![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General
On-line analytical processing (OLAP) is clearly a new approach to information system technology--offering a much-needed way to make informed decisions better and faster. One of its most important characteristics is multidimensional analysis--analysis that goes beyond the conventional two-dimensional analysis and provides users with rapid retrieval of data from organizational databases, data warehouses, or both. Not only that, but most importantly, says Dr. Thierauf, it allows users to look at different dimensions of the same data, thus enabling them to do analyses across departmental and even corporate boundaries. How it works and OLAP's many benefits to aid users in the public and private sectors is spelled out here, comprehensively yet concisely, and with the author's customary well-developed examples and clear prose. His book will be important reading for people at all levels of management and in all types of organizations. Another way of viewing OLAP is getting a typical company out of the custom-report-writing business and into the data-cube-server building business. An OLAP data structure can be thought of as a Rubik's Cube of data that users can twist and twirl in different ways to work through what-if and what-happened scenerios to get at the "whys" of the situation. Within an OLAP environment, the focus is on performing dictionary definition and maintenance as well as mapping flat files or relational columns to dimensions and measures. Although this may sound like a lot of work, managing one data cube is more efficient than writing a number of custom reports. Currently, some vendors provide administrative tools to get the data into the cubes in the first place, in the proper form, and on a regular basis. Hence, the job of managing data has been simplified for users.
The complex world of online piracy and peer-to-peer file sharing is skillfully condensed into an easy-to-understand guide that provides insight into the criminal justice approach to illegal file sharing, while offering guidance to parents and students who have concerns about potential legal action in response to file-sharing activities. While the actual impact of digital piracy is nearly impossible to precisely calculate, the threat of financial damage from illegal peer-to-peer (P2P) file sharing to the world's highest-grossing entertainment firms (and even entire industries!) has garnered attention from government, industry, and academic leaders and criminal justice professionals. Oftentimes, those providing access to computers and file sharing capabilities-parents, schools, libraries-don't know about or understand these activities and, therefore, put themselves and their families at risk for criminal and civil prosecution. This work describes the technological, legal, social, and ethical facets of illegal peer-to-peer file sharing. Geared toward parents, teachers, librarians, students, and any other computer user engaged in file sharing, this book will help readers to understand all forms of traditional and digital copyright violations of protected music, movies, and software. To date over 18,000 P2P users have been sued by the Recording Industry Association of America (RIAA). Most of these users have been college students and parents of high-school students. While word of these law suits are spreading, and many parents fear that their children may be using a family computer to illegally download and share copyrighted works, few supervising adults have the technical knowledge needed to determine whether and to what extent pirating may be occurring via a computer and Internet connection they are legally responsible for. Additionally, while P2P networks are filled with millions of users with billions of copyrighted files, few users understand the ways in which they are illegally using computers and other mobile electronic devices to download protected content. While describing both technical and social issues, this book primarily focuses on the social aspects of illegal file sharing, and provides technical concepts at a general level. Fisk skillfully condenses the complex nature of file sharing systems into an easy-to-understand guide, provides insight into the criminal justice approach to illegal file sharing, and offers guidance to parents and students who have concerns about potential legal action in response to file sharing activities.
There are today no more compelling sets of crime and security threats facing nations, communities, organizations, groups, families and individuals than those encompassed by cybercrime. For over fifty years crime enabled by computing and telecommunications technologies have increasingly threatened societies as they have become reliant on information systems for sustaining modernized living. Cybercrime is not a new phenomenon, rather an evolving one with respect to adoption of information technology (IT) for abusive and criminal purposes. Further, by virtue of the myriad ways in which IT is abused, it represents a technological shift in the nature of crime rather than a new form of criminal behavior. In other words, the nature of crime and its impacts on society are changing to the extent computers and other forms of IT are used for illicit purposes. Understanding the subject, then, is imperative to combatting it and to addressing it at various levels. This work is the first comprehensive encyclopedia to address cybercrime. Topical articles address all key areas of concern and specifically those having to with: terminology, definitions and social constructs of crime; national infrastructure security vulnerabilities and capabilities; types of attacks to computers and information systems; computer abusers and cybercriminals; criminological, sociological, psychological and technological theoretical underpinnings of cybercrime; social and economic impacts of crime enabled with information technology (IT) inclusive of harms experienced by victims of cybercrimes and computer abuse; emerging and controversial issues such as online pornography, the computer hacking subculture and potential negative effects of electronic gaming and so-called computer addiction; bodies and specific examples of U.S. federal laws and regulations that help to prevent cybercrimes; examples and perspectives of law enforcement, regulatory and professional member associations concerned about cybercrime and its impacts; and computer forensics as well as general investigation/prosecution of high tech crimes and attendant challenges within the United States and internationally.
In recent decades, computing has undergone rapid evolutions and ground breaking developments that affect almost every sector across the world. The developments of quantum computing and quantum cryptography are similarly revolutionizing computing and security with lasting impacts and implications. Quantum computing and quantum cryptography will pave the path for new opportunities for the future of computing. Quantum Computing and Quantum Cryptography in Future Computers discusses quantum computing and quantum cryptography principles and their impact on future computers. It includes coverage of the role of quantum computing to overcome the issues of current security methods. It also discusses the application of quantum computing in various areas like security, blockchain and more. Covering topics such as attack detection, machine learning, and quantum key distribution, this premier reference source is an ideal resource for developers, engineers, practitioners, security experts, students and educators of higher education, librarians, researchers, and academicians.
In Redefining Eternity: Interfacing Immortality in the Digital Corporate World, Bethany Crawford critically assesses the implications of “digital immortality” for central tenets of the human experience - such as consciousness, death, and time - as a preliminary mapping of the shifting existential paradigms of the digital age. This groundbreaking new book explores the social consequences and provocations of a digitally replicable subject in the current sociopolitical context. It thereby confronts a timeless philosophical question, imbued with ever greater urgency in our digital age: What does it mean to be human? Redefining Eternity establishes the motivations of digital and information technologies in creating “immortalization” through social and modal engagement with these new media. By analyzing various digital services currently promoting immortality, both intentionally and unintentionally, and engaging with texts by transhumanists and technologists such as Ray Kurzweil, Martine Rothblatt, and Max More, this endeavor allows for critical interpretation of the key terminologies, processes, and intentions for an immortal digital being. Crawford’s findings offer a dynamic foundation for conceptual analysis of the ramifications of “living forever” as a digital post-death self.
Advanced Topics in Global Information Management includes original material concerned with all aspects of global information management in three broad areas: Global Information Systems in Business Fuctions, Information Technology in Specific Regions of the World, Management of Global Information Resources and Applications. Both researchers and practitioners disseminate the evolving knowledge in these broad categories and the book examines a variety of aspects of global information management dealing with development, usage, failure, success, policies, strategies and applications of this valuable organizational resources.
Managers and executives know the importance of integrating business strategy and IT strategy for competitive advantage. Via numerous real-world examples and anecdotes, this book investigates myriad issues regarding the application of business strategy and IT strategy. Specifically, it focuses on how business/IT alignment is assessed, the factors that aid or hinder its integration, a maturity assessment and way in which managers can implement strategic information systems within their firms using various constructs and models. Strategic Information Technology: Opportunities for Competitive Advantage provides managers with an understanding and appreciation for the development of business and information technologies strategies to yield competitive advantage.
A 2021 ‘BOOK TO LOOK OUT FOR’ – THE INDEPENDENT ‘A mouthpiece for our anxieties and a tonic for our hearts.’ Charly Cox ‘Funny and honest.’ Pandora Sykes ‘Offers readers of all stripes and ages a great overview of relationships in the digital era’. Matt Haig In Millennial Love journalist Olivia Petter explores the questions, quirks and anxieties that consume the contemporary dating landscape. Olivia scrutinises the myths surrounding modern romance and asks why, despite having endless technology designed to aid communication, it’s harder to meet someone now than ever before. The book is based on the Independent’s chart-topping podcast of the same name and expands on some of the issues discussed on the show, including why contraception is a feminist issue, how dating apps have altered our understanding of attraction, and how 'Love Island' became the unlikely lens through which the consequences of so many of these things were exposed. Other topics covered include read receipt anxiety, why we need to rethink our relationship with porn, and the significance of ‘sliding into someone’s DMs’. By combining memoir with social commentary and insights from former podcast guests, including Munroe Bergdorf, Elizabeth Day and Lisa Taddeo, Millennial Love is an essential handbook on what it means to love today.
|
You may like...
Design, Analysis and Test of Logic…
Smita Krishnaswamy, Igor L Markov, …
Paperback
R2,965
Discovery Miles 29 650
The System Designer's Guide to VHDL-AMS…
Peter J Ashenden, Gregory D. Peterson, …
Paperback
R2,281
Discovery Miles 22 810
Fair Scheduling in High Performance…
Art Sedighi, Milton Smith
Hardcover
R2,653
Discovery Miles 26 530
Grids, P2P and Services Computing
Frederic Desprez, Vladimir Getov, …
Hardcover
R4,121
Discovery Miles 41 210
Customizable and Adaptive Quantum…
Nadia Nedjah, Luiza de Macedo Mourelle
Hardcover
R1,550
Discovery Miles 15 500
Creativity in Computing and DataFlow…
Suyel Namasudra, Veljko Milutinovic
Hardcover
R4,204
Discovery Miles 42 040
Smart and Secure Internet of Healthcare…
Nitin Gupta, Jagdeep Singh, …
Hardcover
R3,653
Discovery Miles 36 530
|