0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (306)
  • R250 - R500 (1,130)
  • R500+ (10,966)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing

Future Home Design - A Home That Adapts To Different Phases Of Your Life (Hardcover): Farinah Husodo Future Home Design - A Home That Adapts To Different Phases Of Your Life (Hardcover)
Farinah Husodo
R806 R706 Discovery Miles 7 060 Save R100 (12%) Ships in 10 - 15 working days
The Pentester BluePrint - Starting a Career as an Ethical Hacker (Paperback): PL Wylie The Pentester BluePrint - Starting a Career as an Ethical Hacker (Paperback)
PL Wylie
R690 R636 Discovery Miles 6 360 Save R54 (8%) Ships in 12 - 19 working days

JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER The Pentester BluePrint: Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications. You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement. Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing. Written in a highly approachable and accessible style, The Pentester BluePrint avoids unnecessarily technical lingo in favor of concrete advice and practical strategies to help you get your start in pentesting. This book will teach you: The foundations of pentesting, including basic IT skills like operating systems, networking, and security systems The development of hacking skills and a hacker mindset Where to find educational options, including college and university classes, security training providers, volunteer work, and self-study Which certifications and degrees are most useful for gaining employment as a pentester How to get experience in the pentesting field, including labs, CTFs, and bug bounties

Protecting Privacy through Homomorphic Encryption (Hardcover, 1st ed. 2021): Kristin Lauter, Wei Dai, Kim Laine Protecting Privacy through Homomorphic Encryption (Hardcover, 1st ed. 2021)
Kristin Lauter, Wei Dai, Kim Laine
R3,121 Discovery Miles 31 210 Ships in 10 - 15 working days

This book summarizes recent inventions, provides guidelines and recommendations, and demonstrates many practical applications of homomorphic encryption. This collection of papers represents the combined wisdom of the community of leading experts on Homomorphic Encryption. In the past 3 years, a global community consisting of researchers in academia, industry, and government, has been working closely to standardize homomorphic encryption. This is the first publication of whitepapers created by these experts that comprehensively describes the scientific inventions, presents a concrete security analysis, and broadly discusses applicable use scenarios and markets. This book also features a collection of privacy-preserving machine learning applications powered by homomorphic encryption designed by groups of top graduate students worldwide at the Private AI Bootcamp hosted by Microsoft Research. The volume aims to connect non-expert readers with this important new cryptographic technology in an accessible and actionable way. Readers who have heard good things about homomorphic encryption but are not familiar with the details will find this book full of inspiration. Readers who have preconceived biases based on out-of-date knowledge will see the recent progress made by industrial and academic pioneers on optimizing and standardizing this technology. A clear picture of how homomorphic encryption works, how to use it to solve real-world problems, and how to efficiently strengthen privacy protection, will naturally become clear.

Handbook of Research on Technology Integration in the Global World (Hardcover): Efosa C. Idemudia Handbook of Research on Technology Integration in the Global World (Hardcover)
Efosa C. Idemudia
R5,317 Discovery Miles 53 170 Ships in 10 - 15 working days

Technology's presence in society continues to increase as new products and programs emerge. As such, it is vital for various industries to rapidly adapt and learn to incorporate the latest technology applications and tools. The Handbook of Research on Technology Integration in the Global World is an essential reference source that examines a variety of approaches to integrating technology through technology diffusion, e-collaboration, and e-adoption. The book explores topics such as information systems agility, semantic web, and the digital divide. This publication is a valuable resource for academicians, practitioners, researchers, and upper-level graduate students.

I Won't Forget Passwords To Remember - Hardback Cover Password Tracker And Information Keeper With Alphabetical Index For... I Won't Forget Passwords To Remember - Hardback Cover Password Tracker And Information Keeper With Alphabetical Index For Social Media, Website and Online Accounts With Ocean Painting Abstract (Hardcover)
Midnight Mornings Media
R528 Discovery Miles 5 280 Ships in 10 - 15 working days
Our Virtual World - The Transformation of Work Play and Life Via Technology (Paperback, Illustrated Ed): Laku Chidambaram, Ilze... Our Virtual World - The Transformation of Work Play and Life Via Technology (Paperback, Illustrated Ed)
Laku Chidambaram, Ilze Zigurs
R2,157 Discovery Miles 21 570 Ships in 10 - 15 working days

Since the dawn of civilization, new technologies-from the plow to the locomotive to the computer-have transformed human lives. These changes have often been for the better, but occasionally also for the worse. No matter what consequence, these changes have always been irrevocable and pervasive. Today's new technologies, from the well-connected computer to the digital communication infrastructure, are not exception. They are dramatically changing the way we work, play and live. The central theme of Our Virtual World: The Transformation of Work, Play and Life via Technology is the interplay of the ubiquity of the virtual environment and our evolving interactions in this changed context.

The Myth Of Security - Hackers' Inventions Will Win The Race for Information (Hardcover): Niels Starling The Myth Of Security - Hackers' Inventions Will Win The Race for Information (Hardcover)
Niels Starling
R750 Discovery Miles 7 500 Ships in 10 - 15 working days
60 Days to LinkedIn Mastery - The Entrepreneur, Executive, and Employee's Guide to Optimize Your Profile, Make Meaningful... 60 Days to LinkedIn Mastery - The Entrepreneur, Executive, and Employee's Guide to Optimize Your Profile, Make Meaningful Connections, and Create Compelling Content . . . In Just 15 Minutes a Day (Hardcover)
Josh Steimle; As told to Virginie Cantin, Andy Foote
R706 Discovery Miles 7 060 Ships in 10 - 15 working days
Managing Screen Time in an Online Society (Hardcover): Lidia Oliveira Managing Screen Time in an Online Society (Hardcover)
Lidia Oliveira
R5,005 Discovery Miles 50 050 Ships in 10 - 15 working days

The number of hours individuals spend in front of screens, such as smartphones, televisions, computers, and tablets, is enormous in today's society because screen time plays a very important role in work contexts and an even more significant role in social interaction and cultural consumption. This almost compulsive relationship with screens is more evident in children and young people and can have a lasting impact on how a society approaches screen time. Managing Screen Time in an Online Society is a collection of innovative research on how screen time seduces the person to stay in the online interaction leaving her/him in a state of alienation from her/his face-to-face context. While highlighting the methods and applications of time management in the context of screen time, especially during leisure, social interaction, and cultural consumption, this book covers topics including media consumption, psychology, and social networks. This book is ideal for researchers, students, and professionals seeking emerging information on the relationship between online interaction and personal relationships.

New Media Influence on Social and Political Change in Africa (Hardcover, New): Anthony A. Olorunnisola, Aziz Douai New Media Influence on Social and Political Change in Africa (Hardcover, New)
Anthony A. Olorunnisola, Aziz Douai
R4,913 Discovery Miles 49 130 Ships in 10 - 15 working days

While transitioning from autocracy to democracy, media in Africa has always played an important role in democratic and non-democratic states; focusing on politicians, diplomats, activists, and others who work towards political transformations. New Media Influence on Social and Political Change in Africa addresses the development of new mass media and communication tools and its influence on social and political change. While analyzing democratic transitions and cultures with a theoretical perspective, this book also presents case studies and national experiences for media, new media, and democracy scholars and practitioners.

Pragmatic Enterprise Architecture - Strategies to Transform Information Systems in the Era of Big Data (Paperback): James Luisi Pragmatic Enterprise Architecture - Strategies to Transform Information Systems in the Era of Big Data (Paperback)
James Luisi
R1,095 Discovery Miles 10 950 Ships in 12 - 19 working days

"Pragmatic Enterprise Architecture" is a practical hands-on instruction manual for enterprise architects. This book prepares you to better engage IT, management, and business users by equipping you with the tools and knowledge you need to address the most common enterprise architecture challenges. You will come away with a pragmatic understanding of and approach to enterprise architecture and actionable ideas to transform your enterprise. Experienced enterprise architect James V. Luisi generously shares life cycle architectures, transaction path analysis frameworks, and more so you can save time, energy, and resources on your next big project.

As an enterprise architect, you must have relatable frameworks and excellent communication skills to do your job. You must actively engage and support a large enterprise involving a hundred architectural disciplines with a modest number of subject matter experts across business, information systems, control systems, and operations architecture. They must achieve their mission using the influence of ideas and business benefits expressed in simple terms so that any audience can understand what to do and why. "Pragmatic Enterprise Architecture "gives you the tools to accomplish your goals in less time with fewer resources.
Expand your Enterprise Architecture skills so you can do more in less time with less money with the priceless tips presentedUnderstand the cost of creating new Enterprise Architecture disciplines and contrast those costs to letting them go unmanagedIncludes 10 life cycle architectures so that you can properly assess the ROI of performing activities such as outsourcing, insourcing, restructuring, mergers and acquisitions, and moreComplete appendix of eight transaction path analysis frameworks provide DBA guidelines for proper physical database design

Cyber Warfare and Terrorism - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso Management... Cyber Warfare and Terrorism - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R11,205 Discovery Miles 112 050 Ships in 10 - 15 working days
The UX Five-Second Rules - Guidelines for User Experience Design's Simplest Testing Technique (Paperback): Paul Doncaster The UX Five-Second Rules - Guidelines for User Experience Design's Simplest Testing Technique (Paperback)
Paul Doncaster
R617 Discovery Miles 6 170 Ships in 12 - 19 working days

The five-second test is one of the most convenient rapid UX testing methods available, although its value can be compromised by ignoring the restrictions of the method. "The Five-Second Rules" uses detailed examples from a collection of more than 300 tests to describe the strengths and weaknesses of this rapid testing method. Readers will learn about the "five-second rules" for getting useful data, and will explore what types of design issues can be resolved by using the method.

A five-second test (also known as "timeout test" and "exposure test") involves displaying a visual or informational design for five seconds, removing it from view, then asking what aspects were recalled most easily or vividly. The goal is to understand what stands out most about a design or product, and the impact on the viewer's perception of it.
Describes the origins of the method and its usefulness in modern UX design research and testingConveys the need to structure tests carefully so that time, effort, and money are not wasted, and compiled data is not misleadingFosters an appreciation for the method's outcomes and how they can contribute to the success or failure of a proposed design

The Influencer Effect - Insider Tips for Gearing Up Your Online Success (Hardcover): Greg Jameson The Influencer Effect - Insider Tips for Gearing Up Your Online Success (Hardcover)
Greg Jameson; Foreword by James Malinchak, Armand Morin
R711 R638 Discovery Miles 6 380 Save R73 (10%) Ships in 10 - 15 working days
I Won't Forget Passwords To Remember - Hardcover Password Tracker And Information Keeper With Alphabetical Index For... I Won't Forget Passwords To Remember - Hardcover Password Tracker And Information Keeper With Alphabetical Index For Social Media, Website and Online Accounts With Yorkie Poo Picture (Hardcover)
Midnight Mornings Media
R528 Discovery Miles 5 280 Ships in 10 - 15 working days
Facebook - The Top 100 Best Ways To Use Facebook For Business, Marketing, & Making Money (Hardcover): Ace McCloud Facebook - The Top 100 Best Ways To Use Facebook For Business, Marketing, & Making Money (Hardcover)
Ace McCloud
R544 R504 Discovery Miles 5 040 Save R40 (7%) Ships in 10 - 15 working days
Privacy-Preserving in Edge Computing (Hardcover, 1st ed. 2021): Longxiang Gao, Tom H. Luan, Bruce Gu, Youyang Qu, Yong Xiang Privacy-Preserving in Edge Computing (Hardcover, 1st ed. 2021)
Longxiang Gao, Tom H. Luan, Bruce Gu, Youyang Qu, Yong Xiang
R4,233 Discovery Miles 42 330 Ships in 12 - 19 working days

With the rapid development of big data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model. However, the delays caused by massive data transmission no longer meet the requirements of various real-time mobile services. Therefore, the emergence of edge computing has been recently developed as a new computing paradigm that can collect and process data at the edge of the network, which brings significant convenience to solving problems such as delay, bandwidth, and off-loading in the traditional cloud computing paradigm. By extending the functions of the cloud to the edge of the network, edge computing provides effective data access control, computation, processing and storage for end devices. Furthermore, edge computing optimizes the seamless connection from the cloud to devices, which is considered the foundation for realizing the interconnection of everything. However, due to the open features of edge computing, such as content awareness, real-time computing and parallel processing, the existing problems of privacy in the edge computing environment have become more prominent. The access to multiple categories and large numbers of devices in edge computing also creates new privacy issues. In this book, we discuss on the research background and current research process of privacy protection in edge computing. In the first chapter, the state-of-the-art research of edge computing are reviewed. The second chapter discusses the data privacy issue and attack models in edge computing. Three categories of privacy preserving schemes will be further introduced in the following chapters. Chapter three introduces the context-aware privacy preserving scheme. Chapter four further introduces a location-aware differential privacy preserving scheme. Chapter five presents a new blockchain based decentralized privacy preserving in edge computing. Chapter six summarize this monograph and propose future research directions. In summary, this book introduces the following techniques in edge computing: 1) describe an MDP-based privacy-preserving model to solve context-aware data privacy in the hierarchical edge computing paradigm; 2) describe a SDN based clustering methods to solve the location-aware privacy problems in edge computing; 3) describe a novel blockchain based decentralized privacy-preserving scheme in edge computing. These techniques enable the rapid development of privacy-preserving in edge computing.

The Basics of Digital Privacy - Simple Tools to Protect Your Personal Information and Your Identity Online (Paperback): Denny... The Basics of Digital Privacy - Simple Tools to Protect Your Personal Information and Your Identity Online (Paperback)
Denny Cherry
R650 Discovery Miles 6 500 Ships in 12 - 19 working days

Who s watching you online? These days, it s hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy.

"The Basics of Digital Privacy" teaches you how to protect the privacy of your data and your identity while surfing, searching, and interacting with others in a virtual world. Author Denny Cherry teaches professionals how to keep huge databases secure, and he will introduce you to the basic concepts of protecting your identity, your financial data, and your personal information from prying eyes while using your computer and smartphone. You ll learn how to stay connected and conduct business online, while protecting your privacy with every keystroke and click.

"The Basics of Digital Privacy" gives you clear, non-technical explanations of how to safely store personal information online, create secure usernames and passwords for websites, and participate in social media without compromising your privacy. Learn how to find out who s watching you online, and what the law has to say about your privacy rights. A great resource for anyone who ventures into the online world on a daily basis
The most straightforward and up-to-date guide to privacy for anyone who goes online for work, school, or personal useReal-world examples show you how cyber criminals commit their crimes, and what you can do to keep your identity and your data safeWritten by author Denny Cherry, who teaches top security professionals how to protect huge databases of informationLearn the best ways to create secure passwords, chat, text, email and conduct business online without compromising your identity and your personal data"

Creating Personal, Social, and Urban Awareness through Pervasive Computing (Hardcover, New): Bin Guo, Daniele Riboni, Peizhao Hu Creating Personal, Social, and Urban Awareness through Pervasive Computing (Hardcover, New)
Bin Guo, Daniele Riboni, Peizhao Hu
R4,725 Discovery Miles 47 250 Ships in 10 - 15 working days

The recent emergence and prevalence of social network applications, sensor equipped mobile devices, and the availability of large amounts of geo-referenced data have enabled the analysis of new context dimensions that involve individual, social, and urban context. Creating Personal, Social, and Urban Awareness through Pervasive Computing provides an overview of the theories, techniques, and practical applications related to the three dimensions of context awareness. Through the exploration of emerging research trends of pervasive computing, this book is beneficial to professors, students, researchers, and developers interested this latest development in the field of context-awareness and pervasive computing.

New Opportunities for Artistic Practice in Virtual Worlds (Hardcover): Denise Doyle New Opportunities for Artistic Practice in Virtual Worlds (Hardcover)
Denise Doyle
R5,096 Discovery Miles 50 960 Ships in 10 - 15 working days

Although virtual worlds continue to grow in popularity, a substantial amount of research is needed to determine best practices in virtual spaces. The artistic community is one field where virtual worlds can be utilized to the greatest effect. New Opportunities for Artistic Practice in Virtual Worlds provides a coherent account of artistic practices in virtual worlds and considers the contribution the Second Life platform has made in a historical, theoretical, and critical context within the fields of art and technology. This volume is intended for both artists and scholars in the areas of digital art, art and technology, media arts history, virtual worlds, and games studies, as well as a broader academic audience who are interested in the philosophical implications of virtual spaces.

Social Media for Direct Selling Representatives - Ethical and Effective Online Marketing, 2018 Edition (Hardcover, Updated... Social Media for Direct Selling Representatives - Ethical and Effective Online Marketing, 2018 Edition (Hardcover, Updated Second ed.)
Karen Clark
R734 Discovery Miles 7 340 Ships in 12 - 19 working days
Social Media Security - Leveraging Social Networking While Mitigating Risk (Paperback): Michael Cross Social Media Security - Leveraging Social Networking While Mitigating Risk (Paperback)
Michael Cross
R1,185 Discovery Miles 11 850 Ships in 12 - 19 working days

Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people s lives and is now becoming a significant driving force in business. These new platforms have provided new approaches to many critical enterprise functions, including identifying, communicating, and gathering feedback with customers (e.g., Facebook, Ning); locating expertise (e.g., LinkedIn); providing new communication platforms (e.g., Twitter); and collaborating with a community, small or large (e.g., wikis). However, many organizations have stayed away from potential benefits of social networks because of the significant risks associated with them. This book will help an organization understand the risks present in social networks and provide a framework covering policy, training and technology to address those concerns and mitigate the risks presented to leverage social media in their organization. The book also acknowledges that many organizations have already exposed themselves to more risk than they think from social networking and offers strategies for "dialing it back" to retake control.
Defines an organization's goals for social networkingPresents the risks present in social networking and how to mitigate themExplains how to maintain continuous social networking security"

The STREAM TONE: The Future of Personal Computing? (Hardcover): T. Gilling The STREAM TONE: The Future of Personal Computing? (Hardcover)
T. Gilling
R1,170 Discovery Miles 11 700 Ships in 12 - 19 working days

Imagine... a world where your next personal computing device is the last one that you would ever need to buy. Where you would never need to worry about operating systems, software patches, or viruses. Where you always had enough processing power, memory, storage, and top-of-the-line graphics. Where you could access all of the very best software applications, regardless of their platform. Where you had a constant connection to all your favourite digital services, and your battery lasted for days, perhaps even weeks, of full-on use. Sounds good, doesn't it? Well, this is the world of the Stream Tone. A world that does not exist in some far off future; this could be, figuratively speaking, our world a mere five minutes from now. All that is needed to make it a reality is the creative convergence of certain technologies that are already available and in use today. Personal computing is changing from an old world of local services, provided by local devices, to a new world of remote Web-based services, provided by cloud computing-based data centres. The STREAM TONE: The Future of Personal Computing? is a 408-page academically-oriented non-fiction book that explores, in some technical detail, what might be required to make a comprehensive move to this exciting new world, and the many benefits that move could bring. This book not only attempts to make a thorough evaluation of the technology ecosystem that will be required to create this future but also considers many of the implications of such a move. Along the way, it also discusses a wide range of currently-available technologies and how they could possibly be used to enable this future.

Handbook of Medical and Healthcare Technologies (Hardcover, 2013 ed.): Borko Furht, Ankur Agarwal Handbook of Medical and Healthcare Technologies (Hardcover, 2013 ed.)
Borko Furht, Ankur Agarwal
R5,613 R5,266 Discovery Miles 52 660 Save R347 (6%) Ships in 12 - 19 working days

This book equips readers to understand a complex range of healthcare products that are used to diagnose, monitor, and treat diseases or medical conditions affecting humans. The first part of the book presents medical technologies such as medical information retrieval, tissue engineering techniques, 3D medical imaging, nanotechnology innovations in medicine, medical wireless sensor networks, and knowledge mining techniques in medicine. The second half of the book focuses on healthcare technologies including prediction hospital readmission risk, modeling e-health framework, personal Web in healthcare, security issues for medical records, and personalized services in healthcare. The contributors are leading world researchers who share their innovations, making this handbook the definitive resource on these topics. Handbook of Medical and Healthcare Technologies is intended for a wide audience including academicians, designers, developers, researchers and advanced-level students. It is also valuable for business managers, entrepreneurs, and investors within the medical and healthcare industries.

GeoComputation and Public Health - A Spatial Approach (Hardcover, 1st ed. 2021): Gouri Sankar Bhunia, Pravat Kumar Shit GeoComputation and Public Health - A Spatial Approach (Hardcover, 1st ed. 2021)
Gouri Sankar Bhunia, Pravat Kumar Shit
R4,143 Discovery Miles 41 430 Ships in 10 - 15 working days

GeoComputation and Public Health is fundamentally a multi-disciplinary book, which presents an overview and case studies to exemplify numerous methods and solicitations in addressing vectors borne diseases (e.g, Visceral leishmaniasis, Malaria, Filaria). This book includes a practical coverage of the use of spatial analysis techniques in vector-borne disease using open source software solutions. Environmental factors (relief characters, climatology, ecology, vegetation, water bodies etc.) and socio-economic issues (housing type & pattern, education level, economic status, income level, domestics' animals, census data, etc) are investigated at micro -level and large scale in addressing the various vector-borne disease. This book will also generate a framework for interdisciplinary discussion, latest innovations, and discoveries on public health. The first section of the book highlights the basic and principal aspects of advanced computational practices. Other sections of the book contain geo-simulation, agent-based modeling, spatio-temporal analysis, geospatial data mining, various geocomputational applications, accuracy and uncertainty of geospatial models, applications in environmental, ecological, and biological modeling and analysis in public health research. This book will be useful to the postgraduate students of geography, remote sensing, ecology, environmental sciences and research scholars, along with health professionals looking to solve grand challenges and management on public health.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Allosteric Modulation of G…
Robert Laprairie Paperback R3,117 Discovery Miles 31 170
Damaged Joy - Fixing Digital Experience
Taz Lake Hardcover R474 R444 Discovery Miles 4 440
An Essay on the Action Proper for the…
John Mason Paperback R399 Discovery Miles 3 990
The Future of Copyright in the Age of…
Aviv H. Gaon Hardcover R3,329 Discovery Miles 33 290
A (Very) Short History of Life On Earth…
Henry Gee Paperback R285 R258 Discovery Miles 2 580
The Rise And Fall Of The ANC Youth…
Rebone Tau Paperback R230 R213 Discovery Miles 2 130
Handbook on the Physics and Chemistry of…
Jean-Claude G. Bunzli, Vitalij K Pecharsky Hardcover R8,484 Discovery Miles 84 840
Learner support in a diverse classroom…
M. Nel, N. Nel, … Paperback R696 Discovery Miles 6 960
A Dangerous Love - A Memoir Of Love…
Karen Daniels Paperback R426 Discovery Miles 4 260
Power And Loss In South African…
Glenda Daniels Paperback R380 R351 Discovery Miles 3 510

 

Partners