0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (5)
  • R100 - R250 (638)
  • R250 - R500 (2,095)
  • R500+ (12,286)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet

Web Application Design Handbook - Best Practices for Web-Based Software (Paperback): Susan Fowler, Victor Stanwick Web Application Design Handbook - Best Practices for Web-Based Software (Paperback)
Susan Fowler, Victor Stanwick
R1,541 Discovery Miles 15 410 Ships in 10 - 15 working days

The standards for usability and interaction design for Web sites and software are well known. While not everyone uses those standards, or uses them correctly, there is a large body of knowledge, best practice, and proven results in those fields, and a good education system for teaching professionals "how to." For the newer field of Web application design, however, designers are forced to reuse the old rules on a new platform. This book provides a roadmap that will allow readers to put complete working applications on the Web, display the results of a process that is running elsewhere, and update a database on a remote server using an Internet rather than a network connection.
Web Application Design Handbook describes the essential widgets and development tools that will the lead to the right design solutions for your Web application. Written by designers who have made significant contributions to Web-based application design, it delivers a thorough treatment of the subject for many different kinds of applications, and provides quick reference for designers looking for some fast design solutions and opportunities to enhance the Web application experience. This book adds flavor to the standard Web design genre by juxtaposing Web design with programming for the Web and covers design solutions and concepts, such as intelligent generalization, to help software teams successfully switch from one interface to another.
* The first interaction design book that focuses exclusively on Web applications.
* Full-color figures throughout the book.
* Serves as a "cheat sheet" or "fake book" for designers: a handy reference for standards, rules of thumb, and tricks of the trade.
* Applicable to new Web-based applications and for porting existing desktop applications to Web browsers.

Visualizing Information Using SVG and X3D - XML-based Technologies for the XML-based Web (Hardcover, 2005 ed.): Vladimir... Visualizing Information Using SVG and X3D - XML-based Technologies for the XML-based Web (Hardcover, 2005 ed.)
Vladimir Geroimenko, Chaomei Chen
R4,056 Discovery Miles 40 560 Ships in 18 - 22 working days

Correcting the Great Mistake People often mistake one thing for another. That's human nature. However, one would expect the leaders in a particular ?eld of endeavour to have superior ab- ities to discriminate among the developments within that ?eld. That is why it is so perplexing that the technology elite - supposedly savvy folk such as software developers, marketers and businessmen - have continually mistaken Web-based graphics for something it is not. The ?rst great graphics technology for the Web, VRML, has been mistaken for something else since its inception. Viewed variously as a game system, a format for architectural walkthroughs, a platform for multi-user chat and an augmentation of reality, VRML may qualify as the least understood invention in the history of inf- mation technology. Perhaps it is so because when VRML was originally introduced it was touted as a tool for putting the shopping malls of the world online, at once prosaic and horrifyingly mundane to those of us who were developing it. Perhaps those ?rst two initials,"VR,"created expectations of sprawling, photorealistic f- tasy landscapes for exploration and play across the Web. Or perhaps the magnitude of the invention was simply too great to be understood at the time by the many, ironically even by those spending the money to underwrite its development. Regardless of the reasons, VRML suffered in the mainstream as it was twisted to meet unintended ends and stretched far beyond its limitations.

Privacy and Identity Management for Life - 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School,... Privacy and Identity Management for Life - 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers (Hardcover, Edition.)
Simone Fischer-Hubner, Penny Duquenoy, Marit Hansen, Ronald Leenes, Ge Zhang
R1,455 Discovery Miles 14 550 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post conference proceedings of the 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, held in Helsingborg, Sweden, in August 2010. The 27 revised papers were carefully selected from numerous submissions during two rounds of reviewing. They are organized in topical sections on terminology, privacy metrics, ethical, social, and legal aspects, data protection and identity management, eID cards and eID interoperability, emerging technologies, privacy for eGovernment and AAL applications, social networks and privacy, privacy policies, and usable privacy.

Hybrid Intelligence for Social Networks (Hardcover, 1st ed. 2017): Hema Banati, Siddhartha Bhattacharyya, Ashish Mani, Mario... Hybrid Intelligence for Social Networks (Hardcover, 1st ed. 2017)
Hema Banati, Siddhartha Bhattacharyya, Ashish Mani, Mario Koeppen
R3,449 Discovery Miles 34 490 Ships in 10 - 15 working days

This book explains aspects of social networks, varying from development and application of new artificial intelligence and computational intelligence techniques for social networks to understanding the impact of social networks. Chapters 1 and 2 deal with the basic strategies towards social networks such as mining text from such networks and applying social network metrics using a hybrid approach; Chaps. 3 to 8 focus on the prime research areas in social networks: community detection, influence maximization and opinion mining. Chapter 9 to 13 concentrate on studying the impact and use of social networks in society, primarily in education, commerce, and crowd sourcing. The contributions provide a multidimensional approach, and the book will serve graduate students and researchers as a reference in computer science, electronics engineering, communications, and information technology.

E-Commerce Security and Privacy (Hardcover, 2001 ed.): Anup K. Ghosh E-Commerce Security and Privacy (Hardcover, 2001 ed.)
Anup K. Ghosh
R2,752 Discovery Miles 27 520 Ships in 18 - 22 working days

While e-commerce has experienced meteoric growth recently, security risks have similarly grown in scope and magnitude. Three major factors have driven the security risks in e-commerce: the growing reliance on the electronic medium for a company's core business, the growing complexity of the software systems needed to support e-commerce, and the value of the digital assets brought online to an inherently insecure medium - the Internet. While security has long been a primary concern in e-commerce, more recently privacy has also grown in importance to consumers. Many of the same Internet technologies that make e-commerce possible also make it possible to create detailed profiles of an individual's purchases, to spy on individual Web usage habits, and even to peer into confidential files that reside on an individual's machine. E-Commerce Security and Privacy is the first volume to pull together leading researchers and practitioners in diverse areas of computer science and software engineering to explore their technical innovations to problems in security and privacy in e-commerce. The information is drawn from selected papers presented at the first Workshop on Security and Privacy in E-Commerce (WSPEC'00) held in Athens, Greece, November 4, 2000. As such, E-Commerce Security and Privacy introduces both practitioners and researchers to innovations in secure and private e-commerce. Practitioners will gain great insight from the case studies, and researchers will learn about state-of-the-art protocols in secure and private e-commerce that will serve as the basis for future innovations in applied e-commerce technologies. E-Commerce Security and Privacy is suitable as a secondary text for agraduate level course, and as a reference for researchers and practitioners in industry.

Developing an Online Curriculum - Techniques and Technologies (Hardcover, New): Lynette R. Porter Developing an Online Curriculum - Techniques and Technologies (Hardcover, New)
Lynette R. Porter
R2,018 Discovery Miles 20 180 Ships in 18 - 22 working days

Developing an Online Educational Curriculum: Techniques and Technologies acts as a guidebook for teachers and administrators as they look for support with their online education programs. It offers teaching suggestions for everything from course development to time management and community building. The book is designed to provide information to help teachers work more effectively with online tools, develop course materials for existing online courses, work with the internet as a medium of education and complete daily activities - such as evaluating assignments, lecturing and communicating with students more easily. Administrators are also given support in their efforts to recruit, train, and retain online teachers, allocate resources for online education and evaluate online materials for promotion and tenure.

The DSSSL Book - An XML/SGML Programming Language (Hardcover, 2004 ed.): Javier Farreres The DSSSL Book - An XML/SGML Programming Language (Hardcover, 2004 ed.)
Javier Farreres
R4,197 Discovery Miles 41 970 Ships in 18 - 22 working days

DSSSL (Document Style Semantics and Specification Language) is an ISO standard (ISO/IEC 10179: 1996) published in the year 1996. DSSSL is a standard of the SGML family (Standard Generalized Markup Language, ISO 8879:1986), whose aim is to establish a processing model for SGML documents. For a good understanding of the SGML standard, many books exist including Author's guide[BryanI988] and The SGML handbook[GoldfarbI990]. A DSSSL document is an SGML document, written with the same rules that guide any SGML document. The structure of a DSSSL document is explained in Chapter 2. DSSSL is based, in part, on scheme, a standard functional programming language. The DSSSL subset of scheme along with the procedures supported by DSSSL are explained in Chapter 3. The DSSSL standard starts with the supposition of a pre-existing SGML document, and offers a series of processes that can be performed on it: * Groves The first process that is performed on an SGML document in DSSSL is always the analysis of the document and the creation of a grove. The DSSSL standard shares many common characteristics with another standard of the SGML family, HyTime (ISO/IEC 10744). These standards were developed in parallel, and their developers designed a common data model, the grove, that would support the processing needs of each standard.

The Definitive Guide to Stellent Content Server Development (Hardcover, 1st ed.): Brian Huff The Definitive Guide to Stellent Content Server Development (Hardcover, 1st ed.)
Brian Huff
R1,520 Discovery Miles 15 200 Ships in 18 - 22 working days

The Stellent Content Server has a flexible and highly extensible service-oriented architecture. It is relatively easy to develop custom applications with it, or make modifications to the existing interface. However, there has never been a good manual on how to make such applications.

Thata (TM)s where this book comes in: to help administrators and web developers create custom applications with the Content Server. It contains step-by-step instructions on how to create many different types of applications, including simple business forms, new web interfaces for existing services, new skins, and new functionality with custom Java code.

It also contains detailed reference material for the inner workings of the Content Server.

Youa (TM)ll need this vital resource when creating custom Stellent applications, and youa (TM)ll find this information only in this complete guide to Stellent Content Server.

Securing Web Services - Practical Usage of Standards and Specifications (Hardcover): Panos Periorellis Securing Web Services - Practical Usage of Standards and Specifications (Hardcover)
Panos Periorellis
R4,610 Discovery Miles 46 100 Ships in 18 - 22 working days

'Securing Web Services' investigates the security-related specifications that encompass message level security, transactions, and identity management.

Using Internet Primary Sources to Teach Critical Thinking Skills in History (Hardcover, Annotated edition): Kathleen W Craver Using Internet Primary Sources to Teach Critical Thinking Skills in History (Hardcover, Annotated edition)
Kathleen W Craver
R1,794 Discovery Miles 17 940 Ships in 18 - 22 working days

History teachers and school library media specialists will find this guide a valuable resource for creating technologically advanced, resource-based instructional units in American and World History in grades 7-12. It is filled with 150 recommended primary source Internet sites about history ranging from ancient civilizations to 1998 and is stocked with exciting, interesting, and challenging questions designed to stimulate students' critical thinking skills. Dr. Craver, who maintains an award-winning interactive Internet database and conducts technology workshops for school library media specialists, provides an indispensable tool to enable students to make the best use of the Internet for the study of history. Each site is accompanied by a summary that describes its contents and usefulness to history teachers and school library media specialists. The questions that follow are designed specifically to stimulate critical thinking skills. Critical thinking skills are deemed essential for students if they are to succeed academically and economically in the twenty-first century. An annotated appendix of selected primary source databases includes the Internet addresses for 60 additional primary source sites.

Semantic Web: Concepts, Technologies and Applications (Hardcover, 2007 ed.): Karin Breitman, Marco Antonio Casanova, Walt... Semantic Web: Concepts, Technologies and Applications (Hardcover, 2007 ed.)
Karin Breitman, Marco Antonio Casanova, Walt Truszkowski
R1,592 Discovery Miles 15 920 Ships in 18 - 22 working days

The Web is growing at an astounding pace surpassing the 8 billion page mark. However, most pages are still designed for human consumption and cannot be processed by machines. This book provides a well-paced introduction to the Semantic Web. It covers a wide range of topics, from new trends (ontologies, rules) to existing technologies (Web Services and software agents) to more formal aspects (logic and inference). It includes: real-world (and complete) examples of the application of Semantic Web concepts; how the technology presented and discussed throughout the book can be extended to other application areas.

The Social Semantic Web (Hardcover, 2010 ed.): John G. Breslin, Alexandre Passant, Stefan Decker The Social Semantic Web (Hardcover, 2010 ed.)
John G. Breslin, Alexandre Passant, Stefan Decker
R1,572 Discovery Miles 15 720 Ships in 18 - 22 working days

The Social Web (including services such as MySpace, Flickr, last.fm, and WordPress) has captured the attention of millions of users as well as billions of dollars in investment and acquisition. Social websites, evolving around the connections between people and their objects of interest, are encountering boundaries in the areas of information integration, dissemination, reuse, portability, searchability, automation and demanding tasks like querying. The Semantic Web is an ideal platform for interlinking and performing operations on diverse person- and object-related data available from the Social Web, and has produced a variety of approaches to overcome the boundaries being experienced in Social Web application areas.

After a short overview of both the Social Web and the Semantic Web, Breslin et al. describe some popular social media and social networking applications, list their strengths and limitations, and describe some applications of Semantic Web technology to address their current shortcomings by enhancing them with semantics. Across these social websites, they demonstrate a twofold approach for interconnecting the islands that are social websites with semantic technologies, and for powering semantic applications with rich community-created content. They conclude with observations on how the application of Semantic Web technologies to the Social Web is leading towards the "Social Semantic Web" (sometimes also called "Web 3.0"), forming a network of interlinked and semantically-rich content and knowledge.

The book is intended for computer science professionals, researchers, and graduates interested in understanding the technologies and research issues involved in applying Semantic Web technologies to social software. Practitioners and developers interested in applications such as blogs, social networks or wikis will also learn about methods for increasing the levels of automation in these forms of Web communication.

Designing Embedded Internet Devices (Paperback): Brian DeMuth, Dan Eisenreich Designing Embedded Internet Devices (Paperback)
Brian DeMuth, Dan Eisenreich
R1,530 Discovery Miles 15 300 Ships in 10 - 15 working days

Adding internet access to embedded systems opens up a whole new world of capabilities. For example, a remote data logging system could automatically send data via the internet and be reconfigured - such as to log new types of data or to measure at different intervals - by commands sent over the internet from any computer or device with internet access. Embedded internet and internet appliances are the focus of great attention in the computing industry, as they are seen as the future of computing, but the design of such devices presents many technical challenges.;This book describes how to design, build and program embedded systems with internet access, giving special attention to sensors and actuators which gather data for transmission over the internet or execute commands sent by the internet, It shows how to build sensors and control devices that connect to the "tiny internet interface" (TINI) and explains how to write programs that control them in Java. Several design case histories are given, including weather monitoring stations, communications centres, automation systems, and data acquisitions systems. The authors discuss how these technologies work and where to get detailed specifications, and they provide ideas for the reader to pursue beyond the book. The accompanying CD-ROM includes Java source code for all the applications described in the book, and an electronic version of the text.

The Multimedia Internet (Hardcover, 1st ed. 2005. Corr. 2nd printing 2006): Stephen Weinstein The Multimedia Internet (Hardcover, 1st ed. 2005. Corr. 2nd printing 2006)
Stephen Weinstein
R2,866 Discovery Miles 28 660 Ships in 18 - 22 working days

Here is a thorough, not-overly-complex introduction to the three technical foundations for multimedia applications across the Internet: communications (principles, technologies and networking); compressive encoding of digital media; and Internet protocol and services. All the contributing systems elements are explained through descriptive text and numerous illustrative figures; the result is a book well-suited toward non-specialists, preferably with technical background, who need well-composed tutorial introductions to the three foundation areas. The text discusses the latest advances in digital audio and video encoding, optical and wireless communications technologies, high-speed access networks, and IP-based media streaming, all crucial enablers of the multimedia Internet.

Regulating Cyberspace - The Policies and Technologies of Control (Hardcover): Richard A Spinello Regulating Cyberspace - The Policies and Technologies of Control (Hardcover)
Richard A Spinello
R2,540 Discovery Miles 25 400 Ships in 10 - 15 working days

This visionary book presents an interdisciplinary and cogent approach to the issue of Internet governance and control. By examining five critical areas in which the tension between freedom and control is most palpable--fair competition and open access, free expression, intellectual property, privacy rights, and security--Spinello guides the reader on a tour of the emerging body of law and public policy that has attempted to control the anarchy of cyberspace. In so doing, he defends the credo of Internet self-regulation, asserting that the same powerful and flexible architectures that created the Internet as we know it today can be relied upon to aid the private sector in arriving at a workable, decentralized regulatory regime. Except in certain circumstances that require government involvement, self-regulation is not only viable but is a highly preferred alternative to the forced uniformity that centralized structures tend to impose.

Beginning with an exploration of the Internet's most important values, including universality, free expression, and open access, as well as its promise as a democratizing force, Spinello considers how we can most effectively preserve those values and fulfill that promise while curtailing the social harms that vex Internet users. How do we arrive at the right mixture of technology and policy so that the Internet does not lose its promise as a liberating technology? In examining this question, Spinello evaluates such architectures of control as filters and rights management protocols, which attempt to keep out unwanted information and protect intellectual property, respectively. He explores how these and other technologies can be designed and used responsibly so that online social order can be sustained with a minimal amount of government intervention.

Web-Scale Data Management for the Cloud (Hardcover, 2013 ed.): Wolfgang Lehner, Kai-Uwe Sattler Web-Scale Data Management for the Cloud (Hardcover, 2013 ed.)
Wolfgang Lehner, Kai-Uwe Sattler
R3,307 Discovery Miles 33 070 Ships in 10 - 15 working days

The efficient management of a consistent and integrated database is a central task in modern IT and highly relevant for science and industry. Hardly any critical enterprise solution comes without any functionality for managing data in its different forms. Web-Scale Data Management for the Cloud addresses fundamental challenges posed by the need and desire to provide database functionality in the context of the Database as a Service (DBaaS) paradigm for database outsourcing. This book also discusses the motivation of the new paradigm of cloud computing, and its impact to data outsourcing and service-oriented computing in data-intensive applications. Techniques with respect to the support in the current cloud environments, major challenges, and future trends are covered in the last section of this book. A survey addressing the techniques and special requirements for building database services are provided in this book as well.

C# For Java Programmers (Paperback): Harold Cabrera C# For Java Programmers (Paperback)
Harold Cabrera
R790 Discovery Miles 7 900 Ships in 10 - 15 working days

Java Programmers, Preprare for Microsoft's .NET initiative while enhancing your repertoire and marketability with C# for Java Progammers
C# for Java Programmers will prepare readers for the .NET framework by building on what they already know about object-oriented languages and give them the means to maintain their flexibility and effectiveness in an un-certain marketplace. This book will compare and contrast the advantages and disadvantages of both Java and C# to allow programmers to make their own decisions regarding what each language is best used for.
Whatever your feelings are about Microsoft and its .NET initiative, there can be no denying that C# is here to stay. The C# language, a close cousin to Java, is a new object-oriented programming language (OOPL) designed to work within the .NET framework. It improves upon many of the vague or ill-defined areas of C++ that frequently lead programmers into trouble. C# is a strongly-typed, object-oriented language designed to give the optimum blend of simplicity, expressiveness, and performance.
Written specifically for Java programmers. C# for Java Programmers is not an introductory guide to C#, but builds on what Java programmers already know about object-oriented languages to give them an efficient means for making in-roads to the .NET framework.
Compare and Contrast. This book will compare and contrast many of the advantages and drawbacks of Java and C# to allow programmers to make informed, intelligent decisions based on the unique uses of each language.
Make your own in-depth analysis of C# and Java with the Syngress Wallet CD. Accompanying each book will be a wallet CD containing the HTML version of the text and in-depth code comparison to allow programmers to see for themselves the various differences between Java and C#.

Optimal Mobile Sensing and Actuation Policies in Cyber-physical Systems (Hardcover, 2012): Christophe Tricaud, Yangquan Chen Optimal Mobile Sensing and Actuation Policies in Cyber-physical Systems (Hardcover, 2012)
Christophe Tricaud, Yangquan Chen
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

A successful cyber-physical system, a complex interweaving of hardware and software with some part of the physical environment, depends on proper identification of the, often pre-existing, physical element. A bespoke "cyber" part of the system may then be designed from scratch. Optimal Mobile Sensing and Actuation Strategies in Cyber-physical Systems focuses on distributed-parameter systems the dynamics of which can be modelled with partial differential equations. These are very challenging to observe, their states and inputs being distributed throughout a spatial domain. Consequently, systematic approaches to the optimization of sensor location have to be devised for parameter estimation. The text begins by reviewing the field of cyber-physical systems and introducing background notions of distributed parameter systems and optimal observation theory. New research problems are then defined within this framework. Two important problems considered are optimal mobile sensor trajectory planning and the accuracy effects and allocation of remote sensors. These are followed up with a solution to the problem of optimal robust estimation. Actuation policies are then introduced into the framework with the purpose of improving estimation and optimizing the trajectories of both sensors and actuators simultaneously. The large number of illustrations within the text will assist the reader to visualize the application of the methods proposed. A group of similar examples are used throughout the book to help the reader assimilate the material more easily. The monograph concentrates on the use of methods for which a cyber-physical-systems infrastructure is required. The methods are computationally heavy and require mobile sensors and actuators with communications abilities. Application examples cover fields from environmental science to national security so that readers are encouraged to link the ideas of cyber-physical systems with their own research.

Managed Grids and Cloud Systems in the Asia-Pacific Research Community (Hardcover, 2010 ed.): Simon C. Lin, Eric Yen Managed Grids and Cloud Systems in the Asia-Pacific Research Community (Hardcover, 2010 ed.)
Simon C. Lin, Eric Yen
R5,340 Discovery Miles 53 400 Ships in 18 - 22 working days

ISGC 2009, The International Symposium on Grid Computing was held at Academia Sinica, Taipei, Taiwan in April 2009 bringing together prestigious scientists and engineers worldwide to exchange ideas, present challenges/solutions and introduce future development in the field of Grid Computing. Managed Grids and Cloud Systems in the Asia-Pacific Research Community presents the latest achievements in grid technology including Cloud Computing. This volume also covers international projects in Grid Operation, Grid Middleware, E-Science applications, technical developments in grid operations and management, Security and Networking, Digital Library and more. The resources used to support these advances, such as volunteer grids, production managed grids, and cloud systems are discussed in detail. This book is designed for a professional audience composed of grid users, developers and researchers working in the grid computing. Advanced-level students focusing on computer science and engineering will find this book valuable as a reference or secondary text book.

Spatial Data on the Web - Modeling and Management (Hardcover, 2007 ed.): Alberto Belussi, Barbara Catania, Eliseo Clementini,... Spatial Data on the Web - Modeling and Management (Hardcover, 2007 ed.)
Alberto Belussi, Barbara Catania, Eliseo Clementini, Elena Ferrari
R4,048 Discovery Miles 40 480 Ships in 18 - 22 working days

This book focuses on the modeling and management of spatial data in distributed systems. The authors have structured the contributions from internationally renowned researchers into four parts. The book offers researchers an excellent overview of the state-of-the-art in modeling and management of spatial data in distributed environments, while it may also be the basis of specialized courses on Web-based geographical information systems.

The JR Programming Language - Concurrent Programming in an Extended Java (Hardcover, 2004 ed.): Ronald A Olsson, Aaron W. Keen The JR Programming Language - Concurrent Programming in an Extended Java (Hardcover, 2004 ed.)
Ronald A Olsson, Aaron W. Keen
R1,617 Discovery Miles 16 170 Ships in 18 - 22 working days

JR is an extension of the Java programming language with additional concurrency mechanisms based on those in the SR (Synchronizing Resources) programming language. The JR implementation executes on UNIX-based systems (Linux, Mac OS X, and Solaris) and Windows-based systems. It is available free from the JR webpage. This book describes the JR programming language and illustrates how it can be used to write concurrent programs for a variety of applications. This text presents numerous small and large example programs. The source code for all programming examples and the given parts of all programming exercises are available on the JR webpage. Dr. Ronald A. Olsson and Dr. Aaron W. Keen, the authors of this text, are the designers and implementors of JR.

Law on the Web - A Guide for Students and Practitioners (Paperback): Stuart Stein Law on the Web - A Guide for Students and Practitioners (Paperback)
Stuart Stein
R1,564 Discovery Miles 15 640 Ships in 10 - 15 working days

Law on the Web is ideal for anyone who wants to access Law Internet resources quickly and efficiently without becoming an IT expert. The emphasis throughout is on the location of high quality law Internet resources for learning, teaching and research, from among the billions of publicly accessible Web pages. The book is structured so that it will be found useful by both beginners and intermediate level users, and be of continuing use over the course of higher education studies. In addition to extensive coverage on locating files and Web sites, Part III provides a substantial and annotated list of high quality resources for law students.

Economics of Information Security and Privacy (Hardcover, 2010 Ed.): Tyler Moore, David Pym, Christos Ioannidis Economics of Information Security and Privacy (Hardcover, 2010 Ed.)
Tyler Moore, David Pym, Christos Ioannidis
R5,322 Discovery Miles 53 220 Ships in 18 - 22 working days

The Workshop on the Economics of Information Security was established in 2002 to bring together computer scientists and economists to understand and improve the poor state of information security practice. WEIS was borne out of a realization that security often fails for non-technical reasons. Rather, the incentives of both - fender and attacker must be considered. Earlier workshops have answered questions ranging from?nding optimal levels of security investement to understanding why privacy has been eroded. In the process, WEIS has attracted participation from the diverse?elds such as law, management and psychology. WEIS has now established itself as the leading forum for interdisciplinary scholarship on information security. The eigth installment of the conference returned to the United Kingdom, hosted byUniversityCollegeLondononJune24-25,2009.Approximately100researchers, practitioners and government of?cials from across the globe convened in London to hear presentations from authors of 21 peer-reviewed papers, in addition to a panel and keynote lectures from Hal Varian (Google), Bruce Schneier (BT Co- terpane), Martin Sadler (HP Labs), and Robert Coles (Merrill Lynch). Angela Sasse and David Pym chaired the conference, while Christos Ioannidis and Tyler Moore chaired the program committee.

Aws - The Most Complete Guide to Amazon Web Services from Beginners to Advanced (Hardcover): Aiden Phillips Aws - The Most Complete Guide to Amazon Web Services from Beginners to Advanced (Hardcover)
Aiden Phillips
R744 R658 Discovery Miles 6 580 Save R86 (12%) Ships in 18 - 22 working days
Web-based Learning: Men And Machines - Proceedings Of The First International Conference On Web-based Learning In China (Icwl... Web-based Learning: Men And Machines - Proceedings Of The First International Conference On Web-based Learning In China (Icwl 2002) (Paperback)
Jimmy Sun Fat Chan, Ronnie Chu Ting Cheung, Anthony Fong, Weijia Jia, Reggie Kwan
R2,846 Discovery Miles 28 460 Ships in 18 - 22 working days

This book provides an up-to-date study of technical, pedagogical and managerial issues in Web-based learning. The successful application of Web-based learning provides enhancements in workforce performance, helps to lower costs, and encourages innovation for Web-based and distance learning.It presents a selection of 20 refereed papers given at the First International Conference on Web-Based Learning from over 70 submissions by academic researchers and industry developers from 19 different countries. It provides an excellent resource for students, researchers and practitioners involved in Web-based learning.The proceedings have been selected for coverage in:* Index to Scientific & Technical Proceedings (ISTP CDROM version / ISI Proceedings)* Index to Social Sciences & Humanities Proceedings (R) (ISSHP (R) / ISI Proceedings)* Index to Social Sciences & Humanities Proceedings (ISSHP CDROM version / ISI Proceedings)

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Advances in Measurements and…
Sergey Yurish Hardcover R2,460 Discovery Miles 24 600
Spectacular Men - Race, Gender, and…
Sarah E. Chinn Hardcover R2,621 Discovery Miles 26 210
Twin Bases Remembered - A Personal…
Norman Rose Paperback R631 Discovery Miles 6 310
Historical Scientific Instruments in…
Dominique Bernard, Paolo Brenni, … Hardcover R4,598 Discovery Miles 45 980
Race, Nation, Translation - South…
Zoe Wicomb Paperback R450 R415 Discovery Miles 4 150
Measuring Nothing, Repeatedly - Null…
Allan Franklin, Ronald Laymon Paperback R758 Discovery Miles 7 580
The Works of the Rev. Jonathan Swift…
Jonathan Swift Paperback R642 Discovery Miles 6 420
Precarious Power - Compliance And…
Susan Booysen Paperback  (4)
R420 R388 Discovery Miles 3 880
Guilty
Martina Cole, Jacqui Rose Paperback R549 R506 Discovery Miles 5 060
Gender, Care and Migration in East Asia
Reiko Ogawa, Raymond K.H. Chan, … Hardcover R2,879 Discovery Miles 28 790

 

Partners