0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (9)
  • R100 - R250 (409)
  • R250 - R500 (1,166)
  • R500+ (11,478)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing

Gender and Security in Digital Space - Navigating Access, Harassment, and Disinformation (Hardcover): Gulizar Haciyakupoglu,... Gender and Security in Digital Space - Navigating Access, Harassment, and Disinformation (Hardcover)
Gulizar Haciyakupoglu, Yasmine Wong
R3,767 Discovery Miles 37 670 Ships in 12 - 17 working days

Digital space offers new avenues, opportunities, and platforms in the fight for gender equality, and for the social, economic, and political participation of women and marginalised communities. However, the very same space plays host to gender inequalities and security threats with gendered implications. This edited volume ventures into complexities at the intersection of gender, security, and digital space, with a particular focus on the persistent problems of access, harassment, and disinformation. Scholars and practitioners in this volume tackle various facets of the issue, presenting an array of research, experiences, and case studies that span the globe. This knowledge lends itself to potential policy considerations in tackling inequalities and threats with gendered implications in cyber space towards digital spaces that are safe and equal. This book is a must-read for students, scholars, and practitioners seeking to expand their knowledge on the gendered threats in digital space and potential remedies against them.

Security in the Digital World (Paperback): IT Governance Security in the Digital World (Paperback)
IT Governance
R481 Discovery Miles 4 810 Ships in 12 - 17 working days
Next Generation Healthcare Systems Using Soft Computing Techniques (Hardcover): Rohit Raja, Korhan Cengiz, Hiral Raja, Rekh Ram... Next Generation Healthcare Systems Using Soft Computing Techniques (Hardcover)
Rohit Raja, Korhan Cengiz, Hiral Raja, Rekh Ram Janghel
R3,037 Discovery Miles 30 370 Ships in 12 - 17 working days

This book presents soft computing techniques and applications used in healthcare systems, along with the latest advancements. Written as a guide for assessing the roles that these techniques play, the book also highlights implementation strategies, lists problem-solving solutions, and paves the way for future research endeavors in smart and next-generation healthcare systems. This book provides applications of soft computing techniques related to healthcare systems and can be used as a reference guide for assessing the roles that various techniques, such as machine learning, fuzzy logic, and statical mathematics, play in the advancements of smart healthcare systems. The book presents the basics as well as the advanced concepts to help beginners, as well as industry professionals, get up to speed on the latest developments in healthcare systems. The book examines descriptive, predictive, and social network techniques and discusses analytical tools and the important role they play in finding solutions to problems in healthcare systems. A framework of robust and novel healthcare techniques is highlighted, as well as implementation strategies and a setup for future research endeavors. Healthcare Systems Using Soft Computing Techniques is a valuable resource for researchers and postgraduate students in healthcare systems engineering, computer science, information technology, and applied mathematics. The book introduces beginners to-and at the same time brings industry professionals up to speed with-the important role soft computing techniques play in smart healthcare systems.

The Chaos Machine - The Inside Story of How Social Media Rewired Our Minds and Our World (Hardcover): Max Fisher The Chaos Machine - The Inside Story of How Social Media Rewired Our Minds and Our World (Hardcover)
Max Fisher
R787 R607 Discovery Miles 6 070 Save R180 (23%) Ships in 10 - 15 working days
Constructing Ambient Intelligence - AmI 2008 Workshops, Nuremberg, Germany, November 19-22, 2008, Revised Papers (Paperback,... Constructing Ambient Intelligence - AmI 2008 Workshops, Nuremberg, Germany, November 19-22, 2008, Revised Papers (Paperback, Edition.)
Heinz Gerhauser, Jurgen Hupp, Christos Efstratiou, Janina Heppner
R1,464 Discovery Miles 14 640 Ships in 10 - 15 working days

Ambient intelligence (AmI) was established in the late 1990s as a recent paradigm for electronic environments for the timeframe of 2010-2020. AmI is essentially an elabo- tion of Mark Weiser's vision of ubiquitous computing. Weiser was aiming at a novel mobile computing infrastructure integrated into the networked environment of people. AmI is the idea of a technology that will become invisibly embedded in our natural s- roundings, present whenever we need it, enabled by simple and effortless interaction, attuned to all our senses, adaptive to users, context-sensitive, and autonomous. AmI refers to smart electronic environments that are sensitive and responsive to the presence of people. Since its adoption the vision has grown and fully developed, bec- ing quite influential in the development of novel ideas for information processing and new concepts for multi-disciplinary fields including electrical engineering, computer science, industrial design, user interfaces, and cognitive sciences. The AmI system - fords a basis for new paradigms of technological innovation within a multi-dimensional society. The added value of the AmI vision is the fact that the large-scale integration of electronics into the environment allows the actors, i. e. , people and objects, to collaborate with their surroundings in a natural measure. This is directly related to the increasing societal demand for communication and the exchange of information.

How to Find a Needle in a Haystack - From the Insider Threat to Solo Perpetrators (Hardcover): Yair Neuman How to Find a Needle in a Haystack - From the Insider Threat to Solo Perpetrators (Hardcover)
Yair Neuman
R1,517 Discovery Miles 15 170 Ships in 12 - 17 working days

By the end of this book, the reader will understand: the difficulties of finding a needle in a haystack; creative solutions to address the problem; unique ways of engineering features and solving the problem of the lack of data (e.g. synthetic data). Additionally, the reader will be able to: avoid mistakes resulting from a lack of understanding; search for appropriate methods of feature engineering; locate the relevant technological solutions within the general context of decision-making.

Zero Trust Journey Across the Digital Estate (Hardcover): Abbas Kudrati, Binil A. Pillai Zero Trust Journey Across the Digital Estate (Hardcover)
Abbas Kudrati, Binil A. Pillai
R3,185 Discovery Miles 31 850 Ships in 12 - 17 working days

* The book provides an end-to-end view of the Zero Trust approach across organization's digital estates that includes Strategy, Business Imperatives, Architecture, Solutions, Human Elements, Implementation Approach etc that could significantly benefit large, small and medium enterprises who want to learn adapt and implement Zero Trust in their organization. * The book's scope will be primarily benefited for the Business Decision Makars, Security leadership and organizational change agent who wants to adopt and implement "Zero Trust" Security approach and architecture across their digital estate. * After reading this book, readers will be in a better position to strategize, plan and design a credible and defensible Zero Trust security architecture and solution for their organization, understand the relevance of human elements and implement a stepwise journey that delivers significantly improved security and streamlined operations.

Designing Interfaces - Patterns for Effective Interaction Design (Paperback, 3rd edition): Jenifer Tidwell, Charles Brewer,... Designing Interfaces - Patterns for Effective Interaction Design (Paperback, 3rd edition)
Jenifer Tidwell, Charles Brewer, Aynne Valencia
R1,502 R1,126 Discovery Miles 11 260 Save R376 (25%) Ships in 12 - 17 working days

Designing good application interfaces isn't easy now that companies need to create compelling, seamless user experiences across an exploding number of channels, screens, and contexts. In this updated third edition, you'll learn how to navigate through the maze of design options. By capturing UI best practices as design patterns, this best-selling book provides solutions to common design problems. You'll learn patterns for mobile apps, web applications, and desktop software. Each pattern contains full-color examples and practical design advice you can apply immediately. Experienced designers can use this guide as an idea sourcebook, and novices will find a road map to the world of interface and interaction design. Understand your users before you start designing Build your software's structure so it makes sense to users Design components to help users complete tasks on any device Learn how to promote wayfinding in your software Place elements to guide users to information and functions Learn how visual design can make or break product usability Display complex data with artful visualizations

Vulnerability Management (Paperback, 2nd edition): Park Foreman Vulnerability Management (Paperback, 2nd edition)
Park Foreman
R1,428 Discovery Miles 14 280 Ships in 12 - 17 working days

Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today, we identify vulnerabilities in our software systems, infrastructure, and enterprise strategies. Those vulnerabilities are addressed through various and often creative means. Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman's more than three decades of multinational experience, the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility, he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps, especially those that are inherent in a larger organization. Completely updated, the second edition provides a fundamental understanding of technology risks-including a new chapter on cloud vulnerabilities and risk management-from an interloper's perspective. This book is a guide for security practitioners, security or network engineers, security officers, and CIOs seeking understanding of VM and its role in the organization. To serve various audiences, it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy, although serving the executive well, provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise.

The Cybersecurity Body of Knowledge - The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity... The Cybersecurity Body of Knowledge - The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity (Paperback)
Daniel Shoemaker, Anne Kohnke, Ken Sigler
R1,280 Discovery Miles 12 800 Ships in 12 - 17 working days

The Cybersecurity Body of Knowledge explains the content, purpose, and use of eight knowledge areas that define the boundaries of the discipline of cybersecurity. The discussion focuses on, and is driven by, the essential concepts of each knowledge area that collectively capture the cybersecurity body of knowledge to provide a complete picture of the field. This book is based on a brand-new and up to this point unique, global initiative, known as CSEC2017, which was created and endorsed by ACM, IEEE-CS, AIS SIGSEC, and IFIP WG 11.8. This has practical relevance to every educator in the discipline of cybersecurity. Because the specifics of this body of knowledge cannot be imparted in a single text, the authors provide the necessary comprehensive overview. In essence, this is the entry-level survey of the comprehensive field of cybersecurity. It will serve as the roadmap for individuals to later drill down into a specific area of interest. This presentation is also explicitly designed to aid faculty members, administrators, CISOs, policy makers, and stakeholders involved with cybersecurity workforce development initiatives. The book is oriented toward practical application of a computing-based foundation, crosscutting concepts, and essential knowledge and skills of the cybersecurity discipline to meet workforce demands. Dan Shoemaker, PhD, is full professor, senior research scientist, and program director at the University of Detroit Mercy's Center for Cyber Security and Intelligence Studies. Dan is a former chair of the Cybersecurity & Information Systems Department and has authored numerous books and journal articles focused on cybersecurity. Anne Kohnke, PhD, is an associate professor of cybersecurity and the principle investigator of the Center for Academic Excellence in Cyber Defence at the University of Detroit Mercy. Anne's research is focused in cybersecurity, risk management, threat modeling, and mitigating attack vectors. Ken Sigler, MS, is a faculty member of the Computer Information Systems (CIS) program at the Auburn Hills campus of Oakland Community College in Michigan. Ken's research is in the areas of software management, software assurance, and cybersecurity.

Digital Mediascapes of Transnational Korean Youth Culture (Paperback): Kyong Yoon Digital Mediascapes of Transnational Korean Youth Culture (Paperback)
Kyong Yoon
R1,228 Discovery Miles 12 280 Ships in 12 - 17 working days

Drawing on vivid ethnographic field studies of youth on the transnational move, across Seoul, Toronto, and Vancouver, this book examines transnational flows of Korean youth and their digital media practices. This book explores how digital media are integrated into various forms of transnational life and imagination, focusing on young Koreans and their digital media practices. By combining theoretical discussion and in depth empirical analysis, the book provides engaging narratives of transnational media fans, sojourners, and migrants. Each chapter illustrates a form of mediascape, in which transnational Korean youth culture and digital media are uniquely articulated. This perceptive research offers new insights into the transnationalization of youth cultural practices, from K-pop fandom to smartphone-driven storytelling. A transnational and ethnographic focus makes this book the first of its kind, with an interdisciplinary approach that goes beyond the scope of existing digital media studies, youth culture studies, and Asian studies. It will be essential reading for scholars and students in media studies, migration studies, popular culture studies, and Asian studies.

The Complete Guide for CPP Examination Preparation (Paperback, 2nd edition): Anthony V. DiSalvatore (CPP, PSP & PCI) The Complete Guide for CPP Examination Preparation (Paperback, 2nd edition)
Anthony V. DiSalvatore (CPP, PSP & PCI)
R1,117 Discovery Miles 11 170 Ships in 12 - 17 working days

Originally written by a team of Certified Protection Professionals (CPPs), Anthony DiSalvatore gives valuable updates to The Complete Guide for CPP Examination Preparation. This new edition contains an overview of the fundamental concepts and practices of security management while offering important insights into the CPP exam. Until recently the security profession was regarded as a "necessary evil." This book is a comprehensive guide to a profession that is now considered critical to our well-being in the wake of 9/11. It presents a practical approach drawn from decades of combined experience shared by the authors, prepares the reader for the CPP exam, and walks them through the certification process. This edition gives revised and updated treatment of every subject in the CPP exam, encourages and outlines a three-part program for you to follow, and includes sample questions at the end of each area of study. Although these are not questions that appear on the actual exam, they convey the principles and concepts that the exam emphasizes and are valuable in determining if you have mastered the information. The book also includes a security survey that covers all facets of external and internal security, as well as fire prevention. The Complete Guide for CPP Examination Preparation, Second Edition allows you to move steadily forward along your path to achieving one of the most highly regarded certifications in the security industry.

Sandworm - A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers (Paperback): Andy Greenberg Sandworm - A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers (Paperback)
Andy Greenberg
R395 R309 Discovery Miles 3 090 Save R86 (22%) Ships in 5 - 10 working days

From Wired senior writer Andy Greenberg comes the true story of the most devastating cyberattack in history and the desperate hunt to identify and track the elite Russian agents behind it.

"Much more than a true-life techno-thriller ... a tour through a realm that is both invisible and critical to the daily lives of every person alive in the 21st century." —Los Angeles Times

In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark. NotPetya spread around the world, inflicting an unprecedented ten billion dollars in damage—the largest, most destructive cyberattack the world had ever seen.

The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in history: a group known as Sandworm. Working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike.

A chilling, globe-spanning detective story, Sandworm considers the danger this force poses to our national security and stability. As the Kremlin's role in foreign government manipulation comes into greater focus, Sandworm exposes the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield. It reveals how the lines between digital and physical conflict, between wartime and peacetime, have begun to blur—with world-shaking implications.

Atari 2600/7800: a visual compendium (Paperback): Bitmap Books Atari 2600/7800: a visual compendium (Paperback)
Bitmap Books 1
R954 Discovery Miles 9 540 Ships in 9 - 15 working days
Dream Lovers - The Gamification of Relationships (Hardcover): Alfie Bown Dream Lovers - The Gamification of Relationships (Hardcover)
Alfie Bown
R2,046 Discovery Miles 20 460 Ships in 12 - 17 working days

'An exciting, astute analysis of how our capacity for desire has been slotted into the grooves of digital capitalism, and made to work for profit - from porn to Pokemon' - Richard Seymour We are in the middle of a 'desirevolution' - a fundamental and political transformation of the way we desire as human beings. Perhaps as always, new technologies - with their associated and inherited political biases - are organising and mapping the future. What we don't seem to notice is that the primary way in which our lives are being transformed is through the manipulation and control of desire itself. Our very impulses, drives and urges are 'gamified' to suit particular economic and political agendas, changing the way we relate to everything from lovers and friends to food and politicians. Digital technologies are transforming the subject at the deepest level of desire - re-mapping its libidinal economy - in ways never before imagined possible. From sexbots to smart condoms, fitbits to VR simulators and AI to dating algorithms, the 'love industries' are at the heart of the future smart city and the social fabric of everyday life. This book considers these emergent technologies and what they mean for the future of love, desire, work and capitalism.

Mind the Tech Gap - Addressing the Conflicts between IT and Security Teams (Paperback): Nikki. Robinson Mind the Tech Gap - Addressing the Conflicts between IT and Security Teams (Paperback)
Nikki. Robinson
R1,117 Discovery Miles 11 170 Ships in 12 - 17 working days

1. Learn best practices for every facet of management 2. Learn what type of leader you need to be to succeed 3. Maximize employee engagement and retention among staff 4. Develop your staff's talent to full potential 5. Learn where the future of management is headed

How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Hardcover): Ravi Das How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Hardcover)
Ravi Das
R3,470 Discovery Miles 34 700 Ships in 12 - 17 working days

Written by an author that has real world experience in launching a cyber consulting company. Comprehensive coverage ranging all the way from the legal formation to be used to which segment of the Cybersecurity Industry should be targeted. Explains how CISOs can market their services and get key customers.

Healthcare Analytics - Emergency Preparedness for COVID-19 (Hardcover): Edward M. Rafalski, Ross M. Mullner Healthcare Analytics - Emergency Preparedness for COVID-19 (Hardcover)
Edward M. Rafalski, Ross M. Mullner
R3,189 Discovery Miles 31 890 Ships in 12 - 17 working days

The first COVID-19 case in the US was reported on January 20, 2020. As the first cases were being reported in the US, Washington State became a reliable source not just for hospital bed demand based on incidence and community spread but also for modeling the impact of skilled nursing facilities and assisted living facilities on hospital bed demand. Various hospital bed demand modeling efforts began in earnest across the United States in university settings, private consulting and health systems. Nationally, the University of Washington Institute of Health Metrics and Evaluation seemed to gain a footing and was adopted as a source for many states for its ability to predict the epidemiological curve by state, including the peak. This book therefore addresses a compelling need for documenting what has been learned by the academic and professional healthcare communities in healthcare analytics and disaster preparedness to this point in the pandemic. What is clear, at least from the US perspective, is that the healthcare system was unprepared and uncoordinated from an analytics perspective. Learning from this experience will only better prepare all healthcare systems and leaders for future crisis. Both prospectively, from a modeling perspective and retrospectively from a root cause analysis perspective, analytics provide clarity and help explain causation and data relationships. A more structured approach to teaching healthcare analytics to students, using the pandemic and the rich dataset that has been developed, provides a ready-made case study from which to learn and inform disaster planning and preparedness. The pandemic has strained the healthcare and public health systems. Researchers and practitioners must learn from this crisis to better prepare our processes for future pandemics, at minimum. Finally, government officials and policy makers can use this data to decide how best to assist the healthcare and public health systems in crisis.

Digital Innovation for Pandemics - Concepts, Challenges, Constraints, and Opportunities (Hardcover): Jasleen Kaur, Navjot Sidhu Digital Innovation for Pandemics - Concepts, Challenges, Constraints, and Opportunities (Hardcover)
Jasleen Kaur, Navjot Sidhu
R3,333 Discovery Miles 33 330 Ships in 12 - 17 working days

A pandemic does not only bring health concerns for society but also significantly affects individuals and government and business operations. Recently, COVID-19 has substantially hampered conventional businesses and organizations worldwide. Digital technology can help achieve business continuity and overcome challenges caused by pandemic situations. Digital innovation is the application of digital technology to existing business problems. Ideas such as digital transformation and digitization are closely related to digital innovation. In this pandemic period, many businesses recognize that they need to transform, innovate, and adopt new technologies to stay competitive. However, digital transformation is an inherently complex process, and the time pressure to adopt quickly may result in further complexities for organizations in fostering digital technologies. Digital Innovations for Pandemics: Concepts, Challenges, Constraints, and Opportunities presents the potential of digital responses to the COVID-19 pandemic. It explores new digital concepts for learning and teaching, provides an overview of organizational responses to the crisis through digital technologies, and examines digital solutions developed to manage the crisis. Examining how information systems researchers can contribute to these global efforts, this book seeks to showcase how consumers, citizens, entrepreneurs, organizations, institutions, and governments are leveraging new and emerging digital innovations to disrupt and transform value creation in the pandemic era. It captures the breadth of digital innovations carried out to handle the pandemic and looks at the use of digital technologies to strengthen various processes. The book features the following: Solutions on how digital technologies enable responses to a global crisis An analysis of information systems used during the management of the COVID-19 pandemic New concepts for digital business and innovative content models for different sectors This book is written for advanced undergraduate students, postgraduate students, researchers, and scholars in the field of digital business, education, and healthcare. It includes theoretical chapters and case studies from leading scholars and practitioners on the technology-adoption practices of non-government organizations (NGOs), government, and business.

Ethical Digital Technology in Practice (Hardcover): Simon Rogerson Ethical Digital Technology in Practice (Hardcover)
Simon Rogerson
R4,358 Discovery Miles 43 580 Ships in 12 - 17 working days

Unique selling point: Exploration of the societal and ethical issues surrounding the use and development of digital technology Core audience: IT managers and executives; academic researchers; students of IT Place in the market: Professional title with appeal to academics and students

Practical Core Software Security - A Reference Framework (Hardcover): James F Ransome, Anmol Misra, Mark S. Merkow Practical Core Software Security - A Reference Framework (Hardcover)
James F Ransome, Anmol Misra, Mark S. Merkow
R5,392 Discovery Miles 53 920 Ships in 12 - 17 working days

As long as humans write software, the key to successful software security is making the software development program process more efficient and effective. Although the approach of this textbook includes people, process, and technology approaches to software security, Practical Core Software Security: A Reference Framework stresses the people element of software security, which is still the most important part to manage as software is developed, controlled, and exploited by humans. The text outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. It focuses on what humans can do to control and manage a secure software development process using best practices and metrics. Although security issues will always exist, students learn how to maximize an organization's ability to minimize vulnerabilities in software products before they are released or deployed by building security into the development process. The authors have worked with Fortune 500 companies and have often seen examples of the breakdown of security development lifecycle (SDL) practices. The text takes an experience-based approach to apply components of the best available SDL models in dealing with the problems described above. Software security best practices, an SDL model, and framework are presented in this book. Starting with an overview of the SDL, the text outlines a model for mapping SDL best practices to the software development life cycle (SDLC). It explains how to use this model to build and manage a mature SDL program. Exercises and an in-depth case study aid students in mastering the SDL model. Professionals skilled in secure software development and related tasks are in tremendous demand today. The industry continues to experience exponential demand that should continue to grow for the foreseeable future. This book can benefit professionals as much as students. As they integrate the book's ideas into their software security practices, their value increases to their organizations, management teams, community, and industry.

Data Publics - Public Plurality in an Era of Data Determinacy (Paperback): Peter Moertenboeck, Helge Mooshammer Data Publics - Public Plurality in an Era of Data Determinacy (Paperback)
Peter Moertenboeck, Helge Mooshammer
R1,243 Discovery Miles 12 430 Ships in 12 - 17 working days

Data has emerged as a key component that determines how interactions across the world are structured, mediated and represented. This book examines these new data publics and the areas in which they become operative, via analysis of politics, geographies, environments and social media platforms. By claiming to offer a mechanism to translate every conceivable occurrence into an abstract code that can be endlessly manipulated, digitally processed data has caused conventional reference systems which hinge on our ability to mark points of origin, to rapidly implode. Authors from a range of disciplines provide insights into such a political economy of data capitalism; the political possibilities of techno-logics beyond data appropriation and data refusal; questions of visual, spatial and geographical organization; emergent ways of life and the environments that sustain them; and the current challenges of data publics, which is explored via case studies of three of the most influential platforms in the social media economy today: Facebook, Instagram and Whatsapp. Data Publics will be of great interest to academics and students in the fields of computer science, philosophy, sociology, media and communication studies, architecture, visual culture, art and design, and urban and cultural studies.

Cyberpredators and Their Prey (Hardcover): Lauren R Shapiro Cyberpredators and Their Prey (Hardcover)
Lauren R Shapiro
R3,206 Discovery Miles 32 060 Ships in 12 - 17 working days

Portrays material through multidisciplinary lens of psychology, criminal justice, law, and security Provides consistent, practical information about online criminals and victims Compares online to offline versions of the same crime Discusses adequacy of current laws for prosecuting cybercriminals Considers elements of the online environment that foster criminal activity Describes social engineering techniques Considers the role of intimate partner violence in cybercrimes Reviews 21st century skills needed to educate and protect potential targets

Digital Transformation and Social Well-Being - Promoting an Inclusive Society (Hardcover): Antonio Lopez Pelaez, Sergei... Digital Transformation and Social Well-Being - Promoting an Inclusive Society (Hardcover)
Antonio Lopez Pelaez, Sergei Zelenev, Sang-Mok Suh
R4,112 Discovery Miles 41 120 Ships in 12 - 17 working days

Shows how social services provided now and in the future can be enhanced through digitization. Contains country case-studies from USA, Brasil, Korea, Taiwan, Hong Kong (China), India, Zimbabwe, Morocco, Spain, Portugal, Ireland and Singapore. Will be of interest to all scholars and students of social work, social policy and social welfare provision.

The Web Accessibility Project - Development and Testing Best Practices (Hardcover): Narayanan Palani The Web Accessibility Project - Development and Testing Best Practices (Hardcover)
Narayanan Palani
R5,090 Discovery Miles 50 900 Ships in 12 - 17 working days

Approximately 15% of the global population is affected by some sort of disability, according to the World Report on Disability. Many C-Suite executives perceive digital accessibility (DA) as an endless task. Among the engineering leaders, one in four leaders are reliant on very limited knowledge about digital accessibility. Many countries are increasing their legislative efforts to make web accessibility an important part in web development and testing of software releases. Numerous organizations are facing extreme turbulence when not adhering to international accessibility guidelines while developing their software's and website applications. Web Content Accessibility Guidelines (WCAG) is a global guide on accessibility recommendations that are developed through the World Wide Web Consortium (W3C) to help organizations to meet minimum standard accessibility guidelines. It has become critical for every organization to focus on implementing the accessibility checks at every stage of their application development to avoid costly mistakes. Meanwhile, the need for front-end engineers and Quality Assurance (QA) test analysts to learn WCAG best practices is immensely important for the growing need to incorporate accessibility-focused inclusive design, development, and extensive accessibility testing, which are essential for most of the customer-facing websites. In a fast-paced world, incorporating shift left accessibility within development and testing is the new normal. The Web Accessibility Project: Development and Testing Best Practices helps developers address right accessibility attributes to user interface (UI) components. It also helps developers focus on developing manual and automation tests for QA professionals to inject accessibility audit, accessibility functional tests, and accessibility automation tests as part of their Continuous Integration and Continuous Development (CI/CD) models. The book is filled with readily usable best practices to adapt web accessibility early in application development. By applying the accessibility best practices covered in this book, developers can help their organizations rise to a whole new level of accessibility adherence, innovation, and inclusive design. They will also see greater work satisfaction in their professional lives and a way to help improve digital accessibility for end users.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Slenderman - Online Obsession, Mental…
Kathleen Hale Hardcover R733 R614 Discovery Miles 6 140
Novel Beings - Regulatory Approaches for…
David R. Lawrence, Sarah Morley Hardcover R3,151 Discovery Miles 31 510
The Handover - How We Gave Control Of…
David Runciman Hardcover R630 R504 Discovery Miles 5 040
E-Commerce In South Africa
Adheesh Budree Paperback R403 R355 Discovery Miles 3 550
The Hitchhiker's Guide To AI - A…
Arthur Goldstuck Paperback R350 R249 Discovery Miles 2 490
Information And Communications…
Dana van der Merwe Paperback R1,119 R915 Discovery Miles 9 150
Very Bad People - The Inside Story Of…
Patrick Alley Paperback  (1)
R440 Discovery Miles 4 400
I Am Code
Brent Katz, Josh Morgenthau, … Paperback R390 R312 Discovery Miles 3 120
Selfies, Sexts And Smartphones - A…
Emma Sadleir Paperback R270 R211 Discovery Miles 2 110
WFH: Working From Home - How To Build A…
Harriet Minter Paperback R355 R280 Discovery Miles 2 800

 

Partners