0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (5)
  • R100 - R250 (29)
  • R250 - R500 (195)
  • R500+ (2,667)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society

Robots, Healthcare, and the Law - Regulating Automation in Personal Care (Paperback): Eduard Fosch Villaronga Robots, Healthcare, and the Law - Regulating Automation in Personal Care (Paperback)
Eduard Fosch Villaronga
R1,334 Discovery Miles 13 340 Ships in 12 - 17 working days

First book to look at legal and regulatory aspects of personal care robots

Understanding Cybersecurity Technologies - A Guide to Selecting the Right Cybersecurity Tools (Hardcover): Abbas Moallem Understanding Cybersecurity Technologies - A Guide to Selecting the Right Cybersecurity Tools (Hardcover)
Abbas Moallem
R2,567 Discovery Miles 25 670 Ships in 12 - 17 working days

Cyberattacks on enterprises, government institutions, and individuals are exponentially growing. At the same time, the number of companies, both small and large, offering all types of solutions has been increasing too. Since companies rely on technological solutions to protect themselves against cyberattacks, understanding and selecting the right solutions among those offered presents a significant challenge for professionals, company executives, and newcomers to the cybersecurity field. FEATURES Presents descriptions for each type of cybersecurity technology and their specifications Explains applications, usages, and offers case studies to enhance comprehension Offers an easy-to-understand classification of existing cybersecurity technologies Provides an understanding of the technologies without getting lost in technical details Focuses on existing technologies used in different solutions, without focusing on the companies that offer these technologies This book is intended to help all professionals new to cybersecurity, students, and experts to learn or educate their audiences on the foundations of the available solutions.

Software, Copyright, and Competition - The Look and Feel of the Law (Hardcover, New): Anthony L Clapes Software, Copyright, and Competition - The Look and Feel of the Law (Hardcover, New)
Anthony L Clapes
R2,779 Discovery Miles 27 790 Ships in 10 - 15 working days

This book deals comprehensively with the question of the scope of copyright protection for computer programs. Offering a unique blend of scholarship, technical rigor, and readability, it dispels the confusion and controversy that surround the application of copyright law to computer programs. Through an orderly development of facts and analysis it shows why the copyright law is the appropriate regime for software protection and explains the nature of copyright protection for software. Alternating between essay format and case study, the book provides expert counsel to those interested in this interface between technology and law. "Software, Copyright, and Competition: The Look and Feel' of the LaW," is undoubtedly one of the best pieces of legal scholarship in any subject this editor has ever had the pleasure to read. As to its subject matter, it is the best analysis of look and feel' written to date. . . . The book is very readable. Not only does the author explain' the law for the non-lawyer, but he explains the zen' of computer programming to the non-programmer. With wit and insight he puts to rest the many old wives tales the legal community believes about programmers. . . . In the best of all possible worlds, this book would be mandatory reading for any judge or arbitrator faced with a look and feel' case. "The Software Law Bulletin," January 1990

Two forces, innovation and imitation, fuel the intense competition that underlies the dramatic technological progress taking place in the computer industry. As the competitive battleground shifts increasingly to the software sector, a vigorous debate has arisen over whether the principal legal regime for protecting the asset value of computer programs--the copyright law--encourages or inhibits that competition. Industry executives, computer lawyers, law professors and lawmakers alike are participating in the debate, the outcome of which will quite literally shape the future of the computer industry.

This book deals comprehensively with the question of the scope of copyright protection for computer programs. Offering a unique blend of scholarship, technical rigor, and readability, it dispels the confusion and controversy that surround the application of copyright law to computer programs. Through an orderly development of facts and analysis it shows why the copyright law is the appropriate regime for software protection and explains the nature of copyright protection for software. Alternating between essay format and case study, the book provides expert counsel to those interested in this interface between technology and law.

Social Media and Living Well (Paperback): Berrin A Beasley, Mitchell R. Haney Social Media and Living Well (Paperback)
Berrin A Beasley, Mitchell R. Haney; Contributions by Alan B Albarran, Paul Bloomfield, Kathy Brittain Richardson, …
R1,154 Discovery Miles 11 540 Ships in 12 - 17 working days

What is well-being? Is it a stable income, comfortable home, and time shared with family and friends? Is it clean drinking water and freedom from political oppression? Is it finding Aristotle's Golden Mean by living a life of reason and moderation? Scholars have sought to define well-being for centuries, teasing out nuances among Aristotle's writings and posing new theories of their own. With each major technological shift this question of well-being arises with new purpose, spurring scholars to re-examine the challenge of living the good life in light of significantly altered conditions. Social media comprise the latest technological shift, and in this book leading scholars in the philosophy and communication disciplines bring together their knowledge and expertise in an attempt to define what well-being means in this perpetually connected environment. From its blog prototype in the mid-to-late-2000s to its microblogging reality of today, users have been both invigorated and perplexed by social media's seemingly near-instant propagation. Platforms such as Facebook, Twitter, YouTube, Instagram, and LinkedIn have been hailed as everything from revolutionary to personally and societally destructive. In an exploration of the role social media play in affecting well-being, whether among individuals or society as a whole, this book offers something unique among academic tomes, an opening essay by an executive in the social media industry who shares his observations of the ways in which social communication conventions have changed since the introduction of social media. His essay is followed by an interdisciplinary academic exploration of the potential contributions and detractions of social media to well-being. Authors investigate social media's potential influence on friendship, and on individuals' physical, emotional, social, economic, and political needs. They consider the morality of online deception, how memes and the very structure of the internet inhibit rational social discourse, and how social media facilitate our living a very public life, whether through consent or coercion. Social media networks serve as gathering places for the exchange of information, inspiration, and support, but whether these exchanges are helpful or harmful to well-being is a question whose answer is necessary to living a good life.

Online Misogyny as Hate Crime - A Challenge for Legal Regulation? (Paperback): Kim Barker, Olga Jurasz Online Misogyny as Hate Crime - A Challenge for Legal Regulation? (Paperback)
Kim Barker, Olga Jurasz
R764 Discovery Miles 7 640 Ships in 12 - 17 working days

The ideal of an inclusive and participatory Internet has been undermined by the rise of misogynistic abuse on social media platforms. However, limited progress has been made at national - and to an extent European - levels in addressing this issue. In England and Wales, the tackling of underlying causes of online abuse has been overlooked because the law focuses on punishment rather than measures to prevent such abuses. Furthermore, online abuse has a significant impact on its victims that is underestimated by policymakers. This volume critically analyses the legal provisions that are currently deployed to tackle forms of online misogyny, and focuses on three aspects; firstly, the phenomenon of social media abuse; secondly, the poor and disparate legal responses to social media abuses; and thirdly, the similar failings of hate crime to tackle problems of online gender-based abuses. This book advances a compelling argument for legal changes to the existing hate crime, and communications legislation.

An Integrated Approach to Home Security and Safety Systems (Hardcover): Sonali Goyal, Neera Batra, N. K. Batra An Integrated Approach to Home Security and Safety Systems (Hardcover)
Sonali Goyal, Neera Batra, N. K. Batra
R3,425 Discovery Miles 34 250 Ships in 12 - 17 working days

This book provides an integrated solution for security and safety in the home, covering both assistance in health monitoring and safety from strangers/intruders who want to enter the home with harmful intentions. It defines a system whereby recognition of a person/stranger at the door is done using three modules: Face Recognition, Voice Recognition and Similarity Index. These three modules are taken together to provide a percentage likelihood that the individual is in the "known" or "unknown" category. The system can also continuously monitor the health parameters of a vulnerable person living alone at home and aid them in calling for help in an emergency. The authors have analyzed a number of existing biometric techniques to provide security for an individual living alone at home. These biometric techniques have been tested using MATLAB (R) image processing and signal processing toolboxes, and results have been calculated on the basis of recognition rate. A major contribution in providing security is a hybrid algorithm proposed by the author named PICA, which combines features of both PCA (Principle Component Analysis) and ICA (Independent Component Analysis) algorithms. This hybrid approach gives better performance recognition than either system alone. The second proposed hybrid algorithm for voice recognition is named as a MFRASTA algorithm by combining features of MFCC (Mel Frequency Cepstral Coefficient) and RASTA-PLP (RelAtive SpecTrA-Perceptual Linear Prediction) algorithm. After performing experiments, results are collected on the basis of recognition rate. The authors have also proposed a third technique named as a Similarity Index to provide trust-based security for an individual. This technique is text independent in which a person is recognized by pronunciation, frequency, tone, pitch, etc., irrespective of the content spoken by the person. By combining these three techniques, a high recognition rate is provided to the person at the door and high security to the individual living independently at home. In the final contribution, the authors have proposed a fingertip-based application for health monitoring by using the concept of sensors. This application is developed using iPhone 6's camera. When a person puts their fingertip on a camera lens, with the help of brightness of the skin, the person's heartbeat will be monitored. This is possible even with a low-quality camera. In case of any emergency, text messages will be sent to the family members of the individual living alone by using 3G Dongle and MATLAB tool. Results show that the proposed work outperforms all the existing techniques used in face recognition, voice recognition, and health monitoring alone.

The Cybersecurity Self-Help Guide (Hardcover): Arun Soni The Cybersecurity Self-Help Guide (Hardcover)
Arun Soni
R3,294 Discovery Miles 32 940 Ships in 12 - 17 working days

Cybercrime is increasing at an exponential rate. Every day, new hacking techniques and tools are being developed by threat actors to bypass security systems and access private data. Most people do not know how to secure themselves, their devices, and their media shared online. Especially now, cybercriminals appear to be ahead of cybersecurity experts across cyberspace. During the coronavirus pandemic, we witnessed the peak of cybercrime, which is likely to be sustained even after the pandemic. This book is an up-to-date self-help guide for everyone who connects to the Internet and uses technology. It is designed to spread awareness about cybersecurity by explaining techniques and methods that should be implemented practically by readers. Arun Soni is an international award-winning author who has written 159 books on information technology. He is also a Certified Ethical Hacker (CEH v8) from the EC-Council US. His achievements have been covered by major newspapers and portals, such as Business Standard, The Economic Times, Indian Express, The Tribune, Times of India, Yahoo News, and Rediff.com. He is the recipient of multiple international records for this incomparable feat. His vast international exposure in cybersecurity and writing make this book special. This book will be a tremendous help to everybody and will be considered a bible on cybersecurity.

The Cybersecurity Self-Help Guide (Paperback): Arun Soni The Cybersecurity Self-Help Guide (Paperback)
Arun Soni
R1,455 Discovery Miles 14 550 Ships in 12 - 17 working days

Cybercrime is increasing at an exponential rate. Every day, new hacking techniques and tools are being developed by threat actors to bypass security systems and access private data. Most people do not know how to secure themselves, their devices, and their media shared online. Especially now, cybercriminals appear to be ahead of cybersecurity experts across cyberspace. During the coronavirus pandemic, we witnessed the peak of cybercrime, which is likely to be sustained even after the pandemic. This book is an up-to-date self-help guide for everyone who connects to the Internet and uses technology. It is designed to spread awareness about cybersecurity by explaining techniques and methods that should be implemented practically by readers. Arun Soni is an international award-winning author who has written 159 books on information technology. He is also a Certified Ethical Hacker (CEH v8) from the EC-Council US. His achievements have been covered by major newspapers and portals, such as Business Standard, The Economic Times, Indian Express, The Tribune, Times of India, Yahoo News, and Rediff.com. He is the recipient of multiple international records for this incomparable feat. His vast international exposure in cybersecurity and writing make this book special. This book will be a tremendous help to everybody and will be considered a bible on cybersecurity.

Handbook of Computational Social Science, Volume 1 - Theory, Case Studies and Ethics (Paperback): Uwe Engel, Anabel Quan-Haase,... Handbook of Computational Social Science, Volume 1 - Theory, Case Studies and Ethics (Paperback)
Uwe Engel, Anabel Quan-Haase, Sunny Liu, Lars E. Lyberg
R1,785 Discovery Miles 17 850 Ships in 12 - 17 working days

1. Very comprehensive and extensive coverage (stresses the relevance of the entire research cycle, from design to data collection to analysis to interpretation). 2. Highlights the multidisciplinary nature of CSS, drawing from research in computer science, statistics, and the social and behavioural sciences. 3. Takes a holistic approach to CSS methods. Instead of focusing on simply harvesting data, the editors emphasise the importance of a carefully crafted research design containing key milestone checks.

Handbook of Computational Social Science, Volume 1 - Theory, Case Studies and Ethics (Hardcover): Uwe Engel, Anabel Quan-Haase,... Handbook of Computational Social Science, Volume 1 - Theory, Case Studies and Ethics (Hardcover)
Uwe Engel, Anabel Quan-Haase, Sunny Liu, Lars E. Lyberg
R5,331 Discovery Miles 53 310 Ships in 12 - 17 working days

1. Very comprehensive and extensive coverage (stresses the relevance of the entire research cycle, from design to data collection to analysis to interpretation). 2. Highlights the multidisciplinary nature of CSS, drawing from research in computer science, statistics, and the social and behavioural sciences. 3. Takes a holistic approach to CSS methods. Instead of focusing on simply harvesting data, the editors emphasise the importance of a carefully crafted research design containing key milestone checks.

Privacy and Identity Management. Time for a Revolution? - 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International... Privacy and Identity Management. Time for a Revolution? - 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers (Hardcover, 1st ed. 2016)
David Aspinall, Jan Camenisch, Marit Hansen, Simone Fischer-Hubner, Charles Raab
R3,267 R2,069 Discovery Miles 20 690 Save R1,198 (37%) Ships in 12 - 17 working days

This book contains a range of keynote papers and submitted papers presented at the 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Edinburgh, UK, in August 2015. The 14 revised full papers included in this volume were carefully selected from a total of 43 submissions and were subject to a two-step review process. In addition, the volume contains 4 invited keynote papers. The papers cover a wide range of topics: cloud computing, privacy-enhancing technologies, accountability, measuring privacy and understanding risks, the future of privacy and data protection regulation, the US privacy perspective, privacy and security, the PRISMS Decision System, engineering privacy, cryptography, surveillance, identity management, the European General Data Protection Regulation framework, communicating privacy issues to the general population, smart technologies, technology users' privacy preferences, sensitive applications, collaboration between humans and machines, and privacy and ethics.

Cyber Victimology - Decoding Cyber-Crime Victimisation (Paperback): Debarati Halder Cyber Victimology - Decoding Cyber-Crime Victimisation (Paperback)
Debarati Halder
R1,221 Discovery Miles 12 210 Ships in 12 - 17 working days

Written by leading international experts in field of cybercrimnology Provides a global socio-legal perspective Written in non-technical style without jargon Suitable for use as a textbook in cyber victimology courses Presents practical solutions for the problem

Immersion, Narrative, and Gender Crisis in Survival Horror Video Games (Hardcover): Andrei Nae Immersion, Narrative, and Gender Crisis in Survival Horror Video Games (Hardcover)
Andrei Nae
R4,294 Discovery Miles 42 940 Ships in 12 - 17 working days

This book investigates the narrativity of some of the most popular survival horror video games and the gender politics implicit in their storyworlds. In a thorough analysis of the genre that draws upon detailed comparisons with the mainstream action genre, Andrei Nae places his analysis firmly within a political and social context. In comparing survival horror games to the dominant game design norms of the action genre, the author differentiates between classical and postclassical survival horror games to show how the former reject the norms of the action genre and deliver a critique of the conservative gender politics of action games, while the latter are more heterogeneous in terms of their game design and, implicitly, gender politics. This book will appeal not only to scholars working in game studies, but also to scholars of horror, gender studies, popular culture, visual arts, genre studies and narratology.

It's Your Digital Life (Hardcover): Giri Govindarajulu, Shyam Sundar Ramaswami, Shriram K. Vasudevan It's Your Digital Life (Hardcover)
Giri Govindarajulu, Shyam Sundar Ramaswami, Shriram K. Vasudevan
R3,297 Discovery Miles 32 970 Ships in 12 - 17 working days

This book intends to develop cyber awareness and technical knowledge in anyone who is interested in technology by looking at subjects and experiences the average person will have come into contact with in their life. This book aims to provide a complete and comprehensive analysis, technological inputs and case studies for the readers to build their awareness and knowledge, but in a meaningful way which will stay relevant. There are books available on the market, but they primarily discuss theory, and no industry connection or current state-of-the-art technology is presented. By discussing subjects and experiences that all readers will be familiar with, this book will aid understanding and comprehension of how cyber threats can be noticed, avoided and understood in everyday life. As well as case studies, this book also contains plentiful illustrations and supplementary videos, which will be available via YouTube to complement the information. Giri Govindarajulu is a Chief Information Security officer for Cisco Asiapac and is a 20-year Cisco veteran. Shyam Sundar Ramaswami is the Lead Threat Researcher with the Cisco Talos Threat Intelligence group. Shyam is a two-time TEDx speaker and a teacher of cybersecurity. Dr. Shriram K. Vasudevan is currently working as Dean of K. Ramakrishnan College of Technology. He has authored/co-authored 42 books for reputed publishers across the globe and 122 research papers in revered international journals, plus 30 papers for international/national conferences.

It's Your Digital Life (Paperback): Giri Govindarajulu, Shyam Sundar Ramaswami, Shriram K. Vasudevan It's Your Digital Life (Paperback)
Giri Govindarajulu, Shyam Sundar Ramaswami, Shriram K. Vasudevan
R1,457 Discovery Miles 14 570 Ships in 12 - 17 working days

This book intends to develop cyber awareness and technical knowledge in anyone who is interested in technology by looking at subjects and experiences the average person will have come into contact with in their life. This book aims to provide a complete and comprehensive analysis, technological inputs and case studies for the readers to build their awareness and knowledge, but in a meaningful way which will stay relevant. There are books available on the market, but they primarily discuss theory, and no industry connection or current state-of-the-art technology is presented. By discussing subjects and experiences that all readers will be familiar with, this book will aid understanding and comprehension of how cyber threats can be noticed, avoided and understood in everyday life. As well as case studies, this book also contains plentiful illustrations and supplementary videos, which will be available via YouTube to complement the information. Giri Govindarajulu is a Chief Information Security officer for Cisco Asiapac and is a 20-year Cisco veteran. Shyam Sundar Ramaswami is the Lead Threat Researcher with the Cisco Talos Threat Intelligence group. Shyam is a two-time TEDx speaker and a teacher of cybersecurity. Dr. Shriram K. Vasudevan is currently working as Dean of K. Ramakrishnan College of Technology. He has authored/co-authored 42 books for reputed publishers across the globe and 122 research papers in revered international journals, plus 30 papers for international/national conferences.

The Impact of Information Technology - Evidence from the Healthcare Industry (Paperback): Nirup M. Menon The Impact of Information Technology - Evidence from the Healthcare Industry (Paperback)
Nirup M. Menon
R1,106 Discovery Miles 11 060 Ships in 12 - 17 working days

First published in 2000. Routledge is an imprint of Taylor & Francis, an informa company.

Digital Transformation in a Post-Covid World - Sustainable Innovation, Disruption, and Change (Hardcover): Adrian T. H. Kuah,... Digital Transformation in a Post-Covid World - Sustainable Innovation, Disruption, and Change (Hardcover)
Adrian T. H. Kuah, Roberto Dillon
R4,033 Discovery Miles 40 330 Ships in 12 - 17 working days

Considers how different fields across technology and business have been affected by the Covid-19 pandemic Explores the innovations, disruptions and changes that are required to adapt in a fast-evolving landscape technology Offers a wealth of perspectives from international contributors working in a variety of contexts.

Digital Transformation in a Post-Covid World - Sustainable Innovation, Disruption, and Change (Paperback): Adrian T. H. Kuah,... Digital Transformation in a Post-Covid World - Sustainable Innovation, Disruption, and Change (Paperback)
Adrian T. H. Kuah, Roberto Dillon
R1,572 Discovery Miles 15 720 Ships in 12 - 17 working days

Considers how different fields across technology and business have been affected by the Covid-19 pandemic Explores the innovations, disruptions and changes that are required to adapt in a fast-evolving landscape technology Offers a wealth of perspectives from international contributors working in a variety of contexts.

Children, Technology and Healthy Development - How to Help Kids be Safe and Thrive Online (Hardcover): Catherine Knibbs Children, Technology and Healthy Development - How to Help Kids be Safe and Thrive Online (Hardcover)
Catherine Knibbs
R4,299 Discovery Miles 42 990 Ships in 12 - 17 working days

Offers parents, and training and practising professionals in psychology, psychotherapy, education and social work insight into what the evidence says about human behaviour online, what this means for how children develop and how we can best support children to be safe and healthy online now and in future. Accessibly presents the key research from psychology, sociology and biology to reveal how and why humans interact with platforms, apps and software. Covers essential topics including social media, gaming and harmful effects of technology and social media.

Functional Reverse Engineering of Machine Tools (Paperback): Wasim Ahmed Khan, Ghulam Abbas, Khalid Rahman, Ghulam Hussain,... Functional Reverse Engineering of Machine Tools (Paperback)
Wasim Ahmed Khan, Ghulam Abbas, Khalid Rahman, Ghulam Hussain, Cedric Aimal Edwin
R1,530 Discovery Miles 15 300 Ships in 12 - 17 working days

The purpose of this book is to develop capacity building in strategic and non-strategic machine tool technology. The book contains chapters on how to functionally reverse engineer strategic and non-strategic computer numerical control machinery. Numerous engineering areas, such as mechanical engineering, electrical engineering, control engineering, and computer hardware and software engineering, are covered. The book offers guidelines and covers design for machine tools, prototyping, augmented reality for machine tools, modern communication strategies, and enterprises of functional reverse engineering, along with case studies. Features Presents capacity building in machine tool development Discusses engineering design for machine tools Covers prototyping of strategic and non-strategic machine tools Illustrates augmented reality for machine tools Includes Internet of Things (IoT) for machine tools

Slenderman - Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls (Paperback): Kathleen Hale Slenderman - Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls (Paperback)
Kathleen Hale
R481 Discovery Miles 4 810 Ships in 10 - 15 working days

The first full account of the Slenderman stabbing, a true crime narrative of mental illness, the American judicial system, the trials of adolescence, and the power of the internetOn May 31, 2014, in the Milwaukee suburb of Waukesha, Wisconsin, two twelve-year-old girls attempted to stab their classmate to death. Morgan Geyser and Anissa Weier's violence was extreme, but what seemed even more frightening was that they committed their crime under the influence of a figure born by the internet: the so-called "Slenderman." Yet the even more urgent aspect of the story, that the children involved suffered from undiagnosed mental illnesses, often went overlooked in coverage of the case.Slenderman: Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls tells that full story for the first time in deeply researched detail, using court transcripts, police reports, individual reporting, and exclusive interviews. Morgan and Anissa were bound together by their shared love of geeky television shows and animals, and their discovery of the user-uploaded scary stories on the Creepypasta website could have been nothing more than a brief phase. But Morgan was suffering from early-onset childhood schizophrenia. She believed that she had seen Slenderman long before discovering him online, and the only way to stop him from killing her family was to bring him a sacrifice: Morgan's best friend Payton "Bella" Leutner, whom Morgan and Anissa planned to stab to death on the night of Morgan's twelfth birthday party. Bella survived the attack, but was deeply traumatized, while Morgan and Anissa were immediately sent to jail, and the severity of their crime meant that they would be prosecuted as adults. There, as Morgan continued to suffer from worsening mental illness after being denied antipsychotics, her life became more and more surreal.Slenderman is both a page-turning true crime story and a search for justice.

Creating an Information Security Program from Scratch (Hardcover): Walter Williams Creating an Information Security Program from Scratch (Hardcover)
Walter Williams
R4,014 Discovery Miles 40 140 Ships in 12 - 17 working days

This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role. More and more, organizations are realizing that information security requires a dedicated team with leadership distinct from information technology, and often the people who are placed into those positions have no idea where to start or how to prioritize. There are many issues competing for their attention, standards that say do this or do that, laws, regulations, customer demands, and no guidance on what is actually effective. This book offers guidance on approaches that work for how you prioritize and build a comprehensive information security program that protects your organization. While most books targeted at information security professionals explore specific subjects with deep expertise, this book explores the depth and breadth of the field. Instead of exploring a technology such as cloud security or a technique such as risk analysis, this book places those into the larger context of how to meet an organization's needs, how to prioritize, and what success looks like. Guides to the maturation of practice are offered, along with pointers for each topic on where to go for an in-depth exploration of each topic. Unlike more typical books on information security that advocate a single perspective, this book explores competing perspectives with an eye to providing the pros and cons of the different approaches and the implications of choices on implementation and on maturity, as often a choice on an approach needs to change as an organization grows and matures.

Creating an Information Security Program from Scratch (Paperback): Walter Williams Creating an Information Security Program from Scratch (Paperback)
Walter Williams
R1,571 Discovery Miles 15 710 Ships in 12 - 17 working days

This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role. More and more, organizations are realizing that information security requires a dedicated team with leadership distinct from information technology, and often the people who are placed into those positions have no idea where to start or how to prioritize. There are many issues competing for their attention, standards that say do this or do that, laws, regulations, customer demands, and no guidance on what is actually effective. This book offers guidance on approaches that work for how you prioritize and build a comprehensive information security program that protects your organization. While most books targeted at information security professionals explore specific subjects with deep expertise, this book explores the depth and breadth of the field. Instead of exploring a technology such as cloud security or a technique such as risk analysis, this book places those into the larger context of how to meet an organization's needs, how to prioritize, and what success looks like. Guides to the maturation of practice are offered, along with pointers for each topic on where to go for an in-depth exploration of each topic. Unlike more typical books on information security that advocate a single perspective, this book explores competing perspectives with an eye to providing the pros and cons of the different approaches and the implications of choices on implementation and on maturity, as often a choice on an approach needs to change as an organization grows and matures.

e-Services - Toward a New Model of (Inter)active Community (Hardcover, 1st ed. 2019): Alfredo M. Ronchi e-Services - Toward a New Model of (Inter)active Community (Hardcover, 1st ed. 2019)
Alfredo M. Ronchi
R1,918 Discovery Miles 19 180 Ships in 10 - 15 working days

This book explores various e-Services related to health, learning, culture, media and the news, and the influences the Web and related technologies have had and continue to have in each of these areas, both on service providers and service users. It provides insights into the main technological and human issues regarding healthcare, aging population, recent challenges in the educational environment, the impact of digital technologies on culture and heritage, cultural diversity, freedom of expression, intellectual property, fake news and, last but not least, public opinion manipulation and ethical issues. Its main aim is to bridge the gap between technological solutions, their successful implementation, and the fruitful utilization of the main set of e-Services mostly delivered by private or public companies. Today, various parameters actively influence e-Services' success or failure: cultural aspects, organisational and privacy issues, bureaucracy and workflows, infrastructure and technology in general, user habits, literacy, capacity or merely interaction design. This includes having a significant population of citizens who are willing and able to adopt and use online services; as well as developing the managerial and technical capability to implement applications that meet citizens' needs. This book helps readers understand the mutual dependencies involved; further, a selection of success stories and failures, duly commented on, enables readers to identify the right approach to innovation in areas that offer the opportunity to reach a wide audience with minimal effort. With its balanced humanistic and technological approach, the book mainly targets public authorities, decision-makers, stakeholders, solution developers, and graduate students.

Humans at Work in the Digital Age - Forms of Digital Textual Labor (Paperback): Shawna Ross, Andrew Pilsch Humans at Work in the Digital Age - Forms of Digital Textual Labor (Paperback)
Shawna Ross, Andrew Pilsch
R1,318 Discovery Miles 13 180 Ships in 12 - 17 working days

Humans at Work in the Digital Age explores the roots of twenty-first-century cultures of digital textual labor, mapping the diverse physical and cognitive acts involved, and recovering the invisible workers and work that support digital technologies. Drawing on 14 case studies organized around four sites of work, this book shows how definitions of labor have been influenced by the digital technologies that employees use to produce, interpret, or process text. Incorporating methodology and theory from a range of disciplines and highlighting labor issues related to topics as diverse as census tabulation, market research, electronic games, digital archives, and 3D modeling, contributors uncover the roles played by race, class, gender, sexuality, and national politics in determining how narratives of digital labor are constructed and erased. Because each chapter is centered on the human cost of digital technologies, however, it is individual people immersed in cultures of technology who are the focus of the volume, rather than the technologies themselves. Humans at Work in the Digital Age shows how humanistic inquiry can be a valuable tool in the emerging conversation surrounding digital textual labor. As such, this book will be essential reading for academics and postgraduate students engaged in the study of digital humanities; human-computer interaction; digital culture and social justice; race, class, gender, and sexuality in digital realms; the economics of the internet; and technology in higher education.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cock Grease Beaver Oil Base Pomade…
R389 R342 Discovery Miles 3 420
Jerusalem 2020 - The Breakthrough
Daniel Mark Hardcover R2,542 Discovery Miles 25 420
Elizabeth and James Nirvana BlaCK Dry…
R848 R674 Discovery Miles 6 740
M416 Electric Gel Ball Blasters with…
R1,150 R549 Discovery Miles 5 490
Verimark i Play Vortex Bubble Blaster
R299 Discovery Miles 2 990
Intex Underwater Fun Balls Pool Toy
R191 Discovery Miles 1 910
Dala Bean Bag - Assorted Colours (10 x…
R31 Discovery Miles 310
Cock Grease Extra Stiff Pomade (100g…
R435 R410 Discovery Miles 4 100
ENZO Professional Small Electric…
R1,099 R999 Discovery Miles 9 990
Dream Summer Bubble Gun
R599 R545 Discovery Miles 5 450

 

Partners