0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (9)
  • R100 - R250 (409)
  • R250 - R500 (1,167)
  • R500+ (11,487)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing

The Security Hippie (Paperback): Barak Engel The Security Hippie (Paperback)
Barak Engel
R1,089 Discovery Miles 10 890 Ships in 9 - 15 working days

The Security Hippie is Barak Engel's second book. As the originator of the "Virtual CISO" (fractional security chief) concept, he has served as security leader in dozens of notable organizations, such as Mulesoft, Stubhub, Amplitude Analytics, and many others. The Security Hippie follows his previous book, Why CISOs Fail, which became a sleeper hit, earning a spot in the Cybercannon project as a leading text on the topic of information security management. In this new book, Barak looks at security purely through the lens of story-telling, sharing many and varied experiences from his long and accomplished career as organizational and thought leader, and visionary in the information security field. Instead of instructing, this book teaches by example, sharing many real situations in the field and actual events from real companies, as well as Barak's related takes and thought processes. An out-of-the-mainstream, counterculture thinker - Hippie - in the world of information security, Barak's rich background and unusual approach to the field come forth in this book in vivid color and detail, allowing the reader to sit back and enjoy these experiences, and perhaps gain insights when faced with similar issues themselves or within their organizations. The author works hard to avoid technical terms as much as possible, and instead focus on the human and behavioral side of security, finding the humor inherent in every anecdote and using it to demystify the field and connect with the reader. Importantly, these are not the stories that made the news; yet they are the ones that happen all the time. If you've ever wondered about the field of information security, but have been intimidated by it, or simply wished for more shared experiences, then The Security Hippie is the perfect way to open that window by accompanying Barak on some of his many travels into the land of security.

Blender For Dummies, 4th Edition (Paperback, 4th Edition): JV van Gumster Blender For Dummies, 4th Edition (Paperback, 4th Edition)
JV van Gumster
R796 Discovery Miles 7 960 Ships in 12 - 17 working days

Make your 3D world a reality Some of the dramatic visual effects you've seen in top-grossing movies and heralded television series got their start in Blender. This book helps you get your own start in creating three-dimensional characters, scenes, and animations in the popular free and open-source tool. Author Jason van Gumster shares his insight as an independent animator and digital artist to help Blender newcomers turn their ideas into three-dimensional drawings. From exporting and sharing scenes to becoming a part of the Blender community, this accessible book covers it all! Create 3D characters--no experience required Build scenes with texture and real lighting features Animate your creations and share them with the world Avoid common rookie mistakes This book is the ideal starting place for newcomers to the world of 3D modeling and animation.

PCI Compliance - Understand and Implement Effective PCI Data Security Standard Compliance (Paperback, 5th edition): Branden... PCI Compliance - Understand and Implement Effective PCI Data Security Standard Compliance (Paperback, 5th edition)
Branden Williams, James Adamson
R1,344 Discovery Miles 13 440 Ships in 9 - 15 working days

Unique selling point: * Industry standard book for merchants, banks, and consulting firms looking to learn more about PCI DSS compliance. Core audience: * Retailers (both physical and electronic), firms who handle credit or debit cards (such as merchant banks and processors), and firms who deliver PCI DSS products and services. Place in the market: * Currently there are no PCI DSS 4.0 books

Building an Innovation Hotspot - Approaches and Policies to Stimulating New Industry (Paperback): Alicia (Lucy) Cameron Building an Innovation Hotspot - Approaches and Policies to Stimulating New Industry (Paperback)
Alicia (Lucy) Cameron
R1,328 Discovery Miles 13 280 Ships in 9 - 15 working days

Evaluates innovation policy and actions and considers real-world examples. Looks to the future of innovation and the role of future technologies. Provides an overview of recent policy trends in innovation and how they contribute to the creation of technology hotspots. Identifies how governments, industry, the research community and local communities can work together to craft individualised approaches to increasing innovation at a local level and building new industries.

Innovation in Crisis Management (Paperback): Chiara Fonio, Adam Widera, Tomasz Zweglinski Innovation in Crisis Management (Paperback)
Chiara Fonio, Adam Widera, Tomasz Zweglinski
R1,146 Discovery Miles 11 460 Ships in 9 - 15 working days

This book deals with how to measure innovation in crisis management, drawing on data, case studies, and lessons learnt from different European countries. The aim of this book is to tackle innovation in crisis management through lessons learnt and experiences gained from the implementation of mixed methods through a practitioner-driven approach in a large-scale demonstration project (DRIVER+). It explores innovation from the perspective of the end-users by focusing on the needs and problems they are trying to address through a tool (be it an app, a drone, or a training program) and takes a deep dive into what is needed to understand if and to what extent the tool they have in mind can really bring innovation. This book is a toolkit for readers interested in understanding what needs to be in place to measure innovation: it provides the know-how through examples and best practices. The book will be a valuable source of knowledge for scientists, practitioners, researchers, and postgraduate students studying safety, crisis management, and innovation.

Hands-On Ethical Hacking and Network Defense (Paperback, 4th edition): Rob Wilson Hands-On Ethical Hacking and Network Defense (Paperback, 4th edition)
Rob Wilson
R1,330 R1,188 Discovery Miles 11 880 Save R142 (11%) Ships in 10 - 15 working days

Wilson/Simpson/Antill's HANDS-ON ETHICAL HACKING AND NETWORK DEFENSE, 4th edition, equips you with the knowledge and skills to protect networks using the tools and techniques of an ethical hacker. The authors explore the concept of ethical hacking and its practitioners -- explaining their importance in protecting corporate and government data -- and then deliver an in-depth guide to performing security testing. Thoroughly updated, the text covers new security resources, emerging vulnerabilities and innovative methods to protect networks, mobile security considerations, computer crime laws and penalties for illegal computer hacking. A final project brings concepts together in a penetration testing exercise and report, while virtual machine labs, auto-graded quizzes and interactive activities in the online learning platform help further prepare you for your role as a network security professional.

You're On Mute - 101 Tips to Add Zip to your Zoom (Paperback): Jo Hoare You're On Mute - 101 Tips to Add Zip to your Zoom (Paperback)
Jo Hoare
R153 Discovery Miles 1 530 Ships in 12 - 17 working days

With 101 tips explaining the dos and don'ts of virtual meetings, delivered with abundant humour, You're On Mute will help you master video calls in "the new normal." If life on Zoom is getting you down and you're dreading the next inevitable invite to a Teams meeting, don't panic, help is at hand. Whether you need to stop doing that weird wave at the end of meetings or want to break the habit of being transfixed by your own face in the corner of the screen, the fun advice inside this book has got you covered. Advice includes: Mastering online etiquette - from the right way to say hello to the right time to hang up How to make multi-generational family video calls workable for both grandparents and children ("You're still on mute, grandma!") Ensuring your next video quiz is an entertaining test of knowledge rather than a painful test of endurance Best practices for work-related video calls, from being sensitive to camera-shy coworkers to the ideal backdrop for a job interview Successfully navigating an online romance, covering first dates to long-term relationships Avoiding the "must not dos" of video calls, whether it's the serious matter of security or the shame of surprise screen sharing In no time you'll be living your best life online, bringing your A game to any virtual work meeting, catch-up with family, quiz with friends, online date and more.

Understanding Virtual Reality - Challenging Perspectives for Media Literacy and Education (Paperback): Sarah Jones, Steve... Understanding Virtual Reality - Challenging Perspectives for Media Literacy and Education (Paperback)
Sarah Jones, Steve Dawkins, Julian McDougall
R1,094 Discovery Miles 10 940 Ships in 9 - 15 working days

This book provides critical commentary on key issues around virtual reality, using media technology as a tool to challenge perspectives for learning and understanding cultural diversities. With a focus on empathy, embodiment and ethics, the book interrogates the use of immersive technologies for formal and informal educational contexts. Taking a critical approach to discourses around emerging technology and learning, the book presents the idea that a new literacy is emerging and an emphasis on media and technology is needed in the context of education to explore and experience cultural diversities. Employing a personal reflexive narrative, the chapters highlight key issues through research and interviews with leading practitioners in the field. Understanding Virtual Reality will be of great interest to academics and students interested in the effects of immersive realities on the education experience, and to anyone keen on exploring the paradigm shift from entertainment to education.

Videogames and Agency (Paperback): Bettina Bodi Videogames and Agency (Paperback)
Bettina Bodi
R1,099 Discovery Miles 10 990 Ships in 9 - 15 working days

Videogames and Agency explores the trend in videogames and their marketing to offer a player higher volumes, or even more distinct kinds, of player freedom. The book offers a new conceptual framework that helps us understand how this freedom to act is discussed by designers, and how that in turn reflects in their design principles. What can we learn from existing theories around agency? How do paratextual materials reflect design intention with regards to what the player can and cannot do in a videogame? How does game design shape the possibility space for player action? Through these questions and selected case studies that include AAA and independent games alike, the book presents a unique approach to studying agency that combines game design, game studies, and game developer discourse. By doing so, the book examines what discourses around player action, as well as a game's design can reveal about the nature of agency and videogame aesthetics. This book will appeal to readers specifically interested in videogames, such as game studies scholars or game designers, but also to media studies students and media and screen studies scholars less familiar with digital games.

Advances in Mobile Health Technology - A Research Perspective (Paperback): Sinjini Mitra Advances in Mobile Health Technology - A Research Perspective (Paperback)
Sinjini Mitra
R1,316 Discovery Miles 13 160 Ships in 9 - 15 working days

The COVID-19 pandemic upended the lives of many and taught us the critical importance of taking care of one's health and wellness. Technological advances, coupled with advances in healthcare, has enabled the widespread growth of a new area called mobile health or mHealth that has completely revolutionized how people envision healthcare today. Just as smartphones and tablet computers are rapidly becoming the dominant consumer computer platforms, mHealth technology is emerging as an integral part of consumer health and wellness management regimes. The aim of this book is to inform readers about the this relatively modern technology, from its history and evolution to the current state-of-the-art research developments and the underlying challenges related to privacy and security issues. The book's intended audience includes individuals interested in learning about mHealth and its contemporary applications, from students to researchers and practitioners working in this field. Both undergraduate and graduate students enrolled in college-level healthcare courses will find this book to be an especially useful companion and will be able to discover and explore novel research directions that will further enrich the field.

What UX is Really About - Introducing a Mindset for Great Experiences (Paperback): Celia Hodent What UX is Really About - Introducing a Mindset for Great Experiences (Paperback)
Celia Hodent
R583 Discovery Miles 5 830 Ships in 9 - 15 working days

Key Features: This work aims to be the most approachable book about UX. Many books on the topic are highly specialized and are not easy to read for people who just want to understand it better. This book is easy to read and aims to popularize the UX mindset while debunking its main misconceptions. Small format size makes it easy to carry around. Includes content relatable and meaningful to the readers by taking many examples from everyday life with a conversational and light writing style. It tackles the psychology, design, research, process, strategy, and ethics behind offering the best experience with products, systems, or services. Includes a glossary.

Losing the Cybersecurity War - And What We Can Do to Stop It (Paperback): Steve King Losing the Cybersecurity War - And What We Can Do to Stop It (Paperback)
Steve King; Edited by Kiren Chaudry
R947 Discovery Miles 9 470 Ships in 9 - 15 working days

Addressing Cybersecurity through the lens of a war-time set of varying battlefields is unique. Tying those to Zero Trust is also unique. It has that unique POV that hasn't been covered before combined with a highly credible view of and explanation of Zero Trust.

What To Do When You Get Hacked - A Practitioner's Guide to Incident Response in the 21st Century (Paperback): Shimon... What To Do When You Get Hacked - A Practitioner's Guide to Incident Response in the 21st Century (Paperback)
Shimon Brathwaite
R1,180 Discovery Miles 11 800 Ships in 9 - 15 working days

1) What to do when you get hacked 2) A guide to incident response 3) Incident response and cybersecurity for small businesses

Responsible Graph Neural Networks (Hardcover): Nour Moustafa, Mohamed Abdel-Basset, Zahir Tari, Hossam Hawash Responsible Graph Neural Networks (Hardcover)
Nour Moustafa, Mohamed Abdel-Basset, Zahir Tari, Hossam Hawash
R2,257 Discovery Miles 22 570 Ships in 9 - 15 working days

More frequent and complex cyber threats require robust, automated and rapid responses from cyber security specialists. This book offers a complete study in the area of graph learning in cyber, emphasising graph neural networks (GNNs) and their cyber security applications. Three parts examine the basics; methods and practices; and advanced topics. The first part presents a grounding in graph data structures and graph embedding and gives a taxonomic view of GNNs and cyber security applications. Part two explains three different categories of graph learning including deterministic, generative and reinforcement learning and how they can be used for developing cyber defence models. The discussion of each category covers the applicability of simple and complex graphs, scalability, representative algorithms and technical details. Undergraduate students, graduate students, researchers, cyber analysts, and AI engineers looking to understand practical deep learning methods will find this book an invaluable resource.

The Auditor's Guide to Blockchain Technology - Architecture, Use Cases, Security and Assurance (Hardcover): Shaun Aghili The Auditor's Guide to Blockchain Technology - Architecture, Use Cases, Security and Assurance (Hardcover)
Shaun Aghili
R2,993 Discovery Miles 29 930 Ships in 9 - 15 working days

Unique selling point: * Provides IT managers and audit professionals with relevant knowledge directly applicable to various blockchain-related organizational projects. Core audience: * An educational and professional reference resource for information systems researchers, IT managers, and audit professionals. Place in the market: * Unlike most current blockchain titles on the market, The Auditor's Guide to Blockchain Technology also deals with security and assurance issues

Phishing for Nazis - Conspiracies, Anonymous Communications and White Supremacy Networks on the Dark Web (Paperback): Lev Topor Phishing for Nazis - Conspiracies, Anonymous Communications and White Supremacy Networks on the Dark Web (Paperback)
Lev Topor
R1,063 Discovery Miles 10 630 Ships in 9 - 15 working days

Phishing for Nazis is an evidence-based, undercover study of neo-Nazi communities on anonymous communication platforms that helps to shine a light on the dark web. It unveils how hatred and conspiracies spread and thrive online and how white supremacy is becoming prominent as extremists find shelter in the online dank underbelly of society. Phishing for Nazis explains how online manifestations of hate radicalize people into taking "real-world" action, such as shooting sprees. Methodologically, this book is unique, as it incorporates undercover cyberethnography, a method frequently used by law enforcement and intelligence agencies, unlike traditional academic studies of racism or social behavior that rely on secondary sources or surveys. With a particular interest on how race issues translate online, the book presents the true phenomenon of racism without relying on political correctness or whitewashing. It contributes to the field of cyber communication, as it details why and how people communicate and manage entire communities without knowing one another. The book also contributes to public policy, regulators, and technology companies as they deal with the practice of online anonymity and extremism.

NEOGEO: A VISUAL HISTORY (Hardcover): Bitmap Books NEOGEO: A VISUAL HISTORY (Hardcover)
Bitmap Books
R1,282 Discovery Miles 12 820 Ships in 9 - 15 working days
Hidden and Devalued Feminized Labour in the Digital Humanities - On the Index Thomisticus Project 1954-67 (Paperback): Julianne... Hidden and Devalued Feminized Labour in the Digital Humanities - On the Index Thomisticus Project 1954-67 (Paperback)
Julianne Nyhan
R1,131 Discovery Miles 11 310 Ships in 9 - 15 working days

Hidden and Devalued Feminized Labour in the Digital Humanities examines the data-driven labour that underpinned the Index Thomisticus-a preeminent project of the incunabular digital humanities-and advanced the data-foundations of computing in the Humanities. Through oral history and archival research, Nyhan reveals a hidden history of the entanglements of gender in the intellectual and technical work of the early digital humanities. Setting feminized keypunching in its historical contexts-from the history of concordance making, to the feminization of the office and humanities computing-this book delivers new insight into the categories of work deemed meritorious of acknowledgement and attribution and, thus, how knowledge and expertise was defined in and by this field. Focalizing the overlooked yet significant data-driven labour of lesser-known individuals, this book challenges exclusionary readings of the history of computing in the Humanities. Contributing to ongoing conversations about the need for alternative genealogies of computing, this book is also relevant to current debates about diversity and representation in the Academy and the wider computing sector. Hidden and Devalued Feminized Labour in the Digital Humanities will be of interest to researchers and students studying digital humanities, library and information science, the history of computing, oral history, the history of the humanities, and the sociology of knowledge and science.

Dual Quaternions and Their Associated Clifford Algebras (Hardcover): Ronald Goldman Dual Quaternions and Their Associated Clifford Algebras (Hardcover)
Ronald Goldman
R4,184 Discovery Miles 41 840 Ships in 12 - 17 working days

Amid recent interest in Clifford algebra for dual quaternions as a more suitable method for Computer Graphics than standard matrix algebra, this book presents dual quaternions and their associated Clifford algebras in a new light, accessible to and geared towards the Computer Graphics community. Collating all the associated formulas and theorems in one place, this book provides an extensive and rigorous treatment of dual quaternions, as well as showing how two models of Clifford algebras emerge naturally from the theory of dual quaternions. Each chapter comes complete with a set of exercises to help readers sharpen and practice their knowledge. This book is accessible to anyone with a basic knowledge of quaternion algebra and is of particular use to forward-thinking members of the Computer Graphics community. .

Responsible Graph Neural Networks (Paperback): Nour Moustafa, Mohamed Abdel-Basset, Zahir Tari, Hossam Hawash Responsible Graph Neural Networks (Paperback)
Nour Moustafa, Mohamed Abdel-Basset, Zahir Tari, Hossam Hawash
R1,337 Discovery Miles 13 370 Ships in 9 - 15 working days

More frequent and complex cyber threats require robust, automated and rapid responses from cyber security specialists. This book offers a complete study in the area of graph learning in cyber, emphasising graph neural networks (GNNs) and their cyber security applications. Three parts examine the basics; methods and practices; and advanced topics. The first part presents a grounding in graph data structures and graph embedding and gives a taxonomic view of GNNs and cyber security applications. Part two explains three different categories of graph learning including deterministic, generative and reinforcement learning and how they can be used for developing cyber defence models. The discussion of each category covers the applicability of simple and complex graphs, scalability, representative algorithms and technical details. Undergraduate students, graduate students, researchers, cyber analysts, and AI engineers looking to understand practical deep learning methods will find this book an invaluable resource.

The Evolution of Law against Payment Frauds (Paperback): Christopher Chen The Evolution of Law against Payment Frauds (Paperback)
Christopher Chen
R1,127 Discovery Miles 11 270 Ships in 9 - 15 working days

This book examines the evolution of legal institutions in containing and tackling fraudulent activities plaguing payment systems ('payment fraud', e.g. forged cheques, wrongful payment instructions, etc.) in Asia, focusing on laws in Greater China and Singapore. In the past century, the payment system has invited much innovation, changing the modes of payments from exchanging cash and coins to the use of cards, wire transfers and other new types of payment instruments or services (e.g. bitcoins or QR code payments). As the nature of payment services is to move money from one place to another, it naturally attracts fraudsters. Even with advanced computer technology, payment fraud is still rampant in the market, causing billions of dollars in losses globally per annum. Through an examination of payment instruments and associated frauds over time, the book illustrates a shifting trend of legal solutions from criminal sanctions and civil compensation to a gradual focus on regulations of payment intermediaries. This trend reflects the complexity of payment systems and the challenge of protecting them. The book also identifies the underlying actors and institutional characteristics driving the evolution of legal institutions to deal with payment fraud and illustrates how the arrival of new technology may affect the market and thus the evolution of legal institutions. The book will help readers to better understand the interaction between technology, the market and law and help regulators, financial institutions, practitioners and end users, as well as about payment fraud and corresponding legal responses.

Building a Digital Analytics Organization - Create Value by Integrating Analytical Processes, Technology, and People into... Building a Digital Analytics Organization - Create Value by Integrating Analytical Processes, Technology, and People into Business Operations (Paperback)
Judah Phillips
R1,249 R953 Discovery Miles 9 530 Save R296 (24%) Ships in 12 - 17 working days

Drive maximum business value from digital analytics, web analytics, site analytics, and business intelligence! In Building a Digital Analytics Organization, pioneering expert Judah Phillips thoroughly explains digital analytics to business practitioners, and presents best practices for using it to reduce costs and increase profitable revenue throughout the business. Phillips covers everything from making the business case through defining and executing strategy, and shows how to successfully integrate analytical processes, technology, and people in all aspects of operations. This unbiased and product-independent guide is replete with examples, many based on the author's own extensive experience. Coverage includes: key concepts; focusing initiatives and strategy on business value, not technology; building an effective analytics organization; choosing the right tools (and understanding their limitations); creating processes and managing data; analyzing paid, owned, and earned digital media; performing competitive and qualitative analyses; optimizing and testing sites; implementing integrated multichannel digital analytics; targeting consumers; automating marketing processes; and preparing for the revolutionary "analytical economy." For all business practitioners interested in analytics and business intelligence in all areas of the organization.

Secret Key Cryptography (Paperback): Frank Rubin Secret Key Cryptography (Paperback)
Frank Rubin
R1,054 Discovery Miles 10 540 Ships in 12 - 17 working days

Explore the fascinating and rich world of Secret Key cryptography! This book provides practical methods for encrypting messages, an interesting and entertaining historical perspective, and an incredible collection of ciphers and codes-including 30 unbreakable methods. In Secret Key Cryptography: Ciphers, from simple to unbreakable you will: Measure the strength of your ciphers and learn how to guarantee their security Construct and incorporate data-compression codes Generate true random numbers in bulk Construct huge primes and safe primes Add an undetectable backdoor to a cipher Defeat hypothetical ultracomputers that could be developed decades from now Construct 30 unbreakable ciphers Secret Key Cryptography gives you a toolbox of cryptographic techniques and Secret Key methods. The book's simple, non-technical language is easy to understand and accessible for any reader, even without the advanced mathematics normally required for cryptography. You'll learn how to create and solve ciphers, as well as how to measure their strength. As you go, you'll explore both historic ciphers and groundbreaking new approaches-including a never-before-seen way to implement the uncrackable One-Time Pad algorithm. about the technology Secret Key cryptography is the backbone of all modern computing infrastructure. Secret Key ciphers use the same key to encrypt and decrypt messages. Properly designed, these algorithms are efficient and practical. Some Secret Key approaches are uncrackable, even under attacks backed by supercomputers or quantum technology! about the book Secret Key Cryptography teaches anyone how to create a wide range of ciphers-even if you have no background in math or creating codes. You'll combine Secret Key techniques to achieve ciphers that are effectively uncrackable and avoid common pitfalls that result in strong-looking but weak ciphers. The book reveals scores of different cipher methods, including both historic examples and current innovations in the field. RETAIL SELLING POINTS * Measure the strength of your ciphers and learn how to guarantee their security * Construct and incorporate data-compression codes * Generate true random numbers in bulk * Construct huge primes and safe primes * Add an undetectable backdoor to a cipher * Defeat hypothetical ultra computers that could be developed decades from now * Construct 30 unbreakable ciphers AUDIENCE For professional engineers, computer scientists, and cryptography hobbyists. No advanced math knowledge is required

Leave No Trace - A suspenseful, twisty detective novel (Paperback): M.J. White Leave No Trace - A suspenseful, twisty detective novel (Paperback)
M.J. White
R265 R127 Discovery Miles 1 270 Save R138 (52%) Ships in 12 - 17 working days

A disappearance Ewan Stokes disappeared after a football match 15 years ago. No one knows where he went - or why - but every year on the anniversary of his disappearance, random mysterious sightings are reported across Europe. A cult following An online cult following has grown up around the mystery, sharing tips and sightings. Rumour has it that 'Stokesy' is coming back. And he wants revenge. Riled by the prospect of his return, unrest grows. His followers blame his ex-girlfriend, Maisie, for his disappearance and they want her to pay. A woman in danger As the 15th anniversary of Stokesy's disappearance approaches, there are more sightings, followed by apparently random acts of violence. The campaign of intimidation against Maisie grows. Frightened, she reaches out to the police but she has long been the victim of the cult's anger and her pleas for help have gone unheeded for years. A psychologist with a special gift Dr Cora Lael is brought in to help DS Minshull and South Suffolk CID before the situation gets out of hand. Can her special intuition unlock the key to Stokesy's disappearance, save Maisie and stop Stokesy wreaking his revenge?

Location, Travel and Information Technology - Selected Essays of Peter Nijkamp, Volume 3 (Hardcover): Peter Nijkamp Location, Travel and Information Technology - Selected Essays of Peter Nijkamp, Volume 3 (Hardcover)
Peter Nijkamp
R4,245 Discovery Miles 42 450 Ships in 12 - 17 working days

This important book collects together Peter Nijkamp's work on spatial-economic markets, particularly housing and labour markets, and the increasing impact of information technology on mobility and the location of firms, residents and job seekers.The first part deals with applied modelling and theoretical advances in housing market dynamics and research. The papers address issues such as the implications of household dynamics for relocation decisions, migration movements in Europe, and the driving forces for migration decisions of ethnic groups. The second part focuses on the spatial labour market, dealing with recruitment channel and search channel choices by job seekers and firms, vacancy durations and the opportunities offered by ethnic entrepreneurship for improving the chances of ethnic groups. The third part comprises an analysis of spatial mobility flows and interaction patterns and the final part emphasises the scope and effect of information technology in transport. This includes the effect of real-time information on the behaviour of car drivers, the effect of telematics devices on public transport users, the importance of telematics for the freight transport sector and the adoption mechanisms of ICT users and their related policy implications. This collection will be essential reading for scholars and students interested in the housing and labour markets and the impact on both of developments in IT and transport.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
E-Commerce In South Africa
Adheesh Budree Paperback R403 R355 Discovery Miles 3 550
The Hitchhiker's Guide To AI - A…
Arthur Goldstuck Paperback R350 R249 Discovery Miles 2 490
Broken Code - Inside Facebook And The…
Jeff Horwitz Paperback R420 R285 Discovery Miles 2 850
Misbelief - What Makes Rational People…
Dan Ariely Paperback R410 R320 Discovery Miles 3 200
WFH: Working From Home - How To Build A…
Harriet Minter Paperback R355 R280 Discovery Miles 2 800
Like, Comment, Subscribe - Inside…
Mark Bergen Paperback R350 R277 Discovery Miles 2 770
Autonomous Vehicles - Tracing the Locus…
Atilla Kasap Hardcover R2,669 Discovery Miles 26 690
IT Contracts and Dispute Management - A…
Steven Baker, Lawrence Akka, … Hardcover R5,696 Discovery Miles 56 960
I Am Code
Brent Katz, Josh Morgenthau, … Paperback R390 R312 Discovery Miles 3 120
Information And Communications…
Dana van der Merwe Paperback R1,119 R915 Discovery Miles 9 150

 

Partners