Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Internet
Taking the reader on a journey through queer manifestations in games, this book advocates for video games as a rich, political and cultural medium, which provides us with tools to navigate the future of gaming. Situated at the intersection of New Media, Game, Cultural and Queer Studies, the book navigates diverse interspecies relationships, queer villains from the past, Pokemon memes on border politics, flanerie in post-industrial cities and one-sided erotic fights. It provides new critical engagements with the works of Jose Esteban Munoz, Bonnie Ruberg, Guy Debord and Jack Halberstam, examining queer representation, gaming subcultures and dissident play practices. Making the bold claim that video games might be the queerest medium today, this book provides organic, self-reflective and, ultimately, thought-provoking thinking in which both games and gamers are queered. This book will be of interest to scholars researching game studies, sex, gender and sexuality in new media, but also readers interested in literature, digital media, society, participatory culture and queer studies.
This book is about news search and monitoring. Aimed at
professionals with a strategic need of monitoring the surrounding
world, users with a need to find the best news sources, monitoring
services and news search strategies and techniques will benefit
from reading this book. The main purpose is to present a practical
handbook with an analysis of readily available tools, blending with
passages of a theoretical nature. It is also useful for students at
LIS programmes and related information programmes and for
librarians and information professionals. The authors aim to aid
the reader in reaching a greater understanding of the core in news
search and monitoring.
This book discusses the use of the internet in China, the complicated power relations in online political communications, and the interactions and struggles between the government and the public over the use of the internet. It argues that there is a "semi-structured" online public sphere, in which there is a certain amount of equal and liberal political communication, but that the online political debates are also limited by government control and censorship, as well as by inequality and exclusions, and moreover that the government rarely engages in the political debates. Based on extensive original research, and considering specific debates around particular issues, the book analyses how Chinese net-users debate about political issues, how they problematize the government's actions and policies, what language they use, what online discourses are produced, and how the debates and online discourses are limited. Overall, the book provides a rich picture of the current state of online political communication in China.
Learn the essentials of working with Flutter and Dart to build full stack applications that meet the needs of a cloud-driven world. Together, the Flutter open source UI software development kit and the Dart programming language for client development provide a unified solution to building applications capable of targeting multiple platforms. Recipes in this cookbook show you how this potent combination provides an efficient approach to application development. Typically used in frontend development, Flutter helps you develop cross-platform applications for Android, iOS, Linux, Mac, Windows, and the Google Fuchsia operating system. The Dart SDK provides native access to third-party solutions, including APIs, databases, and authentication. When used in concert with Flutter, Dart allows you to compile source code ahead of time to native code. This cookbook shows you how to: Write effective Dart code by using variables and data structures Build applications with Flutter by exploring widgets and data handling Understand cloud provider solutions and learn how to integrate them with Flutter Manage data through APIs using Google Cloud Serverless Work with Firebase solutions such as Authentication and the Cloud Firestore database Build web applications that also work with mobile and desktop platforms
In a world where computing power, ubiquity and connectivity create
powerful new ways to facilitate learning, this book examines how
librarians and information professionals can utilize emerging
technologies to expand service and resource delivery. With
contributions from leading professionals, including lecturers,
librarians and e-learning technologists, this bookl explores
strategic approaches for effectively implementing, living with, and
managing revolutionary technological change in libraries.
Explores how social media defines consumer behaviour. Discovers how social media works to keep the user always on. Reviews why social media can shape a more extreme political and cultural ideology in users. Studies how social media algorithms can shape a predictable and homogeneous culture. Develops critical and multidisciplinary thinking about the impact of social media in shaping a predictable society.
The Lightning Network (LN) is a rapidly growing second-layer payment protocol that works on top of Bitcoin to provide near-instantaneous transactions between two parties. With this practical guide, authors Andreas M. Antonopoulos, Olaoluwa Osuntokun, and Rene Pickhardt explain how this advancement will enable the next level of scale for Bitcoin, increasing speed and privacy while reducing fees. Ideal for developers, systems architects, investors, and entrepreneurs looking to gain a better understanding of LN, this book demonstrates why experts consider LN a critical solution to Bitcoin's scalability problem. You'll learn how LN has the potential to support far more transactions than today's financial networks. This book examines: How the Lightning Network addresses the challenge of blockchain scaling The Basis of Lightning Technology (BOLT) standards documents The five layers of the Lightning Network Protocol Suite LN basics, including wallets, nodes, and how to operate one Lightning payment channels, onion routing, and gossip protocol Finding paths across payment channels to transport Bitcoin off-chain from sender to recipient
The book Digital Health Transformation with Blockchain and Artificial Intelligence covers the global digital revolution in the field of healthcare sector. The population has been overcoming the COVID-19 period; therefore, we need to establish intelligent digital healthcare systems using various emerging technologies like Blockchain and Artificial Intelligence. Internet of Medical Things is the technological revolution that has included the element of "smartness" in the healthcare industry and also identifying, monitoring, and informing service providers about the patient's clinical information with faster delivery of care services. This book highlights the important issues i.e. (a) How Internet of things can be integrated with the healthcare ecosystem for better diagnostics, monitoring, and treatment of the patients, (b) Artificial Intelligence for predictive and preventive healthcare systems, (c) Blockchain for managing healthcare data to provide transparency, security, and distributed storage, and (d) Effective remote diagnostics and telemedicine approach for developing smart care. The book encompasses chapters belong to the blockchain, Artificial Intelligence, and Big health data technologies. Features: Blockchain and internet of things in healthcare systems Secure Digital Health Data Management in Internet of Things Public Perception towards AI-Driven Healthcare Security, privacy issues and challenges in adoption of smart digital healthcare Big data analytics and Internet of things in the pandemic era Clinical challenges for digital health revolution Artificial intelligence for advanced healthcare Future Trajectory of Healthcare with Artificial Intelligence 9 Parkinson disease pre-diagnosis using smart technologies Emerging technologies to combat the COVID-19 Machine Learning and Internet of Things in Digital Health Transformation Effective Remote Healthcare and Telemedicine Approaches Legal implication of blockchain technology in public health This Book on "Digital Health Transformation with Blockchain and Artificial Intelligence" aims at promoting and facilitating exchanges of research knowledge and findings across different disciplines on the design and investigation of secured healthcare data analytics. It can also be used as a textbook for a Masters course in security and biomedical engineering. This book will also present new methods for the medical data analytics, blockchain technology, and diagnosis of different diseases to improve the quality of life in general, and better integration into digital healthcare.
The quest to achieve high website rankings in search engine results
is a prominent subject for both academics and website
owners/coders. Website Visibility marries academic research results
to the world of the information practitioner and contains a focused
look at the elements which contribute to website visibility,
providing support for the application of each element with relevant
research. A series of real-world case studies with tested examples
of research on website visibility elements and their effect on
rankings are reviewed.
An exciting challenge to how the internet and ICT have been
understood in academia and popular culture and shows how important
cultural assumptions are in how we understand technology. The
Internet, Power and Society argues that the way in which we view
technology such as the internet owes much to older, historic views
of the media and to issues in contemporary society. Such
perspectives are deeply rooted in a Western view of technology and
the book concludes by offering a radically new perspective as to
how the internet can change a society that is truly global in its
application.
Combining theory and practice, this updated new edition provides a complete overview of how to create deep and meaningful quests for games. It uses the Unity game engine in conjunction with Fungus and other free plugins to provide an accessible entry into quest design. The book begins with an introduction to the theory and history of quests in games, before covering four theoretical components of quests: their spaces, objects, actors, and challenges. Each chapter also includes a practical section, with accompanying exercises and suggestions for the use of specific technologies for four crucial aspects of quest design: * level design * quest item creation * NPC and dialogue construction * scripting This book will be of great interest to all game designers looking to create new, innovative quests in their games. It will also appeal to new media researchers, as well as humanities scholars in the fields of mythology and depth-psychology that want to bring computer-assisted instruction into their classroom in an innovative way. The companion website includes lecture and workshop slides, and can be accessed at: www.designingquests.com
An Interdisciplinary Approach to Modern Network Security presents the latest methodologies and trends in detecting and preventing network threats. Investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students, professionals, practitioners, network analysts and technology specialists interested in the simulation and application of computer network protection. It presents theoretical frameworks and the latest research findings in network security technologies, while analyzing malicious threats which can compromise network integrity. It discusses the security and optimization of computer networks for use in a variety of disciplines and fields. Touching on such matters as mobile and VPN security, IP spoofing and intrusion detection, this edited collection emboldens the efforts of researchers, academics and network administrators working in both the public and private sectors. This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, web security and much more. Information and communication systems are an essential component of our society, forcing us to become dependent on these infrastructures. At the same time, these systems are undergoing a convergence and interconnection process that has its benefits, but also raises specific threats to user interests. Citizens and organizations must feel safe when using cyberspace facilities in order to benefit from its advantages. This book is interdisciplinary in the sense that it covers a wide range of topics like network security threats, attacks, tools and procedures to mitigate the effects of malware and common network attacks, network security architecture and deep learning methods of intrusion detection.
This book is for C# developers who want to learn how to develop professional web applications with Microsoft's ASP.NET 3.5. The first 4 chapters present a quick-start course that works both for beginners and for experienced web developers who are new to ASP.NET. Then, the next four sections present (1) the skills you need for any business application, (2) the skills you need for database applications, (3) the skills you need for e-commerce applications, and (4) the skills you need for developing code that can be reused in other web applications. Along the way, you'll learn about .NET 3.5 enhancements that streamline web development, like the ListView and DataPager controls, LINQ, and AJAX.
This book aims at helping software teams work more efficiently by setting up their own design processes In a world where being able to satisfy users' needs becomes a crucial element for products' existence, this book helps organizations understand design processes, allowing them efficiently deliver experiences that address the real problems of their audiences. This book offers a combination of theory and practice that will help its readers understand how to design efficient processes and apply this knowledge in their own work. A large volume of insights in the form of colorful images and doodles.
1. This is the first book to examine cross-device search behavior. 2. This book will discuss a comprehensive range of behaviors in the context of cross-device search, which includes querying, gazing, clicking and touching. 3. The book will be of great interest to academics and students situated in the fields of library and information science, computer science, and management science. The book should also provide fascinating insights to practitioners, including those working for internet service providers.
With the widespread growth of the Internet, a new space - cyberspace - has appeared and has rapidly been integrated into every facet of life and work. It has effectively become the fourth basic living space for human beings. Although cyberspace has become a topic of increasing widespread concern, it is still difficult to understand cyberspace well because of its many definitions, vast and varied content, and differences with other similar spaces. A Brief History of Cyberspace attempts to establish a complete knowledge system about the evolution and history of cyberspace and cyber-enabled spaces (i.e., cyber-enabled physical space, cyber-enabled social space, and cyber-enabled thinking space). By providing a comprehensive overview, this book aims to help readers understand the history of cyberspace and lays a solid foundation for researchers and learners who are interested in cyberspace. The book has three main objectives: To provide a comprehensive understanding of the development of cyberspace, ranging from its origin, evolutions, and research status to open issues and future challenges, as well as related hot topics in industry and academia. To examine cyber life, cyber syndrome, and health in addition to cyber-enabled spaces designed for better living. To describe cyberspace governance from the perspective of the individual, society, and national and international levels in order to promote a more profound and reasonable direction to the development of cyberspace. Consisting of 16 chapters, the book is divided into three parts. Chapter 1 introduces the origins and basic concept of cyberspace, cyber philosophy, and cyber logic to help readers have a general understanding of cyberspace. Chapters 2 through 7 discuss a wide variety of topics related to human behavior, psychology, and health to help people better adapt to cyberspace. Chapters 8 through 16 present the history of cyberspace governance and various social and culture aspects of cyberspace. Each chapter concludes with a discussion of future development.
This book offers a timely exploration of our patterns of engagement with politics, news, and information in current high-choice information environments It analyzes the issue plaguing our society today - The spread of misinformation and its impact on the public sphere, our politics and our everyday lives The book offers insights into the processes that influence the supply of misinformation and factors influencing how and why people expose themselves to and process information that may support or contradict their beliefs and attitudes A team of authors from across a range of disciplines address the phenomena of knowledge resistance and its causes and consequences at the macro- as well as the micro-level The chapters take a philosophical look at the notion of knowledge resistance, before moving on to discuss issues such as misinformation and fake news, psychological mechanisms such as motivated reasoning in processes of selective exposure and attention, how people respond to evidence and fact-checking, the role of political partisanship, political polarization over factual beliefs, and how knowledge resistance might be counteracted This book will have a broad appeal to scholars and students interested in knowledge resistance, primarily within philosophy, psychology, media and communication, and political science, as well as journalists and policymakers
Covering both the fundamentals and the in-depth topics related to Verilog digital design, both students and experts can benefit from reading this book by gaining a comprehensive understanding of how modern electronic products are designed and implemented. Principles of Verilog Digital Design contains many hands-on examples accompanied by RTL codes that together can bring a beginner into the digital design realm without needing too much background in the subject area. This book has a particular focus on how to transform design concepts into physical implementations using architecture and timing diagrams. Common mistakes a beginner or even an experienced engineer can make are summarized and addressed as well. Beyond the legal details of Verilog codes, the book additionally presents what uses Verilog codes have through some pertinent design principles. Moreover, students reading this book will gain knowledge about system-level design concepts. Several ASIC designs are illustrated in detail as well. In addition to design principles and skills, modern design methodology and how it is carried out in practice today are explored in depth as well.
Working with the Web Audio API is the definitive and instructive guide to understanding and using the Web Audio API. The Web Audio API provides a powerful and versatile system for controlling audio on the Web. It allows developers to generate sounds, select sources, add effects, create visualizations and render audio scenes in an immersive environment. This book covers all essential features, with easy to implement code examples for every aspect. All the theory behind it is explained, so that one can understand the design choices as well as the core audio processing concepts. Advanced concepts are also covered, so that the reader will gain the skills to build complex audio applications running in the browser. Aimed at a wide audience of potential students, researchers and coders, this is a comprehensive guide to the functionality of this industry-standard tool for creating audio applications for the web.
Full coverage of functional programming and all OCA Java Programmer exam objectives OCA, Oracle Certified Associate Java SE 8 Programmer I Study Guide, Exam 1Z0-808 is a comprehensive study guide for those taking the Oracle Certified Associate Java SE 8 Programmer I exam (1Z0-808). With complete coverage of 100% of the exam objectives, this book provides everything you need to know to confidently take the exam. The release of Java 8 brought the language's biggest changes to date, and for the first time, candidates are required to learn functional programming to pass the exam. This study guide has you covered, with thorough functional programming explanation and information on all key topic areas Java programmers need to know. You'll cover Java inside and out, and learn how to apply it efficiently and effectively to create solutions applicable to real-world scenarios. * Work confidently with operators, conditionals, and loops * Understand object-oriented design principles and patterns * Master functional programming fundamentals
Machine learning has become an integral part of many commercial applications and research projects, but this field is not exclusive to large companies with extensive research teams. If you use Python, even as a beginner, this book will teach you practical ways to build your own machine learning solutions. With all the data available today, machine learning applications are limited only by your imagination. You'll learn the steps necessary to create a successful machine-learning application with Python and the scikit-learn library. Authors Andreas Muller and Sarah Guido focus on the practical aspects of using machine learning algorithms, rather than the math behind them. Familiarity with the NumPy and matplotlib libraries will help you get even more from this book. With this book, you'll learn: Fundamental concepts and applications of machine learning Advantages and shortcomings of widely used machine learning algorithms How to represent data processed by machine learning, including which data aspects to focus on Advanced methods for model evaluation and parameter tuning The concept of pipelines for chaining models and encapsulating your workflow Methods for working with text data, including text-specific processing techniques Suggestions for improving your machine learning and data science skills
The book provides a broad outlook on the applications of cyber-physical systems along with case studies and examples in healthcare, automotive electronics, industrial automation, environment monitoring, agriculture, and applications in civil and mechanical sectors. Topics include using an energy management system in smart grids, implementing an intelligent traffic management system, warehouse tracking and monitoring, medical cyber-physical systems security, remote healthcare monitoring, and more.
Explores the use of IoT in the field of biomedical engineering Discusses current issues associated with biomedical engineering while including the fundamentals such as collaboration on usage of sensors, bio-interfaces, e-medicine, remote healthcare, etc. Throws light on IoT for healthcare monitoring as well as for remote healthcare, data communication, monitoring, and diagnosis.
We are so used to living in a media-saturated world that we do not notice just how much damage is being done to us daily by the images we see and the articles and posts we read. If you are often anxious or find it hard to sleep, or you regularly want to give up on your fellow human beings, the reason may come down to the relentless influence of the modern media. How Modern Media Destroys Our Minds is a guide for navigating the media today. The book encourages the reader to consider the many peculiarities of the modern media: its excessive focus on scandal, its emphasis on novelty, its capacity to breed envy and self-hatred, its high-minded defence of itself, its ever shorter attention span and its obsession with fame. The book teaches us how to liberate ourselves from the media, in order to achieve calm and a more generous, original and imaginative state of mind. We are shown how to redress the balance and emerge with a stronger, more positive outlook on life.
A one-stop reference for the latest JavaScript features and techniques JavaScript: The New Toys explores the newest features of the world's most popular programming language while also showing you how to track what's coming and get involved. Author T.J. Crowder, the top JavaScript contributor on Stack Overflow, walks you through the significant changes and additions to the language along with key tools and techniques to help you get up to date with modern JavaScript. Beginning with a high-level overview of new features, you'll learn what's new, how new features come about, who's responsible, how to stay on top of what's coming next, and how to use new features even in old browsers. The bulk of the coverage consists of point-by-point "just the facts" explanations of each new feature, plus expert recommendations for tweaking old habits to integrate new techniques. Each feature is introduced with the problem it solves and the details of how it works including brief source code demonstrating syntax and behavior. With comprehensive coverage of the new features and techniques, this book provides an invaluable resource for web programmers everywhere. Modern JavaScript is a fast-changing language, both in terms of what's officially specified and what browsers support at any given time. This book addresses all of the new and updated features of ES2015 and ES2016 plus the finalized features of ES2017 so far. * Discover the unexpected advantages of the new let and const declarations * Learn how classes solve common problems, and get details on syntax * Delve into the use and mechanics of arrow functions and lexical this * Adopt new best practices for using Promises, and avoid common pitfalls All major browsers support JavaScript, but support for individual functions and releases is all over the map. JavaScript: The New Toys shows you what's new, how to use it, but how to keep incomplete browser support from holding you back. |
You may like...
|