![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet
'Cybermarketing' is a no-nonsense structured guide to using the
Internet for marketing and is essential reading for all marketers
and managers who need to know how to use the Internet to promote
and sell their product.
Network monitoring serves as the basis for a wide scope of network, engineering and management operations. Precise network monitoring involves inspecting every packet traversing in a network. However, this is not feasible with future high-speed networks, due to significant overheads of processing, storing, and transferring measured data. Network Monitoring in High Speed Networks presents accurate measurement schemes from both traffic and performance perspectives, and introduces adaptive sampling techniques for various granularities of traffic measurement. The techniques allow monitoring systems to control the accuracy of estimations, and adapt sampling probability dynamically according to traffic conditions. The issues surrounding network delays for practical performance monitoring are discussed in the second part of this book. Case studies based on real operational network traces are provided throughout this book. Network Monitoring in High Speed Networks is designed as a secondary text or reference book for advanced-level students and researchers concentrating on computer science and electrical engineering. Professionals working within the networking industry will also find this book useful.
Implementing e-business requires a dynamic approach that can
respond to changes in technology, management direction, customer
and supplier behavior, and competition. Many traditional project
management methods don't work with e-business. This book presents
proven real world management methods that are adaptive, dynamic,
and flexible in an e-business environment. It tackles the central
issues of e-business: the burgeoning market for "buy-side"
extranet/Internet procurement and supply chain
management/business-to-business, Web-based transactions.
This book provides a comprehensive guide to legal issues which have arisen as a result of the growth of the internet and the worldwide web. As well as discussing each topic in detail, Jonathan Rosenoer includes extensive coverage of the relevant cases and their implications for the future. Topics covered include: copyright and trademark issues, defamation, privacy, liability, electronic contracts, tax issues, and ethics. A potted history of the significant legal events is included which runs from the founding of the Electronic Frontier Foundation to the 1996 Telecommunications Act. About the author: Jonathan Rosenoer has been general counsel for the Haft Corporation, Executive Editor for Lexis Counsel Connect, and is best known for his CyberLaw column which has a distribution list of over four million.
Social network analysis dates back to the early 20th century, with initial studies focusing on small group behavior from a sociological perspective. The emergence of the Internet and subsequent increase in the use of online social networking applications has caused a shift in the approach to this field. Faced with complex, large datasets, researchers need new methods and tools for collecting, processing, and mining social network data. Social Network Mining, Analysis and Research Trends: Techniques and Applications covers current research trends in the area of social networks analysis and mining. Containing research from experts in the social network analysis and mining communities, as well as practitioners from social science, business, and computer science, this book proposes new measures, methods, and techniques in social networks analysis and also presents applications and case studies in this changing field.
Companies invest in e-business and its supporting technology for their e-business initiatives. E-business applications such as supply chain management and customer relationship management improve transaction efficiency and scope economies as well as promoting new product and service offerings and close customer relationships. However, it is difficult for companies to capture these benefits as economic value or profits. Many companies launching e-businesses have not been successful at creating economic value. To justify continued expenditures, it may be necessary for IT managers to move beyond simply demonstrating the benefits of technology and objectively demonstrate the increase in economic value these technologies can produce. To create value from e-business, companies may have to develop appropriate strategies or unique value propositions to complement their e-business investments. This book presents a group of studies that yield significant new insights into the creation of e-business value.
Financial identity theft is well understood with clear underlying motives. Medical identity theft is new and presents a growing problem. The solutions to both problems however, are less clear. The Economics of Financial and Medical Identity Theft discusses how the digital networked environment is critically different from the world of paper, eyeballs and pens. Many of the effective identity protections are embedded behind the eyeballs, where the presumably passive observer is actually a fairly keen student of human behavior. The emergence of medical identity theft and the implications of medical data privacy are described in the second section of this book. The Economics of Financial and Medical Identity Theft also presents an overview of the current technology for identity management. The book closes with a series of vignettes in the last chapter, looking at the risks we may see in the future and how these risks can be mitigated or avoided.
This monograph focuses on characterizing the stability and performance consequences of inserting limited-capacity communication networks within a control loop. The text shows how integration of the ideas of control and estimation with those of communication and information theory can be used to provide important insights concerning several fundamental problems such as: * minimum data rate for stabilization of linear systems over noisy channels; * minimum network requirement for stabilization of linear systems over fading channels; and * stability of Kalman filtering with intermittent observations. A fundamental link is revealed between the topological entropy of linear dynamical systems and the capacities of communication channels. The design of a logarithmic quantizer for the stabilization of linear systems under various network environments is also extensively discussed and solutions to many problems of Kalman filtering with intermittent observations are demonstrated. Analysis and Design of Networked Control Systems will interest control theorists and engineers working with networked systems and may also be used as a resource for graduate students with backgrounds in applied mathematics, communications or control who are studying such systems.
This book intends to change the perception of modern day telecommunications. Communication systems, usually perceived as "dumb pipes", carrying information / data from one point to another, are evolved into intelligently communicating smart systems. The book introduces a new field of cloud communications. The concept, theory, and architecture of this new field of cloud communications are discussed. The book lays down nine design postulates that form the basis of the development of a first of its kind cloud communication paradigm entitled Green Symbiotic Cloud Communications or GSCC. The proposed design postulates are formulated in a generic way to form the backbone for development of systems and technologies of the future. The book can be used to develop courses that serve as an essential part of graduate curriculum in computer science and electrical engineering. Such courses can be independent or part of high-level research courses. The book will also be of interest to a wide range of readers including both scientific and non-scientific domains as it discusses innovations from a simplistic explanatory viewpoint.
I want to express my sincere thanks to all authors who submitted research papers to support the Third IFIP International Conference on Computer and Computing Te- nologies in Agriculture and the Third Symposium on Development of Rural Infor- tion (CCTA 2009) held in China, during October 14-17, 2009. This conference was hosted by the CICTA (EU-China Centre for Information & Communication Technologies, China Agricultural University), China National En- neering Research Center for Information Technology in Agriculture, Asian Conf- ence on Precision Agriculture, International Federation for Information Processing, Chinese Society of Agricultural Engineering, Beijing Society for Information Te- nology in Agriculture, and the Chinese Society for Agricultural Machinery. The pla- num sponsor includes the Ministry of Science and Technology of China, Ministry of Agriculture of China, Ministry of Education of China, among others. The CICTA (EU-China Centre for Information & Communication Technologies, China Agricultural University) focuses on research and development of advanced and practical technologies applied in agriculture and on promoting international communi- tion and cooperation. It has successfully held three International Conferences on C- puter and Computing Technologies in Agriculture, namely CCTA 2007, CCTA 2008 and CCTA 2009. Sustainable agriculture is the focus of the whole world currently, and therefore the application of information technology in agriculture is becoming more and more - portant. 'Informatized agriculture' has been sought by many countries recently in order to scientifically manage agriculture to achieve low costs and high incomes.
Part of the highly successful Shelly Cashman Series (R), this text provides an introduction to HTML5 and CSS and leads the user through a clear, step-by-step, screen-by-screen approach to learning. Readers learn how to create a Web page using HTML5, format the page, add graphics, and more.
This book examines the changes in the governance of human expression as a result of the development of the Internet. It tells the story of the emergence of a global regime that almost completely lacks institutions, and develops a concept of 'expression governance' that focusses on the governance practices of key actors in Europe and North America. The book illuminates the increased disciplinary capacity of the Internet infrastructure that has become apparent to the public following Edward Snowden's leaks in 2013, and provides a theoretical frame within which such changes can be understood. It argues that the Internet has developed a 'global default' of permissible speech that exists pervasively across the globe but beyond the control of any one actor. It then demonstrates why the emergence of such a 'global default' of speech is crucial to global conflict in the international relations of the Internet. The book concludes with an elaboration of the regulatory practices and theatrical performances that enable a global regime as well as the three key narratives that are embedded within it.
The chapters provide a wide-ranging view of issues addressing how
advertisers can proceed on the Internet and World Wide Web. An
initial chapter traces the development of Web advertising from its
very beginnings as it was represented and discussed in the pages of
"Advertising Age." Although there is a noticeable trend to define
Web advertising by comparing it to traditional media, it is clear
that Web advertising just won't fit the old mold. Keith Reinhard of
DDB Needham actually articulates this linkage between the old and
new in his invited chapter.
Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing. "Moving Target Defense II: Application of Game Theory and Adversarial Modeling "includes contributions from world experts in the cyber security field. In the first volume of MTD, we presented MTD approaches based on software transformations, and MTD approaches based on network and software stack configurations. In thissecond volume of MTD, a group of leading researchers describe game theoretic, cyber maneuver, and software transformation approaches for constructing and analyzing MTD systems. Designed as a professional book for practitioners and researchers working in the cyber security field, advanced -level students and researchers focused on computer science will also find this book valuable as a secondary text book or reference."
* need to creat and design your own Web pages that include both text and graphics * want your own Web page up and running quickly and efficiently * would like to know how to include Java applets on your Web pages * need a self-teaching approach * want results fast...then this book is for you!
This wide-ranging introductory text looks at the virtual community of cyberspace and analyzes its relationship to the real one as lived out in today's societies. Such issues as race, gender, power, economics and ethics in cyberspace are discussed by the leading experts on the subject of the Internet, grouped under four main sections: identity; social order and control; community structure and dynamics; and collective action. The book displays how the idea of community is being challenged and rewritten by the increasing power and range of cyberspace. As new societies and relationships are formed in this virtual landscape, we are now having to consider the potential consequences this might have on our own community and societies.;The text should appeal to students and professionals, but also to those concerned about the changing relationships between information technology and a society which is fast becoming divided between those on-line and those not.
Entertain Me! features the most popular influencers and celebrities from Schoen! magazine, a biannual English language publication and online platform with a cutting-edge aesthetic. This book presents a visual explosion of talent in film, music, TV, fashion and art from its debut as an online forum in 2009 to 2020. Stunning photographs from the worlds of culture, fashion, and beauty showcase the biggest names and rising stars who entertain and lead the world in high-octane creativity. It will appeal to the visionary, the collector, and the fashion-conscious, and is intended not only for the magazine's established and loyal readership, but also for a broader demographic of readers around the globe who monitor the pulse of the latest in creative talent.
School library media specialists will find this concepts-based approach to teaching electronic literacy an indispensable basic tool for instructing students and teachers. It provides step-by-step instruction on how to find and evaluate needed information from electronic databases and the Internet, how to formulate successful electronic search strategies and retrieve relevant results, and how to interpret and critically analyze search results. The chapters contain a suggested lesson plan and sample assignments for the school library media specialist to use in teaching electronic literacy skills to students and teachers. Dr. Kathleen W. Craver, a nationally recognized specialist in technology in the library media center, identifies the universal concepts of electronic literacy and provides the library media specialist with the rationales, background, methods, and model assignments to teach students and faculty to become proficient and critical users of electronic information technologies. At the beginning of each chapter, Craver furnishes a rationale for change that school library media specialists can use to justify these essential modifications to their teaching curriculum. Chapters include: The Structure of Electronic Information; The Common Vocabulary and Characteristics of Electronic Resources; Formulating Electronic Search Strategies; The Physical Arrangement of Information; Choosing Appropriate On-Site and Remote Electronic Libraries; Choosing Appropriate Electronic Databases; Internet Search Tools and Techniques; Identifying Electronic Resources; On-Site Electronic Records Access; Using Primary Electronic Resources; and Evaluating Electronic Sources. The Appendix contains a listof principal vendors. A glossary of terms and a bibliography of suggested reading complete the work. This basic teaching guide provides the media specialist with all the tools necessary to help novice users to be successful and avoid the frustration of electronic database searching and retrieval.
This book presents the security and privacy challenges of the smart home following the logic of "terminal device - voice interface - application platform". For each component, the authors provide answers to the three questions: 1) In the terminal device layer, how to conduct cross-layer privacy breach analysis and provide effective countermeasures; 2) In the voice interface layer, how to design effective and lightweight schemes to defend against voice spoofing; 3) In the application layer, how to design an effective anomaly detection system without breaching the application platform. The authors conduct a thorough analysis of the security threats and challenges in each component of the smart home, review the existing state-of-the-art solutions proposed by other researchers, and elaborate on proposed countermeasures. This book aims to provide both security threats analysis and state-of-the-art countermeasures for the smart home network.
Intranets and Extranets are the fastest growing use of internet technology and are being adopted by a large number of organizations. Web-Weaving' is a book for managers which illustrates the benefits and pitfalls of using technology to enhance internal and external connections. The book brings together a number of the hottest subjects in IT and Organizational Development using contributions from innovative thinkers and practitioners in both areas. The first section defines what web-weaving actual is, describing the huge range of communication technology available to organizations at the moment. The second section reviews web-weaving in practice using case studies of companies using intranet and extranet technology. The third section brings together commentaries from leading players in both the IT and Human Resources fields to predict the future of web-weaving and the huge impact it will have on the way organizations and the people within them will work together in the future.
This book is for novices If you have never done any programming before - if you are a complete novice - this book is for you. This book assumes no prior knowledge of programming. It starts from scratch. It is written in a simple, direct style for maximum clarity. It is aimed at first level students at universities and colleges, but it is also suitable for novices studying alone. The approach of this book We explain how to use objects early in this book. Our approach is to start with the ideas of variables, assignment and methods, then introduce the use of objects created from library classes. Next we explain how to use control structures for selection and looping. Then comes the treatment of how to write your own classes. We wanted to make sure that the fun element of programming was paramount, so we use graphics right from the start. We think graphics is fun, interesting and clearly demonstrates all the important principles of programming. But we haven't ignored programs that input and output text - they are also included. The programs we present use many of the features of a graphical user interfaces (GUIs), such as buttons, scroll bars and text boxes. But we also explain how to write console programs in Java. We introduce new ideas carefully one-at-a-time, rather than all at once. So, for example, there is a single chapter on writing methods. We introduce simple ideas early and more sophisticated ideas later on.
Making Hypermedia Work: A User's Guide to HyTime discusses how the HyTime standard can be applied to real world problems of navigating from here to there in collections of documents. The HyTime standard itself provides enabling method and templates for various information structures such as links and various kinds of location indicators. A HyTime application specifies how a group applies those templates to their particular requirements. This involves choosing which HyTime structures are needed, setting up conventions for how they are to be used and setting up management and processes for creation, conversion and update of hypermedia documents. A HyTime engine is the last ingredient: actually using an application typically involves choosing software to support one's use of HyTime and customizing it as needed. This may be as simple as setting up hypertextual style sheets that determine how links and other things look and act. More specialized applications may require full-scale design and programming. Making Hypermedia Work: A User's Guide to HyTime presents the first in-depth guide to the HyTime specifications, both describing its key features and providing guidelines on how it is used. The book begins with the more familiar structures of books, graphics and cross-references, detailing the HyTime constructs and models used to identify, locate, and link data. It goes on to introduce some of HyTime's mechanisms for linking multidimensional, multimedia data, and for scheduling it in space and time. The authors help the reader become fluent in HyTime as it applies to the simpler and most widely understood data types. After mastering this level of HyTime, readers will be ready and able to explore the exciting potential of HyTime for more sophisticated multimedia applications. |
You may like...
New Generation of Portal Software and…
Jana Polgar, Greg Adamson
Hardcover
R4,560
Discovery Miles 45 600
Time and Relational Theory - Temporal…
C.J. Date, Hugh Darwen, …
Paperback
R1,244
Discovery Miles 12 440
Rough Computing - Theories, Technologies…
Aboul Ella Hassanien, Zbigniew Suraj, …
Hardcover
R4,566
Discovery Miles 45 660
Trends, Applications, and Challenges of…
Mohammad Amin Kuhail, Bayan Abu Shawar, …
Hardcover
R6,683
Discovery Miles 66 830
|