselves addresses this transition in how people communicate and who, or what, they communicate with and the implications of this evolution for communication research. Geared toward scholars interested in people's interactions with technology, this book serves as an introduction to human-machine communication (HMC) as a specific area of study within communication (encompassing human-computer interaction, human-robot interaction, and human-agent interaction) and to the research possibilities of HMC. This collection includes papers presented as part of a scholarly conference on HMC, along with invited works from noted researchers. Topics include defining HMC, theoretical approaches to HMC, applications of HMC, and the larger implications of HMC for self and society. The research presented here focuses on people's interactions with multiple technologies (artificial intelligence, algorithms, and robots) used within different contexts (home, workplace, education, journalism, and healthcare) from a variety of epistemological and methodological approaches (empirical, rhetorical, and critical/cultural). Overall, Human-Machine Communication provides readers with an understanding of HMC in a way that supports and promotes further scholarly inquiry in a growing area of communication research.
Sex in college has never been simple. And with modern technology, the rising rates of sexual assault and STDs, and an increasingly ambiguous hookup culture, it is getting ever more complex. Sex, College, and Social Media: A Commonsense Guide to Navigating the Hookup Culture is a compassionate, funny, and well-researched primer for the modern college student, both male and female. It covers a range of topics, including: * How improved communication can make sex better for everyone * Ways that porn and the media have warped our expectations * Trustworthy information about STDs and contraception * How to have a healthy relationship with alcohol and drugs * What terminology is appropriate and respectful to use for all things LGBTQ * The facts about sexual assault on campus, and what to do if you or someone you know is assaulted * Consent * and much more Based on author Cindy Pierce's experience talking to college students and on extensive social and medical research, Sex, College, and Social Media provides trustworthy answers for pressing questions about all aspects of the college social scene. It will prepare entering freshmen for their new environment and continue to provide helpful and supportive guidance through senior year and beyond.
This book offers empirical insight into the way Muslims reacted online towards various controversial issues related to Islam. The book examines four cases studies: The Muhammed's cartoons, the burning of the Quran controversies, Fitna and the Innocence of Muslims' films. The issues of online religion, social movements and extremism are discussed, as many of the cases in question created both uproar and unity among many YouTubers. These case studies - in some instances - led to the expression of extremist views by some users, and the volume argues that they helped contribute to the growth of extremism due to the utilization of these events by some terrorist groups in order to recruit new members. In the concluding chapter, social network and sentiment analyses are presented in order to investigate all the collected comments and videos, while a critical discussion of freedom of expression and hate speech is offered, with special regards to the growing online influence of far right groups and their role in on-going YouTube debates.
Operational Auditing: Principles and Techniques for a Changing World, 2nd edition, explains the proven approaches and essential procedures to perform risk-based operational audits. It shows how to effectively evaluate the relevant dynamics associated with programs and processes, including operational, strategic, technological, financial and compliance objectives and risks. This book merges traditional internal audit concepts and practices with contemporary quality control methodologies, tips, tools and techniques. It explains how internal auditors can perform operational audits that result in meaningful findings and useful recommendations to help organizations meet objectives and improve the perception of internal auditors as high-value contributors, appropriate change agents and trusted advisors. The 2nd edition introduces or expands the previous coverage of: * Control self-assessments. * The 7 Es framework for operational quality. * Linkages to ISO 9000. * Flowcharting techniques and value-stream analysis * Continuous monitoring. * The use of Key Performance Indicators (KPIs) and Key Risk Indicators (KRIs). * Robotic process automation (RPA), artificial intelligence (AI) and machine learning (ML); and * Adds a new chapter that will examine the role of organizational structure and its impact on effective communications, task allocation, coordination, and operational resiliency to more effectively respond to market demands. |
You may like...
They Eat That? - A Cultural Encyclopedia…
Jonathan Deutsch, Natalya Murakhver
Hardcover
The Restaurants Book - Ethnographies of…
David Beriss, David E. Sutton
Hardcover
R3,988
Discovery Miles 39 880
1 Recce: Volume 3 - Onsigbaarheid Is Ons…
Alexander Strachan
Paperback
|