![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General
In the event of a disastrous event leading to the loss of communication networks, ad-hoc networks are a potent wireless communication resource because of their unique features including being quickly deployable and having a distributed nature, large coverage area, reduced cost, and more. Flying ad-hoc networks (FANETS) and vehicular ad-hoc networks (VANETS) are the future technology and can solve many problems in e-commerce delivery through drones, agriculture, vaccine delivery, and more. The unique characteristics of these networks and special requirements have created new challenges for the research community in recent decades. Modelling and Simulation of Fast-Moving Ad-Hoc Networks (FANETs and VANETs) enhances the modelling and simulation aspects of FANETS and VANETS and understands the protocols in mac layer and network layers for fast-moving ad-hoc networks. It presents simulations run using various simulation tools and measures the performance metrics of ad-hoc networks. Covering topics such as emulation tools, secure communication, and modelling software, this premier reference source is an excellent resource for computer scientists, IT specialists, business leaders and managers, supply chain and logistics management, libraries, students, government officials, international organizations, law enforcement, engineers, agriculturalists, researchers, and academicians.
Governments around the world are now placing increasing importance upon the success of small business entrepreneurs and are providing increased resources to support this emphasis. The simple fact that organizations and society are relying heavily on virtual technologies for communication and information management has presented government officials and information resource management practitioners alike with a variety of issues and challenges associated with attempting to managing resources and applications in the world economy. Presents the most current research and findings about these issues and challenges.
"Taken together, these volumes offer access to more than 400 entries on all aspects of data processing. They chronicle the history of those individuals and organizations that have contributed to the evolution of data processing over the past two decades, and jointly form a reference work that has no present parallel in the applied sciences." Choice
This dictionary offers a ready reference to the biographies of more than 160 individuals prominent in the history of data processing. It includes scientists, engineers, government officials, executives of major computer manufacturing companies, and users of data processing technology, and extends in time from antiquity through the 1980s. In an attempt to inform readers at all levels of specialization, the volume gives basic information to the general reader while providing reference materials that will serve the specialist as a starting point for further research.
A 2021 ‘BOOK TO LOOK OUT FOR’ – THE INDEPENDENT ‘A mouthpiece for our anxieties and a tonic for our hearts.’ Charly Cox ‘Funny and honest.’ Pandora Sykes ‘Offers readers of all stripes and ages a great overview of relationships in the digital era’. Matt Haig In Millennial Love journalist Olivia Petter explores the questions, quirks and anxieties that consume the contemporary dating landscape. Olivia scrutinises the myths surrounding modern romance and asks why, despite having endless technology designed to aid communication, it’s harder to meet someone now than ever before. The book is based on the Independent’s chart-topping podcast of the same name and expands on some of the issues discussed on the show, including why contraception is a feminist issue, how dating apps have altered our understanding of attraction, and how 'Love Island' became the unlikely lens through which the consequences of so many of these things were exposed. Other topics covered include read receipt anxiety, why we need to rethink our relationship with porn, and the significance of ‘sliding into someone’s DMs’. By combining memoir with social commentary and insights from former podcast guests, including Munroe Bergdorf, Elizabeth Day and Lisa Taddeo, Millennial Love is an essential handbook on what it means to love today.
In the information communication technologies (ICT) field, there is a vacuum among disciplines, as well as between business research and academic studies, due to the rapid development of new technologies. ""Information Communication Technologies and Emerging Business Strategies"" fills this void by following an interdisciplinary approach to emerging markets, information and communication technologies. ""Information Communication Technologies and Emerging Business Strategies"" creates awareness of changes in cultures of lifestyle consumption, which is both theoretically and empirically explored across multiple nations. This yields insight into the relationships between emerging businesses utilizing cutting-edge technologies and cultural perspectives, from the viewpoint of consumers.
The fourth book in Chris Scullion's critically acclaimed series of video game encyclopedias, The N64 Encyclopedia is dedicated to the Nintendo 64, one of the most well-loved games consoles ever released. Although the Nintendo 64 didn't sell as well as some of Nintendo's other systems, and although it struggled in the shadow of the bold newcomer that was the Sony PlayStation, everyone who owned an N64 was in love with it and the four-player multiplayer it provided as standard. Despite its relatively small library, the Nintendo 64 had a healthy number of groundbreaking titles that would revolutionise the way we played video games. The likes of Super Mario 64, GoldenEye 007, Mario Kart 64 and The Legend of Zelda: Ocarina of Time remain iconic in the eyes of video game fans 25 years down the line. This book naturally contains those games, but it also contains every other game released for the system, no matter how obscure. It also covers every game released in Japan, including those for the ill-fated Nintendo 64DD add-on which never left the country. With over 400 games covered, screenshots for every title and a light-hearted writing style designed to make reading it a fun experience, the N64 Encyclopedia is the definitive guide to a truly revolutionary gaming system.
With the advent of advanced hand-held technology and the widespread nature of the Internet, the world of animated filmmaking is more exciting and accessible than ever. Due to this cultural and technological development, the success of independent animated film makers is on the rise. Independent Animation: Developing, Producing and Distributing Your Animated Films, Second Edition showcases some of the greatest, most innovative giants in the field and helps guide readers through the artistic process and production techniques. Story development, casting, color theory, distribution and the intimidating aspects of production are elucidated using various examples of acclaimed, viral and award-winning animated films from all over the world. Readers will also explore the changing nature of audiences, festivals and distributors’ relationships with animation and be granted first-hand guidance in navigating the diverse fields of animated filmmaking. Key Features: Covers the entire process of creating an independent animated film from story development and casting to editing and distribution Presents a comprehensive array of classic and contemporary case studies covering all manner of production methods from traditional pipelines to avant-garde, auteur and experimental approaches Features input and exclusive insight into the working processes of some of the industry’s most noteworthy indie animation talents, including Signe Baumane, Adam Elliot, Don Hertzfeldt, Kirsten Lepore, Robert Morgan, David OReilly, PES, Bill Plympton, Rosto, Chris Shepherd and dozens more Additional resources and interviews are available through a special section of Skwigly Online Animation Magazine.
The chapters in this book have evolved from talks originally presented at The First International Workshop on Human and Machine Cognition. Although the workshop took place in1989, the papers that appear here are more recent, completed some time after the workshop. They reflect both the spontaneous exchanges in that halcyon setting and the extensive review process.
Intended as an introduction to the law for electronic data processing managers, this book provides a comprehensive overview of legal issues and concerns of particular relevance to those responsible for running computer operations. The author shows the reader how to identify potential areas of liability, how to take steps to prevent a potential liability from becoming an actual liability, and how to communicate more effectively with legal counsel when it is required. As Gemignani demonstrates, managers of computer operations must be especially alert to areas of legal vulnerability because computers have raised novel, precedent-setting legal issues that the courts have only recently begun to address. His guide, written for professionals with little background in the law, will enable EDP managers to recognize their rights in particular situations and deal more successfully with legal problems when they arise. The book begins with an introduction to the law, courts, and the trial process. This first chapter also includes a brief survey of legal research tools that will enable the reader to find the latest word on a question in this rapidly evolving field. Gemignani moves to a discussion of contract law, addressing issues such as the Uniform Commercial Code, warranties, breach of contract, and remedies available in case of breach, rejection and acceptance of contracted-for products, and licenses and leases. Subsequent chapters examine copyright law, laws related to patents and trade secrets, computer crime and piracy, torts, and evidentiary considerations managers should be aware of in designing and operating computer centers. Each chapter contains a list of selected readings, and an extensive glossary of legal terms is provided for ready reference. A contract checklist, forms and instructions for obtaining a copyright, and a sample U.S. Supreme Court slip opinion on a topic in computer law complete this invaluable guide.
Get ready to discover the amazing world of Roblox! We all know Roblox is full of exciting games and experiences, but do you know where to find your next favourite game? This book will reveal the top 100 Roblox games, so hold on tight and prepare for fun! Whether you’re a role-playing fanatic, obsessed with obbys or a total tycoon, the 100% Unofficial Roblox Top 100 brings you the best games across every genre – making it the ultimate guide for Roblox fans old and new! Discover all there is to know about the greatest games on the Roblox platform, from frantic first-person shooters, to epic role-playing quests. Learn tips and tricks to impress your friends, discover secrets hidden in your favourite games and unearth awesome new adventures to play together.
Mobile and Wireless Network Security and Privacy analyzes important security and privacy problems in the realms of wireless networks and mobile computing. The material includes a report to the National Science Foundation of the United States which will be used by program managers for the foundation in setting priorities for research directions in this area. In the following chapters field experts expand upon the report and provide further information about important research directions in the fields of wireless networks and mobile computing. The chapters are written by the leading international researchers and professionals in thes fields. Each chapter represents state-of-the-art research and includes several influential contributions. A multitude of valuable discussions on relevant concepts, such as the various approaches that define emerging security and privacy in mobile and wireless environment, are featured. The book is useful to researchers working in the fields of mobile and wireless security and privacy and to graduate students seeking new areas to perform research. It also provides information for academics and industry people researching recent trends and developments in the mobile and wireless security fields.
The Revolution in Military Affairs (RMA), unleashed by the integration of information technologies into weapons systems, military units, and operations is a phenomenon whose impacts have been felt well beyond the Gulf in 1991 or the Balkans in 1999. Technological developments lie at the center of these changes; however, the RMA is about more than technology. It includes the consequences of technological changes for defense and security. This study provides an assessment of the RMA that goes beyond a mere description of new defense-related technologies to deal with deeper, more fundamental issues. Through the contributions of American, Canadian, Chinese, and French experts, this book surveys the RMA from various perspectives and evaluates it from the standpoints of military history and military science. The authors conclude that, while the RMA represents a significant challenge for defense establishments, it may fall short of being truly revolutionary. Whether one looks at power projection or information warfare, it appears that emerging technologies will translate into significant improvements in capabilities, but not necessarily a revolution in warfare. From a comparative perspective, the United States remains well ahead in thinking of and implementing changes that stem from the RMA, although other nations may make selective use of the RMA to promote regional security goals.
Several aspects of informatics curricula and teaching methods at
the university level are reported in this volume, including: This book contains a selection of the papers presented at the Working Conference on Informatics Curricula, Teaching Methods and Best Practice (ICTEM 2002), which was sponsored by the International Federation for Information Processing (IFIP) Working Group 3.2, and held in Florian polis, Brazil in July 2002. The working groups were organized in three parallel tracks. Working Group 1 discussed the "Directions and Challenges in Informatics Education." The focus of Working Group 2 was "Teaching Programming and Problem Solving." Working Group 3 discussed "Computing: The Shape of an Evolving Discipline." Each working group worked actively and prepared a report with the results of the discussions; these reports are included as the second part of this book.
|
You may like...
CompTIA A+ Guide to Information…
Nicholas Pierce, Jean Andrews, …
Hardcover
Going digital guide to data governance…
Organisation for Economic Cooperation and Development
Paperback
R613
Discovery Miles 6 130
Principles Of Business Information…
Ralph Stair, George Reynolds, …
Paperback
(1)R1,780 Discovery Miles 17 800
Principles of Business Information…
George Reynolds, Ralph M. Stair, …
Paperback
Digital Libraries - Integrating Content…
Mark V Dahl, Kyle Banerjee, …
Paperback
R1,150
Discovery Miles 11 500
The path to becoming a data-driven…
Organisation for Economic Cooperation and Development
Paperback
R1,382
Discovery Miles 13 820
|