![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet
This book examines the changes in the governance of human expression as a result of the development of the Internet. It tells the story of the emergence of a global regime that almost completely lacks institutions, and develops a concept of 'expression governance' that focusses on the governance practices of key actors in Europe and North America. The book illuminates the increased disciplinary capacity of the Internet infrastructure that has become apparent to the public following Edward Snowden's leaks in 2013, and provides a theoretical frame within which such changes can be understood. It argues that the Internet has developed a 'global default' of permissible speech that exists pervasively across the globe but beyond the control of any one actor. It then demonstrates why the emergence of such a 'global default' of speech is crucial to global conflict in the international relations of the Internet. The book concludes with an elaboration of the regulatory practices and theatrical performances that enable a global regime as well as the three key narratives that are embedded within it.
This wide-ranging introductory text looks at the virtual community of cyberspace and analyzes its relationship to the real one as lived out in today's societies. Such issues as race, gender, power, economics and ethics in cyberspace are discussed by the leading experts on the subject of the Internet, grouped under four main sections: identity; social order and control; community structure and dynamics; and collective action. The book displays how the idea of community is being challenged and rewritten by the increasing power and range of cyberspace. As new societies and relationships are formed in this virtual landscape, we are now having to consider the potential consequences this might have on our own community and societies.;The text should appeal to students and professionals, but also to those concerned about the changing relationships between information technology and a society which is fast becoming divided between those on-line and those not.
* need to creat and design your own Web pages that include both text and graphics * want your own Web page up and running quickly and efficiently * would like to know how to include Java applets on your Web pages * need a self-teaching approach * want results fast...then this book is for you!
Language and the Internet gives the readers a linguistic perspective and explains them the role of internet in the changing world. The book throws light on the multilingualism of the internet and talks about the various languages the corresponding themes for in the 21st century. Also discussed in the book is the language that is employed on the web, the language that is used in the virtual world and the one that e-mails are composed in. The readers are also informed about the use of blogs for the understanding of the readers, the various challenges in the internet language and the solutions to them and the linguistic future of internet.
Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing. "Moving Target Defense II: Application of Game Theory and Adversarial Modeling "includes contributions from world experts in the cyber security field. In the first volume of MTD, we presented MTD approaches based on software transformations, and MTD approaches based on network and software stack configurations. In thissecond volume of MTD, a group of leading researchers describe game theoretic, cyber maneuver, and software transformation approaches for constructing and analyzing MTD systems. Designed as a professional book for practitioners and researchers working in the cyber security field, advanced -level students and researchers focused on computer science will also find this book valuable as a secondary text book or reference."
It's a bargain! The definitive guide to buying and selling success on eBay - fully updated for 2020 Want to know the best way to get rid of some of that clutter laying around the house and make some cash? Or sell that beautiful jewelry you made recently? It might be time to take a quick trip to a market with more than 175 million buyers and start a global bidding war. eBay remains the easiest way to sell to hungry consumers worldwide and to uncover incredible bargains and unique items for yourself in the process. Marsha Collier, longtime eBay business owner and one of their first elite PowerSellers, shares 20+ years of expertise to fast-track you to becoming a trusted buyer and seller on the site. You'll find out how to set up your account, market effectively, and master shipping and payment, as well as how to find the best bargains for yourself and close those sweet, sweet deals. Establish your eBay store Find techniques to make your listings stand out Make money and friends with social media Bid or buy outright Whether you're a bargain hunter or bargain seller, declutterer or aspiring eBay tycoon, eBay for Dummies has what you need. Put your bid on it right now!
School library media specialists will find this concepts-based approach to teaching electronic literacy an indispensable basic tool for instructing students and teachers. It provides step-by-step instruction on how to find and evaluate needed information from electronic databases and the Internet, how to formulate successful electronic search strategies and retrieve relevant results, and how to interpret and critically analyze search results. The chapters contain a suggested lesson plan and sample assignments for the school library media specialist to use in teaching electronic literacy skills to students and teachers. Dr. Kathleen W. Craver, a nationally recognized specialist in technology in the library media center, identifies the universal concepts of electronic literacy and provides the library media specialist with the rationales, background, methods, and model assignments to teach students and faculty to become proficient and critical users of electronic information technologies. At the beginning of each chapter, Craver furnishes a rationale for change that school library media specialists can use to justify these essential modifications to their teaching curriculum. Chapters include: The Structure of Electronic Information; The Common Vocabulary and Characteristics of Electronic Resources; Formulating Electronic Search Strategies; The Physical Arrangement of Information; Choosing Appropriate On-Site and Remote Electronic Libraries; Choosing Appropriate Electronic Databases; Internet Search Tools and Techniques; Identifying Electronic Resources; On-Site Electronic Records Access; Using Primary Electronic Resources; and Evaluating Electronic Sources. The Appendix contains a listof principal vendors. A glossary of terms and a bibliography of suggested reading complete the work. This basic teaching guide provides the media specialist with all the tools necessary to help novice users to be successful and avoid the frustration of electronic database searching and retrieval.
Entertain Me! features the most popular influencers and celebrities from Schoen! magazine, a biannual English language publication and online platform with a cutting-edge aesthetic. This book presents a visual explosion of talent in film, music, TV, fashion and art from its debut as an online forum in 2009 to 2020. Stunning photographs from the worlds of culture, fashion, and beauty showcase the biggest names and rising stars who entertain and lead the world in high-octane creativity. It will appeal to the visionary, the collector, and the fashion-conscious, and is intended not only for the magazine's established and loyal readership, but also for a broader demographic of readers around the globe who monitor the pulse of the latest in creative talent.
Intranets and Extranets are the fastest growing use of internet technology and are being adopted by a large number of organizations. Web-Weaving' is a book for managers which illustrates the benefits and pitfalls of using technology to enhance internal and external connections. The book brings together a number of the hottest subjects in IT and Organizational Development using contributions from innovative thinkers and practitioners in both areas. The first section defines what web-weaving actual is, describing the huge range of communication technology available to organizations at the moment. The second section reviews web-weaving in practice using case studies of companies using intranet and extranet technology. The third section brings together commentaries from leading players in both the IT and Human Resources fields to predict the future of web-weaving and the huge impact it will have on the way organizations and the people within them will work together in the future.
This book presents the security and privacy challenges of the smart home following the logic of "terminal device - voice interface - application platform". For each component, the authors provide answers to the three questions: 1) In the terminal device layer, how to conduct cross-layer privacy breach analysis and provide effective countermeasures; 2) In the voice interface layer, how to design effective and lightweight schemes to defend against voice spoofing; 3) In the application layer, how to design an effective anomaly detection system without breaching the application platform. The authors conduct a thorough analysis of the security threats and challenges in each component of the smart home, review the existing state-of-the-art solutions proposed by other researchers, and elaborate on proposed countermeasures. This book aims to provide both security threats analysis and state-of-the-art countermeasures for the smart home network.
This book is for novices If you have never done any programming before - if you are a complete novice - this book is for you. This book assumes no prior knowledge of programming. It starts from scratch. It is written in a simple, direct style for maximum clarity. It is aimed at first level students at universities and colleges, but it is also suitable for novices studying alone. The approach of this book We explain how to use objects early in this book. Our approach is to start with the ideas of variables, assignment and methods, then introduce the use of objects created from library classes. Next we explain how to use control structures for selection and looping. Then comes the treatment of how to write your own classes. We wanted to make sure that the fun element of programming was paramount, so we use graphics right from the start. We think graphics is fun, interesting and clearly demonstrates all the important principles of programming. But we haven't ignored programs that input and output text - they are also included. The programs we present use many of the features of a graphical user interfaces (GUIs), such as buttons, scroll bars and text boxes. But we also explain how to write console programs in Java. We introduce new ideas carefully one-at-a-time, rather than all at once. So, for example, there is a single chapter on writing methods. We introduce simple ideas early and more sophisticated ideas later on.
As we begin a new century, the astonishing spread of nationally and
internationally accessible computer-based communication networks
has touched the imagination of people everywhere. Suddenly, the
Internet is in everyday parlance, featured in talk shows, in
special business "technology" sections of major newspapers, and on
the covers of national magazines. If the Internet is a new world of
social behavior it is also a new world for those who study social
behavior. This volume is a compendium of essays and research
reports representing how researchers are thinking about the social
processes of electronic communication and its effects in society.
Taken together, the chapters comprise a first gathering of social
psychological research on electronic communication and the
Internet.
Making Hypermedia Work: A User's Guide to HyTime discusses how the HyTime standard can be applied to real world problems of navigating from here to there in collections of documents. The HyTime standard itself provides enabling method and templates for various information structures such as links and various kinds of location indicators. A HyTime application specifies how a group applies those templates to their particular requirements. This involves choosing which HyTime structures are needed, setting up conventions for how they are to be used and setting up management and processes for creation, conversion and update of hypermedia documents. A HyTime engine is the last ingredient: actually using an application typically involves choosing software to support one's use of HyTime and customizing it as needed. This may be as simple as setting up hypertextual style sheets that determine how links and other things look and act. More specialized applications may require full-scale design and programming. Making Hypermedia Work: A User's Guide to HyTime presents the first in-depth guide to the HyTime specifications, both describing its key features and providing guidelines on how it is used. The book begins with the more familiar structures of books, graphics and cross-references, detailing the HyTime constructs and models used to identify, locate, and link data. It goes on to introduce some of HyTime's mechanisms for linking multidimensional, multimedia data, and for scheduling it in space and time. The authors help the reader become fluent in HyTime as it applies to the simpler and most widely understood data types. After mastering this level of HyTime, readers will be ready and able to explore the exciting potential of HyTime for more sophisticated multimedia applications.
The widespread use of the Internet as a tool for gathering and
disseminating information raises serious questions for
journalists--and their readers--about the process of reporting
information. Using virtual sources and publishing online is
changing the way in which journalism takes place and its effect on
the society it serves.
"Expert ASP.NET 2.0 Advanced Application Design" will help you derive maximum performance and reliability from the distributed applications you create with ASP.NET 2.0. The book first looks at some of the non-functional requirements that impact the design of a distributed application. It then relates them to the servers and services available in the .NET 2.0 Framework. ASP.NET 2.0 is the central process for use in distributed .NET applications, and the book closely examines the ASP.NET 2.0 Framework and its hosting environment, Internet Information Server (IIS). The book looks at how ASP.NET 2.0 is used by different packages within .NET (like Web Services), and explores how it can be extended to meet your own custom requirements. The second part of the book drills down and examines some of the common architectural challenges encountered when developing application designs. The book walks through the tiers of the .NET Framework, starting at the client level and exploring the internals of the page type, enhancements to ViewState, client script generation, and new out-of-band callbacks. At the middle tier, the book examines Web Services, Remoting, COM+, MSMQ, and mix and match communication options to suit your own requirements. This section wraps up by previewing Windows Communication Foundation, which aims to unify these technologies. The third part of the book examines the data layer of your distributed applications. This includes enhancements to the Managed Providers in 2.0, the new transactional model, and a preview of usage guidelines for SQL Server 2005. By the books conclusion, you will be able to select with confidence the most appropriate design elements for yourpurposes, elegantly connecting them, and ensuring you get the very best from the ASP.NET 2.0 Framework.
The Future of Digital Data, Heritage and Curation critiques digital cultural heritage concepts and their application to data, developing new theories, curatorial practices and a more-than-human museology for a contemporary and future world. Presenting a diverse range of case examples from around the globe, Cameron offers a critical and philosophical reflection on the ways in which digital cultural heritage is currently framed as societal data worth passing on to future generations in two distinct forms: digitally born and digitizations. Demonstrating that most perceptions of digital cultural heritage are distinctly western in nature, the book also examines the complicity of such heritage in climate change, and environmental destruction and injustice. Going further still, the book theorizes the future of digital data, heritage, curation and the notion of the human in the context of the profusion of new types of societal data and production processes driven by the intensification of data economies and through the emergence of new technologies. In so doing, the book makes a case for the development of new types of heritage that comprise AI, automated systems, biological entities, infrastructures, minerals and chemicals - all of which have their own forms of agency, intelligence and cognition. The Future of Digital Data, Heritage and Curation is essential reading for academics and students engaged in the study of museums, archives, libraries, galleries, archaeology, cultural heritage management, information management, curatorial studies and digital humanities.
Content distribution, i.e., distributing digital content from one node to another node or multiple nodes, is the most fundamental function of the Internet. Since Amazon's launch of EC2 in 2006 and Apple's release of the iPhone in 2007, Internet content distribution has shown a strong trend toward polarization. On the one hand, considerable investments have been made in creating heavyweight, integrated data centers ("heavy-cloud") all over the world, in order to achieve economies of scale and high flexibility/efficiency of content distribution. On the other hand, end-user devices ("light-end") have become increasingly lightweight, mobile and heterogeneous, creating new demands concerning traffic usage, energy consumption, bandwidth, latency, reliability, and/or the security of content distribution. Based on comprehensive real-world measurements at scale, we observe that existing content distribution techniques often perform poorly under the abovementioned new circumstances. Motivated by the trend of "heavy-cloud vs. light-end," this book is dedicated to uncovering the root causes of today's mobile networking problems and designing innovative cloud-based solutions to practically address such problems. Our work has produced not only academic papers published in prestigious conference proceedings like SIGCOMM, NSDI, MobiCom and MobiSys, but also concrete effects on industrial systems such as Xiaomi Mobile, MIUI OS, Tencent App Store, Baidu PhoneGuard, and WiFi.com. A series of practical takeaways and easy-to-follow testimonials are provided to researchers and practitioners working in mobile networking and cloud computing. In addition, we have released as much code and data used in our research as possible to benefit the community.
In today's business arena information is one of the most important resources possessed by enterprises. In order to support proper information flow, businesses deploy transactional systems, build decision support systems or launch management information systems. Unfortunately, the majority of information systems do not take advantage of recent developments in knowledge management, thus exposing companies to the risk of missing important information, or what is even worse, leading them to misinterpret information. Knowledge-Based Information Retrieval and Filtering from the Web
contains fifteen chapters, contributed by leading international
researchers, addressing the matter of information retrieval,
filtering and management of the information on the Internet. The
research presented in these chapters deals with the need to find
proper solutions for the description of the information found on
the Internet, the description of the information consumers need,
the algorithms for retrieving documents (and indirectly, the
information embedded in them), and the presentation of the
information found. The chapters include:
The literature on the Internet and library and information services has emerged since 1990 and has exploded in 1994 and 1995. Though the amount of material on this topic has increased significantly, little has been done to organize this body of literature. This book selects, organizes, reviews, analyzes, and presents books and articles on the Internet and the library published in 1994 and 1995. An introductory essay provides a comprehensive discussion of the most important issues, trends, and challenges faced by library and information professionals as they respond to the Internet in diverse ways. The annotated bibliography that follows contains more than a thousand entries, which are grouped in topical chapters to facilitate use. The emergence of the Internet has had a profound impact on society in general and on library and information services in particular. The Internet is widely used in various library and information operations including information selection, organization, preservation, processing, presentation, and delivery. The literature on the Internet and library and information services has emerged since 1990 and covers a great variety of issues. Since 1994, publications on this topic have grown dramatically. While literature before 1994 tends to be primarily descriptive, more recent works are analytical and provide valuable information on the use of the Internet in libraries. Though the amount of literature on the Internet and library and information services has exploded, little effort has been made to organize this vast body of information. This book is a research guide to the most important books and articles published on the Internet and library and information services in 1994 and 1995. The volume begins with a comprehensive essay that identifies and highlights the issues, trends, and challenges faced by library and information professionals today, as they incorporate the Internet in their work. The annotated bibliography that follows cites more than a thousand books and articles on the Internet and library and information services. The entries are grouped in topical sections to facilitate use, and the extensive indexes further allow the reader to locate specific information.
In this book, Dieter Fensel and his qualified team lay the foundation for understanding the Semantic Web Services infrastructure, aimed at eliminating human intervention and thus allowing for seamless integration of information systems. They focus on the currently most advanced SWS infrastructure, namely SESA and related work such as the Web Services Execution Environment (WSMX) activities and the Semantic Execution Environment (OASIS SEE TC) standardization effort. |
You may like...
News Search, Blogs and Feeds - A Toolkit
Lars Vage, Lars Iselid
Paperback
R1,332
Discovery Miles 13 320
Responsive Web Design with HTML 5 & CSS
Jessica Minnick
Paperback
|