0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (8)
  • R100 - R250 (373)
  • R250 - R500 (1,140)
  • R500+ (10,863)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing

Achieving Full Realization and Mitigating the Challenges of the Internet of Things (Hardcover): Marcel Ohanga Odhiambo, Weston... Achieving Full Realization and Mitigating the Challenges of the Internet of Things (Hardcover)
Marcel Ohanga Odhiambo, Weston Mwashita
R6,618 Discovery Miles 66 180 Ships in 10 - 15 working days

As the IoT market is booming, several issues are delaying the full realization of the technology. IoT devices, in cybersecurity terms, greatly increase security risk. This means that any scientific work that offers cybersecurity strategies will excite security experts who will be glad to expand their knowledge base on IoT cybersecurity. As a result of the booming of the IoT market, business competitors are jockeying for a piece of the market. This means that solutions from researchers that address compatibility issues will be greatly welcomed by IoT technology developers. Connectivity providers are likely to embrace solutions to challenges of bandwidth since a growing IoT market must be followed up by bandwidth-intensive IoT applications which tend to jostle for space on the current client-server model. Overpromising followed by underdelivering, has been the current approach by many innovators and the mismatch results in losses in production, orphaned technologies accompanied by frequent system failures. Solutions that address IoT performance issues are likely to excite many start-ups. Solutions to challenges of fragmentation presented by thousands of devices from different manufacturers operating on proprietary ecosystems are likely to be warmly embraced by many IoT brands developers. As such, a publication that specifically addresses the challenges faced in the rolling out of IoT technologies is sorely needed.

Discrete Password Logbook - Locked Door Edition (Hardcover): Suzeteo Enterprises Discrete Password Logbook - Locked Door Edition (Hardcover)
Suzeteo Enterprises
R552 Discovery Miles 5 520 Ships in 10 - 15 working days
SSH Mastery - OpenSSH, PuTTY, Tunnels and Keys (Hardcover, 2nd ed.): Michael W Lucas SSH Mastery - OpenSSH, PuTTY, Tunnels and Keys (Hardcover, 2nd ed.)
Michael W Lucas
R993 R894 Discovery Miles 8 940 Save R99 (10%) Ships in 10 - 15 working days
Peer to Peer Accommodation Networks - An Examination (Hardcover): Sara Dolnicar Peer to Peer Accommodation Networks - An Examination (Hardcover)
Sara Dolnicar
R3,029 Discovery Miles 30 290 Ships in 12 - 17 working days

Peer to Peer Accommodation networks presents a new conceptual framework which offers an initial explanation for the continuing and rapid success of 'disruptive innovators' and their effects on the international hospitality industry, with a specific focus on Airbnb, in the international context. Using her first-hand experience as a host on both traditional holiday accommodation webpages and a peer-to-peer accommodation network, respected tourism academic Sara Dolnicar examines possible reasons for the explosive success of peer to peer accommodation networks, investigates related topics which are less frequently discussed - such as charitable activities and social activism - and offers a future research agenda. Using first hand empirical results, this text provides much needed insight into this 'disruptive innovator' for those studying and working within the tourism and hospitality industries. This book discusses a wealth of issues including: * The disruptive innovation model - the criteria for identifying and understanding new disruptive innovators, and how peer-to-peer accommodation networks comply with these; * The factors postulated to drive the success of these networks and the celebration of variation; * Who are genuine networks members, tourist motivators and the chance of the 'perfect match'; * Pricing, discrimination and stimulation of the creation of new businesses.

Law, Policy, and Technology - Cyberterrorism, Information Warfare, and Internet Immobilization (Hardcover, New): Pauline C.... Law, Policy, and Technology - Cyberterrorism, Information Warfare, and Internet Immobilization (Hardcover, New)
Pauline C. Reich, Eduardo Gelbstein
R5,115 Discovery Miles 51 150 Ships in 12 - 17 working days

In the information society, technology has become ubiquitous, but its intrinsic vulnerabilities and the complexity of managing mission-critical systems create an attractive target for potential attackers. Law, Policy, and Technology: Cyberterorrism, Information Warfare, and Internet Immobilization provides relevant frameworks and best practices as well as current empirical research findings in the area. It is aimed at professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact and what lessons can be learned from the attacks and simulations of the last few years.

Improving Information Security Practices through Computational Intelligence (Hardcover): Wasan Shaker Awad, El-Sayed M El-Alfy,... Improving Information Security Practices through Computational Intelligence (Hardcover)
Wasan Shaker Awad, El-Sayed M El-Alfy, Yousif Al-Bastaki
R5,839 Discovery Miles 58 390 Ships in 10 - 15 working days

The recent explosion in complex global networking architectures has spurred a concomitant rise in the need for robust information security. Further, as computing power increases exponentially with every passing year, so do the number of proposed cryptographic schemata for improving and ensuring the encryption integrity of cutting-edge infosec protocols. Improving Information Security Practices through Computation Intelligence presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to an audience of students, teachers, and entry-level researchers working in computational intelligence, information security, and security engineering.

Investigating Cyber Law and Cyber Ethics - Issues, Impacts and Practices (Hardcover): Alfreda Dudley, James Braman, Giovanni... Investigating Cyber Law and Cyber Ethics - Issues, Impacts and Practices (Hardcover)
Alfreda Dudley, James Braman, Giovanni Vincenti
R5,491 Discovery Miles 54 910 Ships in 10 - 15 working days

Ethical values in computing are essential for understanding and maintaining the relationship between computing professionals and researchers and the users of their applications and programs. While concerns about cyber ethics and cyber law are constantly changing as technology changes, the intersections of cyber ethics and cyber law are still underexplored. Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices discusses the impact of cyber ethics and cyber law on information technologies and society. Featuring current research, theoretical frameworks, and case studies, the book will highlight the ethical and legal practices used in computing technologies, increase the effectiveness of computing students and professionals in applying ethical values and legal statues, and provide insight on ethical and legal discussions of real-world applications.

Human-Computer Interfaces and Interactivity - Emergent Research and Applications (Hardcover): Pedro Isaias, Katherine Blashki Human-Computer Interfaces and Interactivity - Emergent Research and Applications (Hardcover)
Pedro Isaias, Katherine Blashki
R5,638 Discovery Miles 56 380 Ships in 12 - 17 working days

In more ways than one, assistive technologies can have a profound impact on humans and their operations within society. Understanding these emerging technologies is crucial to their effective use in improving human lives. Human-Computer Interfaces and Interactivity: Emergent Research and Applications aims to address the main issues of interest within the culture and design of interactive systems for individuals living with disabilities. This premier reference work addresses a range of approaches including, but not limited to, the conceptual, technological, and design issues related to human-computer interaction, issues of interest to a range of individuals including academics, university teachers, researchers, post-graduate students, public and private institutions, and HCI developers and researchers.

Electric Dreams - Computers in American Culture (Hardcover, New): Ted Friedman Electric Dreams - Computers in American Culture (Hardcover, New)
Ted Friedman
R2,676 Discovery Miles 26 760 Ships in 10 - 15 working days

Electric Dreams turns to the past to trace the cultural history of computers. Ted Friedman charts the struggles to define the meanings of these powerful machines over more than a century, from the failure of Charles Babbage's "difference engine" in the nineteenth century to contemporary struggles over file swapping, open source software, and the future of online journalism. To reveal the hopes and fears inspired by computers, Electric Dreams examines a wide range of texts, including films, advertisements, novels, magazines, computer games, blogs, and even operating systems.

Electric Dreams argues that the debates over computers are critically important because they are how Americans talk about the future. In a society that in so many ways has given up on imagining anything better than multinational capitalism, cyberculture offers room to dream of different kinds of tomorrow.

Deliberate Intervention - Using Policy and Design to Blunt the Harms of New Technology (Paperback): Alexandra Schmidt Deliberate Intervention - Using Policy and Design to Blunt the Harms of New Technology (Paperback)
Alexandra Schmidt; Foreword by Enrique Martinez
R615 Discovery Miles 6 150 Ships in 12 - 17 working days
User-centered Information Design for Improved Software Usability (Hardcover): Pradeep Henry User-centered Information Design for Improved Software Usability (Hardcover)
Pradeep Henry
R2,364 Discovery Miles 23 640 Ships in 10 - 15 working days

This text helps the reader generate clear, effective documentation that is tailored to the information requirements of the end-user. Written for technical writers and their managers, quality assurance experts, and software engineers, the book describes a user-centered information design method (UCID) that should help ensure documentation conveys significant information for the user. The UCID shows how to: integrate the four major information components of a software system - user interface labels, messages, online and printed documentation; make sure these elements work together to improve usability; deploy iterative design and prototyping procedures that minimize flaws and save time and money; and guide technical writers effectively.

E-Commerce Security-Advice From Experts (Paperback, New): Khosrow-Pour E-Commerce Security-Advice From Experts (Paperback, New)
Khosrow-Pour
R974 R696 Discovery Miles 6 960 Save R278 (29%) Ships in 12 - 17 working days

The e-commerce revolution has allowed many organizations around the world to become more effective and efficient in managing their resources. Through the use of e-commerce many businesses can now cut the cost of doing business with their customers in a speed that could only be imagined a decade ago. However, doing business on the Internet has opened up business to additional vulnerabilities and misuse. It has been estimated that the cost of misuse and criminal activities related to e-commerce now exceeds 10 billion dollars per year, and many experts predict that this number will increase in the future. IT Solutions Series: E-Commerce Security: Advice from Experts provides insight and practical knowledge obtained from industry leaders regarding the overall successful management of e-commerce practices and solutions.

Social Media and Living Well (Hardcover): Berrin A Beasley, Mitchell R. Haney Social Media and Living Well (Hardcover)
Berrin A Beasley, Mitchell R. Haney; Contributions by Alan B Albarran, Paul Bloomfield, Kathy Brittain Richardson, …
R2,457 Discovery Miles 24 570 Ships in 12 - 17 working days

What is well-being? Is it a stable income, comfortable home, and time shared with family and friends? Is it clean drinking water and freedom from political oppression? Is it finding Aristotle's Golden Mean by living a life of reason and moderation? Scholars have sought to define well-being for centuries, teasing out nuances among Aristotle's writings and posing new theories of their own. With each major technological shift this question of well-being arises with new purpose, spurring scholars to re-examine the challenge of living the good life in light of significantly altered conditions. Social media comprise the latest technological shift, and in this book leading scholars in the philosophy and communication disciplines bring together their knowledge and expertise in an attempt to define what well-being means in this perpetually connected environment. From its blog prototype in the mid-to-late-2000s to its microblogging reality of today, users have been both invigorated and perplexed by social media's seemingly near-instant propagation. Platforms such as Facebook, Twitter, YouTube, Instagram, and LinkedIn have been hailed as everything from revolutionary to personally and societally destructive. In an exploration of the role social media play in affecting well-being, whether among individuals or society as a whole, this book offers something unique among academic tomes, an opening essay by an executive in the social media industry who shares his observations of the ways in which social communication conventions have changed since the introduction of social media. His essay is followed by an interdisciplinary academic exploration of the potential contributions and detractions of social media to well-being. Authors investigate social media's potential influence on friendship, and on individuals' physical, emotional, social, economic, and political needs. They consider the morality of online deception, how memes and the very structure of the internet inhibit rational social discourse, and how social media facilitate our living a very public life, whether through consent or coercion. Social media networks serve as gathering places for the exchange of information, inspiration, and support, but whether these exchanges are helpful or harmful to well-being is a question whose answer is necessary to living a good life.

The Little Black Book of Data and Democracy - From Innocent Tweeting to an Attempted Coup: How social media threatens our very... The Little Black Book of Data and Democracy - From Innocent Tweeting to an Attempted Coup: How social media threatens our very way of life (Paperback)
Kyle Taylor
R300 Discovery Miles 3 000 Ships in 12 - 17 working days
Photoshop - The Ultimate Beginners' Guide to Mastering Adobe Photoshop in 1 Week (Hardcover): John Slavio Photoshop - The Ultimate Beginners' Guide to Mastering Adobe Photoshop in 1 Week (Hardcover)
John Slavio
R918 Discovery Miles 9 180 Ships in 10 - 15 working days
Password Logbook (Black & Gold) - Keep Track of Usernames, Passwords, Web Addresses in One Easy and Organized Location... Password Logbook (Black & Gold) - Keep Track of Usernames, Passwords, Web Addresses in One Easy and Organized Location (Hardcover)
Editors of Rock Point
R175 R158 Discovery Miles 1 580 Save R17 (10%) Ships in 12 - 17 working days

Keep track of your online passwords in this elegant, yet inconspicuous, alphabetically tabbed notebook featuring a modern black-and-gold design. In this 4 x 5.75-inch, 128-page hardcover notebook with removable cover band, record the necessarily complex passwords and user login names required to thwart hackers. You'll find: Internet password safety and naming tips A to Z tabbed pages with space to list website, username, and five passwords for each Dedicated pages to record software license information, with spaces for license number, purchase date, renewal date, and monthly fee Dedicated pages to record network settings and passwords, including for modem, router, WAN, LAN, and wireless A notes section with blank lined pages Just say "no" to piles of sticky notes and scraps of paper with your passwords and logins! This internet password logbook provides an easy way to keep track of website addresses, usernames, and passwords in one discreet and convenient location.

CIPM Certified Information Privacy Manager All-in-One Exam Guide (Paperback): Peter Gregory CIPM Certified Information Privacy Manager All-in-One Exam Guide (Paperback)
Peter Gregory
R1,051 Discovery Miles 10 510 Ships in 12 - 17 working days

This self-study guide covers every topic on the Certified Information Privacy Manager exam Take IAPP's rigorous Certified Information Privacy Manager (CIPM) exam with complete confidence using the comprehensive information contained in this highly effective study guide. The book enhances candidates' abilities to design, build, and run information privacy management programs. Written by a security and privacy expert and experienced author, CIPM Certified Information Privacy Manager All-in-One Exam Guide is based on proven pedagogy and thoroughly prepares candidates to pass this exam. Beyond exam preparation, the guide also serves as a valuable on-the-job reference. *Provides 100% coverage of all eight objectives for the CIPM exam *Online content includes 300 practice questions in the Total Tester exam engine *Written by a security and privacy expert, educator, and experienced author

The Decision to Attack - Military and Intelligence Cyber Decision-Making (Hardcover): Aaron Franklin Brantly The Decision to Attack - Military and Intelligence Cyber Decision-Making (Hardcover)
Aaron Franklin Brantly
R1,680 Discovery Miles 16 800 Ships in 10 - 15 working days

The debate over cyber technology has resulted in new considerations for national security operations. States find themselves in an increasingly interconnected world with a diverse threat spectrum and little understanding of how decisions are made within this amorphous domain. With The Decision to Attack, Aaron Franklin Brantly investigates how states decide to employ cyber in military and intelligence operations against other states and how rational those decisions are. In his examination, Brantly contextualizes broader cyber decision-making processes into a systematic expected utility-rational choice approach to provide a mathematical understanding of the use of cyber weapons at the state level. Topics Discussed: The Key Concepts of Cyber The Motivation and Utility for Covert Action Digital Power Anonymity and Attribution in Cyberspace Cyber and Conventional Operations: The Dynamics of Conflict Defining the Role of Intelligence in Cyberspace How actors decide to use cyber-a rational choice approach Cognitive Processes and Decision-Making in Cyberspace Finding meaning in the expected utility of international cyber conflict

Universal Principles of UX, Volume 4 - 100 Timeless Strategies to Create Positive Interactions between People and Technology... Universal Principles of UX, Volume 4 - 100 Timeless Strategies to Create Positive Interactions between People and Technology (Hardcover)
Irene Pereyra
R768 R640 Discovery Miles 6 400 Save R128 (17%) Ships in 12 - 17 working days

Master the art of user experience design through the 100 laws, guidelines, human biases, and general considerations in this comprehensive, cross-disciplinary encyclopedia. Richly illustrated and easy to navigate, Universal Principles of UX pairs clear explanations of each concept with visual examples of the ideas applied in practice. The book is organized into six broad categories: Consider Empathize Define Research Design Validate And, features principles as diverse as: Design is not neutral Make the choice easy Some complexity cannot be reduced Map the ecosystem So you think you can scroll Don't grade your own homework User Experience is a field notable for its expansiveness, complexity and persistent evolution. This book is not a chronological retelling of the history of user experience design. It is also not a technical how-to book that will show you how to become a perfect user experience designer one step at a time. It's a philosophical anthology of case studies, situations, problems, and contradictions encountered across more than fifteen years of working on real world client projects that will teach you how to think, rather than tell you what to do. Each principle is presented in a two-page format. The left-hand page contains a succinct definition, a full description of the principle, examples of its use, and guidelines for use. Sidenotes appear to the right of the text, and provide elaborations and references. The right-hand page contains visual examples and related graphics to support a deeper understanding of the principle. This landmark reference is the standard for designers, engineers, managers, and students who seek to broaden and improve their user experience design expertise. The titles in the Rockport Universal series offer comprehensive and authoritative information and edifying and inspiring visual examples on multidisciplinary subjects for designers, architects, engineers, students, and anyone who is interested in expanding and enriching their design knowledge.

PAM Mastery (Hardcover): Michael W Lucas PAM Mastery (Hardcover)
Michael W Lucas
R978 R878 Discovery Miles 8 780 Save R100 (10%) Ships in 10 - 15 working days
Computational Solutions for Knowledge, Art, and Entertainment - Information Exchange Beyond Text (Hardcover, New): Anna Ursyn Computational Solutions for Knowledge, Art, and Entertainment - Information Exchange Beyond Text (Hardcover, New)
Anna Ursyn
R4,981 Discovery Miles 49 810 Ships in 10 - 15 working days

As interactive application software such as apps, installations, and multimedia presentations have become pervasive in everyday life, more and more computer scientists, engineers, and technology experts acknowledge the influence that exists beyond visual explanations. Computational Solutions for Knowledge, Art, and Entertainment: Information Exchange Beyond d104 focuses on the methods of depicting knowledge-based concepts in order to assert power beyond a visual explanation of scientific and computational notions. This book combines formal descriptions with graphical presentations and encourages readers to interact by creating visual solutions for science-related concepts and presenting data. This reference is essential for researchers, computer scientists, and academics focusing on the integration of science, technology, computing, art, and mathematics for visual problem solving.

A Haunted Road Atlas - Sinister Stops, Dangerous Destinations, and True Crime Tales (Paperback): Christine Schiefer, Em Schulz A Haunted Road Atlas - Sinister Stops, Dangerous Destinations, and True Crime Tales (Paperback)
Christine Schiefer, Em Schulz
R726 R665 Discovery Miles 6 650 Save R61 (8%) Ships in 10 - 15 working days
The KING OF FIGHTERS: The Ultimate History (Hardcover): Bitmap Books The KING OF FIGHTERS: The Ultimate History (Hardcover)
Bitmap Books
R1,217 Discovery Miles 12 170 Ships in 9 - 15 working days
Handbook of Research on Individualism and Identity in the Globalized Digital Age (Hardcover): F. Sigmund Topor Handbook of Research on Individualism and Identity in the Globalized Digital Age (Hardcover)
F. Sigmund Topor
R8,288 Discovery Miles 82 880 Ships in 12 - 17 working days

Globalization has shifted perspectives on individualism and identity as cultural exchange occurs more rapidly in an age of heightened connectivity. As technology connects those around the world, it too helps to provoke a shift in the autonomy of individuals. The Handbook of Research on Individualism and Identity in the Globalized Digital Age explores the ways in which globalization has impacted the human experience with a specific emphasis on the field of education and human development. This research-based publication presents critical perspectives on the global changes that are occurring as a result of globalization. Researchers, professionals, and graduate-level students will find this publication to be an essential resource.

Research Anthology on Social Media Advertising and Building Consumer Relationships, VOL 2 (Hardcover): Information R Management... Research Anthology on Social Media Advertising and Building Consumer Relationships, VOL 2 (Hardcover)
Information R Management Association
R16,169 Discovery Miles 161 690 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Hot Wheels Jigsaw Puzzles in a Tin
R299 R239 Discovery Miles 2 390
China's Troubled Waters - Maritime…
Steve Chan Hardcover R2,695 Discovery Miles 26 950
The Bee-Keeper's Text-Book - With…
N. H. King Paperback R443 Discovery Miles 4 430
Port Management and Operations
Giuseppe Saieva Paperback R3,550 Discovery Miles 35 500
Essay on Sheep - Their…
Robert R Livingston Paperback R485 Discovery Miles 4 850
Impact Players - How To Take The Lead…
Liz Wiseman Paperback R360 R321 Discovery Miles 3 210
Yuck said the Yak - (Green Early Reader)
Alex English Paperback  (1)
R196 Discovery Miles 1 960
Cultureneering
Ian Fuhr Paperback R310 R281 Discovery Miles 2 810
Kids On Earth - A Children's Documentary…
Sensei Paul David Hardcover R895 Discovery Miles 8 950
Master Serie 2
Serge Gainsbourg CD  (1)
R117 Discovery Miles 1 170

 

Partners