0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (124)
  • R250 - R500 (454)
  • R500+ (1,355)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > General

Learning to Save the Future - Rethinking Education and Work in an Era of Digital Capitalism (Hardcover): Alexander Means Learning to Save the Future - Rethinking Education and Work in an Era of Digital Capitalism (Hardcover)
Alexander Means
R4,491 Discovery Miles 44 910 Ships in 10 - 15 working days

Mainstream economists and Silicon Valley entrepreneurs claim that unfettered capitalism and digital technology can unlock a future of unbounded prosperity, create endless high paying jobs, and solve the world's vast social and ecological problems. Realizing this future of abundance purportedly rests in the transformation of human potential into innovative human capital through new 21st century forms of education. In this new book Alex Means challenges this view. Stagnating economic growth and runaway inequality have emerged as the 'normal' condition of advanced capitalism. Simultaneously, there has been a worldwide educational expansion and a growing surplus of college-educated workers relative to their demand in the world economy. This surplus is complicated by an emerging digital revolution driven by artificial intelligence and machine learning that generates worker displacing innovations and immaterial forms of labor and valorization. Learning to Save the Future argues that rather than fostering mass intellectuality, educational development is being constrained by a value structure subordinated to 21st century capitalism and technology. Human capabilities from creativity, design, engineering, to communication are conceived narrowly as human capital, valued in terms of economic productivity and growth. Similarly, global problems such as the erosion of employment and climate change are conceived as educational problems to be addressed through business solutions and the digitalization of education. This thought-provoking account provides a cognitive map of this condition, offering alternatives through critical analyses of education and political economy, technology and labor, creativity and value, power and ecology.

Learning to Save the Future - Rethinking Education and Work in an Era of Digital Capitalism (Paperback): Alexander Means Learning to Save the Future - Rethinking Education and Work in an Era of Digital Capitalism (Paperback)
Alexander Means
R1,262 Discovery Miles 12 620 Ships in 10 - 15 working days

Mainstream economists and Silicon Valley entrepreneurs claim that unfettered capitalism and digital technology can unlock a future of unbounded prosperity, create endless high paying jobs, and solve the world's vast social and ecological problems. Realizing this future of abundance purportedly rests in the transformation of human potential into innovative human capital through new 21st century forms of education. In this new book Alex Means challenges this view. Stagnating economic growth and runaway inequality have emerged as the 'normal' condition of advanced capitalism. Simultaneously, there has been a worldwide educational expansion and a growing surplus of college-educated workers relative to their demand in the world economy. This surplus is complicated by an emerging digital revolution driven by artificial intelligence and machine learning that generates worker displacing innovations and immaterial forms of labor and valorization. Learning to Save the Future argues that rather than fostering mass intellectuality, educational development is being constrained by a value structure subordinated to 21st century capitalism and technology. Human capabilities from creativity, design, engineering, to communication are conceived narrowly as human capital, valued in terms of economic productivity and growth. Similarly, global problems such as the erosion of employment and climate change are conceived as educational problems to be addressed through business solutions and the digitalization of education. This thought-provoking account provides a cognitive map of this condition, offering alternatives through critical analyses of education and political economy, technology and labor, creativity and value, power and ecology.

Google+ (Paperback): Kevin Purdy Google+ (Paperback)
Kevin Purdy 1
R359 R340 Discovery Miles 3 400 Save R19 (5%) Ships in 18 - 22 working days

Google+ offers a new social networking platform that promises to give Twitter and Facebook real competition - but its documentation doesn't help you get past the steep learning curve. This Missing Manual gets you up to speed with crystal-clear, jargon-free explanations of key Google+ features, including Circles, Hangouts, Sparks, and Huddles. You'll find lots of undocumented tips, tricks, and tweaks along the way. * Quickly learn how to set up a Google + account and add contacts * Create Circles to organize contacts into groups for sharing * View and share updates and photos with people in the Stream * Use Hangout to organize group video chats with up to 10 people * Identify search topics that may interest your contacts with Sparks * Get sound advice for managing privacy online with selective sharing

University Libraries and Space in the Digital World (Paperback): Graham Walton University Libraries and Space in the Digital World (Paperback)
Graham Walton; Edited by Graham Matthews
R1,271 Discovery Miles 12 710 Ships in 10 - 15 working days

This timely book addresses physical space in university libraries in the digital age. It considers the history of the use of space, integrates case studies from around the world with theoretical perspectives, explores recent developments including new build and refurbishment. With users at the forefront, chapters cover different aspects of learning and research support provision, shared services, and evaluation of space initiatives. Library staff requirements and green issues are outlined. The book also looks to the future, identifying the key strategic issues and trends that will influence and shape future library spaces. The authors are international, senior university library managers and academics who provide a range of views and approaches and experience of individual projects and initiatives.

WFH: Working From Home - How To Build A Career You Love When You're Not In The Office (Paperback): Harriet Minter WFH: Working From Home - How To Build A Career You Love When You're Not In The Office (Paperback)
Harriet Minter
R395 R360 Discovery Miles 3 600 Save R35 (9%) Ships in 5 - 7 working days

The no bullsh*t guide to getting your work and life on track in the new flexible workplace.

Virtually every industry is making lasting changes that will open doors to a more flexible working week. So how do we adjust, thrive and excel in an environment where glitchy daily video conferences are the norm? By turns fierce, funny and highly practical, Harriet Minter will show you the skills to be effective and creative during the day-to-day.

Harriet breaks down how to be an inspiring and energising manager (either remotely or to a flexibly working team), how to create and thrive in a high-trust culture (on a small and large scale) and most importantly how to achieve your ambition and propel your career forwards.

Packed full of hard-won tricks, tips and tools, Harriet Minter draws on her own experience as a careers coach and adviser to companies on their flexible working culture to help you bring your best self to work - from your living room.

Supply Chain Risk Management - Applying Secure Acquisition Principles to Ensure a Trusted Technology Product (Paperback): Ken... Supply Chain Risk Management - Applying Secure Acquisition Principles to Ensure a Trusted Technology Product (Paperback)
Ken Sigler, Dan Shoemaker, Anne Kohnke
R2,089 Discovery Miles 20 890 Ships in 10 - 15 working days

The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how to establish systematic control over the supply chain and how to build auditable trust into the products and services acquired by the organization. It details a capability maturity development process that will install an increasingly competent process and an attendant set of activities and tasks within the technology acquisition process. It defines a complete and correct set of processes, activities, tasks and monitoring and reporting systems.

Home Networking Do-It-Yourself For Dummies (Paperback, New): L.C. Miller Home Networking Do-It-Yourself For Dummies (Paperback, New)
L.C. Miller
R620 R575 Discovery Miles 5 750 Save R45 (7%) Ships in 18 - 22 working days

Step by step guide to connecting all your electronic devices into one network

A home network allows you to share Internet connections, photos, video, music, game consoles, printers, and other electronic gadgets. This do-it-yourself guide shows you step by step how to create a wired or wireless network in your home.

In the "For Dummies" tradition of making technology less intimidating, "Home Networking Do-It-Yourself For Dummies" breaks down the process into easy steps with clear instructions.Increasing broadband speeds, cellular technology, the explosive growth of iPhone sales, and the new Home Group feature in Windows 7 all contribute to a booming interest in home networkingThis step-by-step guide walks do-it-yourselfers through the process of setting up a wired or wireless network with Windows 7 and Windows VistaDemonstrates how to connect desktops or laptops, printers, a home server, a router, high-speed Internet access, a video game system, a telephone line, and entertainment peripheralsShows how to share files, music, and video, and connect to an iPhoneProvides maintenance and troubleshooting tips

"Home Networking Do-It-Yourself For Dummies" enables you to take advantage of everything a home network can offer without hiring a technology wizard.

Big Data, Crime and Social Control (Hardcover): Ales Zavrsnik Big Data, Crime and Social Control (Hardcover)
Ales Zavrsnik
R4,490 Discovery Miles 44 900 Ships in 10 - 15 working days

From predictive policing to self-surveillance to private security, the potential uses to of big data in crime control pose serious legal and ethical challenges relating to privacy, discrimination, and the presumption of innocence. The book is about the impacts of the use of big data analytics on social and crime control and on fundamental liberties. Drawing on research from Europe and the US, this book identifies the various ways in which law and ethics intersect with the application of big data in social and crime control, considers potential challenges to human rights and democracy and recommends regulatory solutions and best practice. This book focuses on changes in knowledge production and the manifold sites of contemporary surveillance, ranging from self-surveillance to corporate and state surveillance. It tackles the implications of big data and predictive algorithmic analytics for social justice, social equality, and social power: concepts at the very core of crime and social control. This book will be of interest to scholars and students of criminology, sociology, politics and socio-legal studies.

You Suck at Cooking - The Absurdly Practical Guide to Sucking Slightly Less at Making Food: A Cookbook (Hardcover): You Suck at... You Suck at Cooking - The Absurdly Practical Guide to Sucking Slightly Less at Making Food: A Cookbook (Hardcover)
You Suck at Cooking 2
R534 R445 Discovery Miles 4 450 Save R89 (17%) Ships in 10 - 15 working days
Social Presence in Online Learning - Multiple Perspectives on Practice and Research (Hardcover): Aimee L Whiteside, Amy Garrett... Social Presence in Online Learning - Multiple Perspectives on Practice and Research (Hardcover)
Aimee L Whiteside, Amy Garrett Dikkers, Karen Swan
R4,499 Discovery Miles 44 990 Ships in 10 - 15 working days

Social presence continues to emerge as a key factor for successful online and blended learning experiences. It is commonly described as the degree to which online participants feel connected to one to another. Understanding social presence with its critical connections to community-building, retention, and learning outcomes allows faculty and instructional designers to better support and engage students. This volume, Social Presence in Online Learning, addresses the evolution of social presence with three distinct perspectives, outlines the relevant research, and focuses on practical strategies that can immediately impact the teaching and learning experience. These strategies include creating connections to build community, applying content to authentic situations, integrating a careful mix of tools and media, leveraging reflective and interactive opportunities, providing early and continuous feedback, designing with assessment in mind, and encouraging change in small increments. Because student satisfaction and motivation plays a key role in retention rates and because increased social presence often leads to enriched learning experiences, it is advantageous to mindfully integrate social presence into learning environments. Social Presence in Online Learning brings together eminent scholars in the field to distinguish among three different perspectives of social presence and to address how these viewpoints immediately inform practice. This important volume: Provides an overview of the evolution of social presence, key findings from social presence research, and practical strategies that can improve the online and blended learning experience Differentiates three distinct perspectives on social presence and explains the ideas and models that inform these perspectives Explores specific ways in which social presence relates to course satisfaction, retention, and outcomes Offers practical implications and ready-to-use techniques that are applicable to multiple disciplines Introduces current research on social presence by prominent researchers in the field with direct inferences to the practice of online and blended learning Looks at future directions for social presence Social Presence in Online Learning is appropriate for practitioners, researchers and academics involved in any level of online learning program design, course design, instruction, support, and leadership as well as for graduate students studying educational technology, technology-enhanced learning, and online and blended learning. It brings together multiple perspectives on social presence from the most influential scholars in the field to help shape the future of online and blended learning.

Cyber Operations and the Use of Force in International Law (Paperback): Marco Roscini Cyber Operations and the Use of Force in International Law (Paperback)
Marco Roscini
R1,355 Discovery Miles 13 550 Ships in 10 - 15 working days

The internet has changed the rules of many industries, and war is no exception. But can a computer virus be classed as an act of war? Does a Denial of Service attack count as an armed attack? And does a state have a right to self-defence when cyber attacked? With the range and sophistication of cyber attacks against states showing a dramatic increase in recent times, this book investigates the traditional concepts of 'use of force', 'armed attack', and 'armed conflict' and asks whether existing laws created for analogue technologies can be applied to new digital developments. The book provides a comprehensive analysis of primary documents and surrounding literature, to investigate whether and how existing rules on the use of force in international law apply to a relatively new phenomenon such as cyberspace operations. It assesses the rules of jus ad bellum and jus in bello, whether based on treaty or custom, and analyses why each rule applies or does not apply to cyber operations. Those rules which can be seen to apply are then discussed in the context of each specific type of cyber operation. The book addresses the key questions of whether a cyber operation amounts to the use of force and, if so, whether the victim state can exercise its right of self-defence; whether cyber operations trigger the application of international humanitarian law when they are not accompanied by traditional hostilities; what rules must be followed in the conduct of cyber hostilities; how neutrality is affected by cyber operations; whether those conducting cyber operations are combatants, civilians, or civilians taking direct part in hostilities. The book is essential reading for everyone wanting a better understanding of how international law regulates cyber combat.

Working Virtually - Transforming the Mobile Workplace (Paperback, 2nd Revised edition): Trina Hoefling Working Virtually - Transforming the Mobile Workplace (Paperback, 2nd Revised edition)
Trina Hoefling
R1,069 Discovery Miles 10 690 Ships in 10 - 15 working days

Remote working is the new reality, and transactional work - provided by freelancers, contract employees or consultants - has increased exponentially. It is forecast that as much as half the labor force will be working independently and virtually by 2020. Most organizations are still grappling with how to effectively manage their virtual staff and how to effectively support and motivate them - an increasingly urgent task as more Millennials join the workforce, bringing changed attitudes to work satisfaction. This book, the fruit of the author's three decades of experience planning and implementing remote working environments, provides expert guidance for anyone planning a shift to remote working, managing teams of teleworkers, or themselves working in a virtual team. The author's key message is that, in an environment where there is no face to face and informal contact, virtual working requires the creation of a matrix of distributed teams, and that their success depends on the right preparation, changing corporate culture and rewards, and implementing appropriate strategies at the management level to create team cohesion and motivate team members. Working Virtually is for the executive leading changes in an enterprise that is preparing for virtual work or seeking to improve current performance. It offers tools to assess readiness, advice on creating appropriate reward policies, and strategies to adapt performance management processes to be more team-driven and technology leveraged. Working Virtually is written to and for the virtual leader who wants to establish high performing virtual teams. It provides an understanding of the roles and responsibilities of managing a virtual team, offering a wealth of advice on creating the conditions for collaboration, motivating team members, and identifying and defusing problems. Working Virtually is for the professional who works remotely from home, on the road, or in an office with remote colleagues. It is for anyone who wants to succeed in this new work environment by developing skills and networks to create a sustained and satisfying career path. With this new edition providing a 360 Degrees view of the roles and objectives of all stakeholders in the virtual workspace, this book uniquely provides readers with a rounded picture of the policies, processes, work habits, and commitments needed to achieve the shared goal of high performance remote teams.

Social Networks as the New Frontier of Terrorism - #Terror (Hardcover): Laura Scaife Social Networks as the New Frontier of Terrorism - #Terror (Hardcover)
Laura Scaife
R4,910 Discovery Miles 49 100 Ships in 10 - 15 working days

Terrorism. Why does this word grab our attention so? Propaganda machines have adopted modern technology as a means to always have their content available. Regardless of the hour or time zone, information is being shared by somebody, somewhere. Social media is a game changer influencing the way in which terror groups are changing their tactics and also how their acts of terror are perceived by the members of the public they intend to influence. This book explores how social media adoption by terrorists interacts with privacy law, freedom of expression, data protection and surveillance legislation through an exploration of the fascinating primary resources themselves, covering everything from the Snowden Leaks, the rise of ISIS to Charlie Hebdo. The book also covers lesser worn paths such as the travel guide that proudly boasts that you can get Bounty and Twix bars mid-conflict, and the best local hair salons for jihadi brides. These vignettes, amongst the many others explored in this volume bring to life the legal, policy and ethical debates considered in this volume, representing an important part in the development of understanding terrorist narratives on social media, by framing the legislative debate. This book represents an invaluable guide for lawyers, government bodies, the defence services, academics, students and businesses.

The Exponential Age - How Accelerating Technology Is Transforming Business, Politics and Society (Paperback): Azeem Azhar The Exponential Age - How Accelerating Technology Is Transforming Business, Politics and Society (Paperback)
Azeem Azhar
R519 R477 Discovery Miles 4 770 Save R42 (8%) Ships in 10 - 15 working days
Software Similarity and Classification (Paperback, 2012 ed.): Silvio Cesare, Yang Xiang Software Similarity and Classification (Paperback, 2012 ed.)
Silvio Cesare, Yang Xiang
R1,357 Discovery Miles 13 570 Ships in 18 - 22 working days

Software similarity and classification is an emerging topic with wide applications. It is applicable to the areas of malware detection, software theft detection, plagiarism detection, and software clone detection. Extracting program features, processing those features into suitable representations, and constructing distance metrics to define similarity and dissimilarity are the key methods to identify software variants, clones, derivatives, and classes of software. Software Similarity and Classification reviews the literature of those core concepts, in addition to relevant literature in each application and demonstrates that considering these applied problems as a similarity and classification problem enables techniques to be shared between areas. Additionally, the authors present in-depth case studies using the software similarity and classification techniques developed throughout the book.

Praxis Des It-Rechts - Praktische Rechtsfragen Der It-Sicherheit Und Internetnutzung (German, Hardcover, 2nd 2., Akt. U. Erw.... Praxis Des It-Rechts - Praktische Rechtsfragen Der It-Sicherheit Und Internetnutzung (German, Hardcover, 2nd 2., Akt. U. Erw. Aufl. 2007 ed.)
Horst Speichert; Edited by Stephen Fedtke
R1,700 Discovery Miles 17 000 Ships in 18 - 22 working days
Web of Lies - The lure and danger of conspiracy theories (Paperback): Aoife Gallagher Web of Lies - The lure and danger of conspiracy theories (Paperback)
Aoife Gallagher
R547 R495 Discovery Miles 4 950 Save R52 (10%) Ships in 9 - 17 working days

Web of Lies is a fascinating and far-reaching examination of the rising threat of far-right extremist thought in Ireland and internationally, and looks at how these movements utilise the online world to spread disinformation, polarising society in the process. From the Illuminati to the Red Scare, Save the Children to QAnon, research analyst Aoife Gallagher shows that there are many pathways to radicalisation - most of them benign and unassuming - and demonstrates that we are all susceptible to conspiratorial thinking and at risk of falling down the rabbit hole. In an accessible and entertaining style, Web of Lies presents a history of conspiracy theories and their roots in anti-Semitism, xenophobia and white supremacy; the role social media plays in spreading these theories; how they can proliferate during times of crises; and what we can do to protect ourselves and others from falling victim to these messages. 'Ever wondered how good people get trapped in their worst nightmares? Web of Lies is an unforgettable journey through the upside-down world of conspiratorial thinking. Aoife Gallagher has written the definitive account of how global lies have changed Irish lives, in a book full of personal empathy, unrivalled expertise and captivating storytelling. It shines a light on the real-world harm of our darkest online fantasies and it shows how each of us can fight back.' Mark Little 'At a time of fractious discord in discourse, Gallagher provides a vital context to and education in the strange and alarming world of conspiracy theories. Anyone interested in truth and facts should read this book.' Una Mullally 'Aoife Gallagher can plumb the depths of the internet and come up to the surface to explain what she's found with levity, empathy and humour. Wise without lecturing; sharp but always maintaining compassion for those caught up in misinformation. A fantastic global overview of trends while having one eye on how these things have come to Ireland.' Brianna Parkins

The Social Media Journalist Handbook (Paperback): Yumi Wilson The Social Media Journalist Handbook (Paperback)
Yumi Wilson
R1,283 Discovery Miles 12 830 Ships in 10 - 15 working days

The Social Media Journalist Handbook teaches readers how to be a real-world social media journalist, tracing the evolution of the field to its current-day practice. This book establishes social media journalism as the latest and one of the most effective ways to practice journalism in the 21st century. It features insights from top recruiters, editors, and senior producers working in the field, as well exercises that aid readers in developing the practical skills necessary to work successfully with social media. Readers will come away from the book with the knowledge to build strong social media strategies across different budgets, employing evergreen principles that work for different, ever-changing platforms. They'll learn how to reach and engage with the maximum number of people, as well as find sources, raise one's profile, conduct research, and produce stories.

Friendship and Social Media - A Philosophical Exploration (Paperback): Diane Jeske Friendship and Social Media - A Philosophical Exploration (Paperback)
Diane Jeske
R774 Discovery Miles 7 740 Ships in 10 - 15 working days

Friendship is regarded as crucial to living a good life. But how does friendship make our lives better? Do all friendships make our lives better? What sorts of interactions are necessary for maintaining valuable friendships? This book answers these questions via a philosophical exploration of friendship and the ways that it contributes value to our lives. Diane Jeske uses this philosophical analysis to assess the impact of our ever-growing use of social media: Do interactions via social media interfere with our ability to maintain genuine friendships? Do such interactions undermine the contribution of friendship to the value of our lives? In addressing these topics, Jeske examines the contemporary notion of a 'frenemy,' the ways in which we deliberately craft our social media personas, the role of the physical body in friendship, and the ways in which social media's exacerbation of our fear of being left out and of comparison-based envy can impact our relationships. Written in a clear and engaging style, Friendship and Social Media brings philosophical rigor and clarity to the task of determining how we can responsibly use social media in our own lives. It is essential reading for anyone interested in the ethics of interpersonal relationships and the social impact of technology.

Cybersecurity - Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare (Hardcover): Thomas A. Johnson Cybersecurity - Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare (Hardcover)
Thomas A. Johnson
R3,659 Discovery Miles 36 590 Ships in 10 - 15 working days

The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporations to protect against these threats. The book first provides a historical reference, detailing the emergence of viruses, worms, malware, and other cyber threats that created the need for the cybersecurity field. It then discusses the vulnerabilities of our critical infrastructures, the broad arsenal of cyber attack tools, and the various engineering design issues involved in protecting our infrastructures. It goes on to cover cyber intelligence tactics, recent examples of cyber conflict and warfare, and the key issues in formulating a national strategy to defend against cyber warfare. The book also discusses how to assess and measure the cost of cybersecurity. It examines the many associated cost factors and presents the results of several important industry-based economic studies of security breaches that have occurred within many nations. The book concludes with a look at future trends in cybersecurity. It discusses the potential impact of industry-wide transformational changes, such as virtualization, social media, cloud computing, structured and unstructured data, big data, and data analytics.

GDPR - How To Achieve and Maintain Compliance (Hardcover): Andrew Denley, Mark Foulsham, Brian Hitchen GDPR - How To Achieve and Maintain Compliance (Hardcover)
Andrew Denley, Mark Foulsham, Brian Hitchen
R1,215 Discovery Miles 12 150 Ships in 10 - 15 working days

Following the implementation of the new General Data Protect Regulation on 25 May 2018, organizations should now be fully compliant with their national interpretation of this far-reaching data protection standard. The reality is that most are not; whether through their inappropriate use of online cookies or ineffective physical data security, businesses continue to struggle with the increasing pressure from regulators to apply the Regulation. Non-compliance is widely due to misinterpretation, lack of real-world thinking, and challenges in balancing costs against business practicalities. This book provides insight into how to achieve effective compliance in a realistic, no-nonsense and efficient way. The authors have over 100 years' collective international experience in security, compliance and business disciplines and know what it takes to keep companies secure and in-line with regulators' demands. Whether your organization needs to swiftly adopt GDPR standards or apply them in "Business as Usual" this book provides a wide range of recommendations and explicit examples. With the likelihood of high-profile penalties causing major reputational damage, this book explains how to reduce risk, run a remedial project, and take immediate steps towards mitigating gaps. Written in plain English, it provides an invaluable international reference for effective GDPR adoption.

Computer and Cyber Security - Principles, Algorithm, Applications, and Perspectives (Hardcover): Brij B. Gupta Computer and Cyber Security - Principles, Algorithm, Applications, and Perspectives (Hardcover)
Brij B. Gupta
R4,841 Discovery Miles 48 410 Ships in 10 - 15 working days

This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.

Cyber Operations and the Use of Force in International Law (Hardcover): Marco Roscini Cyber Operations and the Use of Force in International Law (Hardcover)
Marco Roscini
R4,361 Discovery Miles 43 610 Ships in 10 - 15 working days

The internet has changed the rules of many industries, and war is no exception. But can a computer virus be classed as an act of war? Does a Denial of Service attack count as an armed attack? And does a state have a right to self-defence when cyber attacked? With the range and sophistication of cyber attacks against states showing a dramatic increase in recent times, this book investigates the traditional concepts of 'use of force', 'armed attack', and 'armed conflict' and asks whether existing laws created for analogue technologies can be applied to new digital developments. The book provides a comprehensive analysis of primary documents and surrounding literature, to investigate whether and how existing rules on the use of force in international law apply to a relatively new phenomenon such as cyberspace operations. It assesses the rules of jus ad bellum and jus in bello, whether based on treaty or custom, and analyses why each rule applies or does not apply to cyber operations. Those rules which can be seen to apply are then discussed in the context of each specific type of cyber operation. The book addresses the key questions of whether a cyber operation amounts to the use of force and, if so, whether the victim state can exercise its right of self-defence; whether cyber operations trigger the application of international humanitarian law when they are not accompanied by traditional hostilities; what rules must be followed in the conduct of cyber hostilities; how neutrality is affected by cyber operations; whether those conducting cyber operations are combatants, civilians, or civilians taking direct part in hostilities. The book is essential reading for everyone wanting a better understanding of how international law regulates cyber combat.

Fraud Auditing Using CAATT - A Manual for Auditors and Forensic Accountants to Detect Organizational Fraud (Paperback): Shaun... Fraud Auditing Using CAATT - A Manual for Auditors and Forensic Accountants to Detect Organizational Fraud (Paperback)
Shaun Aghili
R1,459 Discovery Miles 14 590 Ships in 10 - 15 working days

This book discusses various common occupational and organizational fraud schemes, based on the Association of Certified Fraud Examiners (ACFE) fraud tree and assist fraud examiners and auditors in correctly choosing the appropriate audit tests to uncover such various fraud schemes. The book also includes information about audit test red flags to watch out for, a list of recommended controls to help prevent future fraud related incidents, as well as step-by-step demonstrations of a number of common audit tests using IDEA (R) as a CAATT tool.

Industrial Internet of Things and Cyber-Physical Systems - Transforming the Conventional to Digital (Hardcover): Pardeep Kumar,... Industrial Internet of Things and Cyber-Physical Systems - Transforming the Conventional to Digital (Hardcover)
Pardeep Kumar, Vasaki Ponnusamy, Vishal Jain
R6,199 Discovery Miles 61 990 Ships in 18 - 22 working days

With the help of artificial intelligence, machine learning, and big data analytics, the internet of things (IoT) is creating partnerships within industry where machines, processes, and humans communicate with one another. As this radically changes traditional industrial operations, this results in the rapid design, cheap manufacture, and effective customization of products. Answering the growing demand of customers and their preferences has become a challenge for such partnerships. Industrial Internet of Things and Cyber-Physical Systems: Transforming the Conventional to Digital is a collection of innovative research that discusses development, implementation, and business impacts of IoT technologies on sustainable societal development and improved life quality. Highlighting a wide range of topics such as green technologies, wireless networks, and IoT policy, this book is ideally designed for technology developers, entrepreneurs, industrialists, programmers, engineers, technicians, researchers, academicians, and students.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Social Media Marketing - A Quickstudy…
Edwards Poster R232 Discovery Miles 2 320
Like, Comment, Subscribe - Inside…
Mark Bergen Paperback R380 R357 Discovery Miles 3 570
Research Anthology on Social Media's…
Information Resources Management Association Hardcover R9,426 Discovery Miles 94 260
The Honest Guide to Becoming A Digital…
Elizabeth Benton Paperback R221 Discovery Miles 2 210
Social Media Marketing - A Comprehensive…
Jason Lazar Hardcover R554 R509 Discovery Miles 5 090
Infringement Nation - Copyright 2.0 and…
John Tehranian Hardcover R2,229 Discovery Miles 22 290
Multigenerational Online Behavior and…
Information Reso Management Association Hardcover R7,998 Discovery Miles 79 980
Research Anthology on Strategies for…
Information R Management Association Hardcover R13,719 Discovery Miles 137 190
Your Book is Not a Business Card - How…
Kary Oberbrunner Hardcover R571 Discovery Miles 5 710
Security in IoT Social Networks
Fadi Al-Turjman, B.D. Deebak Paperback R2,634 Discovery Miles 26 340

 

Partners