![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet
'We need more warriors like Carrie' TARANA BURKE, founder of the MeToo movement 'In the age of doxxing, revenge porn, and misogynist trolls, this book is required reading' ESQUIRE Nobody's Victim is an unflinching look at a hidden world most people don't know exists-one of stalking, blackmail, and sexual violence, online and off-and the incredible story of how one lawyer, determined to fight back, turned her own hell into a revolution. Nobody's Victim invites readers to join Carrie Goldberg on the front lines of the war against sexual violence and privacy violations as her law firm sues the hell out of tech companies, schools, and sexual predators. Her battleground is the courtroom; her crusade is to transform clients from victims into warriors. In gripping detail, Carrie shares the diabolical ways her clients are attacked and how she, through her unique combination of relentless advocacy, badass risk-taking, and unique client-empowerment, pursues justice for them all. There is the ex-boyfriend who made fake bomb threats in a client's name, causing a national panic; the girl who was sexually assaulted on school grounds and then suspended when she reported the attack; and the guy who used a dating app to send more than 1,200 men to his ex's home and office for sex. Carrie also shares her own shattering story about why she began her work and became the lawyer she needed. Riveting and essential, Nobody's Victim is a bold and timely analysis of victim protection in the era of the Internet. This book is an urgent warning of a coming crisis, a predictor of imminent danger, and a weapon to take back control and protect ourselves-both online and off. 'A rallying cry for privacy justice . . . chilling . . . take-no-prisoners and warmly gregarious' New York Times *Perfect for fans of She Said by Jodi Kantor and Megan Twohey, The Whisper Network by Chandler Baker and The Good Fight*
"There is much of value in Jenkins' work. He manages to discuss CP
calmly, while at the same time making clear his personal revulsion,
an achievement in itself in an area characterized by so much
hysteria." "Magnificently readable social science on a widely misunderstood
subject." "A useful introduction to the methods that the kiddie-porn
community uses to hide its activities...a smart history of the
child-porn industry" "This is a troubling book that exposes how child pornography has
found a safe haven on the Internet. Philip Jenkins's innovative
research methods let him explore and map the secret electronic
networks that link individuals whose deviance seems not just
outrageous, but incomprehensible. Jenkins shows how culture and
social structure emerge in a virtual--and decidedly not
virtuous--world. This book raises profound questions about the
nature of deviance in an electronic future." "A disturbing, thought-provoking study" "A detailed yet engaging account . . . . Engrossing" Perhaps nothing evokes more universal disgust as child pornography. The world of its makers and users is so abhorrent that it is rarely discussed much less studied. Child pornographers have taken advantage of this and are successfully using the new electronic media to exchange their wares without detection or significant sanction. What are the implications of this threat for free speech and a free exchange of ideas on the internet? And how can we stop this illegal activity, which is so repugnant that eventhe most laissez-faire cyberlibertarians want it stamped out, if we know nothing about it? Philip Jenkins takes a leap onto the lower tiers of electronic media in this first book on the business of child pornography online. He tells the story of how the advent of the internet caused this deviant subculture to become highly organized and go global. We learn how the trade which operates on clandestine websites from Budapest or Singapore to the U.S. is easy to glimpse yet difficult to eradicate. Jenkins details how the most sophisticated transactions are done through a proxy, a "false flag" address, rendering the host computer, and participants, virtually unidentifiable. And these sites exist for only a few minutes or hours allowing on-line child pornographers to stay one step ahead of the law. This is truly a globalized criminal network which knows no names or boundaries, and thus challenges both international and U.S. law. Beyond Tolerance delves into the myths and realities of child pornography and the complex process to stamp out criminal activity over the web, including the timely debates over trade regulation, users' privacy, and individual rights. This sobering look and a criminal community contains lessons about human behavior and the law that none interested in media and the new technology can afford to ignore.
Violent behavior has become deeply integrated into modern society and it is an unavoidable aspect of human nature. Examining peacemaking strategies through a critical and academic perspective can assist in resolving violence in societies around the world. The Handbook of Research on Examining Global Peacemaking in the Digital Age is a pivotal reference source for the latest research findings on the utilization of peacemaking in media, leadership, and religion. Featuring extensive coverage on relevant areas such as human rights, spirituality, and the Summer of Peace, this publication is an ideal resource for policymakers, universities and colleges, graduate-level students, and organizations seeking current research on the application of conflict resolution and international negotiation.
This book focuses on new methods, architectures, and applications for the management of Cyber Physical Objects (CPOs) in the context of the Internet of Things (IoT). It covers a wide range of topics related to CPOs, such as resource management, hardware platforms, communication and control, and control and estimation over networks. It also discusses decentralized, distributed, and cooperative optimization as well as effective discovery, management, and querying of CPOs. Other chapters outline the applications of control, real-time aspects, and software for CPOs and introduce readers to agent-oriented CPOs, communication support for CPOs, real-world deployment of CPOs, and CPOs in Complex Systems. There is a focus on the importance of application of IoT technologies for Smart Cities.
Today every business is an e-business, and whether you are selling golf outings over the Internet or manufacturing the carts, there is no escaping the fact that every aspect of organizational design is profoundly affected by the new rules of the electronic economy. What many people and organizations overlook, however, is the degree to which these new rules are requiring a fundamentally different style of leadership. In E-Leader , Robert Hargrove identifies the new mindset and skills that leaders must develop in order to thrive in a world where wealth is built on relationships and experiences, not products or even technology. The old model of leader as "steward," protecting the company's brands and assets, is being replaced by a model of leader as "entrepreneur," searching constantly for new sources of wealth creation establishing creative ventures with suppliers, distributors, and even competitors and discovering new ways to attract, retain, and nurture talent- all at the speed of light. E-Leader captures the energy of the mavericks who are redefining leadership on the electronic frontier and shows managers in all types of organizations how to manage for the future, not for the past or even the present.
Game design is a sibling discipline to software and Web design, but they're siblings that grew up in different houses. They have much more in common than their perceived distinction typically suggests, and user experience practitioners can realize enormous benefit by exploiting the solutions that games have found to the real problems of design. This book will show you how.
Scholars and students are searching for information on what a Web portfolio is, what it is not, what to put into a Web portfolio, and what technical skills are needed to succeed in the process. ""Web Portfolio Design and Applications"" provides a combination of theory, pedagogy, and practice to help enable faculty and students across disciplines to explore creating a Web portfolio. This book provides research conclusions, case studies, and hands-on technical processes, which allow people of all levels to develop a personal approach to creating a Web portfolio. ""Web Portfolio Design and Applications"" is designed for anyone who has an interest in Web portfolios and electronic portfolios.
The Personal Internet Security Guidebook is a complete guide to
protecting your computer(s) on the Internet. The newest attack
point for hackers is home computers on DSL and/or cable modems.
This book will show you how to set up a home network and protect it
from the "bad dudes." Also covered in this book is how to protect
your computer on the road. Many hotels are now offering high-speed
Internet access and this book will show you how to keep your
computer safe in the hotel room as well as on the hotel network.
The ubiquity of modern technologies has allowed for increased connectivity between people and devices across the globe. This connected infrastructure of networks creates numerous opportunities for applications and uses. The Internet of Things: Breakthroughs in Research and Practice is an authoritative reference source for the latest academic material on the interconnectivity of networks and devices in the digital era and examines best practices for integrating this advanced connectivity across multiple fields. Featuring extensive coverage on innovative perspectives, such as secure computing, regulatory standards, and trust management, this book is ideally designed for engineers, researchers, professionals, graduate students, and practitioners seeking scholarly insights on the Internet of Things.
This book discusses global mobile satellite communications (GMSC) for maritime, land (road and rail), and aeronautical applications. It covers how these enable connections between moving objects such as ships, road and rail vehicles and aircrafts on one hand, and ground telecommunications subscribers through the medium of communications satellites, ground earth stations, Terrestrial Telecommunication Networks (TTN), Internet Service Providers (ISP) and other wireless and landline telecommunications providers. The new edition covers new developments and initiatives that have resulted in land and aeronautical applications and the introduction of new satellite constellations in non-geostationary orbits and projects of new hybrid satellite constellations. The book presents current GMSC trends, mobile system concepts and network architecture using a simple mode of style with understandable technical information, characteristics, graphics, illustrations and mathematics equations. It represents telecommunications technique and technology, which can be useful for all technical staff on vessels at sea and rivers, on all types of land vehicles, on planes, on off shore constructions and for everyone possessing satellite communications handset phones. The first edition of Global Mobile Satellite Communications (Springer, 2005) was split into two books for the second edition - one on applications and one on theory. This book presents global mobile satellite communications applications.
This collection of essays addresses whether all nations will actively participate in building the information superhighway or whether the Internet will reflect global technological inequalities. The writings are grouped in four major sections, which examine theoretical issues on cyberglobalization, politics in the electronic global village, global economic issues in cyberspace, and national identities and grassroots movements in cyberspace. Contributing scholars represent a wide spectrum of disciplines from political science, economics, and communications to sociology, anthropology, and philosophy. A number of methodological and theoretical perspectives direct the writings. Collectively, the essays point toward an emerging technology that exhibits innate qualities characteristic of the classic notion of cultural imperialism. This edited collection, with its timely approach to the implications of the Internet for global relations, will appeal to communication, sociology, and political science scholars. The interdisciplinary approach will also attract students and educators from such fields as anthropology, philosophy and economics. To aid in further research, select bibliographies follow each essay.
This book contains the combined proceedings of the 4th International Conference on Ubiquitous Computing Application and Wireless Sensor Network (UCAWSN-15) and the 16th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT-15). The combined proceedings present peer-reviewed contributions from academic and industrial researchers in fields including ubiquitous and context-aware computing, context-awareness reasoning and representation, location awareness services, and architectures, protocols and algorithms, energy, management and control of wireless sensor networks. The book includes the latest research results, practical developments and applications in parallel/distributed architectures, wireless networks and mobile computing, formal methods and programming languages, network routing and communication algorithms, database applications and data mining, access control and authorization and privacy preserving computation.
This book explores cybersecurity research and development efforts, including ideas that deal with the growing challenge of how computing engineering can merge with neuroscience. The contributing authors, who are renowned leaders in this field, thoroughly examine new technologies that will automate security procedures and perform autonomous functions with decision making capabilities. To maximize reader insight into the range of professions dealing with increased cybersecurity issues, this book presents work performed by government, industry, and academic research institutions working at the frontier of cybersecurity and network sciences. Cybersecurity Systems for Human Cognition Augmentation is designed as a reference for practitioners or government employees working in cybersecurity. Advanced-level students or researchers focused on computer engineering or neuroscience will also find this book a useful resource.
IN LITTLE MORE THAN HALF A DECADE, Facebook has gone from a
dorm-room novelty to a company with 500 million users. It is one of
the fastest growing companies in history, an essential part of the
social life not only of teenagers but hundreds of millions of
adults worldwide. As Facebook spreads around the globe, it creates
surprising effects--even becoming instrumental in political
protests from Colombia to Iran.
The ever-growing influence of the Internet has caused a paradigm shift in relationships between customers and companies. New types of interaction introduced by Web 1.0 have undergone a dramatic change in quantity and quality with the advent of Web 2.0. Web 3.0, better known as the Semantic Web, will also significantly impact how companies understand Customer Relationship Management (CRM). Customer Relationship Management and the Social and Semantic Web: Enabling Cliens Conexus provides an overview of the field of the Semantic Web, social Web, and CRM by uniting various research studies from different subfields. Providing a forum for the exchange of research ideas and practices, this book is a reference convergence point for professionals, managers, and researchers in the CRM field together with IT professionals. It also aims to explore the opportunities and challenges confronting organizations in the light of customers in Web 2.0 by using new technologies, including semantic technologies (Web 3.0).
A paradigm shift is taking place in computer science: one generation ago, we learned to abstract from hardware to software, now we are abstracting from software to serviceware implemented through service-oriented computing. Yet ensuring interoperability in open, heterogeneous, and dynamically changing environments, such as the Internet, remains a major challenge for actual machine-to-machine integration. Usually significant problems in aligning data, processes, and protocols appear as soon as a specific piece of functionality is used within a different application context. The Semantic Web Services (SWS) approach is about describing services with metadata on the basis of domain ontologies as a means to enable their automatic location, execution, combination, and use. Fensel and his coauthors provide a comprehensive overview of SWS in line with actual industrial practice. They introduce the main sociotechnological components that ground the SWS vision (like Web Science, Service Science, and service-oriented architectures) and several approaches that realize it, e.g. the Web Service Modeling Framework, OWL-S, and RESTful services. The real-world relevance is emphasized through a series of case studies from large-scale R&D projects and a business-oriented proposition from the SWS technology provider Seekda. Each chapter of the book is structured according to a predefined template, covering both theoretical and practical aspects, and including walk-through examples and hands-on exercises. Additional learning material is available on the book website www.swsbook.org. With its additional features, the book is ideally suited as the basis for courses or self-study in this field, and it may also serve as a reference for researchers looking for a state-of-the-art overview of formalisms, methods, tools, and applications related to SWS."
Hardware Based Packet Classification for High Speed Internet Routers presents the most recent developments in hardware based packet classification algorithms and architectures. This book describes five methods which reduce the space that classifiers occupy within TCAMs; TCAM Razor, All-Match Redundancy Removal, Bit Weaving, Sequential Decomposition, and Topological Transformations. These methods demonstrate that in most cases a substantial reduction of space is achieved. Case studies and examples are provided throughout this book. About this book: * Presents the only book in the market that exclusively covers hardware based packet classification algorithms and architectures. * Describes five methods which reduce the space that classifiers occupy within TCAMs: TCAM Razor, All-Match Redundancy Removal, Bit Weaving, Sequential Decomposition, and Topological Transformations. * Provides case studies and examples throughout. Hardware Based Packet Classification for High Speed Internet Routers is designed for professionals and researchers who work within the related field of router design. Advanced-level students concentrating on computer science and electrical engineering will also find this book valuable as a text or reference book. |
You may like...
Fractional-order Modeling of Nuclear…
Vishwesh Vyawahare, Paluri S. V. Nataraj
Hardcover
R2,661
Discovery Miles 26 610
Stochastic Processes, Optimization, and…
Houmin Yan, G. George Yin, …
Hardcover
R4,230
Discovery Miles 42 300
Informatics in Control Automation and…
Juan Andrade-Cetto, Jean-Louis Ferrier, …
Hardcover
R4,223
Discovery Miles 42 230
Integrability of Nonlinear Systems
Yvette Kosmann-Schwarzbach, Basil Grammaticos, …
Hardcover
R1,595
Discovery Miles 15 950
Fourier Series in Control Theory
Vilmos Komornik, Paola Loreti
Hardcover
R1,421
Discovery Miles 14 210
|