Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > General
If you're a web designer or app developer interested in sophisticated page styling, improved accessibility, and less time and effort expended, this book is for you. This revised fifth edition provides a comprehensive guide to CSS implementation along with a thorough review of the latest CSS specifications. Authors Eric Meyer and Estelle Weyl show you how to improve user experience, speed development, avoid potential bugs, and add life and depth to your applications through layout, transitions and animations, borders, backgrounds, text properties, and many other tools and techniques. We read the specs so you don't have to! This guide covers: Selectors, specificity, and the cascade, including information on the new cascade layers New and old CSS values and units, including CSS variables and ways to size based on viewports Details on font technology and ways to use any available font variants Text styling, from basic decoration to changing the entire writing mode Padding, borders, outlines, and margins, now discussed in terms of the new block- and inline-direction layout paradigm used by modern browsers Colors, backgrounds, and gradients, including the conic gradients Accessible data tables Flexible box and grid layout systems, including new subgrid capabilities 2D and 3D transforms, transitions, and animation Filters, blending, clipping, and masking Media, feature, and container queries
Value-Driven Data explains how data and business leaders can co-create and deploy data-driven solutions for their organizations. Value-Driven Data explores how organizations can understand their problems and come up with better solutions, aligning data storytelling with business needs. The book reviews the main challenges that plague most data-to-business interactions and offers actionable strategies for effective data value implementation, including methods for tackling obstacles and incentivizing change. Value-Driven Data is supported by tried-and-tested frameworks that can be applied to different contexts and organizations. It features cutting-edge examples relating to digital transformation, data strategy, resolving conflicts of interests, building a data P&L and AI value prediction methodology. Recognizing different types of data value, this book presents tangible methodologies for identifying, capturing, communicating, measuring and deploying data-enabled opportunities. This is essential reading for data specialists, business stakeholders and leaders involved in capturing and executing data value opportunities for organizations and for informing data value strategies.
Just about any social need is now met with an opportunity to "connect" through digital means. But this convenience is not free—it is purchased with vast amounts of personal data transferred through shadowy backchannels to corporations using it to generate profit. The Costs of Connection uncovers this process, this "data colonialism," and its designs for controlling our lives—our ways of knowing; our means of production; our political participation. Colonialism might seem like a thing of the past, but this book shows that the historic appropriation of land, bodies, and natural resources is mirrored today in this new era of pervasive datafication. Apps, platforms, and smart objects capture and translate our lives into data, and then extract information that is fed into capitalist enterprises and sold back to us. The authors argue that this development foreshadows the creation of a new social order emerging globally—and it must be challenged. Confronting the alarming degree of surveillance already tolerated, they offer a stirring call to decolonize the internet and emancipate our desire for connection.
This edited collection of essays is devoted to the terminology used in the fields of videogame theory and videogame studies. Videogame scholars provide theoretical critiques of existing terminology, mount arguments for the creation of new terminology, articulate terminological gaps in the current literature devoted to videogame studies, and share phenomenological studies of videogames that facilitate terminological theory.
This collection of new essays explores issues of identity, work and play in the virtual world of Second Life (SL). Fourteen women explore their experiences in this virtual environment. Topics include teaching in Second Life, becoming an SL journalist, and using SL as a means to bring human rights to health care; exploring issues of identity and gender such as performing the role of digital geisha, playing with gender crossing, or determining how identity is formed virtually; examining how race is perceived; and investigating creativity such as poetry writing or quilting. The text is unique in that it represents only women and their experiences in a world that is most often viewed as a man's world.
Cybersecurity attacks grow more complex every day. The first edition of Wilson's COMPTIA PENTEST+ GUIDE TO PENETRATION TESTING helps you gain the knowledge and skills necessary to analyze systems in the same way hackers do. It provides the information you need to successfully pass the CompTIA PenTest+ PTO-002 certification exam and contains detailed examples, projects, and hands-on activities (including virtual machine labs and interactive online features) where you can practice using the actual tools and methodologies needed to be a successful penetration tester. The author begins by exploring the concept of penetration testing, and then walks you through the process of building your own penetration testing lab of virtual machines (hosted on your own computer, which is used to practice the use of pen testing tools and methods). A final project guides you in the creation of a penetration testing report that includes all the areas covered in earlier modules.
E-Government 2001 provides in-depth case studies of the "state" of e-government today. The book chronicles the "early days" of e-government and presents a collective snapshot in time as to where governments at the federal, state, and local levels are today as they continue their march toward e-government. Case studies include analysis of the use of auction models by government, privacy strategies for e-government, e-commerce applications in government, the use of the Internet to deliver government services, and a study of how state employment agencies are using technology to provide improved service. From these case studies, Mark A. Abramson and Grady E. Means develop six initial lessons which government leaders should know before undertaking major e-government initiatives. The lessons should prove valuable to all executives who aspire to transform their organizations from traditional bureaucracies to e-enabled organizations."
Concurrency can be notoriously difficult to get right, but fortunately, the Go open source programming language makes working with concurrency tractable and even easy. If you’re a developer familiar with Go, this practical book demonstrates best practices and patterns to help you incorporate concurrency into your systems. Author Katherine Cox-Buday takes you step-by-step through the process. You’ll understand how Go chooses to model concurrency, what issues arise from this model, and how you can compose primitives within this model to solve problems. Learn the skills and tooling you need to confidently write and implement concurrent systems of any size. Understand how Go addresses fundamental problems that make concurrency difficult to do correctly Learn the key differences between concurrency and parallelism Dig into the syntax of Go’s memory synchronization primitives Form patterns with these primitives to write maintainable concurrent code Compose patterns into a series of practices that enable you to write large, distributed systems that scale Learn the sophistication behind goroutines and how Go’s runtime stitches everything together
This book analyses the root causes of suicide terrorism at both the elite and rank-and- file levels of the Hamas and also explains why this tactic has disappeared in the post-2006 period. This volume adopts a multi-causal, multi-level approach to analyse the use of suicide bombings by Hamas and its individual operatives in the Israeli-Palestinian conflict. It uses extensive fieldwork and on-the-ground interviews in order to delve beneath the surface and understand why and how suicide operations were adopted as a sustained mechanism of engagement within the Israeli-Palestinian conflict. Three core factors fuelled Hamas's suicide bombing campaigns. First, Palestinian suicide operations are a complex combination of instrumental and expressive violence adopted by both organisations and individuals to achieve political and/or societal survival, retaliation and competition. In other words, suicide bombings not only serve distinct political and strategic goals for both Hamas and its operatives but they also serve to convey a symbolic message to various audiences, within Israel, the Palestinian territories and around the world. Second, suicide operations perform a crucial role in the formation and consolidation of Palestinian national identity and are also the latest manifestation of the historically entrenched cultural norm of militant heroic martyrdom. Finally, Hamas's use of political Islam also facilitates the articulation, justification and legitimisation of suicide operations as a modern-day jihad against Israel through the means of modern interpretations and fatwas. This approach not only facilitates a much needed, multifaceted, holistic understanding of suicide bombings in this particular region but also yields policy-relevant lessons to address extreme political violence in other parts of the world. This book will be of much interest to students of Hamas, terrorism, Middle East politics and security studies.
Here is a book containing information about more than 500 Web sites about dinosaurs. Sites are rated for quality and cross-referenced by type, level of complexity, and availability of special features.
Smart phones, tablets, Facebook, Twitter, and wireless Internet connections are the latest technologies to have quickly become entrenched in our culture. Although traditionalists have argued that computer-mediated communication and cyberspace are incongruent with the study of folklore,Trevor J. Blank sees the digital world as fully capable of generating, transmitting, performing, and archiving vernacular culture. Folk Culture in the Digital Age documents the emergent cultural scenes and expressive folkloric communications that are being made possible by digital "new media" technologies. New media is changing the ways in which people learn, share, participate, and engage with others as they adopt technologies to complement and supplement traditional means of vernacular expression. But behavioral and structural overlap in many folkloric forms exists between on- and offline, and emerging patterns in digital rhetoric mimic the dynamics of previously documented folkloric forms, invoking familiar social or behavior customs, linguistic inflections, and symbolic gestures. Folk Culture in the Digital Age provides insights and perspectives on the myriad ways in which folk culture manifests in the digital age and contributes to our greater understanding of vernacular expression in our ever-changing technological world.
Turning an anthropological eye toward cyberspace, Human No More explores how conditions of the online world shape identity, place, culture, and death within virtual communities. Online worlds have recently thrown into question the traditional anthropological conception of place-based ethnography. They break definitions, blur distinctions, and force us to rethink the notion of the "subject." Human No More asks how digital cultures can be integrated and how the ethnography of both the "unhuman" and the "digital" could lead to possible reconfiguring the notion of the "human." This provocative and groundbreaking work challenges fundamental assumptions about the entire field of anthropology. Cross-disciplinary research from well-respected contributors makes this volume vital to the understanding of contemporary human interaction. It will be of interest not only to anthropologists but also to students and scholars of media, communication, popular culture, identity, and technology.
This textbook presents fundamental topics in discrete mathematics introduced from the perspectives of a pure mathematician and an applied computer scientist. The synergy between the two complementary perspectives is seen throughout the book; key concepts are motivated and explained through real-world examples, and yet are still formalized with mathematical rigor. The book is an excellent introduction to discrete mathematics for computer science, software engineering, and mathematics students.The first author is a leading mathematician in the area of logic, computability, and theoretical computer science, with more than 25 years of teaching and research experience. The second author is a computer science PhD student at the University of Washington specializing in database systems. The father-and-daughter team merges two different views to create a unified book for students interested in learning discrete mathematics, the connections between discrete mathematics and computer science, and the mathematical foundations of computer science.Readers will learn how to formally define abstract concepts, reason about objects (such as programs, graphs and numbers), investigate properties of algorithms, and prove their correctness. The textbook studies several well-known algorithmic problems including the path problem for graphs and finding the greatest common divisor, inductive definitions, proofs of correctness of algorithms via loop invariants and induction, the basics of formal methods such as propositional logic, finite state machines, counting, probability, as well as the foundations of databases such as relational calculus.
'A must read for anyone interested in the 4-day week' - Heejung Chung, professor at the University of Kent and author of The Flexibility Paradox 'This invaluable book offers a clear way forward: we don't need to burn ourselves out, we can work less and get more done' - Rebecca Seal, author of SOLO: How To Work Alone (And Not Lose Your Mind) The 4-day week is no longer just an idea. Following successful trials in countries as far apart as New Zealand and the United Kingdom (where nearly all companies involved opted to continue beyond the pilot), research now shows that a shorter workweek benefits both companies and employees, increasing productivity, wellbeing and staff retention. Work Less, Do More offers a practical framework for making the 4-day week a reality in your business, whatever its sector and size. Top expert and Silicon Valley-based consultant Alex Pang helps you: -Identify the best pattern for your company -Assemble your team -Define what success looks like -Think through worst-case scenarios and troubleshoot potential difficulties -Put your plan into action So whether you are a founder who wants to make the 4-day week a reality, an employee who needs to make the case for a shorter working pattern to your board, or a manager who wonders whether this could give your team an extra edge, this is the only book you need to make the 4-day week work for you.
Ready to master Python? Learn to write effective code, whether you’re a beginner or a professional programmer. Review core Python concepts, including functions, modularization, and object orientation and walk through the available data types. Then dive into more advanced topics, such as using Django and working with GUIs. With plenty of code examples throughout, this hands-on reference guide has everything you need to become proficient in Python! Highlights include: 1) Functions 2) Methods 3) Attributes 4) Data types 5) GUIs 6) Debugging 7) Network communication 8) Modularization 9) Object orientation 10) Iterators 11) Generators 12) Exception handling
A kid-friendly and rigorous new way to teach young readers the fundamentals of computer science In Computer Science for Kids: A Storytelling Approach, AWS Head of Academic Advocacy and Google Developer Expert Dr. Jen Looper delivers a colorful, fun, and exciting demonstration for young readers who want to learn the basics of computer science. Using a variety of technologies, the book covers the elements of computer science in concise detail and illustrates how to build projects to learn foundational concepts behind the technology powering the internet. In the book, you’ll find projects to build using both basic and emerging technologies—like SQL, game development, storytelling software, and 3D augmented reality—as well as: Chapter projects aligned to K-12 curriculum standards for grades 6-8 and a GitHub repo featuring open-source projects Lesson plans for teachers An online space for classrooms to showcase and discuss their work An easy-to-follow and kid-friendly new resource for technology-curious middle school students, Computer Science for Kids is the fun and interesting web development resource that classroom teachers, parents, and homeschooling families have been waiting for.
Turn your R code into packages that others can easily download and use. This practical book shows you how to bundle reusable R functions, sample data, and documentation together by applying the package development philosophy used in the package known as the tidyverse (and beyond). In the process, you'll work with devtools, usethis, roxygen2, and testthat, a set of R packages that automate common development tasks. Ideal for developers and data scientists, this book gets you creating packages ASAP, then shows you how to get progressively better over time. You'll learn to focus on what you want your package to do, rather than thinking about package structure. Learn the key components of an R package, including code, documentation, and tests. Get tips on good style, such as organizing functions into files. Streamline your development process with usethis, devtools, and RStudio. Create high quality packages by combining unit tests and continuous integration on GitHub. Maximize your chances of a positive CRAN submission. Turn your existing documentation into a beautiful and user friendly website with pkgdown.
Our most basic relationship with the world is one of technological mediation. Nowadays our available tools are digital, and increasingly what counts in economic, social, and cultural life is what can be digitally stored, distributed, replayed, augmented, and switched. Yet the digital remains very much materially configured, and though it now permeates nearly all human life it has not eclipsed all older technologies. This Handbook is grounded in an understanding that our technologically mediated condition is a condition of organization. It maps and theorizes the largely unchartered territory of media, technology, and organization studies. Written by scholars of organization and theorists of media and technology, the chapters focus on specific, and specifically mediating, objects that shape the practices, processes, and effects of organization. It is in this spirit that each chapter focuses on a specific technological object, such as the Battery, Clock, High Heels, Container, or Smartphone, asking the question, how does this object or process organize? In staying with the object the chapters remain committed to the everyday, empirical world, rather than being confined to established disciplinary concerns and theoretical developments. As the first sustained and systematic interrogation of the relation between technologies, media, and organization, this Handbook consolidates, deepens, and further develops the empirics and concepts required to make sense of the material forces of organization.
Up-to-date practice questions that cover every topic on the 2022 version of the CISM exam Take the current version of the challenging CISM exam with complete confidence using the detailed information contained in this fully updated self-study guide. Written by an expert in the field, the book features hundreds of practice exam questions that match those on the live test in content, format, tone, and feel. In-depth answer explanations are provided for both the correct and incorrect answer choices. CISM Certified Information Security Manager Practice Exams, Second Edition supplements the CISM All-in-One Exam Guide and completely covers every objective of the 2022 exam release. In total, the book contains more than 300 realistic practice questions. • Offers 100% coverage of all four CISM exam domains • Online content includes access to an additional 150 practice questions in the TotalTester Online customizable test engine • Written by a computer security expert, author, and lecturer
"Wikiworld" explores a revolution in the world of education. The way we learn is changing: institutionalised learning is transforming into new forms of critical learning and open collaboration. This book offers a historical and political framework to think about the future of learning and educational media.The authors provide an overview of the use of new technologies and learning practices, and assess how the changing nature of education can lead to a more socially just future. At the same time, they place their analysis of education within a wider social and economic framework of contemporary capitalism.
From renowned financial and technology journalist Nathaniel Popper the dramatic story of a new generation of financial strivers, living online and playing the stock and crypto markets by a new set of rules. Following a cast of young, all male characters, who went from the fringes of the internet to the front pages of newspapers, The Degenerate Generation tells the tale of how social media, crypto and startups like Robinhood and Reddit allowed for the formation of a powerful online movement in which the most unlikely participants took on the old guard—and each other. In The Degenerate Generation, journalist Nathaniel Popper charts the evolution from the idealism of Occupy Wall Street in 2011 to the anarchic chaos of online outrage leading to the market crash of 2022. Showing how a combination of new technology and broader cultural and economic forces created an online revolution led by bands of predominantly young men, who gathered on Reddit and proudly referred to themselves as “degenerates.” This unlikely online gang took their frustration at the current economic system and social climate and created a powerful cultural movement that upended global financial markets and set in motion far reaching changes to how money flows through the economy—all of this just a decade after a financial crisis that most people assumed would forever kill interest in the stock markets. A character driven, human story of kids who made and lost millions, battled with each and with Wall Street for power, and ultimately upended the economy, The Degenerate Generation is a fast moving, suspenseful, and sobering account of how millions of young Americans became obsessed with money and the markets and how that has affected politics, popular culture, finance and more.
This book contains an Open Access chapter The COVID-19 pandemic disrupted economies and society globally. In addressing the crisis, the Internet proved incredibly important in enabling many to shift physical work, education, and social activities online and facilitating the tracking of the progress of the pandemic. Beyond the Pandemic? is the first edited collection to concentrate on the dynamic and complex relationship between the Internet and the role it played in responding to the pandemic. Covid-19 accelerated the digital economy transformation, changing the way work, education, and social engagement is organized, potentially permanently. The collection of international scholars who contributed to this volume offer insightful perspectives on how the Internet ecosystem responded and was changed as a consequence of Covid-19; the sectoral consequences of shifting activity online that the Internet enabled for many, but not for all; and the implications for regulatory policies. Given how central digital technologies are to all aspects of business, society, and government, Beyond the Pandemic? is integral to the exploration of the sectoral consequences of the Internet for business managers, policymakers and researchers engaged in planning and study for the digital economy future and planning for future pandemics.
Learn How to Create Immersive Virtual Environments Written by an award-winning designer with 20 years of experience designing virtual environments for television and online communities, Virtual World Design explores the intertwining disciplines of 2D graphics, 3D models, lighting, sound, and storytelling. It illustrates how these disciplines come together by design in the creation of an accessible virtual environment for teaching, research, and entertainment. The book gives anyone the tools and techniques to design virtual environments that support their message and are accessible by all. With 200 illustrations and 12 step-by-step projects, the book delivers hours of creative challenges for people working in public virtual worlds or on private grids. Using the modular components available for download on the author‘s website, readers learn by building such things as a virtual classroom, an "all-access" terrain, and a sound-based game. This book can be the foundation for class work in distance learning, simulation, and other learning technologies that use virtual environments. It shows both novices and advanced users how 3D composition, color, lighting, and sound design are used in the creation of an immersive virtual environment.
A CUNNING CHRONICLE OF THE 50 CODES THAT ALTERED THE COURSE OF HISTORY AND CHANGED THE WORLD From the bestselling author of Bletchley Park Brainteasers and The Scotland Yard Puzzle Book. There have been secret codes since before the Old Testament, and there were secret codes in the Old Testament too. Almost as soon as writing was invented, so too were the devious means to hide messages and keep them under the wraps of secrecy. In 50 Codes that Changed the World, Sinclair McKay explores these uncrackable codes, secret cyphers and hidden messages from across time to tell a new history of a secret world. From the temples of Ancient Greece to the court of Elizabeth I; from antique manuscripts whose codes might hold prophecies of doom to the modern realm of quantum mechanics, you will see how a few concealed words could help to win wars, spark revolutions and even change the faces of great nations. Here is the complete guide to the hidden world of codebreaking, with opportunities for you to see if you could have cracked some of the trickiest puzzles and lip-chewing codes ever created. ----------------------- Praise for Sinclair McKay's books: 'This book [The Secret Life of Bletchley Park] seems a remarkably faithful account of what we did, why it mattered, and how it all felt at the time by someone who couldn't possibly have been born then. - THE GUARDIAN [Bletchley Park Brainteasers] is outrageously difficult but utterly fascinating. - THE EXPRESS 'Sinclair McKay's account of this secret war of the airwaves in [Secret Listeners] is as painstakingly researched and fascinating as his bestselling The Secret Life Of Bletchley Park, and an essential companion to it.' - DAILY MAIL
|
You may like...
Tax Policy and Uncertainty - Modelling…
Christopher Ball, John Creedy, …
Hardcover
R2,656
Discovery Miles 26 560
Handbook of Artificial Intelligence in…
Benedict du Boulay, Antonija Mitrovic, …
Hardcover
R7,693
Discovery Miles 76 930
Principles Of Business Information…
Ralph Stair, George Reynolds, …
Paperback
(1)
|