0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (9)
  • R100 - R250 (390)
  • R250 - R500 (1,131)
  • R500+ (11,223)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing

The Security Leader's Communication Playbook - Bridging the Gap between Security and the Business (Hardcover): Jeffrey W.... The Security Leader's Communication Playbook - Bridging the Gap between Security and the Business (Hardcover)
Jeffrey W. Brown
R2,076 Discovery Miles 20 760 Ships in 12 - 17 working days

This book is for cybersecurity leaders across all industries and organizations. It is intended to bridge the gap between the data center and the board room. This book examines the multitude of communication challenges that CISOs are faced with every day and provides practical tools to identify your audience, tailor your message and master the art of communicating. Poor communication is one of the top reasons that CISOs fail in their roles. By taking the step to work on your communication and soft skills (the two go hand-in-hand), you will hopefully never join their ranks. This is not a "communication theory" book. It provides just enough practical skills and techniques for security leaders to get the job done. Learn fundamental communication skills and how to apply them to day-to-day challenges like communicating with your peers, your team, business leaders and the board of directors. Learn how to produce meaningful metrics and communicate before, during and after an incident. Regardless of your role in Tech, you will find something of value somewhere along the way in this book.

Blockchain for Big Data - AI, IoT and Cloud Perspectives (Hardcover): Shaoliang Peng Blockchain for Big Data - AI, IoT and Cloud Perspectives (Hardcover)
Shaoliang Peng
R1,986 Discovery Miles 19 860 Ships in 12 - 17 working days

In recent years, the fast-paced development of social information and networks has led to the explosive growth of data. A variety of big data have emerged, encouraging researchers to make business decisions by analysing this data. However, many challenges remain, especially concerning data security and privacy. Big data security and privacy threats permeate every link of the big data industry chain, such as data production, collection, processing, and sharing, and the causes of risk are complex and interwoven. Blockchain technology has been highly praised and recognised for its decentralised infrastructure, anonymity, security, and other characteristics, and it will change the way we access and share information. In this book, the author demonstrates how blockchain technology can overcome some limitations in big data technology and can promote the development of big data while also helping to overcome security and privacy challenges. The author investigates research into and the application of blockchain technology in the field of big data and assesses the attendant advantages and challenges while discussing the possible future directions of the convergence of blockchain and big data. After mastering concepts and technologies introduced in this work, readers will be able to understand the technical evolution, similarities, and differences between blockchain and big data technology, allowing them to further apply it in their development and research. Author: Shaoliang Peng is the Executive Director and Professor of the College of Computer Science and Electronic Engineering, National Supercomputing Centre of Hunan University, Changsha, China. His research interests are high-performance computing, bioinformatics, big data, AI, and blockchain.

Histories of Surveillance from Antiquity to the Digital Era - The Eyes and Ears of Power (Hardcover): Andreas Marklund, Laura... Histories of Surveillance from Antiquity to the Digital Era - The Eyes and Ears of Power (Hardcover)
Andreas Marklund, Laura Skouvig
R4,141 Discovery Miles 41 410 Ships in 12 - 17 working days

Deploying empirical studies spanning from early Imperial China to the present day, 17 scholars from across the globe explore the history of surveillance with special attention to the mechanisms of power that impel the concept of surveillance in society. By delving into a broad range of historical periods and contexts, the book sheds new light on surveillance as a societal phenomenon, offering 10 in-depth, applied analyses that revolve around two main questions: * Who are the central actors in the history of surveillance? * What kinds of phenomena have been deemed eligible for surveillance, for example, information flows, political movements, border-crossing trade, interacting with foreign states, workplace relations, gender relations, andsexuality?

Data Science and Big Data Analytics in Smart Environments (Hardcover): Marta Chinnici, Florin Pop, Catalin Negru Data Science and Big Data Analytics in Smart Environments (Hardcover)
Marta Chinnici, Florin Pop, Catalin Negru
R4,603 Discovery Miles 46 030 Ships in 12 - 17 working days

Most applications generate large datasets, like social networking and social influence programs, smart cities applications, smart house environments, Cloud applications, public web sites, scientific experiments and simulations, data warehouse, monitoring platforms, and e-government services. Data grows rapidly, since applications produce continuously increasing volumes of both unstructured and structured data. Large-scale interconnected systems aim to aggregate and efficiently exploit the power of widely distributed resources. In this context, major solutions for scalability, mobility, reliability, fault tolerance and security are required to achieve high performance and to create a smart environment. The impact on data processing, transfer and storage is the need to re-evaluate the approaches and solutions to better answer the user needs. A variety of solutions for specific applications and platforms exist so a thorough and systematic analysis of existing solutions for data science, data analytics, methods and algorithms used in Big Data processing and storage environments is significant in designing and implementing a smart environment. Fundamental issues pertaining to smart environments (smart cities, ambient assisted leaving, smart houses, green houses, cyber physical systems, etc.) are reviewed. Most of the current efforts still do not adequately address the heterogeneity of different distributed systems, the interoperability between them, and the systems resilience. This book will primarily encompass practical approaches that promote research in all aspects of data processing, data analytics, data processing in different type of systems: Cluster Computing, Grid Computing, Peer-to-Peer, Cloud/Edge/Fog Computing, all involving elements of heterogeneity, having a large variety of tools and software to manage them. The main role of resource management techniques in this domain is to create the suitable frameworks for development of applications and deployment in smart environments, with respect to high performance. The book focuses on topics covering algorithms, architectures, management models, high performance computing techniques and large-scale distributed systems.

Integration of WSNs into Internet of Things - A Security Perspective (Hardcover): Sudhir Kumar Sharma, Bharat Bhushan,... Integration of WSNs into Internet of Things - A Security Perspective (Hardcover)
Sudhir Kumar Sharma, Bharat Bhushan, Raghvendra Kumar, Aditya Khamparia, Narayan C Debnath
R3,980 Discovery Miles 39 800 Ships in 12 - 17 working days

The Internet has gone from an Internet of people to an Internet of Things (IoT). This has brought forth strong levels of complexity in handling interoperability that involves the integrating of wireless sensor networks (WSNs) into IoT. This book offers insights into the evolution, usage, challenges, and proposed countermeasures associated with the integration. Focusing on the integration of WSNs into IoT and shedding further light on the subtleties of such integration, this book aims to highlight the encountered problems and provide suitable solutions. It throws light on the various types of threats that can attack both WSNs and IoT along with the recent approaches to counter them. This book is designed to be the first choice of reference at research and development centers, academic institutions, university libraries, and any institution interested in the integration of WSNs into IoT. Undergraduate and postgraduate students, Ph.D. scholars, industry technologists, young entrepreneurs, and researchers working in the field of security and privacy in IoT are the primary audience of this book.

Public Policy Analytics - Code and Context for Data Science in Government (Paperback): Ken Steif Public Policy Analytics - Code and Context for Data Science in Government (Paperback)
Ken Steif
R1,458 Discovery Miles 14 580 Ships in 12 - 17 working days

Public Policy Analytics: Code & Context for Data Science in Government teaches readers how to address complex public policy problems with data and analytics using reproducible methods in R. Each of the eight chapters provides a detailed case study, showing readers: how to develop exploratory indicators; understand 'spatial process' and develop spatial analytics; how to develop 'useful' predictive analytics; how to convey these outputs to non-technical decision-makers through the medium of data visualization; and why, ultimately, data science and 'Planning' are one and the same. A graduate-level introduction to data science, this book will appeal to researchers and data scientists at the intersection of data analytics and public policy, as well as readers who wish to understand how algorithms will affect the future of government.

Rising from the Mailroom to the Boardroom - Unique Insights for Governance, Risk, Compliance, and Audit Leaders (Hardcover):... Rising from the Mailroom to the Boardroom - Unique Insights for Governance, Risk, Compliance, and Audit Leaders (Hardcover)
Bruce Turner
R2,060 Discovery Miles 20 600 Ships in 12 - 17 working days

Boards and business leaders expect their key advisors to deliver fresh insights, and increasingly expect them to demonstrate foresight. To achieve what is expected, it is crucial to understand the dynamics of conversations in the boardroom and around the audit committee table. This book provides those unique perspectives. The journey from the 'mailroom to the boardroom' follows the story of a young banker who moved into the internal auditing profession as part of the 'new breed', then rose through the ranks into senior leadership and chief audit executive roles, before assuming audit committee and board roles that had an immense influence on governance, risk, compliance, and audit professionals. Success does not always follow a smooth and uneventful trajectory, and this story reflects insights from both the ups and the downs of the journey. Each chapter shares insights, better practices, case studies, practical examples, and real-life challenges and draws them together into 101 building blocks, each one providing crucial career-long learnings. The storytelling provides insights to people at all levels on the importance of positioning oneself to step into leadership roles, helps them understand how to evaluate and pursue potential career growth opportunities, provides tips on how to holistically manage and advance their career, and inspires higher-level thinking that enhances governance, risk, compliance and audit practices.

Rhetoric of InSecurity - The Language of Danger, Fear and Safety in National and International Contexts (Hardcover): Victoria... Rhetoric of InSecurity - The Language of Danger, Fear and Safety in National and International Contexts (Hardcover)
Victoria Baines
R4,133 Discovery Miles 41 330 Ships in 12 - 17 working days

This book demands that we question what we are told about security, using tools we have had for thousands of years. The work considers the history of security rhetoric in a number of distinct but related contexts, including the United States' security strategy, the "war" on Big Tech, and current concerns such as cybersecurity. Focusing on the language of security discourse, it draws common threads from the ancient world to the present day and the near future. The book grounds recent comparisons of Donald Trump to the Emperor Nero in a linguistic evidence base. It examines the potential impact on society of policy-makers' emphasis on the novelty of cybercrime, their likening of the internet to the Wild West, and their claims that criminals have "gone dark". It questions governments' descriptions of technology companies in words normally reserved for terrorists, and asks who might benefit. Interdisciplinary in approach, the book builds on existing literature in the Humanities and Social Sciences, most notably studies on rhetoric in Greco-Roman texts, and on the articulation of security concerns in law, international relations, and public policy contexts. It adds value to this body of research by offering new points of comparison, and a fresh but tried and tested way of looking at problems that are often presented as unprecedented. It will be essential to legal and policy practitioners, students of Law, Politics, Media, and Classics, and all those interested in employing critical thinking.

Information Theory Tools for Visualization (Paperback): Min Chen, Miquel Feixas, Ivan Viola, Anton Bardera, Han-Wei Shen, Mateu... Information Theory Tools for Visualization (Paperback)
Min Chen, Miquel Feixas, Ivan Viola, Anton Bardera, Han-Wei Shen, …
R1,437 Discovery Miles 14 370 Ships in 12 - 17 working days

This book explores Information theory (IT) tools, which have become state of the art to solve and understand better many of the problems in visualization. This book covers all relevant literature up to date. It is the first book solely devoted to this subject, written by leading experts in the field.

Convergence of Blockchain Technology and E-Business - Concepts, Applications, and Case Studies (Hardcover): D. Sumathi, T... Convergence of Blockchain Technology and E-Business - Concepts, Applications, and Case Studies (Hardcover)
D. Sumathi, T Poongodi, Balamurugan Balusamy, Bansal Himani, Firoz Khan Kp
R4,601 Discovery Miles 46 010 Ships in 12 - 17 working days

The purpose of this edited book is to provide the relevant technologies and case studies in a concise format that will simplify and streamline the processing of blockchain. The goal is for the contents of this book to change the way business transformations are conducting in economic and social systems. The book examines blockchain technology, the transaction attributes, and its footprint in various fields. It offers fundamentals and terminologies used in blockchain, architecture, and various consensus mechanisms that can be deployed in areas such as healthcare, smart cities, and supply chain management. The book provides a widespread knowledge into the deployment of security countermeasures that can be implemented for a blockchain network and enables the reader to consider the management of business processes and the implementation process in detail. The book highlights the challenges and provides various e-business case studies of security countermeasures. The book serves researchers and businesses by providing a thorough understanding of the transformation process using blockchain technology.

Quality of Life - An Interdisciplinary Perspective (Hardcover): Shruti Tripathi, Rashmi Rai, Ingrid Van Rompay-Bartels Quality of Life - An Interdisciplinary Perspective (Hardcover)
Shruti Tripathi, Rashmi Rai, Ingrid Van Rompay-Bartels
R2,778 Discovery Miles 27 780 Ships in 12 - 17 working days

Highlights cultural differences in terms of Quality of Life Provides a guide to the current field of global well-being and to future research Suggests improvements in Quality of Life Recognizes the presence of cultural differences resulting from social status, age, gender, class, race, and ethnicity Offers background information for governments, professionals, and policy makers

Who Can You Trust? - How Technology Brought Us Together and Why It Might Drive Us Apart (Paperback): Rachel Botsman Who Can You Trust? - How Technology Brought Us Together and Why It Might Drive Us Apart (Paperback)
Rachel Botsman
R464 R387 Discovery Miles 3 870 Save R77 (17%) Ships in 10 - 15 working days
Digital Learning and Collaborative Practices - Lessons from Inclusive and Empowering Participation with Emerging Technologies... Digital Learning and Collaborative Practices - Lessons from Inclusive and Empowering Participation with Emerging Technologies (Hardcover)
Eva Brooks, Susanne Dau, Staffan Selander
R4,145 Discovery Miles 41 450 Ships in 12 - 17 working days

* Outlines a holistic, evidence-based mindset shift for designing and implementing technology-rich learning experiences that are attentive to social concerns such as equity, ethics, play, diversity, and democratic participation. * Driven by a balance of theoretical and methodological chapters with grounded empirical bases. * Concludes with a future-focused discussion about upcoming digital competencies and the implications of applying design-oriented approaches to digital learning practices.

Humans at Work in the Digital Age - Forms of Digital Textual Labor (Paperback): Shawna Ross, Andrew Pilsch Humans at Work in the Digital Age - Forms of Digital Textual Labor (Paperback)
Shawna Ross, Andrew Pilsch
R1,285 Discovery Miles 12 850 Ships in 12 - 17 working days

Humans at Work in the Digital Age explores the roots of twenty-first-century cultures of digital textual labor, mapping the diverse physical and cognitive acts involved, and recovering the invisible workers and work that support digital technologies. Drawing on 14 case studies organized around four sites of work, this book shows how definitions of labor have been influenced by the digital technologies that employees use to produce, interpret, or process text. Incorporating methodology and theory from a range of disciplines and highlighting labor issues related to topics as diverse as census tabulation, market research, electronic games, digital archives, and 3D modeling, contributors uncover the roles played by race, class, gender, sexuality, and national politics in determining how narratives of digital labor are constructed and erased. Because each chapter is centered on the human cost of digital technologies, however, it is individual people immersed in cultures of technology who are the focus of the volume, rather than the technologies themselves. Humans at Work in the Digital Age shows how humanistic inquiry can be a valuable tool in the emerging conversation surrounding digital textual labor. As such, this book will be essential reading for academics and postgraduate students engaged in the study of digital humanities; human-computer interaction; digital culture and social justice; race, class, gender, and sexuality in digital realms; the economics of the internet; and technology in higher education.

Feminist War Games? - Mechanisms of War, Feminist Values, and Interventional Games (Paperback): Jon Saklofske, Alyssa Arbuckle,... Feminist War Games? - Mechanisms of War, Feminist Values, and Interventional Games (Paperback)
Jon Saklofske, Alyssa Arbuckle, Jon Bath
R1,290 Discovery Miles 12 900 Ships in 12 - 17 working days

Feminist War Games? explores the critical intersections and collisions between feminist values and perceptions of war, by asking whether feminist values can be asserted as interventional approaches to the design, play, and analysis of games that focus on armed conflict and economies of violence. Focusing on the ways that games, both digital and table-top, can function as narratives, arguments, methods, and instruments of research, the volume demonstrates the impact of computing technologies on our perceptions, ideologies, and actions. Exploring the compatibility between feminist values and systems of war through games is a unique way to pose destabilizing questions, solutions, and approaches; to prototype alternative narratives; and to challenge current idealizations and assumptions. Positing that feminist values can be asserted as a critical method of design, as an ideological design influence, and as a lens that determines how designers and players interact with and within arenas of war, the book addresses the persistence and brutality of war and issues surrounding violence in games, whilst also considering the place and purpose of video games in our cultural moment. Feminist War Games? is a timely volume that questions the often-toxic nature of online and gaming cultures. As such, the book will appeal to a broad variety of disciplinary interests, including sociology, education, psychology, literature, history, politics, game studies, digital humanities, media and cultural studies, and gender studies, as well as those interested in playing, or designing, socially engaged games.

Mobile Technology and Social Transformations - Access to Knowledge in Global Contexts (Hardcover): Stefanie Felsberger, Ramesh... Mobile Technology and Social Transformations - Access to Knowledge in Global Contexts (Hardcover)
Stefanie Felsberger, Ramesh Subramanian
R3,993 Discovery Miles 39 930 Ships in 12 - 17 working days

This book investigates the ways in which the mobile telephone has transformed societies around the world, bringing both opportunities and challenges. At a time when knowledge and truth are increasingly contested, the book asks how mobile technology has changed the ways in which people create, disseminate, and access knowledge. Worldwide, mobile internet access has surpassed desktop access, and it is estimated that by 2022 there will be AN excess of 6 billion mobile phone users in the world. This widespread proliferation raises all sorts of questions around who creates knowledge, how is that knowledge shared and proliferated, and what are the structural political, economic, and legal conditions in which knowledge is accessed. The practices and power dynamics around mobile technologies are location specific. They look different depending on whether one chooses to highlight the legal, social, political, or economic context. Bringing together scholars, journalists, activists and practitioners from around the world, this book embraces this complexity, providing a multifaceted picture that acknowledges the tensions and contradictions surrounding accessing knowledge through mobile technologies. With case studies from Hong Kong, South Korea, India, Syria, Egypt, Botswana, Brazil, and the US, this book provides an important account of the changing nature of our access to knowledge, and is key reading for students, researchers, activists and policy makers with an interest in technology and access to knowledge, communication, social transformation, and global development.

The Sensible Guide to Program Management Professional (PgMP) (R) Success - Including 420 Practice Exam Questions (Paperback):... The Sensible Guide to Program Management Professional (PgMP) (R) Success - Including 420 Practice Exam Questions (Paperback)
Te Wu
R1,692 Discovery Miles 16 920 Ships in 12 - 17 working days

A Sensible Guide to Program Management Professional (PgMP) (R) Success is for program managers preparing to take the PgMP exam based on The Standard for Program Management - 4th Edition (PgM4 Standard). It is designed for busy professionals whose responsibilities have taken them into the realm of coordinating, facilitating, managing, and leading programs. Program managers are leaders who are directly managing large amounts of project resources for their organizations. This study guide addresses three main concerns facing PgMP exam candidates: What are the essential concepts, processes, and tools that form the foundation of today's program management? Since program management is still an emerging profession with professionals often working in different ways, what does this mean for a "standard" exam? More specifically, how does that impact your ability to pass the PgMP exam? What is the best way to prepare for the PgMP exam? To address the first concern, this book highlights the underlying rationale for program management: why it exists in organizations; why it is becoming ever more important; what programs are, especially for the purpose of passing the exam; how to think like a portfolio manager; and what the most important concepts, processes, and tools are for this profession. By simplifying complex ideas and communicating them in plain English with relevant examples, this book aims to help readers not only to pass the PgMP exam but also to serve as an essential guide for program managers. For the second concern, this book differs from other study guides by describing the author's personal experience as a program manager and addressing the most pressing questions for each of the performance domains in The Standard for Program Management. To address the last concern, this book contains 420 practice questions, access to an online exam simulator and an online PgMP community, and a time-tested approach for passing the PgMP exam.

Digital Learning and Collaborative Practices - Lessons from Inclusive and Empowering Participation with Emerging Technologies... Digital Learning and Collaborative Practices - Lessons from Inclusive and Empowering Participation with Emerging Technologies (Paperback)
Eva Brooks, Susanne Dau, Staffan Selander
R1,254 Discovery Miles 12 540 Ships in 12 - 17 working days

* Outlines a holistic, evidence-based mindset shift for designing and implementing technology-rich learning experiences that are attentive to social concerns such as equity, ethics, play, diversity, and democratic participation. * Driven by a balance of theoretical and methodological chapters with grounded empirical bases. * Concludes with a future-focused discussion about upcoming digital competencies and the implications of applying design-oriented approaches to digital learning practices.

Augmented and Mixed Reality for Communities (Hardcover): Joshua A. Fisher Augmented and Mixed Reality for Communities (Hardcover)
Joshua A. Fisher
R3,782 Discovery Miles 37 820 Ships in 10 - 15 working days

Using mixed and augmented reality in communities is an emerging media practice that is reshaping how we interact with our cities and neighbors. From the politics of city hall to crosswalks and playgrounds, mixed and augmented reality will offer a diverse range of new ways to interact with our communities. In 2016, apps for augmented reality politics began to appear in app stores. Similarly, the blockbuster success of Pokemon Go illustrated how even forgotten street corners can become a magical space for play. In 2019, a court case in Milwaukee, Wisconsin, extended first amendment rights to augmented reality. For all the good that these emerging media provide, there will and have been consequences. Augmented and Mixed Reality for Communities will help students and practitioners navigate the ethical design and development of these kinds of experiences to transform their cities. As one of the first books of its kind, each chapter in the book prepares readers to contribute to the Augmented City. By providing insight into how these emerging media work, the book seeks to democratize the augmented and mixed reality space. Authors within this volume represent some of the leading scholars and practitioners working in the augmented and mixed reality space for civic media, cultural heritage, civic games, ethical design, and social justice. Readers will find practical insights for the design and development to create their own compelling experiences. Teachers will find that the text provides in-depth, critical analyses for thought-provoking classroom discussions.

Developing Graphics Frameworks with Python and OpenGL (Hardcover): Lee Stemkoski, Michael Pascale Developing Graphics Frameworks with Python and OpenGL (Hardcover)
Lee Stemkoski, Michael Pascale
R3,113 Discovery Miles 31 130 Ships in 12 - 17 working days

Developing Graphics Frameworks with Python and OpenGL shows you how to create software for rendering complete three-dimensional scenes. The authors explain the foundational theoretical concepts as well as the practical programming techniques that will enable you to create your own animated and interactive computer-generated worlds. You will learn how to combine the power of OpenGL, the most widely adopted cross-platform API for GPU programming, with the accessibility and versatility of the Python programming language. Topics you will explore include generating geometric shapes, transforming objects with matrices, applying image-based textures to surfaces, and lighting your scene. Advanced sections explain how to implement procedurally generated textures, postprocessing effects, and shadow mapping. In addition to the sophisticated graphics framework you will develop throughout this book, with the foundational knowledge you will gain, you will be able to adapt and extend the framework to achieve even more spectacular graphical results.

Functional Reverse Engineering of Strategic and Non-Strategic Machine Tools (Hardcover): Wasim Ahmed Khan, Khalid Rahman,... Functional Reverse Engineering of Strategic and Non-Strategic Machine Tools (Hardcover)
Wasim Ahmed Khan, Khalid Rahman, Ghulam Hussain, Ghulam Abbas
R4,142 Discovery Miles 41 420 Ships in 12 - 17 working days

This book describes capacity building in strategic and non-strategic machine tool technology. It includes machine building in sectors such as machine tools, automobiles, home appliances, energy, and biomedical engineering, along with case studies. The book offers guidelines for capacity building in academia, covering how to promote enterprises of functional reverse engineering enterprises. It also discusses machine tool development, engineering design, prototyping of strategic, and non-strategies machine tools, as well as presenting communication strategies and IoT, along with case studies. Professionals from the CNC (Computer Numeric Control) machine tools industry, industrial and manufacturing engineers, and students and faculty in engineering disciplines will find interest in this book.

The Home in the Digital Age (Hardcover): Antonio Argandona, Joy Malala, Richard Peatfield The Home in the Digital Age (Hardcover)
Antonio Argandona, Joy Malala, Richard Peatfield
R4,142 Discovery Miles 41 420 Ships in 12 - 17 working days

The Home in the Digital Age is a set of multidisciplinary studies exploring the impact of digital technologies in the home, with a shift of emphasis from technology to the people living and using this in their homes. The book covers a wide variety of topics on the design, introduction and use of digital technologies in the home, combining the technological dimension with the cognitive, emotional, cultural and symbolic dimensions of the objects that incorporate digital technologies and project them onto people's lives. It offers a coherent approach, that of the home, which gives unity to the discussion. Scholars of the home, the house and the family will find here the connection with the problems derived from the use of domestic robots and connected devices. Students of artificial intelligence, machine learning, robotics, big data and other branches of digital technologies will find ideas and arguments to apply their disciplines to the home and participate fruitfully in forums where digital technologies are built and negotiated in the home. Experts from various disciplines psychologists and sociologists; philosophers, epistemologists and ethicists; economists; engineers, architects, urban planners and designers and so on and also those interested in developing policies for the home and family will find this book contains well-founded and useful ideas to focus their work.

How to Survive a Robot Invasion - Rights, Responsibility, and AI (Paperback): David J. Gunkel How to Survive a Robot Invasion - Rights, Responsibility, and AI (Paperback)
David J. Gunkel
R668 Discovery Miles 6 680 Ships in 12 - 17 working days

In this short introduction, David J. Gunkel examines the shifting world of artificial intelligence, mapping it onto everyday twenty-first century life and probing the consequences of this ever-growing industry and movement. The book investigates the significance and consequences of the robot invasion in an effort to map the increasingly complicated social terrain of the twenty-first century. Whether we recognize it as such or not, we are in the midst of a robot invasion. What matters most in the face of this machine incursion is not resistance, but how we decide to make sense of and respond to the social opportunities and challenges that autonomous machines make available. How to Survive a Robot Invasion is a fascinating and accessible volume for students and researchers of new media, philosophy of technology, and their many related fields. It aims both to assist readers' efforts to understand a changing world and to provide readers with the critical insight necessary for grappling with our science fiction-like future.

Valuing Data - An Open Framework (Paperback): Dewey Ray Valuing Data - An Open Framework (Paperback)
Dewey Ray
R1,428 Discovery Miles 14 280 Ships in 12 - 17 working days

The past decade has seen a dramatic increase in the amount and variety of information that is generated and stored electronically by business enterprises. Storing this increased volume of information has not been a problem to date, but as these information stores grow larger and larger, multiple challenges arise for senior management: namely, questions such as "How much is our data worth?" "Are we storing our data in the most cost-effective way?" "Are we managing our data effectively and efficiently?" "Do we know which data is most important?" "Are we extracting business insight from the right data?" "Are our data adding to the value of our business?" "Are our data a liability?" "What is the potential for monetizing our data?" and "Do we have an appropriate risk management plan in place to protect our data?" To answer these value-based questions, data must be treated with the same rigor and discipline as other tangible and intangible assets. In other words, corporate data should be treated as a potential asset and should have its own asset valuation methodology that is accepted by the business community, the accounting and valuation community, and other important stakeholder groups. Valuing Data: An Open Framework is a first step in that direction. Its purpose is to: Provide the reader with some background on the nature of data Present the common categories of business data Explain the importance of data management Report the current thinking on data valuation Offer some business reasons to value data Present an "open framework"-along with some proposed methods-for valuing data The book does not aim to prescribe exactly how data should be valued monetarily, but rather it is a "starting point" for a discussion of data valuation with the objective of developing a stakeholder consensus, which, in turn, will become accepted standards and practices.

Securing Systems - Applied Security Architecture and Threat Models (Paperback): Brook S. E. Schoenfield Securing Systems - Applied Security Architecture and Threat Models (Paperback)
Brook S. E. Schoenfield
R1,528 Discovery Miles 15 280 Ships in 12 - 17 working days

Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This book describes both the process and the practice of assessing a computer system's existing information security posture. Detailing the time-tested practices of experienced security architects, it explains how to deliver the right security at the right time in the implementation lifecycle. Securing Systems: Applied Security Architecture and Threat Models covers all types of systems, from the simplest applications to complex, enterprise-grade, hybrid cloud architectures. It describes the many factors and prerequisite information that can influence an assessment. The book covers the following key aspects of security analysis: When should the security architect begin the analysis? At what points can a security architect add the most value? What are the activities the architect must execute? How are these activities delivered? What is the set of knowledge domains applied to the analysis? What are the outputs? What are the tips and tricks that make security architecture risk assessment easier? To help you build skill in assessing architectures for security, the book presents six sample assessments. Each assessment examines a different type of system architecture and introduces at least one new pattern for security analysis. The goal is that after you've seen a sufficient diversity of architectures, you'll be able to understand varied architectures and can better see the attack surfaces and prescribe security solutions.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
At Any Cost - The South African…
Stephen Timm Paperback R365 R314 Discovery Miles 3 140
Like, Comment, Subscribe - Inside…
Mark Bergen Paperback R350 R277 Discovery Miles 2 770
The KING OF FIGHTERS: The Ultimate…
Bitmap Books Hardcover R1,358 Discovery Miles 13 580
Handbook on Crime and Technology
Don Hummer, James M. Byrne Hardcover R6,403 Discovery Miles 64 030
I Am Code
Brent Katz, Josh Morgenthau, … Paperback R390 R312 Discovery Miles 3 120
Misbelief - What Makes Rational People…
Dan Ariely Paperback R410 R320 Discovery Miles 3 200
Novel Beings - Regulatory Approaches for…
David R. Lawrence, Sarah Morley Hardcover R3,213 Discovery Miles 32 130
The Handover - How We Gave Control Of…
David Runciman Hardcover R630 R504 Discovery Miles 5 040
Game Boy: The Box Art Collection
Bitmap Books Hardcover R1,181 Discovery Miles 11 810
Squishmallows Official Collectors' Guide
Squishmallows Hardcover R343 Discovery Miles 3 430

 

Partners