Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Social & legal aspects of computing
Safety-critical systems are found in almost every sector of industry. Faults in these systems will result in a breach of safe operating conditions and exposure to the possible risk of major loss of life or catastrophic damage to plant, equipment or the environment. An understanding of the basis for the functioning of these systems is therefore vital to all involved in their operation. In particular, the interaction of the disciplines of software engineering, safety engineering, human factors and safety management is a total process whose entirety is not widely understood by those working in any of the individual fields. This book will redress that problem by providing an introduction to each constituent part with a cohesive structure and overview of the whole subject. It will be of interest to engineers, managers, students and anyone with responsibilities in these areas.
How is the internet changing the way you think? That is one of the dominant questions of our time, one which affects almost every aspect of our life and future. And it's exactly what John Brockman, publisher of Edge.org, posed to more than 150 of the world's most influential minds. Brilliant, farsighted, and fascinating, Is the Internet Changing the Way You Think? is an essential guide to the Net-based world.
Based on a symposium honoring the extensive work of Allen Newell --
one of the founders of artificial intelligence, cognitive science,
human-computer interaction, and the systematic study of
computational architectures -- this volume demonstrates how
unifying themes may be found in the diversity that characterizes
current research on computers and cognition. The subject matter
includes:
The recent evolution of western societies has been characterized by
an increasing emphasis on information and communication. As the
amount of available information increases, however, the user --
worker, student, citizen -- faces a new problem: selecting and
accessing relevant information. More than ever it is crucial to
find efficient ways for users to interact with information systems
in a way that prevents them from being overwhelmed or simply
missing their targets. As a result, hypertext systems have been
developed as a means of facilitating the interactions between
readers and text. In hypertext, information is organized as a
network in which nodes are text chunks (e.g., lists of items,
paragraphs, pages) and links are relationships between the nodes
(e.g., semantic associations, expansions, definitions, examples --
virtually any kind of relation that can be imagined between two
text passages). Unfortunately, the many ways in which these
hypertext interfaces can be designed has caused a complexity that
extends far beyond the processing abilities of regular users.
Therefore, it has become widely recognized that a more rational
approach based on a thorough analysis of information users' needs,
capacities, capabilities, and skills is needed. This volume seeks
to meet that need.
This book focuses on design in the domain of human-computer
interaction. Including a broad sampling of case studies as well as
narrower theoretical or empirical studies, it includes
consideration of educational uses of design rationale, methods for
teaching it in industry, and applications to a variety of software
and user interface/application domains. The volume promises to be
the largest collection of work on design rationale ever assembled,
and thereby to energize the considerable, widespread interest in
this topic. It will also act as a focus for the existing but
scattered work in this domain.
This book focuses on design in the domain of human-computer interaction. Including a broad sampling of case studies as well as narrower theoretical or empirical studies, it includes consideration of educational uses of design rationale, methods for teaching it in industry, and applications to a variety of software and user interface/application domains. The volume promises to be the largest collection of work on design rationale ever assembled, and thereby to energize the considerable, widespread interest in this topic. It will also act as a focus for the existing but scattered work in this domain.
The ideal of an inclusive and participatory Internet has been undermined by the rise of misogynistic abuse on social media platforms. However, limited progress has been made at national - and to an extent European - levels in addressing this issue. In England and Wales, the tackling of underlying causes of online abuse has been overlooked because the law focuses on punishment rather than measures to prevent such abuses. Furthermore, online abuse has a significant impact on its victims that is underestimated by policymakers. This volume critically analyses the legal provisions that are currently deployed to tackle forms of online misogyny, and focuses on three aspects; firstly, the phenomenon of social media abuse; secondly, the poor and disparate legal responses to social media abuses; and thirdly, the similar failings of hate crime to tackle problems of online gender-based abuses. This book advances a compelling argument for legal changes to the existing hate crime, and communications legislation.
Most of the business sectors consider the Digital Twin concept as the next big thing in the industry. A current state analysis of their digital counterparts helps in the prediction of the future of physical assets. Organizations obtain better insights on their product performance through the implementation of Digital Twins, and the applications of the technology are frequently in sectors such as manufacturing, automobile, retail, health care, smart cities, industrial IoT, etc. This book explores the latest developments and covers the significant challenges, issues, and advances in Digital Twin Technology. It will be an essential resource for anybody involved in related industries, as well as anybody interested in learning more about this nascent technology. This book includes: The future, present, and past of Digital Twin Technology. Digital twin technologies across the Internet of Drones, which developed various perceptive and autonomous capabilities, towards different control strategies such as object detection, navigation, security, collision avoidance, and backup. These approaches help to deal with the expansive growth of big data solutions. The recent digital twin concept in agriculture, which offers the vertical framing by IoT installation development to enhance the problematic food supply situation. It also allows for significant energy savings practices. It is highly required to overcome those challenges in developing advanced imaging methods of disease detection & prediction to achieve more accuracy in large land areas of crops. The welfare of upcoming archetypes such as digitalization in forensic analysis. The ideas of digital twin have arisen to style the corporeal entity and associated facts reachable software and customers over digital platforms. Wind catchers as earth building: Digital Twins vs. green sustainable architecture.
There is a growing consensus in the human factors/ergonomics
community that human factors research has had little impact on
significant applied problems. Some have suggested that the problem
lies in the fact that much HF/E research has been based on the
wrong type of psychology, an information processing view of
psychology that is reductionistic and context-free. Ecological
psychology offers a viable alternative, presenting a richer view of
human behavior that is holistic and contextualized. The papers
presented in these two volumes show the conceptual impact that
ecological psychology can have on HF/E, as well as presenting a
number of specific examples illustrating the ecological approach to
human-machine systems. It is the first collection of papers that
explicitly draws a connection between these two fields. While work
in this area is only just beginning, the evidence available
suggests that taking an ecological approach to human
factors/ergonomics helps bridge the existing gap between basic
research and applied problems.
Features In-depth coverage of the role of AI in smart healthcare. Research guideline for AI and data science researchers/practitioners interested in the healthcare sector. Comprehensive coverage on security and privacy issues for AI in smart healthcare.
Cyberattacks on enterprises, government institutions, and individuals are exponentially growing. At the same time, the number of companies, both small and large, offering all types of solutions has been increasing too. Since companies rely on technological solutions to protect themselves against cyberattacks, understanding and selecting the right solutions among those offered presents a significant challenge for professionals, company executives, and newcomers to the cybersecurity field. FEATURES Presents descriptions for each type of cybersecurity technology and their specifications Explains applications, usages, and offers case studies to enhance comprehension Offers an easy-to-understand classification of existing cybersecurity technologies Provides an understanding of the technologies without getting lost in technical details Focuses on existing technologies used in different solutions, without focusing on the companies that offer these technologies This book is intended to help all professionals new to cybersecurity, students, and experts to learn or educate their audiences on the foundations of the available solutions.
This indispensable guide offers detailed coverage of the regulations, requirements, and techniques for the validation of processes and systems used in regulated international industries - addressing all significant requirements for pharmaceutical, medical device, and biologic companies as well as environmental laboratories. Elucidating up-to-the-minute industry changes and international concerns, Validation Compliance Annual 1995 examines Good Manufacturing Practices (GMPs), Good Clinical Practices (GCPs), Good Laboratory Practices (GLPs), and Good Automated laboratory Practices (GALPs)... provides unabridged texts of U.S. and European Union regulatory requirements as well as summaries of the validation requirements of other nations... furnishes complete guidelines and tools for system validation... supplies an in-depth look at problems related to inadequate system validation, including actual regulatory citations for noncompliance... explains the rationale behind regulatory compliance policies and inspectional practices... assesses the future of regulatory and industry trends... and more. Containing key bibliographic citations and a thorough glossary of validation terms, Validation Compliance Annual 1995 is an incomparable day-to-day workbook for analytical, pharmaceutical, food, and environmental chemists; instrumentation specialists; industrial, bio-process, chemical, and pharmaceutical engineers; quality and reliability managers and directors; laboratory managers and technicians; computer scientists; and upper-level undergraduate and graduate students in these disciplines.
This volume seeks to answer the question: "Can findings from
cognitive science enhance the user-computer interaction process?"
In so doing, it recognizes that user-computer interfaces (UCIs) are
often essential parts of an information or decision support system
-- and often critical components of software-intensive systems of
all kinds. From the outset, the authors note that the design,
prototyping, and evaluation of user-computer interfaces are part of
larger systems and are therefore ideally designed, developed, and
evaluated as part of a larger design and developmental process or
"life cycle."
Threat actors, be they cyber criminals, terrorists, hacktivists or disgruntled employees, are employing sophisticated attack techniques and anti-forensics tools to cover their attacks and breach attempts. As emerging and hybrid technologies continue to influence daily business decisions, the proactive use of cyber forensics to better assess the risks that the exploitation of these technologies pose to enterprise-wide operations is rapidly becoming a strategic business objective. This book moves beyond the typical, technical approach to discussing cyber forensics processes and procedures. Instead, the authors examine how cyber forensics can be applied to identifying, collecting, and examining evidential data from emerging and hybrid technologies, while taking steps to proactively manage the influence and impact, as well as the policy and governance aspects of these technologies and their effect on business operations. A world-class team of cyber forensics researchers, investigators, practitioners and law enforcement professionals have come together to provide the reader with insights and recommendations into the proactive application of cyber forensic methodologies and procedures to both protect data and to identify digital evidence related to the misuse of these data. This book is an essential guide for both the technical and non-technical executive, manager, attorney, auditor, and general practitioner who is seeking an authoritative source on how cyber forensics may be applied to both evidential data collection and to proactively managing today's and tomorrow's emerging and hybrid technologies. The book will also serve as a primary or supplemental text in both under- and post-graduate academic programs addressing information, operational and emerging technologies, cyber forensics, networks, cloud computing and cybersecurity.
The potential of software applications to solve an array of office
and administrative problems is increasing faster than the ability
of users to exploit it. We need to make systems easier to learn and
more comfortable to use. This book reports a major advance in the
effort to accomplish both goals.
Since Computational Intelligence is a latest technological aspect, the book is likely to be adopted in almost all leading Universities. This book aims to provide state-of-art research in the context of Computational Intelligence related with Healthcare its applications, challenges and management and it would promote how optimization or intelligent techniques envisage the role of Artificial Intelligence-Machine/Deep Learning (AI-ML/DL) in Healthcare.
- Totally unique, and incredibly damning, concerning information and overview of the world's first Cyberwar. - The first ever Cyberwar and the precursor to the first war in Europe since 1945, it will be discussed for decades to come and go down in history as a defining point. - Will be of interest to all citizens of the world, literally.
Key Features / Selling Points Unique selling point: * The only book to distill the CSEC2017 recommendations down into practical teaching approaches for K-12 classrooms Core audience: * Teachers and educators of cybersecurity, who may or may not have a background in the subject Place in the market: * First book of its kind
Packed with projects and inspirational ideas you can do any time, any place, become an accomplished photographer while feeding your creativity with this guide that reveals what just what your smartphone camera is capable of. A camera phone is something we always have on us and creativity is something we all have in us but often we struggle to use them properly, feeling like we don't have the time, space or inclination to dedicate to it. Here, photography expert and bestselling author Jo Bradford supplies a collection of practical exercises that allow you to master the features on your smartphone camera to take incredible images and also help you to easily reconnect with your creative side. By encouraging you to try something different with your camera and seek out creative opportunities - from light painting to collage, image stacking to time-lapse landscapes - soon you will once again feel the satisfaction of thinking and acting creatively, with the added benefit of taking you from a snapper to an accomplished photographer with visual literacy. Smartphone photography is addictive with a tangible feel-good factor; it's time to embrace it and capture the moments that matter to you in all their glory.
Securing Cloud Services - A pragmatic guide gives an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud. Manage the risks associated with Cloud computing - buy this book today!
For as long as historical annals have been kept, they have recorded the frauds and fakes that have been imposed upon innocent dupes. Perhaps the earliest Christian story of all is that which tells of the deception that Jacob practised on his unsuspecting father Abraham, pretending to be his brother Esau; and today the theft of identity is reported to be the most rapidly spreading crime. And throughout the ages works of art and literature, coinage, and documents of all kinds have been forged for profit, personal status - and even out of pure mischief. Fakes, Scams and Forgeries details many of the most notorious acts of forgery, fraud and fakery that have taken place over the centuries, describing how they were perpetrated, their acceptance by those who considered themselves experts, and how - often after many years - they were eventually detected. As well as providing entertaining and in-depth profiles of famous forgers and legendary frauds, the text deals with the many modern scientific techniques that have been developed for the examination of suspect materials.
Software Quality Assurance: Integrating Testing, Security, and Audit focuses on the importance of software quality and security. It defines various types of testing, recognizes factors that propose value to software quality, and provides theoretical and real-world scenarios that offer value and contribute quality to projects and applications. The practical synopsis on common testing tools helps readers who are in testing jobs or those interested in pursuing careers as testers. It also helps test leaders, test managers, and others who are involved in planning, estimating, executing, and maintaining software. The book is divided into four sections: The first section addresses the basic concepts of software quality, validation and verification, and audits. It covers the major areas of software management, software life cycle, and life cycle processes. The second section is about testing. It discusses test plans and strategy and introduces a step-by-step test design process along with a sample test case. It also examines what a tester or test lead needs to do before and during test execution and how to report after completing the test execution. The third section deals with security breaches and defects that may occur. It discusses documentation and classification of incidences as well as how to handle an occurrence. The fourth and final section provides examples of security issues along with a security policy document and addresses the planning aspects of an information audit. This section also discusses the definition, measurement, and metrics of reliability based on standards and quality metrics methodology CMM models. It discusses the ISO 15504 standard, CMMs, PSP, and TSP and includes an appendix containing a software process improvement sample document.
Cyber Security - Essential principles to secure your organisation takes you through the fundamentals of cyber security, the principles that underpin it, vulnerabilities and threats, and how to defend against attacks. Organisations large and small experience attacks every day, from simple phishing emails to intricate, detailed operations masterminded by criminal gangs, and for every vulnerability fixed, another pops up, ripe for exploitation. Cyber security doesn't have to cost vast amounts of money or take a short ice age to implement. No matter the size of your organisation, improving cyber security helps protect your data and that of your clients, improving business relations and opening the door to new opportunities. This pocket guide will take you through the essentials of cyber security - the principles that underpin it, vulnerabilities and threats and the attackers who use them, and how to defend against them - so you can confidently develop a cyber security programme. Cyber Security - Essential principles to secure your organisation Covers the key differences between cyber and information security; Explains how cyber security is increasingly mandatory and how this ties into data protection, e.g. the Data Protection Act 2018 and the GDPR (General Data Protection Regulation); Focuses on the nature of the problem, looking at technical, physical and human threats and vulnerabilities; Explores the importance of security by design; Gives guidance on why security should be balanced and centralised; and Introduces the concept of using standards and frameworks to manage cyber security. No matter the size of your organisation, cyber security is no longer optional - it is an essential component of business success and a critical defence against the risks of the information age. The only questions left are to decide when and where your journey will begin. Start that journey now - buy this book today!
|
You may like...
IT Contracts and Dispute Management - A…
Steven Baker, Lawrence Akka, …
Hardcover
R5,696
Discovery Miles 56 960
|