0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (9)
  • R100 - R250 (385)
  • R250 - R500 (1,133)
  • R500+ (11,176)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing

HTML5 - Designing Rich Internet Applications (Hardcover, 2nd edition): Matthew David HTML5 - Designing Rich Internet Applications (Hardcover, 2nd edition)
Matthew David
R5,351 Discovery Miles 53 510 Ships in 12 - 17 working days

Implement the powerful multimedia and interactive capabilities offered by HTML5, including style control tools, illustration tools, video, audio, and rich media solutions. Understand how HTML5 is changing the web development game with this project-based book that shows you-not just tells you-what HTML5 can do for your websites. Reinforce your practical understanding of the new standard with demo applications and tutorials, so that execution is one short step away. HTML5 is the future of the web. Literally every web designer and developer needs to know how to use this language to create the types of web sites consumers now expect. This new edition of the bestseller teaches you to enhance your web designs with rich media solutions and interactivity, using detailed descriptions and hands-on projects for every step along the way. The second edition contains completely updated information, including more on mobility and video standards, plus new projects.The companion website, visualizetheweb.com, is packed full of extra information, online code libraries, and a user forum, offering even more opportunity to learn new skills, practice your coding and interact with other users.

Ethics and the Internal Auditor's Political Dilemma - Tools and Techniques to Evaluate a Company's Ethical Culture... Ethics and the Internal Auditor's Political Dilemma - Tools and Techniques to Evaluate a Company's Ethical Culture (Hardcover)
Lynn Fountain
R5,350 Discovery Miles 53 500 Ships in 12 - 17 working days

This book helps auditors understand the reality of performing the internal audit role and the importance of properly managing ethical standards. It provides many examples of ethical conflicts and proposes alternative actions for the internal auditor. Internal auditors are well-schooled on the IIA Standards, but the reality is that the pressure placed on internal auditors related to execution of work and upholding ethical standards can be very difficult. Regardless of best practice or theory, auditors must be personally prepared to manage through issues they run across.

Web Security - A WhiteHat Perspective (Hardcover): Hanqing Wu, Liz Zhao Web Security - A WhiteHat Perspective (Hardcover)
Hanqing Wu, Liz Zhao
R5,235 Discovery Miles 52 350 Ships in 12 - 17 working days

In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target. This catastrophic event, deemed one of the biggest data breaches ever, clearly showed that many companies need to significantly improve their information security strategies. Web Security: A White Hat Perspective presents a comprehensive guide to web security technology and explains how companies can build a highly effective and sustainable security system. In this book, web security expert Wu Hanqing reveals how hackers work and explains why companies of different scale require different security methodologies. With in-depth analysis of the reasons behind the choices, the book covers client script security, server applications security, and Internet company security operations. It also includes coverage of browser security, cross sites script attacks, click jacking, HTML5/PHP security, injection attacks, authentication, session management, access control, web frame security, DDOS, leaks, Internet transactions security, and the security development lifecycle.

Managing A Network Vulnerability Assessment (Hardcover): Thomas R. Peltier, Justin Peltier, John A Blackley Managing A Network Vulnerability Assessment (Hardcover)
Thomas R. Peltier, Justin Peltier, John A Blackley
R4,903 Discovery Miles 49 030 Ships in 12 - 17 working days

The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders. Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them. By following the procedures outlined in this guide, a company can pinpoint what individual parts of their network need to be hardened, and avoid expensive and unnecessary purchases.

Unauthorized Access - The Crisis in Online Privacy and Security (Hardcover): Richard Warner, Robert Sloan Unauthorized Access - The Crisis in Online Privacy and Security (Hardcover)
Richard Warner, Robert Sloan
R5,366 Discovery Miles 53 660 Ships in 12 - 17 working days

Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in clear, straightforward language. The authors two renowned experts on computer security and law explore the well-established connection between social norms, privacy, security, and technological structure. This approach is the key to understanding information security and informational privacy, providing a practical framework to address ethical and legal issues. The authors also discuss how rapid technological developments have created novel situations that lack relevant norms and present ways to develop these norms for protecting informational privacy and ensuring sufficient information security. Bridging the gap among computer scientists, economists, lawyers, and public policy makers, this book provides technically and legally sound public policy guidance about online privacy and security. It emphasizes the need to make trade-offs among the complex concerns that arise in the context of online privacy and security.

Secure Java - For Web Application Development (Hardcover): Abhay Bhargav, B. V Kumar Secure Java - For Web Application Development (Hardcover)
Abhay Bhargav, B. V Kumar
R5,352 Discovery Miles 53 520 Ships in 12 - 17 working days

Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure programming, risk assessment, and threat modeling explaining how to integrate these practices into a secure software development life cycle. From the risk assessment phase to the proof of concept phase, the book details a secure web application development process. The authors provide in-depth implementation guidance and best practices for access control, cryptography, logging, secure coding, and authentication and authorization in web application development. Discussing the latest application exploits and vulnerabilities, they examine various options and protection mechanisms for securing web applications against these multifarious threats. The book is organized into four sections: Provides a clear view of the growing footprint of web applications Explores the foundations of secure web application development and the risk management process Delves into tactical web application security development with Java EE Deals extensively with security testing of web applications This complete reference includes a case study of an e-commerce company facing web application security challenges, as well as specific techniques for testing the security of web applications. Highlighting state-of-the-art tools for web application security testing, it supplies valuable insight on how to meet important security compliance requirements, including PCI-DSS, PA-DSS, HIPAA, and GLBA. The book also includes an appendix that covers the application security guidelines for the payment card industry standards.

Building an Information Security Awareness Program (Hardcover): Mark B. Desman Building an Information Security Awareness Program (Hardcover)
Mark B. Desman
R4,898 Discovery Miles 48 980 Ships in 12 - 17 working days

In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what can happen to them if they ignore them. The key, of course, is continuous awareness of the problems and the solutions. Building an Information Security Awareness Program addresses these concerns. A reference and self-study guide, it goes step-by-step through the methodology for developing, distributing, and monitoring an information security awareness program. It includes detailed instructions on determining what media to use and where to locate it, and it describes how to efficiently use outside sources to optimize the output of a small staff. The author stresses the importance of security and the entire organizations' role and responsibility in protecting it. He presents the material in a fashion that makes it easy for nontechnical staff members to grasp the concepts. These attributes render Building an Information Security Awareness Program an immensely valuable reference in the arsenal of the IS professional.

Securing and Controlling Cisco Routers (Hardcover): Peter T. Davis Securing and Controlling Cisco Routers (Hardcover)
Peter T. Davis
R4,966 Discovery Miles 49 660 Ships in 12 - 17 working days

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology. At the end of most chapters, readers will find the unique opportunity to practice what they have learned. Readers will be able to log on to a real router, practice commands, and gather information as shown in the chapter. To further round out this understanding of routers, Securing and Controlling Cisco Routers reviews Trojan Ports and Services and provides additional resources such as Web sites, mailing lists, bibliographies, glossaries, acronyms, and abbreviations.

Building A Global Information Assurance Program (Hardcover): Douglas E. Campbell, Raymond J. Curts Building A Global Information Assurance Program (Hardcover)
Douglas E. Campbell, Raymond J. Curts
R4,920 Discovery Miles 49 200 Ships in 12 - 17 working days

Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function. These government and business entities are beginning to realize the value of information assurance (IA) as a tool to ensure that the right information gets to the right people, at the right time, with a reasonable expectation that it is timely, accurate, authentic, and uncompromised. Intended for those interested in the construction and operation of an IA or Information Security (InfoSec) program, Building a Global Information Assurance Program describes the key building blocks of an IA development effort including: Information Attributes System Attributes Infrastructure or Architecture Interoperability IA Tools Cognitive Hierarchies Decision Cycles Organizational Considerations Operational Concepts Because of their extensive and diverse backgrounds, the authors bring a unique perspective to current IT issues. The text presents their proprietary process based on the systems development life cycle (SDLC) methodology specifically tailored for an IA program. This process is a structured, cradle-to-grave approach to IA program development, from program planning and design to implementation, support, and phase out. Building a Global Information Assurance Program provides a proven series of steps and tasks that you can follow to build quality IA programs faster, at lower costs, and with less risk.

Security Strategy - From Requirements to Reality (Hardcover): Bill Stackpole, Eric Oksendahl Security Strategy - From Requirements to Reality (Hardcover)
Bill Stackpole, Eric Oksendahl
R5,208 Discovery Miles 52 080 Ships in 12 - 17 working days

Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and place of strategy in an information security program and arms security managers and practitioners with a set of security tactics to support the implementation of strategic planning initiatives, goals, and objectives. The book focuses on security strategy planning and execution to provide a clear and comprehensive look at the structures and tools needed to build a security program that enables and enhances business processes. Divided into two parts, the first part considers business strategy and the second part details specific tactics. The information in both sections will help security practitioners and mangers develop a viable synergy that will allow security to take its place as a valued partner and contributor to the success and profitability of the enterprise. Confusing strategies and tactics all too often keep organizations from properly implementing an effective information protection strategy. This versatile reference presents information in a way that makes it accessible and applicable to organizations of all sizes. Complete with checklists of the physical security requirements that organizations should consider when evaluating or designing facilities, it provides the tools and understanding to enable your company to achieve the operational efficiencies, cost reductions, and brand enhancements that are possible when an effective security strategy is put into action.

Mastering the Five Tiers of Audit Competency - The Essence of Effective Auditing (Hardcover): Ann Butera Mastering the Five Tiers of Audit Competency - The Essence of Effective Auditing (Hardcover)
Ann Butera
R5,486 Discovery Miles 54 860 Ships in 12 - 17 working days

Risk-based operational audits and performance audits require a broad array of competencies. This book provides auditors and risk professionals with the understanding required to improve results during risk-based audits.Mastering the Five Tiers of Audit Competency: The Essence of Effective Auditing is an anthology of powerful risk-based auditing practices. Filled with practical do and don't techniques, it encompasses the interpersonal aspects of risk-based auditing, not just the technical content.This book details the behaviors you need to demonstrate and the habitual actions you need to take at each phase in an audit to manage the people relationships as well as the work itself. Each section of this book is devoted to a component of the audit: planning, detailed risk and control assessment, testing, audit report writing, project management, audit team management, and client relationship management.The book leverages The Whole Person Project, Inc.'s 30 years of hands-on organizational development experience and custom-designed internal audit training programs to aid those just starting out in audit as well as more experienced auditors. It also contains templates you can use to set performance goals and assess your progress towards achieving those goals.This book will spark ideas that can enhance performance, improve working relationships, and make it easier to complete audits that improve your organization's risk management culture and practices. Explaining how to make positive and sustained changes to the way you approach your work, the book includes a summary of the key points and a brief quiz to help you remember salient ideas in each chapter.Presenting proven methods and advice that can help you immediately save time, reduce stress, and produce reliable, quality results, this book is an ideal resource for anyone looking to make positive changes and adopt more productive work habits

Novice Programming Environments - Explorations in Human-Computer Interaction and Artificial Intelligence (Hardcover): Marc... Novice Programming Environments - Explorations in Human-Computer Interaction and Artificial Intelligence (Hardcover)
Marc Eisenstadt, Mark Keane, Tim Rajan
R3,715 Discovery Miles 37 150 Ships in 12 - 17 working days

This book, originally published in 1992, encapsulates ten years of research at the Open University's Human Cognition Research Laboratory. The research investigates the problems of novice programmers, and is strongly oriented toward the design and implementation of "programming environments" aimed at eliminating or easing novices' problems. A range of languages is studied: Pascal, SOLO, Lisp, Prolog and "Knowledge Engineering Programming". The primary emphasis of the empirical studies is to gain some understanding of novices' "mental models" of the inner workings of computers. Such (erroneous) models are constructed by novices in their own heads to account for the idiosyncrasies of particular programming languages. The primary emphasis of the implementations described in the book is the provision of "automatic debugging aids", i.e. artificial intelligence programs which can analyse novices' buggy programs, and make sense of them, thereby providing useful advice for the novices. Another related strand taken in some of the work is the concept of "pre-emptive design", i.e. the provision of tools such as syntax-directed editors and graphical tracers which help programmers avoid many frequently-occurring errors. A common thread throughout the book is its Cognitive Science/Artificial Intelligence orientation. AI tools are used, for instance, to construct simulation models of subjects writing programs, in order to provide insights into what their deep conceptual errors are. At the other extreme, AI programs which were developed in order to help student debug their programs are observed empirically in order to ensure that they provide facilities actually needed by real programmers. This book will be of great interest to advanced undergraduate, postgraduate, and professional researchers in Cognitive Science, Artificial Intelligence, and Human-Computer Interaction.

Mapping Cyberspace (Paperback, New): Martin Dodge, Rob Kitchin Mapping Cyberspace (Paperback, New)
Martin Dodge, Rob Kitchin
R1,743 Discovery Miles 17 430 Ships in 12 - 17 working days


Mapping Cyberspace is a ground-breaking geographic exploration and critical reading of cyberspace, and information and communication technologies. The book:
* provides an understanding of what cyberspace looks like and the social interactions that occur there
* explores the impacts of cyberspace, and information and communication technologies, on cultural, political and economic relations
* charts the spatial forms of virutal spaces
* details empirical research and examines a wide variety of maps and spatialisations of cyberspace and the information society
* has a related website at http://www.MappingCyberspace.com.
This book will be a valuable addition to the growing body of literature on cyberspace and what it means for the future.

User Interfaces for All - Concepts, Methods, and Tools (Hardcover): Constantine Stephanidis User Interfaces for All - Concepts, Methods, and Tools (Hardcover)
Constantine Stephanidis
R7,362 Discovery Miles 73 620 Ships in 12 - 17 working days

"User Interfaces for All" is the first book dedicated to the issues of Universal Design and Universal Access in the field of Human-Computer Interaction (HCI). Universal Design (or Design for All) is an inclusive and proactive approach seeking to accommodate diversity in the users and usage contexts of interactive products, applications, and services, starting from the design phase of the development life cycle. The ongoing paradigm shift toward a knowledge-intensive information society is already bringing about radical changes in the way people work and interact with each other and with information. The requirement for Universal Design stems from the growing impact of the fusion of the emerging technologies, and from the different dimensions of diversity, which are intrinsic to the information society.
This book unfolds the various aspects of this ongoing evolution from a variety of viewpoints. It's a collection of 30 chapters written by leading international authorities, affiliated with academic, research, and industrial organizations, and non-market institutions. The book provides a comprehensive overview of the state of the art in the field, and includes contributions from a variety of theoretical and applied disciplines and research themes.
This book can also be used for teaching purposes in HCI courses at the undergraduate as well as graduate level. Students will be introduced to the human-, organizational-, and technology-oriented dimensions that call for a departure from traditional approaches to user interface development. Students will also get an overview of novel methods, techniques, tools, and frameworks for the design, implementation, and evaluation of user interfaces that are universally accessible and usable by the broadest possible end-user population.
This comprehensive book is targeted to a broad readership, including HCI researchers, user interface designers, computer scientists, software engineers, ergonomists and usability engineers, Human Factors researchers and practitioners, organizational psychologists, system/product designers, sociologists, policy- and decision makers, scientists in government, industry and education, as well as assistive technology and rehabilitation experts.

Cybersex: The Dark Side of the Force - A Special Issue of the Journal Sexual Addiction and Compulsion (Paperback): Al Cooper Cybersex: The Dark Side of the Force - A Special Issue of the Journal Sexual Addiction and Compulsion (Paperback)
Al Cooper
R1,190 Discovery Miles 11 900 Ships in 12 - 17 working days


The exponential growth of the Internet in recent years has given individuals immediate and virtually anonymous access to all types of information, including explicit sexual content. While many celebrate the personal freedoms made possible by the Internet, others consider unfettered access to online sexual material to be an unhealthy, if not dangerous phenomenon. Expanding this debate, Cybersex: The Dark Side of the Force presents for the first time an empirical foundation for the discussion of cybersex compulsivity and its effect on the mental health of individuals, couples, teens, and young children.
While pornographic material has long been available to the consumer in print and video form, these purchases are inherently limited by the individual's degree of comfort with the public exposure (however minimal) that they they require. In contrast, the Internet provides a forum where children can access unsuitable material without parental supervision, and where individuals with existing sexual compulsions can acces material that can exacerbate their struggle to maintain control over their desire. Even among individuals who are not as susceptible to such material, cybersex can create distorted associations or compound negative or unrealistic expectations about sexuality.
This groundbreaking examination of cybersex was originally published as a special issue of the journal Sexual Addiction and Compulsivity. It is a crucial resource for sex therapists, who until now had no rigorous study of the effect of online pornography on the patients they treat. It will also be of great interest to general marriage and family therapists who find themselves dealing with this issue with their clients, as well as others who are interested in the Internet as a social phenomenon.

Related link: Free Email Alerting

The World Wide Web and Contemporary Cultural Theory - Magic, Metaphor, Power (Paperback): Andrew Herman, Thomas Swiss The World Wide Web and Contemporary Cultural Theory - Magic, Metaphor, Power (Paperback)
Andrew Herman, Thomas Swiss
R1,214 Discovery Miles 12 140 Ships in 12 - 17 working days


The World Wide Web is the most well-known, celebrated, and promoted contemporary manifestation of 'cyberspace'. To date, however, most of the public discourse on the Web falls into the category of explanatory journalism - the Web has remained largely unmapped in terms of contemporary cultural research. This book, however, begins that mapping by bringing together more than a dozen well-known scholars across the humanities and social sciences to explore the Web as a cultural technology characterized by a nexus of economic, political, social, and aesthetic forces. Engaging the thematic issues of the Web as a space where magic, metaphor, and power converge, the chapters cover such subjects as The Web and Corporate Media Systems, Conspiracy Theories and the Web, The Economy of Cyberpromotion, The Bias of the Web and The Web and Issues of Gender.

Introduction to Contextual Processing - Theory and Applications (Paperback): Gregory  Vert, S.Sitharama Iyengar, Vir V Phoha Introduction to Contextual Processing - Theory and Applications (Paperback)
Gregory Vert, S.Sitharama Iyengar, Vir V Phoha
R2,196 Discovery Miles 21 960 Ships in 12 - 17 working days

Develops a Comprehensive, Global Model for Contextually Based Processing Systems A new perspective on global information systems operation Helping to advance a valuable paradigm shift in the next generation and processing of knowledge, Introduction to Contextual Processing: Theory and Applications provides a comprehensive model for constructing a contextually based processing system. It explores the components of this system, the interactions of the components, key mathematical foundations behind the model, and new concepts necessary for operating the system. After defining the key dimensions of a model for contextual processing, the book discusses how data is used to develop a semantic model for contexts as well as language-driven context-specific processing actions. It then applies rigorous mathematical methods to contexts, examines basic sensor data fusion theory and applies it to the contextual fusion of information, and describes the means to distribute contextual information. The authors also illustrate a new type of data repository model to manage contextual data, before concluding with the requirements of contextual security in a global environment. This seminal work presents an integrated framework for the design and operation of the next generation of IT processing. It guides the way for developing advanced IT systems and offers new models and concepts that can support advanced semantic web and cloud computing capabilities at a global scale.

Word-Processing Technology in Japan - Kanji and the Keyboard (Hardcover): Nanette Gottlieb Word-Processing Technology in Japan - Kanji and the Keyboard (Hardcover)
Nanette Gottlieb
R4,444 Discovery Miles 44 440 Ships in 12 - 17 working days

This book deals with a topical issue relating to the use of script in Japan, one which has the potential to reshape future script policy through the mediation of both orthographic practices and social relations. It tells the story of the impact of one of the most significant technological breakthroughs in Japan in the latter part of this century: the invention and rapid adoption of word-processing technology capable of handling Japanese script in a society where the nature of that script had previously mandated handwriting as the norm. The ramifications of this technology in both the business and personal spheres have been wide-ranging, extending from changes to business practices, work profiles, orthography and social attitudes to writing through to Japan's ability to construct a substantial presence on the Internet in recent years.

Cognitive Task Analysis (Hardcover, Annotated Ed): Jan Maarten Schraagen, Susan F. Chipman, Valerie L Shalin Cognitive Task Analysis (Hardcover, Annotated Ed)
Jan Maarten Schraagen, Susan F. Chipman, Valerie L Shalin
R3,742 Discovery Miles 37 420 Ships in 12 - 17 working days

Cognitive task analysis is a broad area consisting of tools and techniques for describing the knowledge and strategies required for task performance. Cognitive task analysis has implications for the development of expert systems, training and instructional design, expert decision making and policymaking. It has been applied in a wide range of settings, with different purposes, for instance: specifying user requirements in system design or specifying training requirements in training needs analysis. The topics to be covered by this work include: general approaches to cognitive task analysis, system design, instruction, and cognitive task analysis for teams. The work settings to which the tools and techniques described in this work have been applied include: 911 dispatching, faultfinding on board naval ships, design aircraft, and various support systems.
The editors' goal in this book is to present in a single source a comprehensive, in-depth introduction to the field of cognitive task analysis. They have attempted to include as many examples as possible in the book, making it highly suitable for those wishing to undertake a cognitive task analysis themselves. The book also contains a historical introduction to the field and an annotated bibliography, making it an excellent guide to additional resources.

Get TikTok Famous Fast (Paperback): Will Eagle Get TikTok Famous Fast (Paperback)
Will Eagle
R407 R332 Discovery Miles 3 320 Save R75 (18%) Ships in 9 - 15 working days

Grab your phone and your friends and start making fame-worthy content today! Get TikTok Famous Fast is a bite-sized guide to building your own empire on TikTok and using it as a launchpad for your personal brand and media career. Top TikTok stars and industry insiders provide their tips on how be a hit, how to make your content the best possible, how to tap into the latest memes and trends, how to edit and - most importantly - how to grow your following.

IT Governance and Information Security - Guides, Standards, and Frameworks (Hardcover): Yassine Maleh, Abdelkebir Sahid, Mamoun... IT Governance and Information Security - Guides, Standards, and Frameworks (Hardcover)
Yassine Maleh, Abdelkebir Sahid, Mamoun Alazab, Mustapha Belaissaoui
R1,882 Discovery Miles 18 820 Ships in 9 - 15 working days

IT governance seems to be one of the best strategies to optimize IT assets in an economic context dominated by information, innovation, and the race for performance. The multiplication of internal and external data and increased digital management, collaboration, and sharing platforms exposes organizations to ever-growing risks. Understanding the threats, assessing the risks, adapting the organization, selecting and implementing the appropriate controls, and implementing a management system are the activities required to establish proactive security governance that will provide management and customers the assurance of an effective mechanism to manage risks. IT Governance and Information Security: Guides, Standards, and Frameworks is a fundamental resource to discover IT governance and information security. This book focuses on the guides, standards, and maturity frameworks for adopting an efficient IT governance and information security strategy in the organization. It describes numerous case studies from an international perspective and brings together industry standards and research from scientific databases. In this way, this book clearly illustrates the issues, problems, and trends related to the topic while promoting the international perspectives of readers. This book offers comprehensive coverage of the essential topics, including: IT governance guides and practices; IT service management as a key pillar for IT governance; Cloud computing as a key pillar for Agile IT governance; Information security governance and maturity frameworks. In this new book, the authors share their experience to help you navigate today's dangerous information security terrain and take proactive steps to measure your company's IT governance and information security maturity and prepare your organization to survive, thrive, and keep your data safe. It aspires to provide a relevant reference for executive managers, CISOs, cybersecurity professionals, engineers, and researchers interested in exploring and implementing efficient IT governance and information security strategies.

Designing Pleasurable Products - An Introduction to the New Human Factors (Hardcover): Patrick W Jordan Designing Pleasurable Products - An Introduction to the New Human Factors (Hardcover)
Patrick W Jordan
R5,339 Discovery Miles 53 390 Ships in 12 - 17 working days


Human factors considerations are increasingly being incorporated into the product design process. Users are seen more as being important factors in the overall look and usability of products than just as passive users. We are now treated as cognitive and physical components of the person/product system. The author, who is one of the leading lights in the field of cognitive ergonomics, looks at approaches that assume that if a task can be accomplished with a reasonable degree of efficiency and within acceptable levels of comfort, then the product can be seen as fitting to the user. In this book it is argued that in practice these approaches can be dehumanising. People are more than merely physical and cognitive processors. They have hopes, fears, dreams, values and aspirations, indeed these are the very things that make us human.
Designing Pleasurable Products looks both at and beyond usability, considering how products can appeal to use holistically, leading to products that are a joy to own.

eBook available with sample pages: 020330568X

The Digital Mom Handbook - How to Blog, Vlog, Tweet, and Facebook Your Way to a Dream Career at Home (Paperback): Audrey... The Digital Mom Handbook - How to Blog, Vlog, Tweet, and Facebook Your Way to a Dream Career at Home (Paperback)
Audrey McClelland, Colleen Padilla
R229 Discovery Miles 2 290 Ships in 12 - 17 working days

Mothers have been looking for the middle ground for more than half a century. Staying at home and raising the kids full-time isn't it. Working full-time and rushing home to tuck the kids in at 7 p.m. sharp ain't it either. Even part-time work outside the house can be a scramble for most women, as they try to 'have it all' between 9 am and 5 pm. To work or not to work? That seems to be the bottom-line question for most women today. But, Audrey McClelland and Colleen Padilla are proving that the equation is changing. Both of them left behind the corporate ladder and Ivy League degrees to stay home with their children; but, instead of assigning them permanent stay-at-home status, this choice was the catalyst to their reinvention. Miles apart, they each sat down at their computers one day and began to blog. Slowly but surely, their audiences grew. The portability of computers and smart-phones, the connective powers of social networks, and an overwhelming desire to happily mix work and family enabled them to move past the Mommy Wars (i.e. stay at home mom vs. working mom) into a territory all their own. Audrey and Colleen literally blogged, tweeted, skyped, vlogged, and facebooked their ways to the top. In "The Digital Mom Handbook", they will show other moms how to find middle ground - via the frontier of the Internet - too. Do you want to be a booming six-figure eBay saleswoman? A 20-hour-a-week brand consultant? A local Twitter correspondent? The terms are yours to define. Money, hours-per-week, title - these don't dictate your Digital Mom success. Personal satisfaction does. According to Audrey and Colleen, finding middle-ground requires 7 basic steps that moms can start using now to achieve the kind of success they desire: find your passion (look around, stake out your turf); hang a digital 'shingle' and start typing; find your tribe and forge alliances; let karma breed opportunity (carefully make the most of your network); don't forget the children! (define your version of success and make sure you're truly on middle ground); manage the Benjamins (a.k.a. 'the money'); and, live happily ever after (live your values).

Computing and Educational Studies - A Special Issue of educational Studies (Paperback): Eugene F. Provenzo Jr Computing and Educational Studies - A Special Issue of educational Studies (Paperback)
Eugene F. Provenzo Jr
R983 R823 Discovery Miles 8 230 Save R160 (16%) Ships in 12 - 17 working days

This special issue calls for a greater awareness of computing as a critical area of study for those interested in educational studies. Its purpose is to open up a wider dialogue about computing and education than has previously existed in the field. The questions raised provide the basis for a lively discussion and analysis of the role of educational studies in interpreting the role of computing in our culture and educational system. This issue also provides a model for exploring other topics of similar significance and importance to the field in future issues of the journal.

The Internet, Democracy and Democratization (Hardcover): Peter Ferdinand The Internet, Democracy and Democratization (Hardcover)
Peter Ferdinand
R4,247 Discovery Miles 42 470 Ships in 10 - 15 working days

The Internet is transforming political institutions and modes of political communication. It is also transforming relaitons between states and between citizens. Above all it provides opportunities to create new political communities. This book provides examples of how it is beginning to do so at the sub-state, state and international levels. Both established democracies, such as the US, the UK and Germany, as well as authoritarian regimes in Asia and Africa, are having to come to terms with it. But although it can be a force for increased democracy and for the spread of human rights worldwide, it may also be used by anti-democratic groups who have previously been marginalised. Both ethnic minorities and neo-Nazi groups are already trying to make the most of the Internet. Strong democracy or a 1984-type state: both are possibilities, both present enormous challenges.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Selfies, Sexts And Smartphones - A…
Emma Sadleir Paperback R270 R175 Discovery Miles 1 750
E-Commerce In South Africa
Adheesh Budree Paperback R403 R325 Discovery Miles 3 250
At Any Cost - The South African…
Stephen Timm Paperback R365 R314 Discovery Miles 3 140
Like, Comment, Subscribe - Inside…
Mark Bergen Paperback R350 R277 Discovery Miles 2 770
Broken Code - Inside Facebook And The…
Jeff Horwitz Paperback R420 R328 Discovery Miles 3 280
I Am Code
Brent Katz, Josh Morgenthau, … Paperback R390 R312 Discovery Miles 3 120
Fundamental Rights Protection Online…
Bilyana Petkova, Tuomas Ojanen Hardcover R3,722 Discovery Miles 37 220
IT Contracts and Dispute Management - A…
Steven Baker, Lawrence Akka, … Hardcover R5,809 Discovery Miles 58 090
EU General Data Protection Regulation…
It Governance Privacy Team Paperback R754 Discovery Miles 7 540
Regulating Social Network Sites - Data…
Asma Vranaki Hardcover R3,208 Discovery Miles 32 080

 

Partners