![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General
Get ready to discover the amazing world of Roblox! We all know Roblox is full of exciting games and experiences, but do you know where to find your next favourite game? This book will reveal the top 100 Roblox games, so hold on tight and prepare for fun! Whether you’re a role-playing fanatic, obsessed with obbys or a total tycoon, the 100% Unofficial Roblox Top 100 brings you the best games across every genre – making it the ultimate guide for Roblox fans old and new! Discover all there is to know about the greatest games on the Roblox platform, from frantic first-person shooters, to epic role-playing quests. Learn tips and tricks to impress your friends, discover secrets hidden in your favourite games and unearth awesome new adventures to play together.
This dictionary offers a ready reference to the biographies of more than 160 individuals prominent in the history of data processing. It includes scientists, engineers, government officials, executives of major computer manufacturing companies, and users of data processing technology, and extends in time from antiquity through the 1980s. In an attempt to inform readers at all levels of specialization, the volume gives basic information to the general reader while providing reference materials that will serve the specialist as a starting point for further research.
Microservices become immensely popular because it promised to help organizations build loosely-coupled systems that allow for fast, easy change. But microservices systems haven’t always kept that promise. This book identifies the deeper problem -- how software architects and designers approach coupling – and introduces an important new approach for creating more successful designs whether you use microservices or not. Instead of blindly avoiding coupling, leading software architecture expert Vladik (Vlad) Khononov proposes a novel method that transforms it into a powerful design tool: “balanced multi-dimensional coupling.†Khononov begins by surveying existing methods of evaluating coupling, and illuminating their strengths and limitations in the context of modern distributed systems. Next, he introduces a new multi-dimensional coupling model, and demonstrates how to harness it to build modular software. Instead of focusing solely on a single approach, Balancing Coupling in Software Design illuminates underlying design principles that are ubiquitous in SOA, microservices, DDD, design patterns, and other paradigms, revealing how each of them can fail if thoughtful design principles for coupling are neglected -- and how balanced coupling can make all of them work more effectively.
In the information communication technologies (ICT) field, there is a vacuum among disciplines, as well as between business research and academic studies, due to the rapid development of new technologies. ""Information Communication Technologies and Emerging Business Strategies"" fills this void by following an interdisciplinary approach to emerging markets, information and communication technologies. ""Information Communication Technologies and Emerging Business Strategies"" creates awareness of changes in cultures of lifestyle consumption, which is both theoretically and empirically explored across multiple nations. This yields insight into the relationships between emerging businesses utilizing cutting-edge technologies and cultural perspectives, from the viewpoint of consumers.
Provides a wide-ranging survey of the sociolinguistic issues raised by the impact of information technology. The author demonstrates how and in which ways the new technologies both affect human communication and are in turn affected by the way people communicate using the technologies.
Just as the automobile radically changed people's lives at the beginning of the 20th century, so too has the revolution in online services (including blogging, podcasting, videogaming, shopping, and social networking) and cell-phone use changed our lives at the turn of the 21st century. In addition, many other services, activities, and devices—including the Palm Pilot, the BlackBerry, the iPod, digital cameras, and cell cameras—have been made possible by the combination of these two technologies. Whereas the automobile allowed people for the first time to work in cities and live comfortably in the suburbs, extending the long commute beyond the limits previously circumscribed by public transportation, the Internet and cell phone allow us to interact with others from around the world—or a few hundred miles—from where we work or live, giving rise to the telecommuting phenomenon and allowing us to stay in touch with friends and families in the new virtual environment. As Hanson demonstrates in her new book, these technologies enable us to work and play 24/7, anytime, anywhere. What does this mean for us as individuals and for society as a whole? What are the social implications of this technological revolution that we have witnessed in the short span of about 20 years? Do people of different generations use these technologies in the same ways, or do they adopt them to support their communication habits formed at different times of their lives? How does the illusion of control provided by these technologies affect the way we think about what is meaningful in our lives? Hanson examines the wide-ranging impact of this change. How do individuals posting their viewpoints on the Internet affect democracy? Is it possible to ever completely prevent identity theft over the Internet? How permanent is information stored on the Internet or on a hard drive? Do cell phones change the way people think about privacy or the way they communicate with others? Does email? Do videogames teach new social principles? Do cell phones and the Internet change traditional communication behaviors and attitudes? Hanson discusses these crucial issues and explores to what extent individuals do have control, and she assesses how social and governmental services are responding to (or running from) the problems posed by these new technologies.
The chapters in this book have evolved from talks originally presented at The First International Workshop on Human and Machine Cognition. Although the workshop took place in1989, the papers that appear here are more recent, completed some time after the workshop. They reflect both the spontaneous exchanges in that halcyon setting and the extensive review process.
Intended as an introduction to the law for electronic data processing managers, this book provides a comprehensive overview of legal issues and concerns of particular relevance to those responsible for running computer operations. The author shows the reader how to identify potential areas of liability, how to take steps to prevent a potential liability from becoming an actual liability, and how to communicate more effectively with legal counsel when it is required. As Gemignani demonstrates, managers of computer operations must be especially alert to areas of legal vulnerability because computers have raised novel, precedent-setting legal issues that the courts have only recently begun to address. His guide, written for professionals with little background in the law, will enable EDP managers to recognize their rights in particular situations and deal more successfully with legal problems when they arise. The book begins with an introduction to the law, courts, and the trial process. This first chapter also includes a brief survey of legal research tools that will enable the reader to find the latest word on a question in this rapidly evolving field. Gemignani moves to a discussion of contract law, addressing issues such as the Uniform Commercial Code, warranties, breach of contract, and remedies available in case of breach, rejection and acceptance of contracted-for products, and licenses and leases. Subsequent chapters examine copyright law, laws related to patents and trade secrets, computer crime and piracy, torts, and evidentiary considerations managers should be aware of in designing and operating computer centers. Each chapter contains a list of selected readings, and an extensive glossary of legal terms is provided for ready reference. A contract checklist, forms and instructions for obtaining a copyright, and a sample U.S. Supreme Court slip opinion on a topic in computer law complete this invaluable guide.
Mobile and Wireless Network Security and Privacy analyzes important security and privacy problems in the realms of wireless networks and mobile computing. The material includes a report to the National Science Foundation of the United States which will be used by program managers for the foundation in setting priorities for research directions in this area. In the following chapters field experts expand upon the report and provide further information about important research directions in the fields of wireless networks and mobile computing. The chapters are written by the leading international researchers and professionals in thes fields. Each chapter represents state-of-the-art research and includes several influential contributions. A multitude of valuable discussions on relevant concepts, such as the various approaches that define emerging security and privacy in mobile and wireless environment, are featured. The book is useful to researchers working in the fields of mobile and wireless security and privacy and to graduate students seeking new areas to perform research. It also provides information for academics and industry people researching recent trends and developments in the mobile and wireless security fields.
The generative AI revolution has come to education. Salman Khan, the
visionary behind Khan Academy with more than 150 million users,
explores how artificial intelligence and GPT technology is already
beginning to transform learning, offering a future roadmap for
teachers, parents, and students to navigate this exciting (and
sometimes intimidating) new world.
The Revolution in Military Affairs (RMA), unleashed by the integration of information technologies into weapons systems, military units, and operations is a phenomenon whose impacts have been felt well beyond the Gulf in 1991 or the Balkans in 1999. Technological developments lie at the center of these changes; however, the RMA is about more than technology. It includes the consequences of technological changes for defense and security. This study provides an assessment of the RMA that goes beyond a mere description of new defense-related technologies to deal with deeper, more fundamental issues. Through the contributions of American, Canadian, Chinese, and French experts, this book surveys the RMA from various perspectives and evaluates it from the standpoints of military history and military science. The authors conclude that, while the RMA represents a significant challenge for defense establishments, it may fall short of being truly revolutionary. Whether one looks at power projection or information warfare, it appears that emerging technologies will translate into significant improvements in capabilities, but not necessarily a revolution in warfare. From a comparative perspective, the United States remains well ahead in thinking of and implementing changes that stem from the RMA, although other nations may make selective use of the RMA to promote regional security goals.
Several aspects of informatics curricula and teaching methods at
the university level are reported in this volume, including: This book contains a selection of the papers presented at the Working Conference on Informatics Curricula, Teaching Methods and Best Practice (ICTEM 2002), which was sponsored by the International Federation for Information Processing (IFIP) Working Group 3.2, and held in Florian polis, Brazil in July 2002. The working groups were organized in three parallel tracks. Working Group 1 discussed the "Directions and Challenges in Informatics Education." The focus of Working Group 2 was "Teaching Programming and Problem Solving." Working Group 3 discussed "Computing: The Shape of an Evolving Discipline." Each working group worked actively and prepared a report with the results of the discussions; these reports are included as the second part of this book.
|
You may like...
Research Anthology on Implementing…
Information R Management Association
Hardcover
R15,742
Discovery Miles 157 420
Research Anthology on Big Data…
Information R Management Association
Hardcover
R15,732
Discovery Miles 157 320
Demystifying Graph Data Science - Graph…
Pethuru Raj, Abhishek Kumar, …
Hardcover
Handbook of Economic Expectations
Ruediger Bachmann, Giorgio Topa, …
Paperback
R2,978
Discovery Miles 29 780
Intelligent Network Design Driven by Big…
Sunil Kumar, Glenford Mapp, …
Hardcover
Successfully Implementing Microsoft…
Reinder Koop, Ester Muris
Hardcover
R1,420
Discovery Miles 14 200
Integrierte Informationslogistik
Barbara Dinter, Robert Winter
Hardcover
R1,681
Discovery Miles 16 810
Research Anthology on Big Data…
Information R Management Association
Hardcover
R15,743
Discovery Miles 157 430
|