0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (4)
  • R100 - R250 (654)
  • R250 - R500 (2,119)
  • R500+ (12,303)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet

E-Commerce Security and Privacy (Hardcover, 2001 ed.): Anup K. Ghosh E-Commerce Security and Privacy (Hardcover, 2001 ed.)
Anup K. Ghosh
R2,752 Discovery Miles 27 520 Ships in 18 - 22 working days

While e-commerce has experienced meteoric growth recently, security risks have similarly grown in scope and magnitude. Three major factors have driven the security risks in e-commerce: the growing reliance on the electronic medium for a company's core business, the growing complexity of the software systems needed to support e-commerce, and the value of the digital assets brought online to an inherently insecure medium - the Internet. While security has long been a primary concern in e-commerce, more recently privacy has also grown in importance to consumers. Many of the same Internet technologies that make e-commerce possible also make it possible to create detailed profiles of an individual's purchases, to spy on individual Web usage habits, and even to peer into confidential files that reside on an individual's machine. E-Commerce Security and Privacy is the first volume to pull together leading researchers and practitioners in diverse areas of computer science and software engineering to explore their technical innovations to problems in security and privacy in e-commerce. The information is drawn from selected papers presented at the first Workshop on Security and Privacy in E-Commerce (WSPEC'00) held in Athens, Greece, November 4, 2000. As such, E-Commerce Security and Privacy introduces both practitioners and researchers to innovations in secure and private e-commerce. Practitioners will gain great insight from the case studies, and researchers will learn about state-of-the-art protocols in secure and private e-commerce that will serve as the basis for future innovations in applied e-commerce technologies. E-Commerce Security and Privacy is suitable as a secondary text for agraduate level course, and as a reference for researchers and practitioners in industry.

Developing an Online Curriculum - Techniques and Technologies (Hardcover, New): Lynette R. Porter Developing an Online Curriculum - Techniques and Technologies (Hardcover, New)
Lynette R. Porter
R2,018 Discovery Miles 20 180 Ships in 18 - 22 working days

Developing an Online Educational Curriculum: Techniques and Technologies acts as a guidebook for teachers and administrators as they look for support with their online education programs. It offers teaching suggestions for everything from course development to time management and community building. The book is designed to provide information to help teachers work more effectively with online tools, develop course materials for existing online courses, work with the internet as a medium of education and complete daily activities - such as evaluating assignments, lecturing and communicating with students more easily. Administrators are also given support in their efforts to recruit, train, and retain online teachers, allocate resources for online education and evaluate online materials for promotion and tenure.

The DSSSL Book - An XML/SGML Programming Language (Hardcover, 2004 ed.): Javier Farreres The DSSSL Book - An XML/SGML Programming Language (Hardcover, 2004 ed.)
Javier Farreres
R4,197 Discovery Miles 41 970 Ships in 18 - 22 working days

DSSSL (Document Style Semantics and Specification Language) is an ISO standard (ISO/IEC 10179: 1996) published in the year 1996. DSSSL is a standard of the SGML family (Standard Generalized Markup Language, ISO 8879:1986), whose aim is to establish a processing model for SGML documents. For a good understanding of the SGML standard, many books exist including Author's guide[BryanI988] and The SGML handbook[GoldfarbI990]. A DSSSL document is an SGML document, written with the same rules that guide any SGML document. The structure of a DSSSL document is explained in Chapter 2. DSSSL is based, in part, on scheme, a standard functional programming language. The DSSSL subset of scheme along with the procedures supported by DSSSL are explained in Chapter 3. The DSSSL standard starts with the supposition of a pre-existing SGML document, and offers a series of processes that can be performed on it: * Groves The first process that is performed on an SGML document in DSSSL is always the analysis of the document and the creation of a grove. The DSSSL standard shares many common characteristics with another standard of the SGML family, HyTime (ISO/IEC 10744). These standards were developed in parallel, and their developers designed a common data model, the grove, that would support the processing needs of each standard.

The Definitive Guide to Stellent Content Server Development (Hardcover, 1st ed.): Brian Huff The Definitive Guide to Stellent Content Server Development (Hardcover, 1st ed.)
Brian Huff
R1,520 Discovery Miles 15 200 Ships in 18 - 22 working days

The Stellent Content Server has a flexible and highly extensible service-oriented architecture. It is relatively easy to develop custom applications with it, or make modifications to the existing interface. However, there has never been a good manual on how to make such applications.

Thata (TM)s where this book comes in: to help administrators and web developers create custom applications with the Content Server. It contains step-by-step instructions on how to create many different types of applications, including simple business forms, new web interfaces for existing services, new skins, and new functionality with custom Java code.

It also contains detailed reference material for the inner workings of the Content Server.

Youa (TM)ll need this vital resource when creating custom Stellent applications, and youa (TM)ll find this information only in this complete guide to Stellent Content Server.

HTML5 Canvas and CSS3 Graphics Primer (Mixed media product): Oswald Campesato HTML5 Canvas and CSS3 Graphics Primer (Mixed media product)
Oswald Campesato
R1,030 R883 Discovery Miles 8 830 Save R147 (14%) Ships in 18 - 22 working days

This book covers the features of HTML5 Canvas, CSS3 graphics, and shows how you can extend the power of CSS3 with SVG. The material in this book is accessible to people who have limited knowledge of HTML and JavaScript. Companion DVD with source code and graphics. While the material is accessible to those with limited knowledge of HTML and JavaScript, but more advanced users will benefit from numerous graphics techniques. The book also includes illustrative code samples and illustrations that are useful for Web developers and SVG/Flash/Silverlight developers. You'll see examples that help you learn to do the following in HTML5 Canvas, CSS3, and SVG: render Bezier curves, apply colors and gradients, transform 2D shapes and JPG files, perform animation effects, create 2D/3D bar charts and line graphs, handle mouse events, render HTML5/CSS3/SVG pages in Android, and learn the mechanics of a Tic-tac-toe game. A companion DVD contains all the source code and color graphics from the book.

Securing Web Services - Practical Usage of Standards and Specifications (Hardcover): Panos Periorellis Securing Web Services - Practical Usage of Standards and Specifications (Hardcover)
Panos Periorellis
R4,610 Discovery Miles 46 100 Ships in 18 - 22 working days

'Securing Web Services' investigates the security-related specifications that encompass message level security, transactions, and identity management.

Using Internet Primary Sources to Teach Critical Thinking Skills in History (Hardcover, Annotated edition): Kathleen W Craver Using Internet Primary Sources to Teach Critical Thinking Skills in History (Hardcover, Annotated edition)
Kathleen W Craver
R1,794 Discovery Miles 17 940 Ships in 18 - 22 working days

History teachers and school library media specialists will find this guide a valuable resource for creating technologically advanced, resource-based instructional units in American and World History in grades 7-12. It is filled with 150 recommended primary source Internet sites about history ranging from ancient civilizations to 1998 and is stocked with exciting, interesting, and challenging questions designed to stimulate students' critical thinking skills. Dr. Craver, who maintains an award-winning interactive Internet database and conducts technology workshops for school library media specialists, provides an indispensable tool to enable students to make the best use of the Internet for the study of history. Each site is accompanied by a summary that describes its contents and usefulness to history teachers and school library media specialists. The questions that follow are designed specifically to stimulate critical thinking skills. Critical thinking skills are deemed essential for students if they are to succeed academically and economically in the twenty-first century. An annotated appendix of selected primary source databases includes the Internet addresses for 60 additional primary source sites.

Semantic Web: Concepts, Technologies and Applications (Hardcover, 2007 ed.): Karin Breitman, Marco Antonio Casanova, Walt... Semantic Web: Concepts, Technologies and Applications (Hardcover, 2007 ed.)
Karin Breitman, Marco Antonio Casanova, Walt Truszkowski
R1,592 Discovery Miles 15 920 Ships in 18 - 22 working days

The Web is growing at an astounding pace surpassing the 8 billion page mark. However, most pages are still designed for human consumption and cannot be processed by machines. This book provides a well-paced introduction to the Semantic Web. It covers a wide range of topics, from new trends (ontologies, rules) to existing technologies (Web Services and software agents) to more formal aspects (logic and inference). It includes: real-world (and complete) examples of the application of Semantic Web concepts; how the technology presented and discussed throughout the book can be extended to other application areas.

The Social Semantic Web (Hardcover, 2010 ed.): John G. Breslin, Alexandre Passant, Stefan Decker The Social Semantic Web (Hardcover, 2010 ed.)
John G. Breslin, Alexandre Passant, Stefan Decker
R1,572 Discovery Miles 15 720 Ships in 18 - 22 working days

The Social Web (including services such as MySpace, Flickr, last.fm, and WordPress) has captured the attention of millions of users as well as billions of dollars in investment and acquisition. Social websites, evolving around the connections between people and their objects of interest, are encountering boundaries in the areas of information integration, dissemination, reuse, portability, searchability, automation and demanding tasks like querying. The Semantic Web is an ideal platform for interlinking and performing operations on diverse person- and object-related data available from the Social Web, and has produced a variety of approaches to overcome the boundaries being experienced in Social Web application areas.

After a short overview of both the Social Web and the Semantic Web, Breslin et al. describe some popular social media and social networking applications, list their strengths and limitations, and describe some applications of Semantic Web technology to address their current shortcomings by enhancing them with semantics. Across these social websites, they demonstrate a twofold approach for interconnecting the islands that are social websites with semantic technologies, and for powering semantic applications with rich community-created content. They conclude with observations on how the application of Semantic Web technologies to the Social Web is leading towards the "Social Semantic Web" (sometimes also called "Web 3.0"), forming a network of interlinked and semantically-rich content and knowledge.

The book is intended for computer science professionals, researchers, and graduates interested in understanding the technologies and research issues involved in applying Semantic Web technologies to social software. Practitioners and developers interested in applications such as blogs, social networks or wikis will also learn about methods for increasing the levels of automation in these forms of Web communication.

Designing Embedded Internet Devices (Paperback): Brian DeMuth, Dan Eisenreich Designing Embedded Internet Devices (Paperback)
Brian DeMuth, Dan Eisenreich
R1,530 Discovery Miles 15 300 Ships in 10 - 15 working days

Adding internet access to embedded systems opens up a whole new world of capabilities. For example, a remote data logging system could automatically send data via the internet and be reconfigured - such as to log new types of data or to measure at different intervals - by commands sent over the internet from any computer or device with internet access. Embedded internet and internet appliances are the focus of great attention in the computing industry, as they are seen as the future of computing, but the design of such devices presents many technical challenges.;This book describes how to design, build and program embedded systems with internet access, giving special attention to sensors and actuators which gather data for transmission over the internet or execute commands sent by the internet, It shows how to build sensors and control devices that connect to the "tiny internet interface" (TINI) and explains how to write programs that control them in Java. Several design case histories are given, including weather monitoring stations, communications centres, automation systems, and data acquisitions systems. The authors discuss how these technologies work and where to get detailed specifications, and they provide ideas for the reader to pursue beyond the book. The accompanying CD-ROM includes Java source code for all the applications described in the book, and an electronic version of the text.

Regulating Cyberspace - The Policies and Technologies of Control (Hardcover): Richard A Spinello Regulating Cyberspace - The Policies and Technologies of Control (Hardcover)
Richard A Spinello
R2,806 R2,540 Discovery Miles 25 400 Save R266 (9%) Ships in 10 - 15 working days

This visionary book presents an interdisciplinary and cogent approach to the issue of Internet governance and control. By examining five critical areas in which the tension between freedom and control is most palpable--fair competition and open access, free expression, intellectual property, privacy rights, and security--Spinello guides the reader on a tour of the emerging body of law and public policy that has attempted to control the anarchy of cyberspace. In so doing, he defends the credo of Internet self-regulation, asserting that the same powerful and flexible architectures that created the Internet as we know it today can be relied upon to aid the private sector in arriving at a workable, decentralized regulatory regime. Except in certain circumstances that require government involvement, self-regulation is not only viable but is a highly preferred alternative to the forced uniformity that centralized structures tend to impose.

Beginning with an exploration of the Internet's most important values, including universality, free expression, and open access, as well as its promise as a democratizing force, Spinello considers how we can most effectively preserve those values and fulfill that promise while curtailing the social harms that vex Internet users. How do we arrive at the right mixture of technology and policy so that the Internet does not lose its promise as a liberating technology? In examining this question, Spinello evaluates such architectures of control as filters and rights management protocols, which attempt to keep out unwanted information and protect intellectual property, respectively. He explores how these and other technologies can be designed and used responsibly so that online social order can be sustained with a minimal amount of government intervention.

The Multimedia Internet (Hardcover, 1st ed. 2005. Corr. 2nd printing 2006): Stephen Weinstein The Multimedia Internet (Hardcover, 1st ed. 2005. Corr. 2nd printing 2006)
Stephen Weinstein
R2,866 Discovery Miles 28 660 Ships in 18 - 22 working days

Here is a thorough, not-overly-complex introduction to the three technical foundations for multimedia applications across the Internet: communications (principles, technologies and networking); compressive encoding of digital media; and Internet protocol and services. All the contributing systems elements are explained through descriptive text and numerous illustrative figures; the result is a book well-suited toward non-specialists, preferably with technical background, who need well-composed tutorial introductions to the three foundation areas. The text discusses the latest advances in digital audio and video encoding, optical and wireless communications technologies, high-speed access networks, and IP-based media streaming, all crucial enablers of the multimedia Internet.

Web-Scale Data Management for the Cloud (Hardcover, 2013 ed.): Wolfgang Lehner, Kai-Uwe Sattler Web-Scale Data Management for the Cloud (Hardcover, 2013 ed.)
Wolfgang Lehner, Kai-Uwe Sattler
R3,307 Discovery Miles 33 070 Ships in 10 - 15 working days

The efficient management of a consistent and integrated database is a central task in modern IT and highly relevant for science and industry. Hardly any critical enterprise solution comes without any functionality for managing data in its different forms. Web-Scale Data Management for the Cloud addresses fundamental challenges posed by the need and desire to provide database functionality in the context of the Database as a Service (DBaaS) paradigm for database outsourcing. This book also discusses the motivation of the new paradigm of cloud computing, and its impact to data outsourcing and service-oriented computing in data-intensive applications. Techniques with respect to the support in the current cloud environments, major challenges, and future trends are covered in the last section of this book. A survey addressing the techniques and special requirements for building database services are provided in this book as well.

C# For Java Programmers (Paperback): Harold Cabrera C# For Java Programmers (Paperback)
Harold Cabrera
R790 Discovery Miles 7 900 Ships in 10 - 15 working days

Java Programmers, Preprare for Microsoft's .NET initiative while enhancing your repertoire and marketability with C# for Java Progammers
C# for Java Programmers will prepare readers for the .NET framework by building on what they already know about object-oriented languages and give them the means to maintain their flexibility and effectiveness in an un-certain marketplace. This book will compare and contrast the advantages and disadvantages of both Java and C# to allow programmers to make their own decisions regarding what each language is best used for.
Whatever your feelings are about Microsoft and its .NET initiative, there can be no denying that C# is here to stay. The C# language, a close cousin to Java, is a new object-oriented programming language (OOPL) designed to work within the .NET framework. It improves upon many of the vague or ill-defined areas of C++ that frequently lead programmers into trouble. C# is a strongly-typed, object-oriented language designed to give the optimum blend of simplicity, expressiveness, and performance.
Written specifically for Java programmers. C# for Java Programmers is not an introductory guide to C#, but builds on what Java programmers already know about object-oriented languages to give them an efficient means for making in-roads to the .NET framework.
Compare and Contrast. This book will compare and contrast many of the advantages and drawbacks of Java and C# to allow programmers to make informed, intelligent decisions based on the unique uses of each language.
Make your own in-depth analysis of C# and Java with the Syngress Wallet CD. Accompanying each book will be a wallet CD containing the HTML version of the text and in-depth code comparison to allow programmers to see for themselves the various differences between Java and C#.

Optimal Mobile Sensing and Actuation Policies in Cyber-physical Systems (Hardcover, 2012): Christophe Tricaud, Yangquan Chen Optimal Mobile Sensing and Actuation Policies in Cyber-physical Systems (Hardcover, 2012)
Christophe Tricaud, Yangquan Chen
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

A successful cyber-physical system, a complex interweaving of hardware and software with some part of the physical environment, depends on proper identification of the, often pre-existing, physical element. A bespoke "cyber" part of the system may then be designed from scratch. Optimal Mobile Sensing and Actuation Strategies in Cyber-physical Systems focuses on distributed-parameter systems the dynamics of which can be modelled with partial differential equations. These are very challenging to observe, their states and inputs being distributed throughout a spatial domain. Consequently, systematic approaches to the optimization of sensor location have to be devised for parameter estimation. The text begins by reviewing the field of cyber-physical systems and introducing background notions of distributed parameter systems and optimal observation theory. New research problems are then defined within this framework. Two important problems considered are optimal mobile sensor trajectory planning and the accuracy effects and allocation of remote sensors. These are followed up with a solution to the problem of optimal robust estimation. Actuation policies are then introduced into the framework with the purpose of improving estimation and optimizing the trajectories of both sensors and actuators simultaneously. The large number of illustrations within the text will assist the reader to visualize the application of the methods proposed. A group of similar examples are used throughout the book to help the reader assimilate the material more easily. The monograph concentrates on the use of methods for which a cyber-physical-systems infrastructure is required. The methods are computationally heavy and require mobile sensors and actuators with communications abilities. Application examples cover fields from environmental science to national security so that readers are encouraged to link the ideas of cyber-physical systems with their own research.

Managed Grids and Cloud Systems in the Asia-Pacific Research Community (Hardcover, 2010 ed.): Simon C. Lin, Eric Yen Managed Grids and Cloud Systems in the Asia-Pacific Research Community (Hardcover, 2010 ed.)
Simon C. Lin, Eric Yen
R5,340 Discovery Miles 53 400 Ships in 18 - 22 working days

ISGC 2009, The International Symposium on Grid Computing was held at Academia Sinica, Taipei, Taiwan in April 2009 bringing together prestigious scientists and engineers worldwide to exchange ideas, present challenges/solutions and introduce future development in the field of Grid Computing. Managed Grids and Cloud Systems in the Asia-Pacific Research Community presents the latest achievements in grid technology including Cloud Computing. This volume also covers international projects in Grid Operation, Grid Middleware, E-Science applications, technical developments in grid operations and management, Security and Networking, Digital Library and more. The resources used to support these advances, such as volunteer grids, production managed grids, and cloud systems are discussed in detail. This book is designed for a professional audience composed of grid users, developers and researchers working in the grid computing. Advanced-level students focusing on computer science and engineering will find this book valuable as a reference or secondary text book.

Spatial Data on the Web - Modeling and Management (Hardcover, 2007 ed.): Alberto Belussi, Barbara Catania, Eliseo Clementini,... Spatial Data on the Web - Modeling and Management (Hardcover, 2007 ed.)
Alberto Belussi, Barbara Catania, Eliseo Clementini, Elena Ferrari
R4,048 Discovery Miles 40 480 Ships in 18 - 22 working days

This book focuses on the modeling and management of spatial data in distributed systems. The authors have structured the contributions from internationally renowned researchers into four parts. The book offers researchers an excellent overview of the state-of-the-art in modeling and management of spatial data in distributed environments, while it may also be the basis of specialized courses on Web-based geographical information systems.

The JR Programming Language - Concurrent Programming in an Extended Java (Hardcover, 2004 ed.): Ronald A Olsson, Aaron W. Keen The JR Programming Language - Concurrent Programming in an Extended Java (Hardcover, 2004 ed.)
Ronald A Olsson, Aaron W. Keen
R1,617 Discovery Miles 16 170 Ships in 18 - 22 working days

JR is an extension of the Java programming language with additional concurrency mechanisms based on those in the SR (Synchronizing Resources) programming language. The JR implementation executes on UNIX-based systems (Linux, Mac OS X, and Solaris) and Windows-based systems. It is available free from the JR webpage. This book describes the JR programming language and illustrates how it can be used to write concurrent programs for a variety of applications. This text presents numerous small and large example programs. The source code for all programming examples and the given parts of all programming exercises are available on the JR webpage. Dr. Ronald A. Olsson and Dr. Aaron W. Keen, the authors of this text, are the designers and implementors of JR.

Economics of Information Security and Privacy (Hardcover, 2010 Ed.): Tyler Moore, David Pym, Christos Ioannidis Economics of Information Security and Privacy (Hardcover, 2010 Ed.)
Tyler Moore, David Pym, Christos Ioannidis
R5,322 Discovery Miles 53 220 Ships in 18 - 22 working days

The Workshop on the Economics of Information Security was established in 2002 to bring together computer scientists and economists to understand and improve the poor state of information security practice. WEIS was borne out of a realization that security often fails for non-technical reasons. Rather, the incentives of both - fender and attacker must be considered. Earlier workshops have answered questions ranging from?nding optimal levels of security investement to understanding why privacy has been eroded. In the process, WEIS has attracted participation from the diverse?elds such as law, management and psychology. WEIS has now established itself as the leading forum for interdisciplinary scholarship on information security. The eigth installment of the conference returned to the United Kingdom, hosted byUniversityCollegeLondononJune24-25,2009.Approximately100researchers, practitioners and government of?cials from across the globe convened in London to hear presentations from authors of 21 peer-reviewed papers, in addition to a panel and keynote lectures from Hal Varian (Google), Bruce Schneier (BT Co- terpane), Martin Sadler (HP Labs), and Robert Coles (Merrill Lynch). Angela Sasse and David Pym chaired the conference, while Christos Ioannidis and Tyler Moore chaired the program committee.

Aws - The Most Complete Guide to Amazon Web Services from Beginners to Advanced (Hardcover): Aiden Phillips Aws - The Most Complete Guide to Amazon Web Services from Beginners to Advanced (Hardcover)
Aiden Phillips
R744 R658 Discovery Miles 6 580 Save R86 (12%) Ships in 18 - 22 working days
Web-based Learning: Men And Machines - Proceedings Of The First International Conference On Web-based Learning In China (Icwl... Web-based Learning: Men And Machines - Proceedings Of The First International Conference On Web-based Learning In China (Icwl 2002) (Paperback)
Jimmy Sun Fat Chan, Ronnie Chu Ting Cheung, Anthony Fong, Weijia Jia, Reggie Kwan
R2,846 Discovery Miles 28 460 Ships in 18 - 22 working days

This book provides an up-to-date study of technical, pedagogical and managerial issues in Web-based learning. The successful application of Web-based learning provides enhancements in workforce performance, helps to lower costs, and encourages innovation for Web-based and distance learning.It presents a selection of 20 refereed papers given at the First International Conference on Web-Based Learning from over 70 submissions by academic researchers and industry developers from 19 different countries. It provides an excellent resource for students, researchers and practitioners involved in Web-based learning.The proceedings have been selected for coverage in:* Index to Scientific & Technical Proceedings (ISTP CDROM version / ISI Proceedings)* Index to Social Sciences & Humanities Proceedings (R) (ISSHP (R) / ISI Proceedings)* Index to Social Sciences & Humanities Proceedings (ISSHP CDROM version / ISI Proceedings)

Geospatial Services and Applications for the Internet (Hardcover, 2008 ed.): John T. Sample, Kevin Shaw, Shengru Tu, Mahdi... Geospatial Services and Applications for the Internet (Hardcover, 2008 ed.)
John T. Sample, Kevin Shaw, Shengru Tu, Mahdi Abdelguerfi
R2,656 Discovery Miles 26 560 Ships in 18 - 22 working days

The use of geospatial technologies has become ubiquitous since the leading Internet vendors delivered a number of popular map websites. This book covers a wide spectrum of techniques, model methodologies and theories on development and applications of GIS relative to the internet. It includes coverage of business process services, and integration of GIS into global enterprise information systems and service architectures. The world's experts in this emerging field present examples and case studies for location-based services, coastal restoration, urban planning, battlefield planning, rehearsal environmental analysis and assessment.

Knowledge and Information Technology Management - Human and Social Perspectives (Hardcover): Knowledge and Information Technology Management - Human and Social Perspectives (Hardcover)
R2,270 Discovery Miles 22 700 Ships in 18 - 22 working days

The importance of knowledge and information technology management has been emphasized both by researchers and practitioners in order for companies to compete in the global market. Now such technologies have become crucial in a sense that there is a need to understand the business and operations strategies, as well as how the development of IT would contribute to knowledge management and therefore increase competitiveness. Knowledge and Information Technology Management: Human and Social Perspectives strives to explore the human resource and social dimensions of knowledge and IT management, to discuss the opportunities and major issues related to the management of people along the supply chain in Internet marketing, and to provide an understanding of how the human resource and the IT management should complement each other for improved communication and competitiveness.

Social Media in the Digital Age - History, Ethics, and Professional Uses (Paperback, 2nd Revised edition): Rebecca Coates Nee Social Media in the Digital Age - History, Ethics, and Professional Uses (Paperback, 2nd Revised edition)
Rebecca Coates Nee
R2,432 R2,072 Discovery Miles 20 720 Save R360 (15%) Ships in 10 - 15 working days

Social Media in the Digital Age: History, Ethics, and Professional Uses details how the growth and development of social media has influenced how people interact with one another, receive news, and form social bonds. Part I of the book focuses on the history and study of social media, addressing the rise of social media, theories used to study social media, the widespread impacts of user-generated content, and more. Part II examines the legal and ethical implications of social media with chapters covering the legalities of social and digital media use, user policies, and image and brand management. Part III addresses the professional uses of social media within the disciplines of public relations, advertising, marketing, journalism, mass media, nonprofit work, and U.S. politics, as well as the role of social media in national and global movements. The second edition features new content on fake news, disinformation, conspiracy theories, bots and trolls, social media influencers, the growth of Instagram and TikTok, the Communications Decency Act, podcasts, and the confluence of social media and the 2020 United States presidential election. Social Media in the Digital Age is ideal for undergraduate courses in mass communication, broadcasting, history, and popular culture. It is also a valuable resource for communication professionals.

Wireless Networking and Mobile Data Management (Hardcover, 1st ed. 2017): R.K. Ghosh Wireless Networking and Mobile Data Management (Hardcover, 1st ed. 2017)
R.K. Ghosh
R4,118 Discovery Miles 41 180 Ships in 18 - 22 working days

This book examines two main topics, namely, Wireless Networking and Mobile Data Management. It is designed around a course the author began teaching to senior undergraduate and master's students at the Department of Computer Science & Engineering of the Indian Institute of Technology Kanpur. The first part of the book, consisting of eight chapters, including the introduction, focuses exclusively on wireless networking aspects. It begins with cellular communication systems, which provided the foundation of wireless networking principles. Three subsequent chapters are devoted to the Global System for Mobile communication (GSM), Wireless Local Area Network (WLAN), Bluetooth, infrared (IR), ZigBee and 6LoWPAN protocols. There is also a chapter on routings in ad hoc networks, an area that is currently being intensively researched due to its potential applications in areas of vehicular network, traffic management, tactical and military systems. Furthermore, the book discusses mobile operating systems and wireless network application level protocols such as Wireless Application Protocols (WAP), Mobile IP and Mosh. The second part highlights mobile data management. It addresses the issues like location management, the importance of replication and caching in mobile environments, the concept of broadcast disk and indexing in air, storage systems for sharing data in mobile environments, and building smart environments. Given that the design of algorithms is the key to applications in data management; this part begins with a chapter on the type of paradigm shift that has been introduced in the design of algorithms, especially due to asymmetry in mobile environments. Lastly, the closing chapter of the book explores smart environments, showing the readers how wireless technology and mobile data management can be combined to provide optimum comfort for human life. Though the book has been structured as a monograph, it can be used both as a textbook and as a reference material for researchers and developers working in the area.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Day trading Playbook - Intermediate…
David Reese Hardcover R586 Discovery Miles 5 860
E-Commerce In South Africa
Adheesh Budree Paperback R445 Discovery Miles 4 450
Wikis - Tools for information Work and…
Jane Klobas Paperback R1,159 Discovery Miles 11 590
New Perspectives on HTML 5 and CSS…
Patrick Carey Paperback R1,448 R1,348 Discovery Miles 13 480
The Internet, Power and Society…
Marcus Leaning Paperback R1,400 Discovery Miles 14 000
Broken Code - Inside Facebook And The…
Jeff Horwitz Paperback R485 R265 Discovery Miles 2 650
The Price Of Money - How To Prosper In A…
Rob Dix Paperback R438 Discovery Miles 4 380
Forex Trading #2020 - Best Swing & Day…
Ryan Miles Hardcover R565 Discovery Miles 5 650
Like, Comment, Subscribe - Inside…
Mark Bergen Paperback R498 R473 Discovery Miles 4 730
Indexing - From Thesauri to the Semantic…
Piet de Keyser Paperback R1,639 Discovery Miles 16 390

 

Partners