![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet
The advent of the Internet and other new digital technologies means that companies—be they virtual or traditional bricks-and-mortar—must develop a successful strategy for presenting compelling brands in the virtual world. Drawing on their experience with Interbrand, the world's largest branding consultancy, and including chapters by branding experts from such companies as Pepsi-Cola, Procter & Gamble, and Hewlett Packard, the authors focus on the strategic role of e-branding. Practical, tested, and designed for companies in any industry, this book presents a lively look at creating and sustaining e-brands beyond the current dot-com fizzle.
The Mobile Ad Hoc Network (MANET) has emerged as the next frontier for wireless communications networking in both the military and commercial arena. "Handbook of Mobile Ad Hoc Networks for Mobility Models" introduces 40 different major mobility models along with numerous associate mobility models to be used in a variety of MANET networking environments in the ground, air, space, and/or under water mobile vehicles and/or handheld devices. These vehicles include cars, armors, ships, under-sea vehicles, manned and unmanned airborne vehicles, spacecrafts and more. This handbook also describes how each mobility pattern affects the MANET performance from physical to application layer; such as throughput capacity, delay, jitter, packet loss and packet delivery ratio, longevity of route, route overhead, reliability, and survivability. Case studies, examples, and exercises are provided throughout the book. "Handbook of Mobile Ad Hoc Networks for Mobility Models" is for advanced-level students and researchers concentrating on electrical engineering and computer science within wireless technology. Industry professionals working in the areas of mobile ad hoc networks, communications engineering, military establishments engaged in communications engineering, equipment manufacturers who are designing radios, mobile wireless routers, wireless local area networks, and mobile ad hoc network equipment will find this book useful as well.
This book redefines community discovery in the new world of Online Social Networks and Web 2.0 applications, through real-world problems and applications in the context of the Web, pointing out the current and future challenges of the field. Particular emphasis is placed on the issues of community representation, efficiency and scalability, detection of communities in hypergraphs, such as multi-mode and multi-relational networks, characterization of social media communities and online privacy aspects of online communities. User Community Discovery is for computer scientists, data scientists, social scientists and complex systems researchers, as well as students within these disciplines, while the connections to real-world problem settings and applications makes the book appealing for engineers and practitioners in the industry, in particular those interested in the highly attractive fields of data science and big data analytics.
Understand Bitcoin, Blockchains, and Cryptocurrency "Antony helps us all clearly understand the mechanics of bitcoin and blockchain." Rob Findlay, Founder, Next Money #1 Best Seller in Investing Derivatives and Natural Resource Extraction Industry, Futures Trading, Banks & Banking, Energy & Mining, Monetary Policy, and Computers & Technology There's a lot written on cryptocurrency and blockchains. But, for the uninitiated, most of this information can be indecipherable. The Basics of Bitcoins and Blockchains provides a clear guide to this new currency and the revolutionary technology that powers it. Bitcoin, Ethereum, and other cryptocurrencies. Gain an understanding of a broad spectrum of Bitcoin topics including the history of Bitcoin, the Bitcoin blockchain, and Bitcoin buying, selling, and mining. Learn how payments are made, and how to put a value on cryptocurrencies and digital tokens. Blockchain technology. What exactly is a blockchain, how does it work, and why is it important? The Basics of Bitcoins and Blockchains answers these questions and more. Learn about notable blockchain platforms, smart contracts, and other important facets of blockchains and their function in the changing cyber-economy. Things to know before buying cryptocurrencies. Find trustworthy and balanced insights into Bitcoin investing and investing in other cryptocurrency. Discover the risks and mitigations, learn how to identify scams, and understand cryptocurrency exchanges, digital wallets, and regulations. Learn about: Blockchain technology and how it works Workings of the cryptocurrency market Evolution and potential impacts of Bitcoin and blockchains on global businesses You've read books such as Blockchain Bubble or Revolution, Cryptoassets, Blockchain Technology Explained, Blockchain Revolution, The Bitcoin Standard, Mastering Bitcoin, or Bitcoin For Dummies, but to really understand the technology read The Basics of Bitcoins and Blockchains.
***** Fully revised and updated, 2nd Edition 2/11/2012 ***** THE HANDS-ON, TUTORIAL-BASED GUIDE TO BUILDING SECURE AND HIGH PERFORMANT WEB WIDGET Get up to speed for developing web widget with design guidelines, standard practices, security measures and techniques for high performance. Developing Web Widget with HTML, CSS, JSON and Ajax is the first guide to creating web widgets, tiny web applications that can be embedded in a web page, blog or social profile. Inside, author of the bestselling book Creating Vista Gadget, Rajesh Lal provide readers with a methodology for building widget using standard web technologies like HTML, CSS, and JavaScript. Developing Web Widget starts with a step-by step tutorial starting from Hello World Widget to an advanced Web Widget which uniquely identifies the user based on the url and not only display user data but also update data. Reader will learn how to use techniques to ensure security and add high performance to the web widget. You will also learn how to create RSS based widgets using Ajax, Proxy Server and Google Ajax Feed API and Widgets based on Facebook APIs. The star Widget developed in the book is now a popular free service. To see it live, visit http: //addrating.com All code can be downloaded from the companion website. http: //widgets-gadgets.com ***** Enjoy Fully revised and edited Second edition 2/11/2012 *****
Over the last few years, Web technology has grown so rapidly that
it is hard for interested readers to learn and keep up with the
techniques. It would be extremely useful to have a single book that
collectively describes not only the underlying areas from which
internet technology derives its solutions, but also details the
specific solutions to important applications on the World Wide Web.
Foundations of Web Technology covers the basics of Web technology
while being specialized enough to add value to experienced
professionals working in this field. Most books on the Web focus on
programmatic aspects of languages such as Java, JavaScript, or
description of standards such as Hypertext Markup Language (HTML)
or Wireless Markup Language (WML). A book that covers the concepts
behind the infrastructure of the Web would be indispensable to a
wide range of audiences interested in learning how the Web works,
how techniques in Web technology can be applied to their own
problem, and what the emergent technological trends in these areas
are.
This book deals with Web applications in product design and manufacture, thus filling an information gap in digital manufacturing in the Internet era. It helps both developers and users to appreciate the potentials, as well as difficulties, in developing and adopting Web applications. The objective is to equip potential users and practitioners of Web applications with a better appreciation of the technology. In addition, Web application developers and new researchers in this field will gain a clearer understanding of the selection of system architecture and design, development and implementation techniques, and deployment strategies. The book is divided into two main parts. The first part gives an overview of Web and Internet and the second explains eight typical Web applications.
Semantic Web Services for Web Databases introduces an end-to-end framework for querying Web databases using novel Web service querying techniques. This includes a detailed framework for the query infrastructure for Web databases and services. Case studies are covered in the last section of this book. Semantic Web Services For Web Databases is designed for practitioners and researchers focused on service-oriented computing and Web databases.
A decade ago Tim Berners-Lee proposed an extraordinary vision: despite the p- nomenal success of the Web, it would not, and could not, reach its full potential unless it became a place where automated processes could participate as well as people. This meant the publication of documents and data to the web in such a way that they could be interpreted, integrated, aggregated and queried to reveal new connections and answer questions, rather than just browsed and searched. Many scoffed at this idea, interpreting the early emphasis on language design and reas- ing as AI in new clothes. This missed the point. The Grand Challenge of the Semantic Web is one that needs not only the information structure of ontologies, metadata, and data, but also the computational infrastructure of Web Services, P2P and Grid distributed computing and workflows. Consequently, it is a truly who- system and multi-disciplinary effort. This is also an initiative that has to be put into practice. That means a pragmatic approach to standards, tools, mechanisms and methodologies, and real, challenging examples. It would seem self-evident that the Semantic Web should be able to make a major contribution to clinical information discovery. Scientific commu- ties are ideal incubators: knowledge-driven, fragmented, diverse, a range of str- tured and unstructured resources with many disconnected suppliers and consumers of knowledge. Moreover, the clinicians and biosciences have embraced the notions of annotation and classification using ontologies for centuries, and have dema- ing requirements for trust, security, fidelity and expressivity.
Rethinking Hypermedia: The Microcosm Approach is essentially the story of the Microcosm hypermedia research and development project that started in the late 1980's and from which has emerged a philosophy that re-examines the whole concept of hypermedia and its role in the evolution of multimedia information systems. The book presents the complete story of Microcosm to date. It sets the development of Microcosm in the context of the history of the subject from which it evolved, as well as the developments in the wider world of technology over the last two decades including personal computing, high-speed communications, and the growth of the Internet. These all lead us towards a world of global integrated information environments: the publishing revolution of the 20th century, in principle making vast amounts of information available to anybody anywhere in the world. Rethinking Hypermedia: The Microcosm Approach explains the role that open hypermedia systems and link services will play in the integrated information environments of the future. It considers issues such as authoring, legacy systems and data integrity issues, and looks beyond the simple hypertext model provided in the World Wide Web and other systems today to the world of intelligent information processing agents that will help us deal with the problems of information overload and maintenance. Rethinking Hypermedia: The Microcosm Approach will be of interest to all those who are involved in designing, implementing and maintaining hypermedia systems such as the World Wide Web by setting the groundwork for producing a system that is both easy to use and easy to maintain. Rethinking Hypermedia: The Microcosm Approach is essential reading for anyone involved in the provision of online information.
'A brilliant page-turner by one of Holland's finest investigative journalists' Rutger Bregman, author of Humankind 'Essential . . . What's revealed are networks of spies and criminals fighting an invisible war that involves us all' Eliot Higgins, bestselling author of We Are Bellingcat Summer 2017: computer screens go blank in 150 countries. The NHS is so affected that hospitals can only take in patients for A&E. Ambulances are grounded. Computer screens turn on spontaneously and warnings appear. Employees who desperately pull the plugs are too late. Restarting is pointless; the computers are locked. And now the attackers ask each victim for money. This is hijack software. It is just one example of how vulnerable the digital world has made us. Based on the cases he investigated over a period of six years, award-winning Dutch journalist Huib Modderkolk takes the reader on a tour of the corridors and back doors of the globalised digital world. He reconstructs British-American espionage operations and reveals how the power relationships between countries enable intelligence services to share and withhold data from each other. Looking at key players including Edward Snowden, Russian hackers Cozy Bear and Evgeniy Bogachev, 'the Pablo Escobar of the digital era', Modderkolk opens our eyes to the dark underbelly of the digital world with the narrative drive of a thriller.
An examination of the social impact of the Internet, this volume explores political, social, technical, legal, and economic controversies in a manner accessible to the general reader. Today more than one billion people worldwide use the Internet for communication, shopping, business, and research. But in the last five years they have lost over $10 billion to malicious computer attacks alone. Is there a way to keep the benefits and avoid the problems? The Internet and Society: A Reference Handbook explores both the positive aspects of the Internet and its darker side. Topically organized, it chronicles the background and history of the Internet, with a focus on the 1960s and beyond. Through analysis of the latest research in sociology, political science, economics, law, and computer science, it examines problems, varieties of cybercrime, controversies, and solutions related to the Internet's phenomenal growth. It also illuminates the likely directions of the Internet's future and the ongoing challenges it presents to societies around the globe. A glossary of key terms, such as algorithm, ARPAnet, Hyper Text Markup Language, identity theft, Internet protocol, malicious mode, and Moore's law, helps readers find their bearings in the high-tech world of the Internet Bibliographical sketches of 20 key personalities-both positive and negative-in Internet history bring this high-tech story to life
Cloud computing has provided multiple advantages as well as challenges to software and infrastructure services. In order to be fully beneficial, these challenges facing cloud specific communication protocols must be addressed. Communication Infrastructures for Cloud Computing presents the issues and research directions for a broad range of cloud computing aspects of software, computing, and storage systems. This book will highlight a broad range of topics in communication infrastructures for cloud computing that will benefit researchers, academics, and practitioners in the active fields of engineering, computer science, and software.
This book presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2018), organized by SRM University, NCR Campus, New Delhi, India, February 16-18, 2018. The conference focuses on challenges with respect to the dependability of integrated applications and intelligence-driven security threats against the platforms supporting these applications. The WIDECOM 2018 proceedings features papers addressing issues related to the new dependability paradigms, design, control, and management of next generation networks, performance of dependable network computing and mobile systems, protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and Internet of Things (IoT) systems. The proceeding is a valuable reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners, in industry, in the aforementioned areas. The book's structure and content is organized in such a manner that makes it useful at a variety of learning levels. Presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2018), organized by SRM University, NCR Campus, New Delhi, India, February 16-18, 2018; Includes an array of topics related to new dependability paradigms, design, control, and management of next generation networks, performance of dependable network computing and mobile systems, protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and Internet of Things (IoT) systems; Addresses issues related to the design and performance of dependable network computing and systems and to the security of these systems.
In many countries shopping has been transformed from High Street stores to large out-of-town Retail Parks and Shopping Centres. Technology now provides the opportunity for many products and services to be promoted and purchased electronically, particularly via the Internet. This will progress differently for different products, regions, consumer groups, etc. This book presents future scenarios for the retail industry in the light of Internet shopping. Through its unique perspective, it examines developments so far, and through the insight of the author who is one of the leading professionals in shopping centre developments, takes an inspired look at the future of retailing in the next century.
With the prevalence of social media, businesses and other organizations have a growing need to utilize various online media platforms and sites to engage and interact with their potential consumer base. Virtual communities and social networking can provide an effective escape route from the limits imposed by traditional media. Using optimal strategies can lead to more successful outcomes when using these platforms. Modern Perspectives on Virtual Communications and Social Networking provides innovative insights into connection and conversation through internet media that foster trust, commitment, and transparency in business. The content within this publication represents the potential to create virtual bonds with consumers through the observation of buying behavior, social media best practices, and digital marketing strategies. It is designed for business professionals, academicians, consultants, managers, marketers, and researchers and covers topics centered on the use of online media as a method of reaching a wider population.
This volume contains the proceedings of IFIPTM 2010, the 4th IFIP WG 11.11 International Conference on Trust Management, held in Morioka, Iwate, Japan during June 16-18, 2010. IFIPTM 2010 provided a truly global platform for the reporting of research, development, policy, and practice in the interdependent arrears of privacy, se- rity, and trust. Building on the traditions inherited from the highly succe- ful iTrust conference series, the IFIPTM 2007 conference in Moncton, New Brunswick, Canada, the IFIPTM 2008 conference in Trondheim, Norway, and the IFIPTM 2009 conference at Purdue University in Indiana, USA, IFIPTM 2010 focused on trust, privacy and security from multidisciplinary persp- tives. The conference is an arena for discussion on relevant problems from both research and practice in the areas of academia, business, and government. IFIPTM 2010 was an open IFIP conference. The program of the conference featured both theoretical research papers and reports of real-world case studies. IFIPTM 2010 received 61 submissions from 25 di?erent countries: Japan (10), UK (6), USA (6), Canada (5), Germany (5), China (3), Denmark (2), India (2), Italy (2), Luxembourg (2), The Netherlands (2), Switzerland (2), Taiwan (2), Austria, Estonia, Finland, France, Ireland, Israel, Korea, Malaysia, Norway, Singapore, Spain, Turkey. The Program Committee selected 18 full papers for presentation and inclusion in the proceedings. In addition, the program and the proceedings include two invited papers by academic experts in the ?elds of trust management, privacy and security, namely, Toshio Yamagishi and Pamela Briggs
Much of the world's advanced data processing applications are now dependant on eXtensible Markup Language (XML), from publishing to medical information storage. Therefore, XML has become a de facto standard for data exchange and representation on the World Wide Web and in daily life. Applications and Structures in XML Processing: Label Streams, Semantics Utilization and Data Query Technologies reflects the significant research results and latest findings of scholars' worldwide, working to explore and expand the role of XML. This collection represents an understanding of XML processing technologies in connection with both advanced applications and the latest XML processing technologies that is of primary importance. It provides the opportunity to understand topics in detail and discover XML research at a comprehensive level.
E-Business has become a fact for almost all companies. But what are the key technologies for economically successful e-commerce? In this book readers will find all concepts that will coin tomorrow's e-business: virtual sales assistants (shopbots), personalized web pages, electronic market places, vendor managed inventory, virtual organizations, supply chain management. Both technical and economic issues of these concepts are discussed in detail. Leading-edge real world applications are presented that will shape e-business mid-term. This book is a must-read for managers or technical consultants as well as researchers needing in-depth information for strategic business decisions.
It's easy and reflexive to view our online presence as fake, to see the internet as a space we enter when we aren't living our real, offline lives. And yet, so much of who we are and what we do now happens online. Social media is becoming less somewhere we go and more a place in which we are simply always present. All of it makes it hard to know which parts of our lives are real. IRL, Chris Stedman's personal and searing exploration of authenticity in the digital age, shines a light on how age-old notions of realness can be freshly understood in our new online lives. Stedman argues for a different way of seeing the supposed split between our online and offline selves: far from being unnatural, the internet is simply one more tool for understanding and expressing ourselves, and the way we use it can reveal new insights into far older human behaviors and desires. IRL invites readers to consider the ways they edit or curate themselves for digital audiences, and in the end makes a bold case for authenticity, even when it feels risky.
Addressing the rising security issues during the design stages of cyber-physical systems, this book develops a systematic approach to address security at early design stages together with all other design constraints. Cyber-attacks become more threatening as systems are becoming more connected with the surrounding environment, infrastructures, and other systems. Security mechanisms can be designed to protect against attacks and meet security requirements, but there are many challenges of applying security mechanisms to cyber-physical systems including open environments, limited resources, strict timing requirements, and large number of devices. Designed for researchers and professionals, this book is valuable for individuals working in network systems, security mechanisms, and system design. It is also suitable for advanced-level students of computer science. |
You may like...
|