![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing
'The most important book of 2022.' Dr. Robert Malone Desmet's work on mass formation theory was brought to the world's attention on The Joe Rogan Experience and in major alternative news outlets around the globe. Read this book to get beyond the sound bites! In The Psychology of Totalitarianism, world-renowned Professor of Clinical Psychology Mattias Desmet deconstructs the societal conditions that allow collective hypnosis to take hold. By analysing the global pandemic, he identifies the phenomenon of 'mass formation' and illustrates how humanity is being forcibly, unconsciously led into a reality of technocratic totalitarianism, which aggressively excludes alternative views and relies on destructive groupthink, vilifying non-conformist thought as 'dissident.' Building on Hannah Arendt's essential work on totalitarianism, The Origins of Totalitarianism, Desmet offers a sharp critique of the cultural 'groupthink' that existed pre-pandemic but has steadily and inexorably advanced during the Covid crisis. He cautions against the dangers of our current societal landscape, media consumption, and reliance on manipulative technologies, offering simple solutions - both individual and collective - to prevent the willing sacrifice of our ability to think critically. The Psychology of Totalitarianism serves as an indispensable and fundamental guide to understanding this key moment in history. 'Mattias Desmet's [theory of mass formation hypnosis] is great. . . . Once I kind of started to look for it, I saw it everywhere.' Eric Clapton
Over the last two decades, a major challenge for researchers working on modeling and evaluation of computer-based systems has been the assessment of system Non Functional Properties (NFP) such as performance, scalability, dependability and security. In this book, the authors present cutting-edge model-driven techniques for modeling and analysis of software dependability. Most of them are based on the use of UML as software specification language. From the software system specification point of view, such techniques exploit the standard extension mechanisms of UML (i.e., UML profiling). UML profiles enable software engineers to add non-functional properties to the software model, in addition to the functional ones. The authors detail the state of the art on UML profile proposals for dependability specification and rigorously describe the trade-off they accomplish. The focus is mainly on RAMS (reliability, availability, maintainability and safety) properties. Among the existing profiles, they emphasize the DAM (Dependability Analysis and Modeling) profile, which attempts to unify, under a common umbrella, the previous UML profiles from literature, providing capabilities for dependability specification and analysis. In addition, they describe two prominent model-to-model transformation techniques, which support the generation of the analysis model and allow for further assessment of different RAMS properties. Case studies from different domains are also presented, in order to provide practitioners with examples of how to apply the aforementioned techniques. Researchers and students will learn basic dependability concepts and how to model them usingUML and its extensions. They will also gain insights into dependability analysis techniques through the use of appropriate modeling formalisms as well as of model-to-model transformation techniques for deriving dependability analysis models from UML specifications. Moreover, software practitioners will find a unified framework for the specification of dependability requirements and properties of UML, and will benefit from the detailed case studies."
In the world as we know it, you can be attacked both physically and virtually. For today's organisations, which rely so heavily on technology - particularly the Internet - to do business, the latter is the far more threatening of the two. The cyber threat landscape is complex and constantly changing. For every vulnerability fixed, another pops up, ripe for exploitation. This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape. Suitable for senior directors (CEO, CISO, CIO), compliance managers, privacy managers, IT managers, security analysts and others, the book is divided into six parts: Part 1: Introduction. The world of cyber security and the approach taken in this book. Part 2: Threats and vulnerabilities. A discussion of a range of threats organisations face, organised by threat category, to help you understand what you are defending yourself against before you start thinking about your actual defences. Part 3: The CRF processes. Detailed discussions of each of the 24 CRF processes, explaining a wide range of security areas by process category and offering guidance on how to implement each. Part 4: Eight steps to implementing cyber security. Our eight-step approach to implementing the cyber security processes you need and maintaining them. Part 5: Reference frameworks. An explanation of how standards and frameworks work, along with their benefits. It also presents ten framework options, introducing you to some of the best-known standards and giving you an idea of the range available. Part 6: Conclusion and appendices. The appendices include a glossary of all the acronyms and abbreviations used in this book. Whether you are just starting out on the road to cyber security or looking to enhance and improve your existing cyber resilience programme, it should be clear that cyber security is no longer optional in today's information age; it is an essential component of business success. Make sure you understand the threats and vulnerabilities your organisation faces and how the Cyber Resilience Framework can help you tackle them. Start your journey to cyber security now - buy this book today!
This comprehensive volume is the product of an intensive
collaborative effort among researchers across the United States,
Europe and Japan. The result -- a change in the way we think of
humans and computers.
Education and Technology for a Better World was the main theme for WCCE 2009. The conference highlights and explores different perspectives of this theme, covering all levels of formal education as well as informal learning and societal aspects of education. The conference was open to everyone involved in education and training. Additionally players from technological, societal, business and political fields outside education were invited to make relevant contributions within the theme: Education and Technology for a Better World. For several years the WCCE (World Conference on Computers in Education) has brought benefits to the fields of computer science and computers and education as well as to their communities. The contributions at WCCE include research projects and good practice presented in different formats from full papers to posters, demonstrations, panels, workshops and symposiums. The focus is not only on presentations of accepted contributions but also on discussions and input from all participants. The main goal of these conferences is to provide a forum for the discussion of ideas in all areas of computer science and human learning. They create a unique environment in which researchers and practitioners in the fields of computer science and human learning can interact, exchanging theories, experiments, techniques, applications and evaluations of initiatives supporting new developments that are potentially relevant for the development of these fields. They intend to serve as reference guidelines for the research community.
ISO/IEC 27701:2019: An introduction to privacy information management offers a concise introduction to the Standard, aiding those organisations looking to improve their privacy information management regime, particularly where ISO/IEC 27701:2019 is involved.
This volume presents the proceedings of ECSCW 2011, the 12th European Conference on Computer Supported Cooperative Work. Each conference offers an occasion to critically review our research field, which has been multidisciplinary and committed to high scientific standards, both theoretical and methodological, from its beginning. The papers this year focus on work and the enterprise as well as on the challenges of involving citizens, patients, etc. into collaborative settings. The papers embrace new theories, and discuss known ones. They contribute to the discussions on the blurring boundaries between home and work and on the ways we think about and study work. They introduce recent and emergent technologies, and study known social and collaborative technologies, such as wikis and video messages. Classical settings in computer supported cooperative work, e.g. meetings and standardization are also looked upon anew. With contributions from all over the world, the papers in interesting ways help focus on the European perspective in our community. The 22 papers selected for this conference deal with and reflect the lively debate currently ongoing in our field of research.
Putting technology front and centre in our thinking about law, this book introduces Law 3.0: the future of the legal landscape. Technology not only disrupts the traditional idea of what it is 'to think like a lawyer,' as per Law 1.0; it presents major challenges to regulators who are reasoning in a Law 2.0 mode. As this book demonstrates, the latest developments in technology offer regulators the possibility of employing a technical fix rather than just relying on rules - thus, we are introducing Law 3.0. Law 3.0 represents, so to speak, the state we are in and the conversation that we now need to have, and this book identifies some of the key points for discussion in that conversation. Thinking like a lawyer might continue to be associated with Law 1.0, but from 2020 onward, Law 3.0 is the conversation that we all need to join. And, as this book argues, law and the evolution of legal reasoning cannot be adequately understood unless we grasp the significance of technology in shaping both legal doctrine and our regulatory thinking. This is a book for those studying, or about to study, law - as well as others with interests in the legal, political, and social impact of technology.
A fast, hands-on introduction to offensive hacking techniques Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks to computer networks and data. Readers will benefit from the author's years of experience in the field hacking into computer networks and ultimately training others in the art of cyber-attacks. This book holds no punches and explains the tools, tactics and procedures used by ethical hackers and criminal crackers alike. We will take you on a journey through a hacker's perspective when focused on the computer infrastructure of a target company, exploring how to access the servers and data. Once the information gathering stage is complete, you'll look for flaws and their known exploits--including tools developed by real-world government financed state-actors. An introduction to the same hacking techniques that malicious hackers will use against an organization Written by infosec experts with proven history of publishing vulnerabilities and highlighting security flaws Based on the tried and tested material used to train hackers all over the world in the art of breaching networks Covers the fundamental basics of how computer networks are inherently vulnerable to attack, teaching the student how to apply hacking skills to uncover vulnerabilities We cover topics of breaching a company from the external network perimeter, hacking internal enterprise systems and web application vulnerabilities. Delving into the basics of exploitation with real-world practical examples, you won't find any hypothetical academic only attacks here. From start to finish this book will take the student through the steps necessary to breach an organization to improve its security. Written by world-renowned cybersecurity experts and educators, Hands-On Hacking teaches entry-level professionals seeking to learn ethical hacking techniques. If you are looking to understand penetration testing and ethical hacking, this book takes you from basic methods to advanced techniques in a structured learning format.
Describes the tools and strategies required for scholars, practitioners and administrators alike to excel and surpass obstacles based on the utilization of IT opportunities.
Scientific experiments and medical improvements in recent years have augmented our bodies, made them manipulable; our personal data have been downloaded, stored, sold, analyzed; and the pandemic has given new meaning to the idea of 'virtual presence'. Such phenomena are often thought to belong to the era of the 'posthuman', an era that both promises and threatens to redefine the notion of the human: what does it mean to be human? Can technological advances impact the way we define ourselves as a species? What will the future of humankind look like? These questions have gained urgency in recent years, and continue to preoccupy cultural and legal practitioners alike. How can the law respond and adapt to a world shaped by technology and AI? How can it ensure that technological developments remain inclusive, while simultaneously enforcing ethical limits to its reach? The volume explores how fictional texts, whether on the page or on screen, negotiate the legal dilemmas posed by the increasing infiltration of technology into modern life.
The aim of IFIP Working Group 2.7 (13.4) for User Interface Engineering is to investigate the nature, concepts and construction of user interfaces for software systems. The group's scope is: * developing user interfaces based on knowledge of system and user behaviour; * developing frameworks for reasoning about interactive systems; and * developing engineering models for user interfaces. Every three years, the group holds a "working conference" on these issues. The conference mixes elements of a regular conference and a workshop. As in a regular conference, the papers describe relatively mature work and are thoroughly reviewed. As in a workshop, the audience is kept small, to enable in-depth discussions. The conference is held over 5-days (instead of the usual 3-days) to allow such discussions. Each paper is discussed after it is presented. A transcript of the discussion is found at the end of each paper in these proceedings, giving important insights about the paper. Each session was assigned a "notes taker", whose responsibility was to collect/transcribe the questions and answers during the session. After the conference, the original transcripts were distributed (via the Web) to the attendees and modifications that clarified the discussions were accepted.
This book uses literature as a wrench to pry open social networks and to ask different questions than have been asked about social networks previously. The book emphasizes the story-telling aspect of social networks, as well as the connection between narrative and social networks by incorporating narrative, dynamic networks, and time. Thus, it constructs a bridge between literature, digital humanities, and social networks. This book is a pioneering work that attempts to express social and philosophic constructs in mathematical terms. The material used to test the algorithms is texts intended for performance, such as plays, film scripts, and radio plays; mathematical representations of the texts, or "literature networks", are then used to analyze the social networks found in the respective texts. By using literature networks and their accompanying narratives, along with their supporting analyses, this book allows for a novel approach to social network analysis.
ATM is regarded as the next high speed multimedia networking paradigm. Mobile computing, which is a confluence of mobile communications, computing and networks, is changing the way people work. Wireless ATM combines wireless and ATM technologies to provide mobility support and multimedia services to mobile users. Wireless ATM and Ad-Hoc Networks: Protocols and Architectures, a consolidated reference work, presents the state of the art in wireless ATM technology. It encompasses the protocol and architectural aspects of Wireless ATM networks. The topics covered in this book include: mobile communications and computing, fundamentals of ATM and Wireless ATM, mobile routing and switch discovery, handover protocol design and implementation, mobile quality of service, unifying handover strategy for both unicast and multicast mobile connections, and roaming between Wireless ATM LANs. A novel routing protocol for ad-hoc mobile networks (also known as Cambridge Ad-hoc) is also presented in this book along with information about ETSI HIPERLAN, the RACE Mobile Broadband System, and SUPERNET. This timely book is a valuable reference source for researchers, scientists, consultants, engineers, professors and graduate students working in this new and exciting field.
Who is going to reap the rewards of new information and communication technologies? Focusing on a theme of exclusion, Access Denied in the Information Age dispels the myths of the information society. The authors here take a few steps back from the hype and consider the real place of these new technologies in society.
The industrial society is fast becoming an information society. As
a result, many companies are experiencing serious difficulties in
developing the new internal structures required. The increasing use
of information technology has a profound effect on markets,
products, and processes, as well as the management of and
co-operation between companies. Recognising the possibilities and
grasping the emerging potential is an important challenge for
todays management, if the organisations and systems are to develop
over the next twenty years.
Understand your GDPR obligations and prioritise the steps you need to take to comply The GDPR gives individuals significant rights over how their personal information is collected and processed, and places a range of obligations on organisations to be more accountable for data protection. The Regulation applies to all data controllers and processors that handle EU residents' personal information. It supersedes the 1995 EU Data Protection Directive and all EU member states' national laws that are based on it - including the UK's DPA (Data Protection Act) 1998. Failure to comply with the Regulation could result in fines of up to 20 million or 4% of annual global turnover - whichever is greater. This guide is a perfect companion for anyone managing a GDPR compliance project. It provides a detailed commentary on the Regulation, explains the changes you need to make to your data protection and information security regimes, and tells you exactly what you need to do to avoid severe financial penalties. Clear and comprehensive guidance to simplify your GDPR compliance project Now in its fourth edition, EU General Data Protection Regulation (GDPR) - An implementation and compliance guide provides clear and comprehensive guidance on the GDPR. It explains the Regulation and sets out the obligations of data processors and controllers in terms you can understand. Topics covered include: The DPO (data protection officer) role, including whether you need one and what they should do; Risk management and DPIAs (data protection impact assessments), including how, when and why to conduct one; Data subjects' rights, including consent and the withdrawal of consent, DSARs (data subject access requests) and how to handle them, and data controllers and processors' obligations; Managing personal data internationally, including updated guidance following the Schrems II ruling; How to adjust your data protection processes to comply with the GDPR, and the best way of demonstrating that compliance; and A full index of the Regulation to help you find the articles and stipulations relevant to your organisation. Supplemental material While most of the EU GDPR's requirements are broadly unchanged in the UK GDPR, the context is quite different and will have knock-on effects. You may need to update contracts regarding EU-UK data transfers, incorporate standard contractual clauses into existing agreements, and update your policies, processes and procedural documentation as a result of these changes. We have published a supplement that sets out specific extra or amended information for this pocket guide. Click here to download the supplement. About the authors The IT Governance Privacy Team, led by Alan Calder, has substantial experience in privacy, data protection, compliance and information security. This practical experience, their understanding of the background and drivers for the GDPR, and the input of expert consultants and trainers are combined in this must-have guide to GDPR compliance. Start your compliance journey now and buy this book today.
Over the coming decades, Artificial Intelligence will profoundly impact the way we live, work, wage war, play, seek a mate, educate our young, and care for our elderly. It is likely to greatly increase our aggregate wealth, but it will also upend our labor markets, reshuffle our social order, and strain our private and public institutions. Eventually it may alter how we see our place in the universe, as machines pursue goals independent of their creators and outperform us in domains previously believed to be the sole dominion of humans. Whether we regard them as conscious or unwitting, revere them as a new form of life or dismiss them as mere clever appliances, is beside the point. They are likely to play an increasingly critical and intimate role in many aspects of our lives. The emergence of systems capable of independent reasoning and action raises serious questions about just whose interests they are permitted to serve, and what limits our society should place on their creation and use. Deep ethical questions that have bedeviled philosophers for ages will suddenly arrive on the steps of our courthouses. Can a machine be held accountable for its actions? Should intelligent systems enjoy independent rights and responsibilities, or are they simple property? Who should be held responsible when a self-driving car kills a pedestrian? Can your personal robot hold your place in line, or be compelled to testify against you? If it turns out to be possible to upload your mind into a machine, is that still you? The answers may surprise you.
Increase in consumer awareness of nutritional habits has placed automatic food analysis in the spotlight in recent years. However, food-logging is cumbersome and requires sufficient knowledge of the food item consumed. Additionally, keeping track of every meal can become a tedious task. Accurately documenting dietary caloric intake is crucial to manage weight loss, but also presents challenges because most of the current methods for dietary assessment must rely on memory to recall foods eaten. Food understanding from digital media has become a challenge with important applications in many different domains. Substantial research has demonstrated that digital imaging accurately estimates dietary intake in many environments and it has many advantages over other methods. However, how to derive the food information effectively and efficiently remains a challenging and open research problem. The provided recommendations could be based on calorie counting, healthy food and specific nutritional composition. In addition, if we also consider a system able to log the food consumed by every individual along time, it could provide health-related recommendations in the long-term. Computer Vision specialists have developed new methods for automatic food intake monitoring and food logging. Fourth Industrial Revolution [4.0 IR] technologies such as deep learning and computer vision robotics are key for sustainable food understanding. The need for AI based technologies that allow tracking of physical activities and nutrition habits are rapidly increasing and automatic analysis of food images plays an important role. Computer vision and image processing offers truly impressive advances to various applications like food analytics and healthcare analytics and can aid patients in keeping track of their calorie count easily by automating the calorie counting process. It can inform the user about the number of calories, proteins, carbohydrates, and other nutrients provided by each meal. The information is provided in real-time and thus proves to be an efficient method of nutrition tracking and can be shared with the dietician over the internet, reducing healthcare costs. This is possible by a system made up of, IoT sensors, Cloud-Fog based servers and mobile applications. These systems can generate data or images which can be analyzed using machine learning algorithms. Image Based Computing for Food and Health Analytics covers the current status of food image analysis and presents computer vision and image processing based solutions to enhance and improve the accuracy of current measurements of dietary intake. Many solutions are presented to improve the accuracy of assessment by analyzing health images, data and food industry based images captured by mobile devices. Key technique innovations based on Artificial Intelligence and deep learning-based food image recognition algorithms are also discussed. This book examines the usage of 4.0 industrial revolution technologies such as computer vision and artificial intelligence in the field of healthcare and food industry, providing a comprehensive understanding of computer vision and intelligence methodologies which tackles the main challenges of food and health processing. Additionally, the text focuses on the employing sustainable 4 IR technologies through which consumers can attain the necessary diet and nutrients and can actively monitor their health. In focusing specifically on the food industry and healthcare analytics, it serves as a single source for multidisciplinary information involving AI and vision techniques in the food and health sector. Current advances such as Industry 4.0 and Fog-Cloud based solutions are covered in full, offering readers a fully rounded view of these rapidly advancing health and food analysis systems.Â
How is the internet changing the way you think? That is one of the dominant questions of our time, one which affects almost every aspect of our life and future. And it's exactly what John Brockman, publisher of Edge.org, posed to more than 150 of the world's most influential minds. Brilliant, farsighted, and fascinating, Is the Internet Changing the Way You Think? is an essential guide to the Net-based world.
Peer-to-peer (P2P) technology, or peer computing, is a paradigm that is viewed as a potential technology for redesigning distributed architectures and, consequently, distributed processing. Yet the scale and dynamism that characterize P2P systems demand that we reexamine traditional distributed technologies. A paradigm shift that includes self-reorganization, adaptation and resilience is called for. On the other hand, the increased computational power of such networks opens up completely new applications, such as in digital content sharing, scientific computation, gaming, or collaborative work environments. In this book, Vu, Lupu and Ooi present the technical challenges offered by P2P systems, and the means that have been proposed to address them. They provide a thorough and comprehensive review of recent advances on routing and discovery methods; load balancing and replication techniques; security, accountability and anonymity, as well as trust and reputation schemes; programming models and P2P systems and projects. Besides surveying existing methods and systems, they also compare and evaluate some of the more promising schemes. The need for such a book is evident. It provides a single source for practitioners, researchers and students on the state of the art. For practitioners, this book explains best practice, guiding selection of appropriate techniques for each application. For researchers, this book provides a foundation for the development of new and more effective methods. For students, it is an overview of the wide range of advanced techniques for realizing effective P2P systems, and it can easily be used as a text for an advanced course on Peer-to-Peer Computing and Technologies, or as a companion text for courses on various subjects, such as distributed systems, and grid and cluster computing.
This book summarizes recent inventions, provides guidelines and recommendations, and demonstrates many practical applications of homomorphic encryption. This collection of papers represents the combined wisdom of the community of leading experts on Homomorphic Encryption. In the past 3 years, a global community consisting of researchers in academia, industry, and government, has been working closely to standardize homomorphic encryption. This is the first publication of whitepapers created by these experts that comprehensively describes the scientific inventions, presents a concrete security analysis, and broadly discusses applicable use scenarios and markets. This book also features a collection of privacy-preserving machine learning applications powered by homomorphic encryption designed by groups of top graduate students worldwide at the Private AI Bootcamp hosted by Microsoft Research. The volume aims to connect non-expert readers with this important new cryptographic technology in an accessible and actionable way. Readers who have heard good things about homomorphic encryption but are not familiar with the details will find this book full of inspiration. Readers who have preconceived biases based on out-of-date knowledge will see the recent progress made by industrial and academic pioneers on optimizing and standardizing this technology. A clear picture of how homomorphic encryption works, how to use it to solve real-world problems, and how to efficiently strengthen privacy protection, will naturally become clear. |
You may like...
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi
Paperback
Brain Machine Interfaces for Space…
Luca Rossini, Dario Izzo
Hardcover
R4,841
Discovery Miles 48 410
Fundamental Rights Protection Online…
Bilyana Petkova, Tuomas Ojanen
Hardcover
R4,152
Discovery Miles 41 520
|