![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing
" Gender and Computers" presents evidence that shows that girls and
young women are being left behind on the road to information
technology. This book not only documents the digital divide but
also provides guideposts to overcoming it. Social psychological
theories and data are brought to bear on understanding the societal
and environmental roots of the divide. Remedies ranging from family
dynamics to teacher-student interactions to the controversial
question of the gender organization of schools and school systems
are proposed.
This revised edition has more breadth and depth of coverage than the first edition. Information Technology: An Introduction for Today's Digital World introduces undergraduate students to a wide variety of concepts that they will encounter throughout their IT studies and careers. The features of this edition include: Introductory system administration coverage of Windows 10 and Linux (Red Hat 7), both as general concepts and with specific hands-on instruction Coverage of programming and shell scripting, demonstrated through example code in several popular languages Updated information on modern IT careers Computer networks, including more content on cloud computing Improved coverage of computer security Ancillary material that includes a lab manual for hands-on exercises Suitable for any introductory IT course, this classroom-tested text presents many of the topics recommended by the ACM Special Interest Group on IT Education (SIGITE). It offers a far more detailed examination of the computer and IT fields than computer literacy texts, focusing on concepts essential to all IT professionals - from system administration to scripting to computer organization. Four chapters are dedicated to the Windows and Linux operating systems so that students can gain hands-on experience with operating systems that they will deal with in the real world.
Psychoanalysis and Digital Culture offers a comprehensive account of our contemporary media environment-digital culture and audiences in particular-by drawing on psychoanalysis and media studies frameworks. It provides an introduction to the psychoanalytic affect theories of Sigmund Freud and Didier Anzieu and applies them theoretically and methodologically in a number of case studies. Johanssen argues that digital media fundamentally shape our subjectivities on affective and unconscious levels, and he critically analyses phenomena such as television viewing, Twitter use, affective labour on social media, and data-mining. How does watching television involve the body? Why are we so drawn to reality television? Why do we share certain things on social media and not others? How are bodies represented on social media? How do big data and data mining influence our identities? Can algorithms help us make better decisions? These questions amongst others are addressed in the chapters of this wide-ranging book. Johanssen shows in a number of case studies how a psychoanalytic angle can bring new insights to audience studies and digital media research more generally. From audience research with viewers of the reality television show Embarrassing Bodies and how they unconsciously used it to work through feelings about their own bodies, to a critical engagement with Hardt and Negri's notion of affective labour and how individuals with bodily differences used social media for their own affective-digital labour, the book suggests that an understanding of affect based on Freud and Anzieu is helpful when thinking about media use. The monograph also discusses the perverse implications of algorithms, big data and data mining for subjectivities. In drawing on empirical data and examples throughout, Johanssen presents a compelling analysis of our contemporary media environment.
The book is relevant for various regions including the US, UK, Australia, Western European nations and New Zealand. Key informants offer insights for policy and practice. Rich theoretical analysis further contextualizes findings and provides analysis to advance the field.
Joining a thriving field of new media, this collective volume authored by global academics features important research by thought leaders within computer-mediated communication (CMC) and social media. Featuring 40 comprehensive chapters of new research that focuses on what is new, relevant, and cutting edge in the areas of CMC and social media, authors critically explore topics ranging from social media theories to civil rights. Divided into three parts, the handbook begins with theory and methods, which sets the foundation for the text and then moves into the applicability of strategy, tactics, and measurement. The final focus is toward the future of CMC and social media and its impact on the study and practice of communication. Uniquely relating social media communication research to its computer-mediated communication foundation, as well as digital and emerging media trends, this handbook is an indispensable resource whether you're a graduate student or a seasoned practitioner.
The principal benefit this book is to provide a holistic and comprehensible view of the entire software development process, including ongoing evolution and support. It treats development as a collaborative effort with triad communication between a tester, a programmer, and a representative from the user community or a Subject Matter Expert (SME). Progress is measured by user acceptance in each cycle before proceeding to the next step of an activity. There is no test stage in the DPAC model: continuous testing is represented in the backswing (Check Phase) of each activity cycle. This approach posits that there exists some "happy path" that represents the intent of the project as declared by the objectives of a Vision Statement, and that this path can be revealed by an iterative and incremental process of "freeing the statue from the stone." As the image of this path unfolds, more waste is removed while retaining conceptual integrity. The example presented herein walks the reader through an application of the model. This book should be of great interest to Product and Project Managers new to the concept of a lean agile development effort, and all practitioners of an agile methodology or those considering or just beginning an agile journey. What You'll Learn See how the various disciplines constituting the software development process come together Understand where in the development process management, you can exercise measurement of progress and control Review how a quality engineering program will positively affect the quality of the development process Examine how the quality of the development process profoundly affects the quality of the software system Who This Book Is For Managers, from the C-Suite (CEO,CXO, CIO) to line managers including project managers, and practitioners including programmers, testers, and mid-level managers (Technical Project Managers, Software Quality Engineers, and Coaches). Also, Agile enthusiasts who are looking for a software development methodology on which to place their hat.
Law on the Web is ideal for anyone who wants to access Law Internet resources quickly and efficiently without becoming an IT expert. The emphasis throughout is on the location of high quality law Internet resources for learning, teaching and research, from among the billions of publicly accessible Web pages. The book is structured so that it will be found useful by both beginners and intermediate level users, and be of continuing use over the course of higher education studies. In addition to extensive coverage on locating files and Web sites, Part III provides a substantial and annotated list of high quality resources for law students.
The Asset Protection and Security Management Handbook is a must for all professionals involved in the protection of assets. For those new to the security profession, the text covers the fundamental aspects of security and security management providing a firm foundation for advanced development. For the experienced security practitioner, it provides the tools necessary for developing effective solutions and responses to the growing number of challenges encountered by today's security professionals.
Address Errors before Users Find ThemUsing a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of "smart" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test. The book guides you step by step starting with the basics. It explains patterns and techniques ranging from simple mind mapping to sophisticated test labs. For traditional testers moving into the mobile and embedded area, the book bridges the gap between IT and mobile/embedded system testing. It illustrates how to apply both traditional and new approaches. For those working with mobile/embedded systems without an extensive background in testing, the book brings together testing ideas, techniques, and solutions that are immediately applicable to testing smart and mobile devices.
The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference. The changes in the technology of information security and the increasing threats to security make a complete and up-to-date understanding of this material essential. Volume 4 supplements the information in the earlier volumes of this handbook, updating it and keeping it current. Organized by the ten domains of the Common Body of Knowledge (CBK) on which the CISSP exam is based, this volume gives you the information you need to understand what makes information secure and how to secure it. Because the knowledge required to master information security - the CBK - is growing so quickly, there is little duplication of material among the four volumes. As a study guide or resource that you can use on the job, the Information Security Management Handbook, Fourth Edition, Volume 4 is the book you will refer to over and over again.
Recent years have seen digital advertising grow to the point where it will soon overtake television as the no. 1 advertising medium. In the online environment, consumers interact and share their thoughts on brands and their experiences using them. These electronic word-of-mouth (eWOM) communications have become a very important to the success of products. In today's cluttered environment, it is especially important to study how the practice of eWOM advertising operates, and how marketers can influence eWOM in social media and other online sites. This volume starts with a chapter on the current state of knowledge on eWOM and then turns its attention to current research articles on a variety of eWOM formats. These include the posting of selfies on social media, the influence of review types on consumer perception and purchase intention, the effects of preannouncement messages, and how user-generated content can be used to induce effectiveness of eWOM on social media. The relationship of eWOM to brand building is emphasized in several of the chapters. This book was originally published as a special issue of the International Journal of Advertising.
Evolutionary Psychology and Digital Games: Digital Hunter-Gatherers is the first edited volume that systematically applies evolutionary psychology to the study of the use and effects of digital games. The book is divided into four parts: Theories and Methods Emotion and Morality Social Interaction Learning and Motivation These topics reflect the main areas of digital games research as well as some of the basic categories of psychological research. The book is meant as a resource for researchers and graduate students in psychology, anthropology, media studies and communication as well as video game designers who are interested in learning more about the evolutionary roots of player behaviors and experiences.
Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security explains how to use built-in Windows networking tools and third-party networking products to diagnose network problems, address performance issues, and enhance the overall security of your system and network. It starts with a review of the major components of the TCP/IP protocol suite, as well as IP and MAC addressing, to provide a clear understanding of the various networking tools and how they are used in a LAN and a TCP/IP networking environment. Although the book focuses on built-in Windows networking tools, it also investigates a number of third-party products that can enhance the performance of your computer. It identifies tools to help you to understand the traffic flow and operational status of your network , illustrates the use of numerous tools, and shows you several methods to protect your computers from malicious software. It also examines one of the best programs for examining the flow of data on a network Wireshark and explains how to use this program to scan for open ports and discover vulnerability issues. In addition to helping you gain insight into existing problems, the text highlights built-in Windows networking tools that can help to determine if you can expect future bandwidth bottlenecks or other problems to occur under different growth scenarios. Placing the proven methods of an industry veteran at your fingertips, the book includes a chapter devoted to software programs that can enhance the security of your network. It explains how to negate the operation of unwanted advertisement trackers as well as how to minimize and alleviate the various types of hacking from keyboard loggers to network viruses. In the event your computational device is lost or stolen a cryptographic program is described that results in data becoming meaningless to the person or persons attempting to read your
|
![]() ![]() You may like...
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi
Paperback
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier
Hardcover
R2,911
Discovery Miles 29 110
Legal Challenges of Big Data
Joe Cannataci, Valeria Falce, …
Hardcover
R3,727
Discovery Miles 37 270
|