0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (9)
  • R100 - R250 (408)
  • R250 - R500 (1,167)
  • R500+ (11,371)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing

Cybercrime and Digital Forensics - An Introduction (Hardcover, 3rd edition): Thomas J. Holt, Adam M Bossler, Kathryn C... Cybercrime and Digital Forensics - An Introduction (Hardcover, 3rd edition)
Thomas J. Holt, Adam M Bossler, Kathryn C Seigfried-Spellar
R4,147 Discovery Miles 41 470 Ships in 12 - 17 working days

This book offers a comprehensive and integrative introduction to cybercrime. It provides an authoritative synthesis of the disparate literature on the various types of cybercrime, the global investigation and detection of cybercrime and the role of digital information, and the wider role of technology as a facilitator for social relationships between deviants and criminals. It includes coverage of: * key theoretical and methodological perspectives; * computer hacking and malicious software; * digital piracy and intellectual theft; * economic crime and online fraud; * pornography and online sex crime; * cyber-bullying and cyber-stalking; * cyber-terrorism and extremism; * the rise of the Dark Web; * digital forensic investigation and its legal context around the world; * the law enforcement response to cybercrime transnationally; * cybercrime policy and legislation across the globe. The new edition has been revised and updated, featuring two new chapters; the first offering an expanded discussion of cyberwarfare and information operations online, and the second discussing illicit market operations for all sorts of products on both the Open and Dark Web. This book includes lively and engaging features, such as discussion questions, boxed examples of unique events and key figures in offending, quotes from interviews with active offenders, and a full glossary of terms. It is supplemented by a companion website that includes further exercises for students and instructor resources. This text is essential reading for courses on cybercrime, cyber-deviancy, digital forensics, cybercrime investigation, and the sociology of technology.

Scholarly Communication in China, Hong Kong, Japan, Korea and Taiwan (Hardcover): Jingfeng Xia Scholarly Communication in China, Hong Kong, Japan, Korea and Taiwan (Hardcover)
Jingfeng Xia
R1,961 Discovery Miles 19 610 Ships in 12 - 17 working days

This is one of the very few books that systematically explores the characteristics of scholarly communication outside the West. Over the last decade the advances in information technology have remodelled the foundation of scholarly communication. This book examines how countries/regions in East Asia (China, Japan, Korea and Taiwan) have reacted to the innovations in the conduct of research and in the exchange of ideas. It outlines the traditional systems of scholarly exchange in China, Japan, Korea and Taiwan, and then concentrates on the efforts of these countries/regions to provide revolutionary ways of writing, publishing, and reading of information produced by members of the academic community. It also discusses the achievements as well as challenges in the process of technology innovations, highlighting the uniqueness of practices in scholarly communication in this part of the world.
The first book on this topicChapters written by experts from each country and region coveredComprehensive introduction with historical view and critical perspective

These Things Really Do Happen To Me (Paperback): Khaya Dlanga These Things Really Do Happen To Me (Paperback)
Khaya Dlanga 1
bundle available
R210 R164 Discovery Miles 1 640 Save R46 (22%) Ships in 5 - 10 working days

Sometimes real life is stranger than fiction. That certainly is the case when considering the things that happen to Khaya Dlanga in the course of his everyday life. Khaya often shares these stories in brief via Instagram or his other social media platforms. He is finally succumbing to the pressure from the many people who read his posts and want more details, and is telling all of these stories and more in These Things Really Do Happen To Me.

Always entertaining, and often containing astute observations regarding various social practices and situations, Khaya tells wide-ranging stories – his lunch with William Shatner; how he fell asleep next to President Thabo Mbeki; how he got hit on by a deaf girl; how his dreadlocks didn’t get the expected reaction from his mom; the greatest pick-up line ever used on him; awkward encounters with exes; what happens when you parallel park in Parkhurst; and what he has learnt in the course of his eventful life – that are guaranteed to entertain and enlighten readers.

Ethics in Information Technology - A Practical Guide (Hardcover): G K Awari, Sarvesh V. Warjurkar Ethics in Information Technology - A Practical Guide (Hardcover)
G K Awari, Sarvesh V. Warjurkar
R5,238 Discovery Miles 52 380 Ships in 12 - 17 working days

Discusses the legal, ethical, and societal implications of information technology. Covers important topics including infringement of intellectual property, security risks, Internet crime, and social networking. Provides in-depth knowledge of privacy techniques. Discusses concepts of intellectual property (IPR) and issues in software development.

Teach Yourself Getting Started on Second Life (Paperback): Teach Yourself Getting Started on Second Life (Paperback)
R90 Discovery Miles 900 Ships in 12 - 17 working days
Making Sense of Cyber Capabilities for Small States - Case Studies from the Asia-Pacific (Hardcover): Francis C. Domingo Making Sense of Cyber Capabilities for Small States - Case Studies from the Asia-Pacific (Hardcover)
Francis C. Domingo
R3,920 Discovery Miles 39 200 Ships in 12 - 17 working days

Domingo explores the potential of cyber capabilities for small states in the Asia-Pacific, the most active region for cyber conflict. He develops a systematic explanation for why Brunei, New Zealand, and Singapore have developed or are developing cyber capabilities. Studies on cyber conflict and strategy have substantially increased in the past decade but most have focused on the cyber operations of powerful states. This book moves away from the prominence of powerful states and explores the potential of cyber capabilities for small states in the Asia-Pacific, the most active region for cyber conflict. It develops a systematic explanation of why Brunei, New Zealand, and Singapore have developed or are developing cyber capabilities despite its obscure strategic value. The book argues that the distribution of power in the region and a "technology-oriented" strategic culture are two necessary conditions that influence the development of cyber capabilities in small states. Following this argument, the book draws on neoclassical realism as a theoretical framework to account for the interaction between these two conditions. The book also pursues three secondary objectives. First, it aims to determine the constraints and incentives that affect the utilization of cyber capabilities as foreign policy instruments. Second, the book evaluates the functionality of these cyber capabilities for small states. Lastly, it assesses the implications of employing cyber capabilities as foreign policy tools of small states. This book will be an invaluable resource for academics and security analysts working on cyber conflict, military strategy, small states, and International Relations in general.

Ethical Hacking and Penetration Testing Guide (Paperback): Rafay Baloch Ethical Hacking and Penetration Testing Guide (Paperback)
Rafay Baloch
R1,775 Discovery Miles 17 750 Ships in 9 - 15 working days

Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration test. The book covers a wide range of tools, including Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools, it details a four-step methodology for conducting an effective penetration test or hack.Providing an accessible introduction to penetration testing and hacking, the book supplies you with a fundamental understanding of offensive security. After completing the book you will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks you through each of the steps and tools in a structured, orderly manner allowing you to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process will allow you to clearly see how the various tools and phases relate to each other. An ideal resource for those who want to learn about ethical hacking but don't know where to start, this book will help take your hacking skills to the next level. The topics described in this book comply with international standards and with what is being taught in international certifications.

Cybersecurity - Ethics, Legal, Risks, and Policies (Hardcover): Ishaani Priyadarshini, Chase Cotton Cybersecurity - Ethics, Legal, Risks, and Policies (Hardcover)
Ishaani Priyadarshini, Chase Cotton
R3,753 Discovery Miles 37 530 Ships in 12 - 17 working days

This book is the first of its kind to introduce the integration of ethics, laws, risks, and policies in cyberspace. The book provides understanding of the ethical and legal aspects of cyberspace along with the risks involved. It also addresses current and proposed cyber policies, serving as a summary of the state of the art cyber laws in the United States. It also, importantly, incorporates various risk management and security strategies from a number of organizations. Using easy-to-understand language and incorporating case studies, the authors begin with the consideration of ethics and law in cybersecurity and then go on to take into account risks and security policies. The section on risk covers identification, analysis, assessment, management, and remediation. The very important topic of cyber insurance is covered as well-its benefits, types, coverage, etc. The section on cybersecurity policy acquaints readers with the role of policies in cybersecurity and how they are being implemented by means of frameworks. The authors provide a policy overview followed by discussions of several popular cybersecurity frameworks, such as NIST, COBIT, PCI/DSS, ISO series, etc.

Handbook of Usability and User-Experience - Research and Case Studies (Hardcover): Marcelo M. Soares, Francisco Rebelo, Tareq... Handbook of Usability and User-Experience - Research and Case Studies (Hardcover)
Marcelo M. Soares, Francisco Rebelo, Tareq Z. Ahram
R4,657 Discovery Miles 46 570 Ships in 12 - 17 working days

This volume of the Handbook of Usability and User Experience (UX) presents research and case studies used to design products, systems and environments with good usability and consequent acceptance, pleasure in use, good user experience, and understanding of human interaction issues with products and systems for their improvement. The book presents concepts and perspectives of UX; it also discusses methods and tools that use requirements analysis activity elicitation, recording, and analysis to guarantee a good user experience. In addition, it introduces usability and UX in the automotive industry, usability and UX in a digital interface, game design and digital media, usability and UX in fashion design, and some case studies on usability and UX in various contexts in product design. We hope that this second volume will be helpful to a larger number of professionals, students and practitioners who strive to incorporate usability and UX principles and knowledge in a variety of applications. We trust that the knowledge presented in this volume will ultimately lead to an increased appreciation of the benefits of usability and incorporate the principles of usability and UX knowledge to improve the quality, effectiveness, and efficiency of everyday consumer products, systems, and environments.

Economic Crime - From Conception to Response (Hardcover): Mark Button, Branislav Hock, David Shepherd Economic Crime - From Conception to Response (Hardcover)
Mark Button, Branislav Hock, David Shepherd
R4,076 Discovery Miles 40 760 Ships in 12 - 17 working days

This book offers a fresh approach to a range of pressing issues, emphasising the value of establishing economic crime as a sub-discipline within criminology. This will be essential reading for a range of more applied graduate courses across the UK and Europe on counter-fraud, money laundering, corruption, security management and financial crime investigation. Given the prominence of 'economic crime' amongst police forces, law enforcement agencies and government, this book has a secondary market amongst practitioners.

Digital for Good - Raising Kids to Thrive in an Online World (Hardcover): Richard Culatta Digital for Good - Raising Kids to Thrive in an Online World (Hardcover)
Richard Culatta
R550 Discovery Miles 5 500 Ships in 12 - 17 working days

Kids deserve a better digital future. Help them create it. When it comes to raising children in a digital world, every parent feels underprepared and overwhelmed. We worry that our children will become addicted to online games, be victims of cyberbullying, or get lost down the rabbit hole of social media. We warn them about all the things they shouldn't do online, but we don't do nearly enough to teach them the skills of digital well-being. It's time to start a new conversation. In Digital for Good, EdTech expert Richard Culatta argues that technology can be a powerful tool for learning, solving humanity's toughest problems, and bringing us closer together. He offers a refreshingly positive framework for preparing kids to be successful in a digital world&#8212one that encourages them to use technology proactively and productively&#8212by outlining five qualities every young person should develop in order to become a thriving, contributing digital citizen: Be balanced: understand when and how much tech use is healthy Stay informed: discern between true and false information Be inclusive: treat others with respect and kindness online Be engaged: use tech to strengthen family relationships and community connections Stay alert: exercise caution and create safe digital spaces for others This practical guide will help parents and children discover the path to becoming effective digital citizens, all while making our online world a better place.

Authorization and Access Control - Foundations, Frameworks, and Applications (Hardcover): Parikshit N. Mahalle, Shashikant S.... Authorization and Access Control - Foundations, Frameworks, and Applications (Hardcover)
Parikshit N. Mahalle, Shashikant S. Bhong, Gitanjali R. Shinde
R1,513 Discovery Miles 15 130 Ships in 12 - 17 working days

Provides overview of security challenges of IoT and mitigation techniques with a focus on authorization and access control mechanisms Discusses behavioural analysis of threats and attacks using UML base modelling Covers use of Oauth2.0 Protocol and UMA for connecting web applications Includes Role Based Access Control (RBAC), Discretionary Access Control (DAC), Mandatory Access Control (MAC), and Permission Based Access Control (PBAC) Explores how to provide access to third party web applications through resource server by use of secured and reliable Oauth2.0 framework

ICT and Data Sciences (Hardcover): Archana Singh, Vinod Kumar Shukla, Ashish Seth, Sai Sabitha ICT and Data Sciences (Hardcover)
Archana Singh, Vinod Kumar Shukla, Ashish Seth, Sai Sabitha
R4,503 Discovery Miles 45 030 Ships in 12 - 17 working days

This book highlights the state-of-the-art research on data usage, security, and privacy in the scenarios of the Internet of Things (IoT), along with related applications using Machine Learning and Big Data technologies to design and make efficient Internet-compatible IoT systems. ICT and Data Sciences brings together IoT and Machine Learning and provides the careful integration of both, along with many examples and case studies. It illustrates the merging of two technologies while presenting basic to high-level concepts covering different fields and domains such as the Hospitality and Tourism industry, Smart Clothing, Cyber Crime, Programming, Communications, Business Intelligence, all in the context of the Internet of Things. The book is written for researchers and practitioners, working in Information Communication Technology and Computer Science.

The Little Book of Big PR - 100+ Quick Tips to Get Your Business Noticed (Paperback, Special Ed.): Jennefer Witter The Little Book of Big PR - 100+ Quick Tips to Get Your Business Noticed (Paperback, Special Ed.)
Jennefer Witter
R212 R199 Discovery Miles 1 990 Save R13 (6%) Ships in 12 - 17 working days

As an entrepreneur, you need every helpful tool you can get your hands on to build your business. And if you know the tricks of the trade, perhaps nothing can gain more attention for your small business and build your company's credibility than a good, old-fashioned public-relations campaign. Whether you're an established company or a cost-conscious start-up, The Little Book of Big PR tells you all you need to know to be able to use public relations effectively as a business-building tool.Drawing on the expertise gained during her long career in public relations, Jennefer Witter shares simple, smart, and budget-friendly methods for getting your business noticed, including what she calls the seven key elements of public relations:* Self-branding* Media relations* Social Media* Networking* Speaking engagements* Cause-related marketing* Selecting a PR agencyComplete with real-world case studies and sample content (such as media pitches) to use as-is or to modify to fit your own specific needs, this all-encompassing resource will provide for you the expert guidance all entrepreneurs need to grow their business to new, attention-getting heights.

The Security Hippie (Hardcover): Barak Engel The Security Hippie (Hardcover)
Barak Engel
R3,179 Discovery Miles 31 790 Ships in 12 - 17 working days

The Security Hippie is Barak Engel's second book. As the originator of the "Virtual CISO" (fractional security chief) concept, he has served as security leader in dozens of notable organizations, such as Mulesoft, Stubhub, Amplitude Analytics, and many others. The Security Hippie follows his previous book, Why CISOs Fail, which became a sleeper hit, earning a spot in the Cybercannon project as a leading text on the topic of information security management. In this new book, Barak looks at security purely through the lens of story-telling, sharing many and varied experiences from his long and accomplished career as organizational and thought leader, and visionary in the information security field. Instead of instructing, this book teaches by example, sharing many real situations in the field and actual events from real companies, as well as Barak's related takes and thought processes. An out-of-the-mainstream, counterculture thinker - Hippie - in the world of information security, Barak's rich background and unusual approach to the field come forth in this book in vivid color and detail, allowing the reader to sit back and enjoy these experiences, and perhaps gain insights when faced with similar issues themselves or within their organizations. The author works hard to avoid technical terms as much as possible, and instead focus on the human and behavioral side of security, finding the humor inherent in every anecdote and using it to demystify the field and connect with the reader. Importantly, these are not the stories that made the news; yet they are the ones that happen all the time. If you've ever wondered about the field of information security, but have been intimidated by it, or simply wished for more shared experiences, then The Security Hippie is the perfect way to open that window by accompanying Barak on some of his many travels into the land of security.

Internet of Everything and Big Data - Major Challenges in Smart Cities (Hardcover): Salahddine Krit, Mohamed Elhoseny,... Internet of Everything and Big Data - Major Challenges in Smart Cities (Hardcover)
Salahddine Krit, Mohamed Elhoseny, Valentina Emilia Balas, Rachid Benlamri, Marius M. Balas
R4,493 Discovery Miles 44 930 Ships in 12 - 17 working days

Explains concepts of Internet of Everything problems, research challenge goals, and vision in smart cities Based on the most recent innovations, and covering the major challenges in smart cities, between IoT and Big Data Examines security issues and challenges related to data-intensive advances in IoT Addresses the total information science challenges in Internet of Everything enabled technologies Covers the exploring and creating IoT environment related self-adaptive systems

Privacy Engineering (Paperback): Nishant Bhajaria Privacy Engineering (Paperback)
Nishant Bhajaria
R1,258 Discovery Miles 12 580 Ships in 12 - 17 working days

PrivacyEngineering is a hands-on guide to building a modern and flexible privacy program for your organization. It helps map essential legal requirements into practical engineering techniques that you can implement right away. The book develops your strategic understanding of data governance and helps you navigate the tricky trade-offs between privacy and business needs. You'll learn to spot risks in your own data management systems and prepare to satisfy both internal and external privacy audits. There's no bureaucratic new processes or expensive new software necessary. You'll learn how to repurpose the data and security tools you already use to achieve your privacy goals. Preserving the privacy of your users is essential for any successful business. Well-designed processes and data governance ensure that privacy is built into your systems from the ground up, keeping your users safe and helping your organization maintain compliance with the law.

Dream Lovers - The Gamification of Relationships (Paperback): Alfie Bown Dream Lovers - The Gamification of Relationships (Paperback)
Alfie Bown
R445 Discovery Miles 4 450 Ships in 12 - 17 working days

'An exciting, astute analysis of how our capacity for desire has been slotted into the grooves of digital capitalism, and made to work for profit - from porn to Pokemon' - Richard Seymour We are in the middle of a 'desirevolution' - a fundamental and political transformation of the way we desire as human beings. Perhaps as always, new technologies - with their associated and inherited political biases - are organising and mapping the future. What we don't seem to notice is that the primary way in which our lives are being transformed is through the manipulation and control of desire itself. Our very impulses, drives and urges are 'gamified' to suit particular economic and political agendas, changing the way we relate to everything from lovers and friends to food and politicians. Digital technologies are transforming the subject at the deepest level of desire - re-mapping its libidinal economy - in ways never before imagined possible. From sexbots to smart condoms, fitbits to VR simulators and AI to dating algorithms, the 'love industries' are at the heart of the future smart city and the social fabric of everyday life. This book considers these emergent technologies and what they mean for the future of love, desire, work and capitalism.

Practical Security for Agile and DevOps (Hardcover): Mark S. Merkow Practical Security for Agile and DevOps (Hardcover)
Mark S. Merkow
R4,797 Discovery Miles 47 970 Ships in 12 - 17 working days

This textbook was written from the perspective of someone who began his software security career in 2005, long before the industry began focusing on it. This is an excellent perspective for students who want to learn about securing application development. After having made all the rookie mistakes, the author realized that software security is a human factors issue rather than a technical or process issue alone. Throwing technology into an environment that expects people to deal with it but failing to prepare them technically and psychologically with the knowledge and skills needed is a certain recipe for bad results. Practical Security for Agile and DevOps is a collection of best practices and effective implementation recommendations that are proven to work. The text leaves the boring details of software security theory out of the discussion as much as possible to concentrate on practical applied software security that is useful to professionals. It is as much a book for students' own benefit as it is for the benefit of their academic careers and organizations. Professionals who are skilled in secure and resilient software development and related tasks are in tremendous demand. This demand will increase exponentially for the foreseeable future. As students integrate the text's best practices into their daily duties, their value increases to their companies, management, community, and industry. The textbook was written for the following readers: Students in higher education programs in business or engineering disciplines AppSec architects and program managers in information security organizations Enterprise architecture teams with a focus on application development Scrum Teams including: Scrum Masters Engineers/developers Analysts Architects Testers DevOps teams Product owners and their management Project managers Application security auditors Agile coaches and trainers Instructors and trainers in academia and private organizations

Digital Totalitarianism - Algorithms and Society (Hardcover): Michael Filimowicz Digital Totalitarianism - Algorithms and Society (Hardcover)
Michael Filimowicz
R1,525 Discovery Miles 15 250 Ships in 12 - 17 working days

Digital Totalitarianism: Algorithms and Society focuses on important challenges to democratic values posed by our computational regimes: policing the freedom of inquiry, risks to the personal autonomy of thought, NeoLiberal management of human creativity, and the collapse of critical thinking with the social media fueled rise of conspiranoia. Digital networks allow for a granularity and pervasiveness of surveillance by government and corporate entities. This creates power asymmetries where each citizen's daily 'data exhaust' can be used for manipulative and controlling ends by powerful institutional actors. This volume explores key erosions in our fundamental human values associated with free societies by covering government surveillance of library-based activities, cognitive enhancement debates, the increasing business orientation of art schools, and the proliferation of conspiracy theories in network media. Scholars and students from many backgrounds, as well as policy makers, journalists and the general reading public will find a multidisciplinary approach to questions of totalitarian tendencies encompassing research from Communication, Rhetoric, Library Sciences, Art and New Media.

Democratic Frontiers - Algorithms and Society (Hardcover): Michael Filimowicz Democratic Frontiers - Algorithms and Society (Hardcover)
Michael Filimowicz
R1,582 Discovery Miles 15 820 Ships in 12 - 17 working days

Democratic Frontiers: Algorithms and Society focuses on digital platforms' effects in societies with respect to key areas such as subjectivity and self-reflection, data and measurement for the common good, public health and accessible datasets, activism in social media and the import/export of AI technologies relative to regime type. Digital technologies develop at a much faster pace relative to our systems of governance which are supposed to embody democratic principles that are comparatively timeless, whether rooted in ancient Greek or Enlightenment ideas of freedom, autonomy and citizenship. Algorithms, computing millions of calculations per second, do not pause to reflect on their operations. Developments in the accumulation of vast private datasets that are used to train automated machine learning algorithms pose new challenges for upholding these values. Social media platforms, while the key driver of today's information disorder, also afford new opportunities for organized social activism. The US and China, presumably at opposite ends of an ideological spectrum, are the main exporters of AI technology to both free and totalitarian societies. These are some of the important topics covered by this volume that examines the democratic stakes for societies with the rapid expansion of these technologies. Scholars and students from many backgrounds as well as policy makers, journalists and the general reading public will find a multidisciplinary approach to issues of democratic values and governance encompassing research from Sociology, Digital Humanities, New Media, Psychology, Communication, International Relations and Economics. Chapter 3 of this book is available for free in PDF format as Open Access from the individual product page at www.routledge.com. It has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license

The SME Business Guide to Fraud Risk Management (Hardcover): Robert James Chapman The SME Business Guide to Fraud Risk Management (Hardcover)
Robert James Chapman
R4,099 Discovery Miles 40 990 Ships in 12 - 17 working days

* A straightforward yet comprehensive guide about risk specifically for smaller businesses. * Fraud is an increasing area of concern, and one that particularly impacts SMEs. This easy-to-access book provides, in one place, key details of all of the primary fraud types affecting SMEs so that they do not have to carry out their own extensive and very time-consuming research. * Case studies are presented throughout to give real life instances of fraud events.

Systemic Bias - Algorithms and Society (Hardcover): Michael Filimowicz Systemic Bias - Algorithms and Society (Hardcover)
Michael Filimowicz
R1,586 Discovery Miles 15 860 Ships in 12 - 17 working days

Systemic Bias: Algorithms and Society looks at issues of computational bias in the contexts of cultural works, metaphors of magic and mathematics in tech culture, and workplace psychometrics. The output of computational models is directly tied not only to their inputs but to the relationships and assumptions embedded in their model design, many of which are of a social and cultural, rather than physical and mathematical, nature. How do human biases make their way into these data models, and what new strategies have been proposed to overcome bias in computed products? Scholars and students from many backgrounds, as well as policy makers, journalists, and the general reading public will find a multidisciplinary approach to inquiry into algorithmic bias encompassing research from Communication, Art, and New Media.

The UX Careers Handbook (Paperback, 2nd edition): Cory Lebson The UX Careers Handbook (Paperback, 2nd edition)
Cory Lebson
R1,227 Discovery Miles 12 270 Ships in 9 - 15 working days

Features interviews and personal stories from a range of industry-leading UX professionals to show readers how they broke into the industry, stayed with it, and evolved with it. Accompanied by a companion website that provides readers with featured articles and updated resources covering new and changing information to help them stay on top of this fast-paced industry. Provides worksheets and activities to help readers make decisions for their careers and build their soft business skills and portfolios

AI for Learning (Hardcover): Carmel Kent, Benedict du Boulay AI for Learning (Hardcover)
Carmel Kent, Benedict du Boulay
R3,597 Discovery Miles 35 970 Ships in 12 - 17 working days

- the book provides a short and accessible introduction to AI for learners - it examines seven different educational roles and settings, from AI as a peer to AI as a tutor and AI as textbook, among others - it considers both opportunities and risks: technological developments as well as ethical considerations

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Information And Communications…
Dana van der Merwe Paperback R1,119 R1,000 Discovery Miles 10 000
Misbelief - What Makes Rational People…
Dan Ariely Paperback R410 R320 Discovery Miles 3 200
Selfies, Sexts And Smartphones - A…
Emma Sadleir Paperback R270 R211 Discovery Miles 2 110
IT Contracts and Dispute Management - A…
Steven Baker, Lawrence Akka, … Hardcover R5,696 Discovery Miles 56 960
Broken Code - Inside Facebook And The…
Jeff Horwitz Paperback R420 R328 Discovery Miles 3 280
Slenderman - Online Obsession, Mental…
Kathleen Hale Hardcover R733 R614 Discovery Miles 6 140
WFH: Working From Home - How To Build A…
Harriet Minter Paperback R355 R280 Discovery Miles 2 800
Very Bad People - The Inside Story Of…
Patrick Alley Paperback  (1)
R440 Discovery Miles 4 400
Novel Beings - Regulatory Approaches for…
David R. Lawrence, Sarah Morley Hardcover R3,151 Discovery Miles 31 510
The Hitchhiker's Guide To AI - A…
Arthur Goldstuck Paperback R350 R249 Discovery Miles 2 490

 

Partners