![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General
The crypto wars have raged for half a century. In the 1970s, digital privacy activists prophesied the emergence of an Orwellian State, made possible by computer-mediated mass surveillance. The antidote: digital encryption. The U.S. government warned encryption would not only prevent surveillance of law-abiding citizens, but of criminals, terrorists, and foreign spies, ushering in a rival dystopian future. Both parties fought to defend the citizenry from what they believed the most perilous threats. The government tried to control encryption to preserve its surveillance capabilities; privacy activists armed citizens with cryptographic tools and challenged encryption regulations in the courts. No clear victor has emerged from the crypto wars. Governments have failed to forge a framework to govern the, at times conflicting, civil liberties of privacy and security in the digital age—an age when such liberties have an outsized influence on the citizen–State power balance. Solving this problem is more urgent than ever. Digital privacy will be one of the most important factors in how we architect twenty-first century societies—its management is paramount to our stewardship of democracy for future generations. We must elevate the quality of debate on cryptography, on how we govern security and privacy in our technology-infused world. Failure to end the crypto wars will result in societies sleepwalking into a future where the citizen–State power balance is determined by a twentieth-century status quo unfit for this century, endangering both our privacy and security. This book provides a history of the crypto wars, with the hope its chronicling sets a foundation for peace.
This book is an attempt to establish in the readers the importance of creating interoperable data stores and writing rules for handling this data. It also covers extracts from a few project dissertations and a research funded project that the author had supervised.• Describes the power of ontologies for better data management• Provides an overview of knowledge engineering including ontology engineering, tools and techniques• Provides sample development procedures for creating two domain ontologies.• Depicts the utility of ontological representation in situation awareness• Demonstrates recommendation engine for unconventional emergencies using a hybrid reasoning approach.• The text explains how to make better utilization of resources when emergency strikesGraduates and undergraduates doing courses in artificial intelligence, semantic web and knowledge engineering will find this book beneficial.
Machine learning algorithms allow computers to learn without being explicitly programmed. Their application is now spreading to highly sophisticated tasks across multiple domains, such as medical diagnostics or fully autonomous vehicles. While this development holds great potential, it also raises new safety concerns, as machine learning has many specificities that make its behaviour prediction and assessment very different from that for explicitly programmed software systems. This book addresses the main safety concerns with regard to machine learning, including its susceptibility to environmental noise and adversarial attacks. Such vulnerabilities have become a major roadblock to the deployment of machine learning in safety-critical applications. The book presents up-to-date techniques for adversarial attacks, which are used to assess the vulnerabilities of machine learning models; formal verification, which is used to determine if a trained machine learning model is free of vulnerabilities; and adversarial training, which is used to enhance the training process and reduce vulnerabilities. The book aims to improve readers’ awareness of the potential safety issues regarding machine learning models. In addition, it includes up-to-date techniques for dealing with these issues, equipping readers with not only technical knowledge but also hands-on practical skills.
This book brings together the insights and practical experience of some of the most experienced Data Plane Development Kit (DPDK) technical experts, detailing the trend of DPDK, data packet processing, hardware acceleration, packet processing and virtualization, as well as the practical application of DPDK in the fields of SDN, NFV, and network storage. The book also devotes many chunks to exploring various core software algorithms, the advanced optimization methods adopted in DPDK, detailed practical experience, and the guides on how to use DPDK.
Since the release of V0.01 in 2006, to the present V4.0 version, RT-Thread has developed a reputation among developers for its open source strategy. RT-Thread has gained a large following among members of the embedded open source community in China with hundreds of thousands of enthusiasts. RT-Thread is widely used in energy, automotive, medical, consumer electronics, among other applications, making it a mature and stable open source embedded operating system. The purpose of RT-Thread RTOS Design and Implementation is to create an easy learning curve for mastering RT-Thread, so that more developers can participate in the development of RT-Thread and work together to create an open source, tiny, and beautiful Internet of Things operating system. The book’s first part introduces the RT-Thread kernel and starts with an overview of RT-Thread before covering thread management, clock management, inter-thread synchronization, inter-thread communication, memory management, and interrupt management. The second part begins with RT-Thread kernel porting and explains how to port RT-Thread to a hardware board to run it. The second part also introduces RT-Thread components and discusses the Env development environment, FinSH console, device management, and network framework. Additional topics covered include: The I/O device framework Virtual file systems Peripheral interfaces Devices including the PIN device, UART device, and ADC device, among others. Each chapter features code samples, as well as helpful tables and graphs, so you can practice as you learn as well as perform your own experiments.
The Chaos Machine is an essential book for our times - Ezra Klein The Chaos Machine is the story of how the world was driven mad by social media. The election of populists like Trump and Bolsonaro; strife and genocide in countries like Myanmar; the rampant spread of COVID-19 conspiracy theories as deadly as the pandemic itself; all of these are products of a breakdown in our social and political lives, a breakdown driven by the apps, companies and algorithms that compete constantly for our attention. Max Fisher is a leading New York Times technology reporter whose work has covered the way that social media sites - driven increasingly by artificial intelligence rather than human ingenuity - push users towards more and more extreme positions, deepening the divisions in society in pursuit of greater engagement and profit. With extraordinary access to the most powerful players in Silicon Valley, and with testimonies from around the world of the havoc being wreaked by our online selves, The Chaos Machine shows us how we got to this uniquely perilous moment - and how we might get out of it.
Following significant advances in deep learning and related areas interest in artificial intelligence (AI) has rapidly grown. In particular, the application of AI in drug discovery provides an opportunity to tackle challenges that previously have been difficult to solve, such as predicting properties, designing molecules and optimising synthetic routes. Artificial Intelligence in Drug Discovery aims to introduce the reader to AI and machine learning tools and techniques, and to outline specific challenges including designing new molecular structures, synthesis planning and simulation. Providing a wealth of information from leading experts in the field this book is ideal for students, postgraduates and established researchers in both industry and academia.
Security and smart spaces are among the most significant topics in IoT nowadays. The implementation of secured smart spaces is at the heart of this concept, and its development is a key issue in the next generation IoT. This book addresses major security aspects and challenges in realizing smart spaces and sensing platforms in critical Cloud and IoT applications. The book focuses on both the design and implementation aspects of security models and strategies in smart that are enabled by wireless sensor networks and RFID systems. It mainly examines seamless data access approaches and encryption and decryption aspects in reliable IoT systems.
The book is about a very active research field in software engineering. In modern society, the fact of the world's high reliance on software requires the system's robustness, i.e., continual availability and satisfactory service quality. This requirement gives rise to the popularity of the research on the self-adaptive software in open environment. There are some academic conferences dedicated to this field. But there is a lack of monographs about the topic. We believe such need is unmet in marketplace. By publishing the book, it can help bridge the gap and bring benefits to readers thereof. Key Features: The topic is well-motivated, interesting and actively studied worldwide The research represents as the state-of-the-art in the field The technical part of the book is rigidly evaluated The theoretical part of the book is sound and proved The organization and presentation of the book will be double-checked by professional scholars
Discover one-of-a-kind AI strategies never before seen outside of academic papers! Learn how the principles of evolutionary computation overcome deep learning’s common pitfalls and deliver adaptable model upgrades without constant manual adjustment. In Evolutionary Deep Learning you will learn how to: Solve complex design and analysis problems with evolutionary computation Tune deep learning hyperparameters with evolutionary computation (EC), genetic algorithms, and particle swarm optimization Use unsupervised learning with a deep learning autoencoder to regenerate sample data Understand the basics of reinforcement learning and the Q Learning equation Apply Q Learning to deep learning to produce deep reinforcement learning Optimize the loss function and network architecture of unsupervised autoencoders Make an evolutionary agent that can play an OpenAI Gym game Evolutionary Deep Learning is a guide to improving your deep learning models with AutoML enhancements based on the principles of biological evolution. This exciting new approach utilizes lesser-known AI approaches to boost performance without hours of data annotation or model hyperparameter tuning. about the technology Evolutionary deep learning merges the biology-simulating practices of evolutionary computation (EC) with the neural networks of deep learning. This unique approach can automate entire DL systems and help uncover new strategies and architectures. It gives new and aspiring AI engineers a set of optimization tools that can reliably improve output without demanding an endless churn of new data. about the reader For data scientists who know Python.
What are the borders of risk? How is the perception of risk related to new technologies and digital changing? This book discusses these topics, moving from theories to research data, looking for concrete answers now, or taking a picture of reality. The volume is divided into three main sections: Exploring the Edges of Risk, according to sociological, psychological and artificial intelligence perspective; Technological and Digital Risks, exploring social media, cyberbullying, hate speech, social bots on digital platforms; Risk in the Cities, working with risk and deviance, risk communication, environmental and nuclear risks. Inside, research data from Europe, USA and Mexico are discussed.
AN FT BUSINESS BOOK OF THE MONTH The book that will make you rethink everything you thought you knew about data, privacy and the future of Big Tech. 'We are currently living in a moment of extreme pessimism about data. This book will change your mind.' Almost everything we do generates data. Digital technology is now so pervasive that it's very hard to escape its influence, and with that growth comes fear. But whatever the news has told you about data and technology, think again. Data expert and tech insider Sam Gilbert shows that, actually, this data revolution could be the best thing that ever happened to us. Good Data examines the incredible new ways this information explosion is already helping us – whether that's combating inequality, creating jobs, advancing the frontiers of knowledge or protecting us from coronavirus – and explains why the best is yet to come. Data touches everything, from our biggest hates (online advertising) to our greatest loves (our pets), and in this fascinating new book, Gilbert explores how, if we can embrace the revolution (even the ads), we could all live vastly improved lives. We are standing on the edge of greatness, we just need to know how to get there.
Der mit der Digitalisierung der Kommunikation einhergehende Wandel von Kommunikations- und Medienkulturen beeinflusst die Produktionsbedingungen und den Rezeptionsrahmen von Texten sowie kommunikative Praktiken und kommunikatives Handeln. Um kommunikative Praktiken zu vollziehen und kommunikatives Handeln möglichst effektiv zu gestalten, entstehen vielfältige diskursive Kommunikationsräume, in denen mediale Akteure zu verschiedenen Zwecken miteinander agieren. Mit der Verlagerung der kommunikativen Praktiken in die digitale Welt kommt es zur Verlinkung von Texten zu Diskursen, die multisemiotisch und multimedial geprägt und auf Interaktion ausgerichtet sind. Dieses Buch ist solchen diversen textuellen und diskursiven Erscheinungsformen der massenmedialen Kommunikation gewidmet, die auf der Grundlage erschlossener Textkorpora interdisziplinär untersucht werden. Gegenstand der breit gefächerten Diskussion sind hier einzelne Texte und zusammenhängende Textformate in verschiedenen Medien sowie diskursiv organisierte Textwelten diverser multimodaler und -medialer Ausgestaltung.
Ditch the devices and bring back the magic of being a kid Screens are everywhere. Children spend an average of 7.5 hours on digital devices every day with profoundly negative consequences. While some tech may “amplify” real life experience (online music lessons or Zoom calls with faraway family, for example), the vast majority “amputates” by limiting physical activity, creating anxiety, or damaging self-esteem. Childhood Unplugged takes a bold approach to creating healthy boundaries around the use of digital media, suggesting kids should be offline for the majority of their time. Drawing on her own family’s experience, plus interviews with digital minimalists, educators, and child development experts, author Katherine Martinko presents: Meticulously researched analysis of the impacts of excessive screen time on children's physical, neurological, emotional, and social development Specific pathways to reduced screen exposure, naturally leading to more time spent outdoors, increased confidence and empathy, more creative and active play, and other benefits Inspiration for caregivers overwhelmed by the thought of severing ties with the digital babysitter Age-appropriate advice for fundamental change, with specific sections for babies and toddlers, school-aged children, and adolescents. Taking a calming, nonjudgmental approach, Childhood Unplugged is a lifeline for parents, caregivers, educators, and anyone who questions the role of digital media and yearns for the young people in their life to experience the profound beauty and magic of childhood.
* A useful summary of the findings of a project researching the use of information communication technologies (ICTs) for development* Includes a functional best practice framework--who should do what, and when--and suggestions for further research* Features a review of the literature and illustrates lessons learned through the example of a case study of a project in PeruThis paper summarizes the findings from a research project conducted by ITDG and Cranfield School of Management (Bedford, U.K.) into using ICTs (like the Internet or mobile telephony) to share information with people at grassroots level "connecting the first mile."Across the world, development agencies are piloting projects to use ICTs to provide people with improved access to up-to-date information, equip them with new skills, or connect them to an international market. Evidence suggests that many of these projects are not succeeding. "Connecting the First Mile" outlines the challenges involved in sharing information with people who have little experience with ICTs, low levels of literacy, little time or money, and very specific knowledge and language requirements. It provides a best practice framework that embraces many applications of ICT (eg for agriculture, e-governance etc.) and many technologies, and it includes suggestions for further research.Of interest to Development, and ICT for Development: practitioners, students, academics, and donor organizations.
The term “cyberspace” that entered into our lives towards the end of the 20th century is defined as: “a global platform that consists of the network containing the infrastructures of information technologies with Internet, communication networks, computer systems, embedded processors and controllers”. When this term is analysed, it is seen that nearly all informatics systems minimize the human control and at many platforms, they are connected to each other. Although the term “cyberspace” is very new, it is like a living organism that is coordinated with scientific disciplines such as finance, defence, health, education, transportation and security, in all manned and unmanned areas. Our interaction with this organism covers almost all our lifespan. When looked closer, it is seen that cyberspace must be researched not only from technology side but also from sociology and psychology sides. So, welcome to the cyberspace journey that we prepared for you in our book What’s Happening in Cyberspace?
How we interface and interact with computing, communications and entertainment devices is going through revolutionary changes, with natural user inputs based on touch, voice, and vision replacing or augmenting the use of traditional interfaces based on the keyboard, mouse, joysticks, etc. As a result, displays are morphing from one-way interface devices that merely show visual content to two-way interaction devices that provide more engaging and immersive experiences. This book provides an in-depth coverage of the technologies, applications, and trends in the rapidly emerging field of interactive displays enabled by natural human-interfaces. Key features: * Provides a definitive reference reading on all the touch technologies used in interactive displays, including their advantages, limitations, and future trends. * Covers the fundamentals and applications of speech input, processing and recognition techniques enabling voice-based interactions. * Offers a detailed review of the emerging vision-based sensing technologies, and user interactions using gestures of hands, body, face, and eye gazes. * Discusses multi-modal natural user interface schemes which intuitively combine touch, voice, and vision for life-like interactions. * Examines the requirements and technology status towards realizing true 3D immersive and interactive displays.
ITIL 4 is the latest evolution of the leading best-practice framework for ITSM (IT service management). It has been significantly updated from ITIL v3 and addresses new ITSM challenges, includes new technologies and incorporates new ways of working. ITIL Foundation Essentials - ITIL 4 Edition* is the ultimate revision guide for candidates preparing for the ITIL 4 Foundation exam. It is fully aligned with the Foundation course syllabus and gives a clear and concise overview of the facts. You can use it in place of writing revision notes, giving you more time to focus on learning the information you need to pass the exam. Whether you are taking an ITIL 4 Foundation training course or are a self-study candidate, new to the framework or looking to upgrade your ITIL 2011 certification, this guide is the essential companion. It: -Provides definitions of the key terms and concepts used in ITIL 4; -Presents detailed information in clear, user-friendly and easy-to-follow ways through tables, bullet points and diagrams; and -Explains the key figures and diagrams in the ITIL syllabus. New for the ITIL 4 Edition: -Fully updated to reflect the changes introduced in ITIL 4. -New sections on the guiding principles of ITIL and the four dimensions of service management. -Updated overview of the ITIL Foundation exam.
Begin your JavaScript journey with this comprehensive, hands-on guide. You’ll learn everything there is to know about professional JavaScript programming, from core language concepts to essential client-side tasks. Build dynamic web applications with step-by-step instructions and expand your knowledge by exploring server-side development and mobile development. Work with advanced language features, write clean and efficient code, and much more! · Your all-in-one guide to JavaScript· Work with objects, reference types, events, forms, and web APIs· Build server-side applications, mobile applications, desktop applications, and more· Consult and download practical code examples Language ReviewRefresh your knowledge or learn JavaScript as a beginner with in-depth coverage of JavaScript basics. Understand how to store values, use data types, control flow, and debug your code. Client-Side ProgrammingBuild dynamic web applications by learning to process events, load content, create images, and use web APIs. Advanced ConceptsExplore server-side application development with Node.js, mobile application development with React Native and Iconic, and desktop programming with Electron and NW.js. Work with advanced language features and more. This book includes: 1) More than 1,000 pages of JavaScript knowledge from a leading expert 2) A compendium of basics and advanced topics for professionals 3) Detailed, numbered code listings 4) Diagrams, charts, tables, note boxes, definitions, and background information 5) Numerous illustrations and screenshots 6) A comprehensive index This book is for you if: 1) You’re a beginner without extensive programming experience who wants to learn the JavaScript language: In addition to JavaScript basics, this book provides you with information about programming concepts and paradigms, as well as the most important APIs and application areas of JavaScript. The best way to work with the book as a beginner is to read it from cover to cover. Prior knowledge of HTML and CSS will make it easier to follow along with this book. 2) You’re a professional programmer looking to add JavaScript to your language repertoire: You can deepen your knowledge and learn from a comprehensive and versatile reference guide. Explore advanced topics and follow along with in-depth exercises. Since the code examples do not build on each other, you can read the chapters in any order you prefer. Highlights: Reference types Objects Events Forms Web APIs Object-oriented programming Functional programming Client-side applications Server-side applications Mobile and desktop applications
See Dungeons & Dragons come to life through the incredible craftwork of pop-up legend Matthew Reinhart! Let a paper craft D20 guide your adventure as you explore iconic D&D locations and enjoy scores of easter eggs waiting to be discovered behind interactive doors and flaps! This immersive pop-up book is a unique addition to any D&D collection! Experience the Forgotten Realms like you've never seen it before! From lands such as Waterdeep and Icewind Dale, to creatures like mind flayers, dragons, mimics, owl bears, and beholders, the expansive world of Dungeons & Dragons is brought to life in a whole new way through this immersive pop-up book. Use this pop-up book's paper craft D20 to guide your adventure! Readers who roll a critical hit will discover auspicious interactive features, while others may meet certain doom. Packed with easter eggs from fan-favourite campaigns, a wealth of hidden surprises to discover, and all-new artwork, Dungeons & Dragons: The Ultimate Pop-Up Book is a must have for any D&D fan!
A compelling firsthand investigation of how social media and big data have amplified the close relationship between privacy and inequality Online privacy is under constant attack by social media and big data technologies. But we cannot rely on individual actions to remedy this—it is a matter of social justice. Alice E. Marwick offers a new way of understanding how privacy is jeopardized, particularly for marginalized and disadvantaged communities—including immigrants, the poor, people of color, LGBTQ+ populations, and victims of online harassment. Marwick shows that few resources or regulations for preventing personal information from spreading on the internet. Through a new theory of “networked privacy,” she reveals how current legal and technological frameworks are woefully inadequate in addressing issues of privacy—often by design. Drawing from interviews and focus groups encompassing a diverse group of Americans, Marwick shows that even heavy social media users care deeply about privacy and engage in extensive “privacy work” to protect it. But people are up against the violation machine of the modern internet. Safeguarding privacy must happen at the collective level. |
You may like...
Research Developments in Biometrics and…
Rajeev Srivastava, S.K. Singh, …
Hardcover
R4,837
Discovery Miles 48 370
Advanced Technologies for Intelligent…
Aleksander Nawrat, Krzysztof Simek, …
Hardcover
R2,682
Discovery Miles 26 820
Computer Vision in Control Systems-4…
Margarita N. Favorskaya, Lakhmi C. Jain
Hardcover
R2,715
Discovery Miles 27 150
Optoelectronics in Machine Vision-Based…
Moises Rivas-Lopez, Oleg Sergiyenko, …
Hardcover
R5,649
Discovery Miles 56 490
Computer-Aided Oral and Maxillofacial…
Jan Egger, Xiaojun Chen
Paperback
R4,451
Discovery Miles 44 510
Methods for Multilevel Analysis and…
Celine Rozenblat, Guy Melancon
Hardcover
Deep Network Design for Medical Image…
Haofu Liao, S. Kevin Zhou, …
Paperback
R2,208
Discovery Miles 22 080
|