0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (9)
  • R100 - R250 (391)
  • R250 - R500 (1,141)
  • R500+ (11,442)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing

Digital Forensics in the Era of Artificial Intelligence (Paperback): Nour Moustafa Digital Forensics in the Era of Artificial Intelligence (Paperback)
Nour Moustafa
R1,409 Discovery Miles 14 090 Ships in 9 - 15 working days

Digital forensics plays a crucial role in identifying, analysing, and presenting cyber threats as evidence in a court of law. Artificial intelligence, particularly machine learning and deep learning, enables automation of the digital investigation process. This book provides an in-depth look at the fundamental and advanced methods in digital forensics. It also discusses how machine learning and deep learning algorithms can be used to detect and investigate cybercrimes. This book demonstrates digital forensics and cyber-investigating techniques with real-world applications. It examines hard disk analytics and style architectures, including Master Boot Record and GUID Partition Table as part of the investigative process. It also covers cyberattack analysis in Windows, Linux, and network systems using virtual machines in real-world scenarios. Digital Forensics in the Era of Artificial Intelligence will be helpful for those interested in digital forensics and using machine learning techniques in the investigation of cyberattacks and the detection of evidence in cybercrimes.

AI for Big Data Based Engineering Applications from the Security Perspectives (Hardcover): Balwinder Raj, Brij B. Gupta, Shingo... AI for Big Data Based Engineering Applications from the Security Perspectives (Hardcover)
Balwinder Raj, Brij B. Gupta, Shingo Yamaguchi, Sandeep Singh Gill
R3,390 Discovery Miles 33 900 Ships in 12 - 17 working days

i. This book will contain AI, ML, DL, big data and security never before considered ii. Innovative artificial intelligence techniques and algorithms iii. Only emerging from recent research and development, e.g. AI for big data from security perspective, which are not covered in any existing texts iv. Artificial Intelligence for big data and security Applications with advanced features v. Key new finding of machine learning and deep learning for Security Applications

Privacy & Personality (Paperback): Russell L Ciochon Privacy & Personality (Paperback)
Russell L Ciochon
R1,387 Discovery Miles 13 870 Ships in 12 - 17 working days

Like many concepts, privacy has a commonly accepted core of meaning with an indefinite or variable periphery. Some would wish to enlarge the core. It would be pointless to attempt to establish a definition by way of introduction to a series of essays that themselves provide no single definition. But the themes of freedom, justice, rational choice, and community always seem to appear in any discussion of privacy. "Privacy is a penultimate good. Perhaps, in certain usages--such as autonomy--it is an ultimate good, desirable for its own sake and grounded on nothing more final. Of course, the right of privacy may sometimes be asserted to conceal illegal or immoral acts. When that occurs, it appears to be put to an instrumental use. But, insofar as we justify such claims, it is not because they prevent the detection of immorality or violations of the law. Rather, at least in the case of illegal acts, it is because the means being challenged themselves violate privacy.

The individual control-human dignity foundation for privacy, is closely related to personality. Privacy provides relief from tension and opportunity for the development of intimate relations with others. All of us have standards of behavior that are higher than we can maintain at all times, and these standards are widely shared in the society in which we live. If we do not observe them we are likely to be criticized, or we fear that we shall be, and we suffer also from loss of self-esteem. Whether in some final sense the concept of privacy is culture bound is impossible to establish, in the absence of any known society in which elements of privacy are not to be found.

"J. Roland Pennock" was professor of political science at Swarthmore College for more than twenty-five years, as well as a fellow at the John Simon Guggenheim Memorial Foundation. "John W. Chapman" is professor emeritus of political science at the University of Pittsburgh.

Data - New Trajectories in Law (Paperback): Robert Herian Data - New Trajectories in Law (Paperback)
Robert Herian
R682 Discovery Miles 6 820 Ships in 9 - 15 working days

This book explores the phenomenon of data - big and small - in the contemporary digital, informatic and legal-bureaucratic context. Challenging the way in which legal interest in data has focused on rights and privacy concerns, this book examines the contestable, multivocal and multifaceted figure of the contemporary data subject. The book analyses "data" and "personal data" as contemporary phenomena, addressing the data realms, such as stores, institutions, systems and networks, out of which they emerge. It interrogates the role of law, regulation and governance in structuring both formal and informal definitions of the data subject, and disciplining data subjects through compliance with normative standards of conduct. Focusing on the 'personal' in and of data, the book pursues a re-evaluation of the nature, role and place of the data subject qua legal subject in on and offline societies: one that does not begin and end with the inviolability of individual rights but returns to more fundamental legal principles suited to considerations of personhood, such as stewardship, trust, property and contract. The book's concern with the production, use, abuse and alienation of personal data within the context of contemporary communicative capitalism will appeal to scholars and students of law, science and technology studies, and sociology; as well as those with broader political interests in this area.

Countering Cyber Sabotage - Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) (Paperback): Andrew A. Bochman,... Countering Cyber Sabotage - Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) (Paperback)
Andrew A. Bochman, Sarah Freeman
R1,040 Discovery Miles 10 400 Ships in 9 - 15 working days

Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. Current best practice approaches to cyber defense struggle to stop targeted attackers from creating potentially catastrophic results. From a national security perspective, it is not just the damage to the military, the economy, or essential critical infrastructure companies that is a concern. It is the cumulative, downstream effects from potential regional blackouts, military mission kills, transportation stoppages, water delivery or treatment issues, and so on. CCE is a validation that engineering first principles can be applied to the most important cybersecurity challenges and in so doing, protect organizations in ways current approaches do not. The most pressing threat is cyber-enabled sabotage, and CCE begins with the assumption that well-resourced, adaptive adversaries are already in and have been for some time, undetected and perhaps undetectable. Chapter 1 recaps the current and near-future states of digital technologies in critical infrastructure and the implications of our near-total dependence on them. Chapters 2 and 3 describe the origins of the methodology and set the stage for the more in-depth examination that follows. Chapter 4 describes how to prepare for an engagement, and chapters 5-8 address each of the four phases. The CCE phase chapters take the reader on a more granular walkthrough of the methodology with examples from the field, phase objectives, and the steps to take in each phase. Concluding chapter 9 covers training options and looks towards a future where these concepts are scaled more broadly.

The EU Artificial Intelligence Act - Regulating Subliminal AI Systems (Hardcover): Rostam J. Neuwirth The EU Artificial Intelligence Act - Regulating Subliminal AI Systems (Hardcover)
Rostam J. Neuwirth
R1,560 Discovery Miles 15 600 Ships in 9 - 15 working days

AI in combination with other innovative technologies promises to bring unprecedented opportunities to all aspects of life. These technologies, however, hold great dangers, especially for the manipulation of the human mind, which have given rise to serious ethical concerns. Apart from some sectoral regulatory efforts to address these concerns, no regulatory framework for AI has yet been adopted though in 2021 the European Commission of the EU published a draft Act on Artificial Intelligence and UNESCO followed suit with a Recommendation on the Ethics of Artificial Intelligence. The book contextualises the future regulation of AI, specifically addressing the regulatory challenges relating to the planned prohibition of the use of AI systems that deploy subliminal techniques. The convergence of AI with various related technologies, such as brain-computer interfaces, functional magnetic resonance imaging, robotics and big data, already allows for "mind reading" or "dream hacking" through brain spyware, as well as other practices that intrude on cognition and the right to freedom of thought. Future innovations will enhance the possibilities for manipulating thoughts and behaviour, and they threaten to cause serious harm to individuals as well as to society as a whole. The issue of subliminal perception and the ability to deceive and manipulate the mind below the threshold of awareness causes severe difficulties for law and democracy and raises important questions for the future of society. This book shows how cognitive, technological, and legal questions are intrinsically interwoven, and aims to stimulate an urgently needed transdisciplinary and transnational debate between students, academics, practitioners, policymakers and citizens interested not only in the law but also in disciplines including computer science, neuroscience, sociology, political science, marketing and psychology.

The Internet and Politics - Citizens, Voters and Activists (Paperback, New Ed): Sarah Oates, Diana Owen, Rachel K. Gibson The Internet and Politics - Citizens, Voters and Activists (Paperback, New Ed)
Sarah Oates, Diana Owen, Rachel K. Gibson
R1,382 Discovery Miles 13 820 Ships in 12 - 17 working days

This volume explores the nature of the Internet's impact on civil society, addressing the following central questions: is the Internet qualitatively different from the more traditional forms of the media? has the Internet demonstrated real potential to improve civil society through a wider provision of information, an enhancement of communication between government and citizen, or via better state transparency? does the Internet pose a threat to the coherence of civil society as people are encouraged to abandon shared media experiences and pursue narrow interests? in authoritarian states, does the Internet function as a beacon for free speech or as another tool for propaganda?

Data Storytelling and Visualization with Tableau - A Hands-on Approach (Hardcover): Prachi Manoj Joshi, Parikshit Narendra... Data Storytelling and Visualization with Tableau - A Hands-on Approach (Hardcover)
Prachi Manoj Joshi, Parikshit Narendra Mahalle
R1,564 Discovery Miles 15 640 Ships in 9 - 15 working days

Provides a hands-on approach in Tableau in a simplified manner with steps Discusses the broad background of data and its fundamentals, Internet of everything to analytics Emphasizes the use of context in delivering the stories Presents case studies with building of a dashboard Reviews application areas and case studies with identification of the impactful visualization

The Practical Guide to HIPAA Privacy and Security Compliance (Paperback, 2nd edition): Rebecca Herold, Kevin Beaver The Practical Guide to HIPAA Privacy and Security Compliance (Paperback, 2nd edition)
Rebecca Herold, Kevin Beaver
R2,105 Discovery Miles 21 050 Ships in 9 - 15 working days

Following in the footsteps of its bestselling predecessor, The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition is a one-stop, up-to-date resource on Health Insurance Portability and Accountability Act (HIPAA) privacy and security, including details on the HITECH Act, the 2013 Omnibus Rule, and the pending rules. Updated and revised with several new sections, this edition defines what HIPAA is, what it requires, and what you need to do to achieve compliance. The book provides an easy-to-understand overview of HIPAA privacy and security rules and compliance tasks. Supplying authoritative insights into real-world HIPAA privacy and security issues, it summarizes the analysis, training, and technology needed to properly plan and implement privacy and security policies, training, and an overall program to manage information risks. Instead of focusing on technical jargon, the book spells out what your organization must do to achieve and maintain compliance requirements on an ongoing basis.

A Beginner's Guide to Internet of Things Security - Attacks, Applications, Authentication, and Fundamentals (Paperback):... A Beginner's Guide to Internet of Things Security - Attacks, Applications, Authentication, and Fundamentals (Paperback)
Aakanksha Tewari, Brij B. Gupta
R631 Discovery Miles 6 310 Ships in 9 - 15 working days

A Beginner's Guide to Internet of Things Security focuses on security issues and developments in the Internet of Things (IoT) environment. The wide-ranging applications of IoT, including home appliances, transportation, logistics, healthcare, and smart cities, necessitate security applications that can be applied to every domain with minimal cost. IoT contains three layers: application layer, middleware layer, and perception layer. The security problems of each layer are analyzed separately to identify solutions, along with the integration and scalability issues with the cross-layer architecture of IoT. The book discusses the state-of-the-art authentication-based security schemes, which can secure radio frequency identification (RFID) tags, along with some security models that are used to verify whether an authentication scheme is secure against any potential security risks. It also looks at existing authentication schemes and security models with their strengths and weaknesses. The book uses statistical and analytical data and explains its impact on the IoT field, as well as an extensive literature survey focusing on trust and privacy problems. The open challenges and future research direction discussed in this book will help to further academic researchers and industry professionals in the domain of security. Dr. Brij B. Gupta is an assistant professor in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India. Ms. Aakanksha Tewari is a PhD Scholar in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India.

Internet of Behaviors (IoB) (Hardcover): R. Dhaya, R. Kanthavel Internet of Behaviors (IoB) (Hardcover)
R. Dhaya, R. Kanthavel
R3,084 Discovery Miles 30 840 Ships in 12 - 17 working days

1. The book will begin by evaluating the state of the art of all Internet Of behaviors (IoB) while looking into their BI, Big Data, CDPs, etc. core building block 2. Offers in-depth examination of Internet Of behaviors, which supports 3. Includes handy quick-reference to help readers with regular with simple language rules; 4. This book goal is to record, analyse, comprehend, and respond to all forms of human behaviour in a way that allows people to be tracked and interpreted using developing technology advancements and advances in machine learning algorithms

Cyberculture Theorists - Manuel Castells and Donna Haraway (Hardcover): David Bell Cyberculture Theorists - Manuel Castells and Donna Haraway (Hardcover)
David Bell; Series edited by Robert Eaglestone
R2,641 Discovery Miles 26 410 Ships in 12 - 17 working days

This book surveys a 'cluster' of works that seek to explore the cultures of cyberspace, the Internet and the information society. It introduces key ideas, and includes detailed discussion of the work of two key thinkers in this area, Manuel Castells and Donna Haraway, as well as outlining the development of cyberculture studies as a field. To do this, the book also explores selected 'moments' in this development, from the early 1990s, when cyberspace and cyberculture were only just beginning to come together as ideas, up to the present day, when the field of cyberculture studies has grown and bloomed, producing innovative theoretical and empirical work from a diversity of standpoints. Key topics include: life on the screen network society space of flows cyborg methods. Cyberculture Theorists is the ideal starting point for anyone wanting to understand how to theorise cyberculture in all its myriad forms.

Modern Management and Leadership - Best Practice Essentials with CISO/CSO Applications (Paperback): Mark Tarallo Modern Management and Leadership - Best Practice Essentials with CISO/CSO Applications (Paperback)
Mark Tarallo
R1,177 Discovery Miles 11 770 Ships in 9 - 15 working days

In one modest-sized volume, this book offers three valuable sets of knowledge. First, it provides best practice guidance on virtually every large-scale task a modern manager may be involved in-from recruiting and hiring to onboarding and leading teams, and from employee engagement and retention to performance management and working with difficult employees. Second, it explains the essential concepts and practice of a range of effective leadership styles-including (but not limited to) servant leadership, crisis leadership, change agent leadership, and diversity and inclusion leadership. Third, it offers brief case studies from select CISOs and CSOs on how these management and leadership principles and practices play out in real-life workplace situations. The best practice essentials provided throughout this volume will empower aspiring leaders and also enable experienced managers to take their leadership to the next level. Many if not most CISOs and other leaders have had very little, if any, formal training in management and leadership. The select few that have such training usually obtained it through academic courses that take a theoretical, broad brush approach. In contrast, this book provides much actionable guidance in the nitty-gritty tasks that managers must do every day. Lack of management practical knowledge puts CISOs and CSOs at a disadvantage vis-a-vis other executives in the C-suite. They risk being pigeonholed as "security cops" rather than respected business leaders. Many articles on these subjects published in the press are too incomplete and filled with bad information. And combing through the few high-quality sources that are out there, such as Harvard Business Publishing, can take hundreds of dollars in magazine subscription and book purchase fees and weeks or months of reading time. This book puts all the essential information into your hands through a series of concise chapters authored by an award-winning writer.

Security without Obscurity - Frequently Asked Questions (FAQ) (Paperback): Jeff Stapleton Security without Obscurity - Frequently Asked Questions (FAQ) (Paperback)
Jeff Stapleton
R1,182 Discovery Miles 11 820 Ships in 9 - 15 working days

Security without Obscurity: Frequently Asked Questions (FAQ) complements Jeff Stapleton's three other Security without Obscurity books to provide clear information and answers to the most commonly asked questions about information security (IS) solutions that use or rely on cryptography and key management methods. There are good and bad cryptography, bad ways of using good cryptography, and both good and bad key management methods. Consequently, information security solutions often have common but somewhat unique issues. These common and unique issues are expressed as an FAQ organized by related topic areas. The FAQ in this book can be used as a reference guide to help address such issues. Cybersecurity is based on information technology (IT) that is managed using IS controls, but there is information, misinformation, and disinformation. Information reflects things that are accurate about security standards, models, protocols, algorithms, and products. Misinformation includes misnomers, misunderstandings, and lack of knowledge. Disinformation can occur when marketing claims either misuse or abuse terminology, alluding to things that are inaccurate or subjective. This FAQ provides information and distills misinformation and disinformation about cybersecurity. This book will be useful to security professionals, technology professionals, assessors, auditors, managers, and hopefully even senior management who want a quick, straightforward answer to their questions. It will serve as a quick reference to always have ready on an office shelf. As any good security professional knows, no one can know everything.

Handbook of Digital Politics (Paperback): Stephen Coleman, Deen Freelon Handbook of Digital Politics (Paperback)
Stephen Coleman, Deen Freelon
R1,706 Discovery Miles 17 060 Ships in 12 - 17 working days

Politics continues to evolve in the digital era, spurred in part by the accelerating pace of technological development. This cutting-edge Handbook includes the very latest research on the relationship between digital information, communication technologies and politics. Written by leading scholars in the field, the chapters explore in seven parts: theories of digital politics, government and policy, collective action and civic engagement, political talk, journalism, internet governance and new frontiers in digital politics research. The contributors focus on the politics behind the implementation of digital technologies in society today. All students in the fields of politics, media and communication studies, journalism, science and sociology will find this book to be a useful resource in their studies. Political practitioners seeking digital strategies, as well as web and other digital practitioners wanting to know more about political applications for their work will also find this book to be of interest. Contributors include: E. Amna, N. Anstead, N. Benn, W.L. Bennett, C. Birchall, L. Bode, A. Bruns, S. Coleman, N. Couldry, K.B. Culver, P. Dahlgren, E. Dubois, W.H. Dutton, S. Edgerly, D. Freelon, C. Fuchs, S. Gonzalez-Bailon, T. Graham, T. Hall, A. Hanna, T. Highfield, F. Hirzalla, Y. Kim, D. Kreiss, T. Mcafee, G. Moss, B. O'Loughlin, K. Parry, R. Petchler, J. Schradie, A. Segerberg, D.V. Shah, K. Thorson, N. Thurman, E. Vraga, C. Wells, S. Wright, M.A. Xenos, J. Yang, L. van Zoonen

The Internet and Politics - Citizens, Voters and Activists (Hardcover): Sarah Oates, Diana Owen, Rachel K. Gibson The Internet and Politics - Citizens, Voters and Activists (Hardcover)
Sarah Oates, Diana Owen, Rachel K. Gibson
R3,988 Discovery Miles 39 880 Ships in 12 - 17 working days

Changes in the media landscape present new challenges for scholars interested in the relationship between the mass media and civil society. Notably, the explosion of the Internet in advanced industrial democracies and its more limited introduction in other types of regimes has provided new pathways for communication. This volume explores the nature of the Internet's impact on civil society, addressing the following central questions: * Is the Internet qualitativey different from the more traditional forms of the media? * Has the Internet demonstrated real potential to improve civil society through a wider provision of information, an enhancement of communication between government and citizen or via better state transparency? * Alternatively, does the Internet pose a threat to the coherence of civil society as people are encouraged to abandon shared media experiences and pursue narrow interests? * In authoritarian states, does the Internet function as a beacon for free speech or another tool for propaganda? This book will be of interest to students and scholars of the Internet and civil society. Jensen, University of Aarhus Weiner Lusoli, University of Salford Stephen Ward, University of Salford Scott Wr

Cryptology - Classical and Modern (Paperback, 2nd edition): Richard Klima, Richard E. Klima, Neil Sigmon, Neil P. Sigmon Cryptology - Classical and Modern (Paperback, 2nd edition)
Richard Klima, Richard E. Klima, Neil Sigmon, Neil P. Sigmon
R1,423 Discovery Miles 14 230 Ships in 9 - 15 working days

Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Alberti, Vigenere, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Navajo code. Additionally, the book presents modern methods like RSA, ElGamal, and stream ciphers, as well as the Diffie-Hellman key exchange and Advanced Encryption Standard. When possible, the book details methods for breaking both classical and modern methods. The new edition expands upon the material from the first edition which was oriented for students in non-technical fields. At the same time, the second edition supplements this material with new content that serves students in more technical fields as well. Thus, the second edition can be fully utilized by both technical and non-technical students at all levels of study. The authors include a wealth of material for a one-semester cryptology course, and research exercises that can be used for supplemental projects. Hints and answers to selected exercises are found at the end of the book. Features: Requires no prior programming knowledge or background in college-level mathematics Illustrates the importance of cryptology in cultural and historical contexts, including the Enigma machine, Turing bombe, and Navajo code Gives straightforward explanations of the Advanced Encryption Standard, public-key ciphers, and message authentication Describes the implementation and cryptanalysis of classical ciphers, such as substitution, transposition, shift, affine, Alberti, Vigenere, and Hill

Security Risk Models for Cyber Insurance (Paperback): Caroline Baylon, Jose Vila, David Rios Insua Security Risk Models for Cyber Insurance (Paperback)
Caroline Baylon, Jose Vila, David Rios Insua
R1,433 Discovery Miles 14 330 Ships in 9 - 15 working days

Tackling the cybersecurity challenge is a matter of survival for society at large. Cyber attacks are rapidly increasing in sophistication and magnitude-and in their destructive potential. New threats emerge regularly, the last few years having seen a ransomware boom and distributed denial-of-service attacks leveraging the Internet of Things. For organisations, the use of cybersecurity risk management is essential in order to manage these threats. Yet current frameworks have drawbacks which can lead to the suboptimal allocation of cybersecurity resources. Cyber insurance has been touted as part of the solution - based on the idea that insurers can incentivize companies to improve their cybersecurity by offering premium discounts - but cyber insurance levels remain limited. This is because companies have difficulty determining which cyber insurance products to purchase, and insurance companies struggle to accurately assess cyber risk and thus develop cyber insurance products. To deal with these challenges, this volume presents new models for cybersecurity risk management, partly based on the use of cyber insurance. It contains: A set of mathematical models for cybersecurity risk management, including (i) a model to assist companies in determining their optimal budget allocation between security products and cyber insurance and (ii) a model to assist insurers in designing cyber insurance products. The models use adversarial risk analysis to account for the behavior of threat actors (as well as the behavior of companies and insurers). To inform these models, we draw on psychological and behavioural economics studies of decision-making by individuals regarding cybersecurity and cyber insurance. We also draw on organizational decision-making studies involving cybersecurity and cyber insurance. Its theoretical and methodological findings will appeal to researchers across a wide range of cybersecurity-related disciplines including risk and decision analysis, analytics, technology management, actuarial sciences, behavioural sciences, and economics. The practical findings will help cybersecurity professionals and insurers enhance cybersecurity and cyber insurance, thus benefiting society as a whole. This book grew out of a two-year European Union-funded project under Horizons 2020, called CYBECO (Supporting Cyber Insurance from a Behavioral Choice Perspective).

The Routledge Handbook of Privacy and Social Media (Hardcover): Sabine Trepte, Philipp Masur The Routledge Handbook of Privacy and Social Media (Hardcover)
Sabine Trepte, Philipp Masur
R6,556 Discovery Miles 65 560 Ships in 12 - 17 working days

This volume provides the basis for contemporary privacy and social media research and informs global as well as local initiatives to address issues related to social media privacy through research, policymaking, and education. Renowned scholars in the fields of communication, psychology, philosophy, informatics, and law look back on the last decade of privacy research and project how the topic will develop in the next decade. The text begins with an overview of key scholarship in online privacy, expands to focus on influential factors shaping privacy perceptions and behaviors-such as culture, gender, and trust-and continues with specific examinations of concerns around vulnerable populations such as children and older adults. It then looks at how privacy is managed and the implications of interacting with artificial intelligence, concluding by discussing feasible solutions to some of the more pressing questions surrounding online privacy. This handbook will be a valuable resource for advanced students, scholars, and policymakers in the fields of communication studies, digital media studies, psychology, and computer science.

Internet of Things in Modern Computing - Theory and Applications (Hardcover): Vinay Chowdary, Abhinav Sharma, Naveen Kumar,... Internet of Things in Modern Computing - Theory and Applications (Hardcover)
Vinay Chowdary, Abhinav Sharma, Naveen Kumar, Vivek Kaundal
R3,550 Discovery Miles 35 500 Ships in 12 - 17 working days

The text focuses on the theory, design, and implementation of the Internet of Things (IoT), in a modern communication system. It will be useful to senior undergraduate, graduate students, and researchers in diverse fields domains including electrical engineering, electronics and communications engineering, computer engineering, and information technology. Features: Presents all the necessary information on the Internet of Things in modern computing Examines antenna integration challenges and constraints in the Internet of Things devices Discusses advanced Internet of Things networks and advanced controllers required for modern architecture Explores security and privacy challenges for the Internet of Things-based health care system Covers implementation of Internet of Things security protocols such as MQTT, Advanced Message Queuing Protocol, XMPP, and DSS The text addresses the issues and challenges in implementing communication and security protocols for IoT in modern computing. It further highlights the applications of IoT in diverse areas including remote health monitoring, remote monitoring of vehicle data and environmental characteristics, industry 4.0, 5G communications, and Next-gen IoT networks. The text presents case studies on IoT in modern digital computing. It will serve as an ideal reference text for senior undergraduate, graduate students, and academic researchers in diverse fields domains including electrical engineering, electronics and communications engineering, computer engineering, and information technology.

Playing Video Games - Motives, Responses, and Consequences (Paperback): Peter Vorderer, Jennings Bryant Playing Video Games - Motives, Responses, and Consequences (Paperback)
Peter Vorderer, Jennings Bryant
R2,280 Discovery Miles 22 800 Ships in 12 - 17 working days

From security training simulations to war games to role-playing games, to sports games to gambling, playing video games has become a social phenomena, and the increasing number of players that cross gender, culture, and age is on a dramatic upward trajectory. "Playing Video Games: Motives, Responses, and Consequences" integrates communication, psychology, and technology to examine the psychological and mediated aspects of playing video games. It is the first volume to delve deeply into these aspects of computer game play. It fits squarely into the media psychology arm of entertainment studies, the next big wave in media studies. The book targets one of the most popular and pervasive media in modern times, and it will serve to define the area of study and provide a theoretical spine for future research.
This unique and timely volume will appeal to scholars, researchers, and graduate students in media studies and mass communication, psychology, and marketing.

Lean UX, 2e (Paperback, 2nd Revised edition): Jeff Gothelf, Josh Seiden Lean UX, 2e (Paperback, 2nd Revised edition)
Jeff Gothelf, Josh Seiden
R736 R579 Discovery Miles 5 790 Save R157 (21%) Out of stock

Lean UX has become the preferred approach to interaction design, tailor-made for today's agile teams. In the second edition of this award winning book, leading advocates Jeff Gothelf and Josh Seiden expand on the valuable Lean UX principles, tactics, and techniques covered in the first edition to share how product teams can easily incorporate design, experimentation, iteration, and continuous learning from real users into their Agile process. Inspired by Lean and Agile development theories, Lean UX lets you focus on the actual experience being designed, rather than deliverables. This book shows you how to collaborate closely with other members of your Agile product team, and gather feedback early and often. You'll learn how to drive the design in short, iterative cycles to assess what works best for the business and the user. Lean UX shows you how to make this change-for the better. Frame a vision of the problem you're solving and focus your team on the right outcomes Bring the designers' toolkit to the rest of your product team Share your insights with your team much earlier in the process Create Minimum Viable Products to determine which ideas are valid Incorporate the voice of the customer throughout the project cycle Make your team more productive: combine Lean UX with Agile's Scrum framework Understand the organizational shifts necessary to integrate Lean UX

Crime and Punishment in the Future Internet - Digital Frontier Technologies and Criminology in the Twenty-First Century... Crime and Punishment in the Future Internet - Digital Frontier Technologies and Criminology in the Twenty-First Century (Paperback)
Sanja Milivojevic
R1,162 Discovery Miles 11 620 Ships in 9 - 15 working days

Crime and Punishment in the Future Internet is an examination of the development and impact of digital frontier technologies (DFTs) such as Artificial Intelligence, the Internet of things, autonomous mobile robots, and blockchain on offending, crime control, the criminal justice system, and the discipline of criminology. It poses criminological, legal, ethical, and policy questions linked to such development and anticipates the impact of DFTs on crime and offending. It forestalls their wide-ranging consequences, including the proliferation of new types of vulnerability, policing and other mechanisms of social control, and the threat of pervasive and intrusive surveillance. Two key concerns lie at the heart of this volume. First, the book investigates the origins and development of emerging DFTs and their interactions with criminal behaviour, crime prevention, victimisation, and crime control. It also investigates the future advances and likely impact of such processes on a range of social actors: citizens, non-citizens, offenders, victims of crime, judiciary and law enforcement, media, NGOs. This book does not adopt technological determinism that suggests technology alone drives social development. Yet, while it is impossible to know where the emerging technologies are taking us, there is no doubt that DFTs will shape the way we engage with and experience criminal behaviour in the twenty-first century. As such, this book starts the conversation about a range of essential topics that this expansion brings to social sciences, and begins to decipher challenges we will be facing in the future. An accessible and compelling read, this book will appeal to those engaged with criminology, sociology, politics, policymaking, and all those interested in the impact of DFTs on the criminal justice system.

Verified - How To Think Straight, Get Duped Less, And Make Better Decisions About What To Believe Online (Paperback): Mike... Verified - How To Think Straight, Get Duped Less, And Make Better Decisions About What To Believe Online (Paperback)
Mike Caulfield, Sam Wineburg
R403 R341 Discovery Miles 3 410 Save R62 (15%) Ships in 10 - 15 working days

An indispensable guide for telling fact from fiction on the internet—often in less than 30 seconds.

The internet brings information to our fingertips almost instantly. The result is that we often jump to thinking too fast, without taking a few moments to verify the source before engaging with a claim or viral piece of media. Information literacy expert Mike Caulfield and educational researcher Sam Wineburg are here to enable us to take a moment for due diligence with this informative, approachable guide to the internet. With this illustrated tool kit, you will learn to identify red flags, get quick context, and make better use of common websites like Google and Wikipedia that can help and hinder in equal measure.

This how-to guide will teach you how to use the web to verify the web, quickly and efficiently, including how to

  • Verify news stories and other events in as little as thirty seconds (seriously)
  • Determine if the article you’re citing is by a reputable scholar or a quack
  • Detect the slippery tactics scammers use to make their sites look credible
  • Decide in a minute if that shocking video is truly shocking
  • Deduce who’s behind a site—even when its ownership is cleverly disguised
  • Uncover if that feature story is actually a piece planted by a foreign government
  • Use Wikipedia wisely to gain a foothold on new topics and leads for digging deeper

And so much more. Building on techniques like SIFT and lateral reading, Verified will help students and anyone else looking to get a handle on the internet’s endless flood of information through quick, practical, and accessible steps.

Closer Together, Further Apart - The Effect of Technology and the Internet on Parenting, Work, and Relationships (Paperback):... Closer Together, Further Apart - The Effect of Technology and the Internet on Parenting, Work, and Relationships (Paperback)
Robert Weiss, Jennifer P Schneider
R430 R364 Discovery Miles 3 640 Save R66 (15%) Ships in 10 - 15 working days

Closer Together, Further Apart offers current unique insight into the cultural shifts brought about by digital technology and the Internet. It considers how these new connections are impacting not only society as a whole, but more specifically communication in relationships and across generations.
Digital technology has in less than a single generation, dramatically and permanently altered the ways in which humans connect and communicate with each other. Conversations and information transfers that once either weren't possible or took days to complete now occur in an instant. Technological advances are profoundly affecting humankind, forcing us to change on multiple levels.
As with all forms of human/social/technological change, these advances will be good for some and bad for others. Those who learn to effectively absorb information and use new technologies in healthy ways will flourish, and those who don't may feel increasingly disconnected from our technology driven world.

Robert Weiss, MSW, is a therapist, international speaker, author, and a blogger on PsychCentral.com, where he writes regularly on the topic of sex and intimacy in the digital age. He was featured in LA Weekly 2013 People issue as one of LA's most fascinating people. He currently serves as Senior Vice-President of Clinical Development for Elements Behavioral Health.

Jennifer P. Schneider, MD, PhD, is a physician, international speaker, and the author of nine books and numerous journal articles.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Game Boy: The Box Art Collection
Bitmap Books Hardcover R1,181 Discovery Miles 11 810
Misbelief - What Makes Rational People…
Dan Ariely Paperback R410 R320 Discovery Miles 3 200
Information And Communications…
Dana van der Merwe Paperback R1,119 R1,000 Discovery Miles 10 000
Extremely Hardcore - Inside Elon Musk's…
Zoë Schiffer Hardcover R718 R472 Discovery Miles 4 720
E-Commerce In South Africa
Adheesh Budree Paperback R403 R355 Discovery Miles 3 550
The Handover - How We Gave Control Of…
David Runciman Hardcover R630 R504 Discovery Miles 5 040
I Am Code
Brent Katz, Josh Morgenthau, … Paperback R390 R312 Discovery Miles 3 120
Squishmallows Official Collectors' Guide
Squishmallows Hardcover R343 Discovery Miles 3 430
WFH: Working From Home - How To Build A…
Harriet Minter Paperback R355 R280 Discovery Miles 2 800
The Hitchhiker's Guide To AI - A…
Arthur Goldstuck Paperback R350 R249 Discovery Miles 2 490

 

Partners