Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Internet > Web browsers
'A brilliant page-turner by one of Holland's finest investigative journalists' Rutger Bregman, author of Humankind 'Essential . . . What's revealed are networks of spies and criminals fighting an invisible war that involves us all' Eliot Higgins, bestselling author of We Are Bellingcat Summer 2017: computer screens go blank in 150 countries. The NHS is so affected that hospitals can only take in patients for A&E. Ambulances are grounded. Computer screens turn on spontaneously and warnings appear. Employees who desperately pull the plugs are too late. Restarting is pointless; the computers are locked. And now the attackers ask each victim for money. This is hijack software. It is just one example of how vulnerable the digital world has made us. Based on the cases he investigated over a period of six years, award-winning Dutch journalist Huib Modderkolk takes the reader on a tour of the corridors and back doors of the globalised digital world. He reconstructs British-American espionage operations and reveals how the power relationships between countries enable intelligence services to share and withhold data from each other. Looking at key players including Edward Snowden, Russian hackers Cozy Bear and Evgeniy Bogachev, 'the Pablo Escobar of the digital era', Modderkolk opens our eyes to the dark underbelly of the digital world with the narrative drive of a thriller.
This study, written in the context of its first publication in 1970, discusses and documents the invasion of privacy by the corporation and the social institution in the search for efficiency in information processing. Discussing areas such as the impact of the computer on administration, privacy and the storage on information, the authors assess the technical and social feasibility of constructing integrated data banks to cover the details of populations. The book was hugely influential both in terms of scholarship and legislation, and the years following saw the introduction of the Data Protection Act of 1984, which was then consolidated by the Act of 1998. The topics under discussion remain of great concern to the public in our increasingly web-based world, ensuring the continued relevance of this title to academics and students with an interest in data protection and public privacy.
Translating traditional coaching methods and competencies for use in the online world, this informative and timely guide shows coaches how to transform their face-to-face practice into one that utilises technological means of communication with clients, mentors, and everyone else associated with their practice. The book offers up-to-the-minute practical and ethical information from two world-expert coaches, leaning on their combined 50 years of experience and study. It covers the practice of online coaching via email, chat, audio/telephone and video methods, as well as the ethics of online coaching (including an ethical framework), case material, supervision, mentoring and training, and a look into the future of the coaching profession in light of technological developments and the culture of cyberspace. Whether you are a coach-in-training or established Coaching Master, this book is an accessible and invaluable tool for taking and maintaining your coaching services online.
Google's Programmable Search Engines (PSEs, previously called Custom Search Engines) provide search opportunities that are unavailable with any other tool. PSEs have advanced settings and search operators that are not supported by "regular" Google. With PSEs, it is possible to perform filtered searches within parts of the web as if they were databases! While lots of professionals use existing PSEs to source for talent or with other research goals, few people have experience creating them. Even fewer know about powerful PSE-only search operators. The main reason PSEs are not as popular as they should be is that it is not easy to get educated on PSE creation. There is little information online and no books (other than this one) on the subject. Even less info is available on the "structured" operators that allow for filtered searches. The first of its kind, this book hopes to popularize these fun and powerful tools so that many more people can include PSEs in their work. Key Features: A detailed introduction to creating PSEs, including info absent in Google's help A "hack" for creating PSEs that look for profiles in seconds An introduction to advanced PSE-only search operators allowed to perform filtered searches of parts of the web A "hack" for expanding Google's search limits to 500 terms Use cases, examples, and approaches that would be educational for those doing online research This book will be of interest to researchers, OSINT specialists, investigative journalists, Competitive Intelligence people, recruiters, and Sourcers, to name a few categories, and to the general public interested in how to search better.
Complete real-world examples of gathering feedback from users and web environments; Fundamentals of text analysis using JavaScript and PHP; Harnessing JavaScript data visualisation tools; Business focused application to feedback gathering, analysis and reporting; Integration of new and existing data sources into a single bespoke web-based analysis environment
Internet of Things (IoT)-enabled spaces have made revolutionary advances in the utility grid. Among these advances, intelligent and energy-efficient services are gaining considerable interest. The use of the smart grid is increasing day after day around us and is not only used in saving energy but also in our daily life for intelligent health, traffic, and even farming systems. The grid enabled with IoT features is also expected to communicate with cellular networks smoothly in the next-generation networks (6G and beyond). This will open the door for other interesting research areas. In this book, we consider the most significant and emergent research topics in this domain, addressing major issues and challenges in IoT-based solutions proposed for the smart grid. The chapters provide insight on comprehensive topics in IoT-based smart grids, combining technical aspects with the most up-to-date theory. It investigates the grid under varying and potential emerging paradigms such as edge/fog computing, in addition to big data aspects considerations in the IoT era. With comprehensive surveys and case studies, this book explores basic and high-level grid aspects in the emerging smart city paradigm, which makes it especially attractive to researchers, academics, and higher-level students. This authored book can be used by computer science undergraduate and postgraduate students, researchers and practitioners, city administrators, policymakers, and government regulators.
Translating traditional coaching methods and competencies for use in the online world, this informative and timely guide shows coaches how to transform their face-to-face practice into one that utilises technological means of communication with clients, mentors, and everyone else associated with their practice. The book offers up-to-the-minute practical and ethical information from two world-expert coaches, leaning on their combined 50 years of experience and study. It covers the practice of online coaching via email, chat, audio/telephone and video methods, as well as the ethics of online coaching (including an ethical framework), case material, supervision, mentoring and training, and a look into the future of the coaching profession in light of technological developments and the culture of cyberspace. Whether you are a coach-in-training or established Coaching Master, this book is an accessible and invaluable tool for taking and maintaining your coaching services online.
This book intends to develop cyber awareness and technical knowledge in anyone who is interested in technology by looking at subjects and experiences the average person will have come into contact with in their life. This book aims to provide a complete and comprehensive analysis, technological inputs and case studies for the readers to build their awareness and knowledge, but in a meaningful way which will stay relevant. There are books available on the market, but they primarily discuss theory, and no industry connection or current state-of-the-art technology is presented. By discussing subjects and experiences that all readers will be familiar with, this book will aid understanding and comprehension of how cyber threats can be noticed, avoided and understood in everyday life. As well as case studies, this book also contains plentiful illustrations and supplementary videos, which will be available via YouTube to complement the information. Giri Govindarajulu is a Chief Information Security officer for Cisco Asiapac and is a 20-year Cisco veteran. Shyam Sundar Ramaswami is the Lead Threat Researcher with the Cisco Talos Threat Intelligence group. Shyam is a two-time TEDx speaker and a teacher of cybersecurity. Dr. Shriram K. Vasudevan is currently working as Dean of K. Ramakrishnan College of Technology. He has authored/co-authored 42 books for reputed publishers across the globe and 122 research papers in revered international journals, plus 30 papers for international/national conferences.
This book intends to develop cyber awareness and technical knowledge in anyone who is interested in technology by looking at subjects and experiences the average person will have come into contact with in their life. This book aims to provide a complete and comprehensive analysis, technological inputs and case studies for the readers to build their awareness and knowledge, but in a meaningful way which will stay relevant. There are books available on the market, but they primarily discuss theory, and no industry connection or current state-of-the-art technology is presented. By discussing subjects and experiences that all readers will be familiar with, this book will aid understanding and comprehension of how cyber threats can be noticed, avoided and understood in everyday life. As well as case studies, this book also contains plentiful illustrations and supplementary videos, which will be available via YouTube to complement the information. Giri Govindarajulu is a Chief Information Security officer for Cisco Asiapac and is a 20-year Cisco veteran. Shyam Sundar Ramaswami is the Lead Threat Researcher with the Cisco Talos Threat Intelligence group. Shyam is a two-time TEDx speaker and a teacher of cybersecurity. Dr. Shriram K. Vasudevan is currently working as Dean of K. Ramakrishnan College of Technology. He has authored/co-authored 42 books for reputed publishers across the globe and 122 research papers in revered international journals, plus 30 papers for international/national conferences.
Google's Programmable Search Engines (PSEs, previously called Custom Search Engines) provide search opportunities that are unavailable with any other tool. PSEs have advanced settings and search operators that are not supported by "regular" Google. With PSEs, it is possible to perform filtered searches within parts of the web as if they were databases! While lots of professionals use existing PSEs to source for talent or with other research goals, few people have experience creating them. Even fewer know about powerful PSE-only search operators. The main reason PSEs are not as popular as they should be is that it is not easy to get educated on PSE creation. There is little information online and no books (other than this one) on the subject. Even less info is available on the "structured" operators that allow for filtered searches. The first of its kind, this book hopes to popularize these fun and powerful tools so that many more people can include PSEs in their work. Key Features: A detailed introduction to creating PSEs, including info absent in Google's help A "hack" for creating PSEs that look for profiles in seconds An introduction to advanced PSE-only search operators allowed to perform filtered searches of parts of the web A "hack" for expanding Google's search limits to 500 terms Use cases, examples, and approaches that would be educational for those doing online research This book will be of interest to researchers, OSINT specialists, investigative journalists, Competitive Intelligence people, recruiters, and Sourcers, to name a few categories, and to the general public interested in how to search better.
This new volume, Cognitive Computing Systems: Applications and Technological Advancements, explores the emerging area of artificial intelligence that encompasses machine self-learning, human-computer interaction, natural language processing, data mining and more. It introduces cognitive computing systems, highlights their key applications, discusses the technologies used in cognitive systems, and explains underlying models and architectures. Focusing on scientific work for real-world applications, each chapter presents the use of cognitive computing and machine learning in specific application areas. These include the use of speech recognition technology, application of neural networks in construction management, elevating competency in education, comprehensive health monitoring systems, predicting type 2 diabetes, applications for smart agricultural technology, human resource management, and more. With chapters from knowledgeable researchers in the area of artificial intelligence, cognitive computing, and allied areas, this book will be an asset for researchers, faculty, advances students, and industry professionals in many fields.
The complexity and severity of the Distributed Denial of Service (DDoS) attacks are increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource distribution. Numerous technical solutions are available, but those involving economic aspects have not been given much consideration. The book, DDoS Attacks - Classification, Attacks, Challenges, and Countermeasures, provides an overview of both types of defensive solutions proposed so far, exploring different dimensions that would mitigate the DDoS effectively and show the implications associated with them. Features: Covers topics that describe taxonomies of the DDoS attacks in detail, recent trends and classification of defensive mechanisms on the basis of deployment location, the types of defensive action, and the solutions offering economic incentives. Introduces chapters discussing the various types of DDoS attack associated with different layers of security, an attacker's motivations, and the importance of incentives and liabilities in any defensive solution. Illustrates the role of fair resource-allocation schemes, separate payment mechanisms for attackers and legitimate users, negotiation models on cost and types of resources, and risk assessments and transfer mechanisms. DDoS Attacks - Classification, Attacks, Challenges, and Countermeasures is designed for the readers who have an interest in the cybersecurity domain, including students and researchers who are exploring different dimensions associated with the DDoS attack, developers and security professionals who are focusing on developing defensive schemes and applications for detecting or mitigating the DDoS attacks, and faculty members across different universities.
Fake News in Context defines fake news and sets it within a historical and international context. Helping readers to become more skilled at detecting misinformation, the book also demonstrates how such knowledge can be leveraged to facilitate more effective engagement in civic education. Distinguishing between fake news and other forms of misinformation, the book explains the complete communication cycle of fake news: how and why it is created, disseminated and accessed. The book then explains the physical and psychological reasons why people believe fake news. Providing generic methods for identifying fake news, Farmer also explains the use of fact- checking tools and automated algorithms. The book then details how various literacies, including news, media, visual, information, digital and data, offer unique concepts and skills that can help interpret fake news. Arguing that individuals and groups can respond and counter fake news, which leads to civic engagement and digital citizenship, the book concludes by providing strategies for instruction and tips for collaborating with librarians. Including a range of international examples, Fake News in Context will be of interest to teaching faculty, and students of library and information science, communication studies, media studies, politics and journalism. Librarians and information professionals will also find a valuable resource in this book.
Fake News in Context defines fake news and sets it within a historical and international context. Helping readers to become more skilled at detecting misinformation, the book also demonstrates how such knowledge can be leveraged to facilitate more effective engagement in civic education. Distinguishing between fake news and other forms of misinformation, the book explains the complete communication cycle of fake news: how and why it is created, disseminated and accessed. The book then explains the physical and psychological reasons why people believe fake news. Providing generic methods for identifying fake news, Farmer also explains the use of fact- checking tools and automated algorithms. The book then details how various literacies, including news, media, visual, information, digital and data, offer unique concepts and skills that can help interpret fake news. Arguing that individuals and groups can respond and counter fake news, which leads to civic engagement and digital citizenship, the book concludes by providing strategies for instruction and tips for collaborating with librarians. Including a range of international examples, Fake News in Context will be of interest to teaching faculty, and students of library and information science, communication studies, media studies, politics and journalism. Librarians and information professionals will also find a valuable resource in this book.
IoT is empowered by various technologies used to detect, gather, store, act, process, transmit, oversee, and examine information. The combination of emergent technologies for information processing and distributed security, such as Cloud computing, Artificial intelligence, and Blockchain, brings new challenges in addressing distributed security methods that form the foundation of improved and eventually entirely new products and services. As systems interact with each other, it is essential to have an agreed interoperability standard, which is safe and valid. This book aims at providing an introduction by illustrating state-of-the-art security challenges and threats in IoT and the latest developments in IoT with Cloud, AI, and Blockchain security challenges. Various application case studies from domains such as science, engineering, and healthcare are introduced, along with their architecture and how they leverage various technologies Cloud, AI, and Blockchain. This book provides a comprehensive guide to researchers and students to design IoT integrated AI, Cloud, and Blockchain projects and to have an overview of the next generation challenges that may arise in the coming years.
This book focuses on RFID (Radio Frequency Identification), IoT (Internet of Things), and WSN (Wireless Sensor Network). It includes contributions that discuss the security and privacy issues as well as the opportunities and applications that are tightly linked to sensitive infrastructures and strategic services. This book addresses the complete functional framework and workflow in IoT-enabled RFID systems and explores basic and high-level concepts. It is based on the latest technologies and covers the major challenges, issues, and advances in the field. It presents data acquisition and case studies related to data-intensive technologies in RFID-based IoT and includes WSN-based systems and their security. It can serve as a manual for those in the industry while also helping beginners to understand both the basic and advanced aspects of IoT-based RFID-related issues. This book can be a premier interdisciplinary platform for researchers, practitioners, and educators to present and discuss the most recent innovations, trends, and concerns as well as practical challenges encountered, and find solutions that have been adopted in the fields of IoT and analytics.
Internet of Things (IoT)-enabled spaces have made revolutionary advances in the utility grid. Among these advances, intelligent and energy-efficient services are gaining considerable interest. The use of the smart grid is increasing day after day around us and is not only used in saving energy but also in our daily life for intelligent health, traffic, and even farming systems. The grid enabled with IoT features is also expected to communicate with cellular networks smoothly in the next-generation networks (6G and beyond). This will open the door for other interesting research areas. In this book, we consider the most significant and emergent research topics in this domain, addressing major issues and challenges in IoT-based solutions proposed for the smart grid. The chapters provide insight on comprehensive topics in IoT-based smart grids, combining technical aspects with the most up-to-date theory. It investigates the grid under varying and potential emerging paradigms such as edge/fog computing, in addition to big data aspects considerations in the IoT era. With comprehensive surveys and case studies, this book explores basic and high-level grid aspects in the emerging smart city paradigm, which makes it especially attractive to researchers, academics, and higher-level students. This authored book can be used by computer science undergraduate and postgraduate students, researchers and practitioners, city administrators, policymakers, and government regulators.
Aims to be broad in scope yet practical in approach, so that it can serve the needs of several different audiences, including researchers, teachers, developers, and theologians; Covers a wide variety of issues which have been neglected in other research texts; Studies the impact of creating a digital immortal on relatives and friends, the consequences of persistent digital legacies, and ways digital media are currently being used to expand the possibilities of commemorating the dead and managing the grief of those left behind; Analyzes the extent to which digital media are complementing or replacing the well-established formal structures and religious rituals; Explores the legal and ethical impact of creating a digital immortal.
Provides advanced system implementation for Smart Cities using Artificial Intelligence Addresses the complete functional framework workflow in Artificial Intelligence Explores basic and high-level concepts, thus servicing as a manual for those in the industry while also helping beginners Based on the latest technologies, and covering the major challenges, issues, and advances in Artificial Intelligence and Cybersecurity Discusses intelligent data management and automated systems through Artificial Intelligence and Cyber Security
Complete real-world examples of gathering feedback from users and web environments; Fundamentals of text analysis using JavaScript and PHP; Harnessing JavaScript data visualisation tools; Business focused application to feedback gathering, analysis and reporting; Integration of new and existing data sources into a single bespoke web-based analysis environment
NB-IoT is the Internet of Things (IoT) technology used for cellular communication. NB-IoT devices deliver much better capability and performance, such as: increased area coverage of up to one kilometer; a massive number of devices-up to 200,000-per a single base-station area; longer battery lifetime of ten years; and better indoor and outdoor coverage for areas with weak signal, such as underground garages. The cellular NB-IoT technology is a challenging technology to use and understand. With more than 30 projects presented in this book, covering many use cases and scenarios, this book provides hands-on and practical experience of how to use the cellular NB-IoT for smart applications using Arduino (TM), Amazon Cloud, Google Maps, and charts. The book starts by explaining AT commands used to configure the NB-IoT modem; data serialization and deserialization; how to set up the cloud for connecting NB-IoT devices; setting up rules, policy, security certificates, and a NoSQL database on the cloud; how to store and read data in the cloud; how to use Google Maps to visualize NB-IoT device geo-location; and how to use charts to visualize sensor datasets. Projects for Arduino are presented in four parts. The first part explains how to connect the device to the mobile operator and cellular network; perform communication using different network protocols, such as TCP, HTTP, SSL, or MQTT; how to use GPS for geo-location applications; and how to upgrade NB-IoT modem firmware over the air. The second part explains the microcontroller unit and how to build and run projects, such as a 7-segment display or a real-time clock. The third part explains how NB-IoT can be used with sensor devices, such as ultrasonic and environmental sensors. Finally, the fourth part explains how NB-IoT can be used to control actuators, such as stepper motors and relays. This book is a unique resource for understanding practical uses of the NB-IoT technology and serves as a handbook for technical and non-technical readers who are looking for practicing and exercising the cellular NB-IoT technology. The book can be used by engineers, students, researchers, system integrators, mobile operators' technical staff, and electronics enthusiasts. To download the software which can be used with the book, go to: https://github.com/5ghub/NB-IoT About the Author: Hossam Fattah is a technology expert in 4G/5G wireless systems and networking. He received his Ph.D. in Electrical and Computer Engineering from University of British Columbia, Vancouver, Canada in 2003. He received his Master of Applied Science in Electrical and Computer Engineering from University of Victoria, Victoria, Canada in 2000. He completed his B.Sc. degree in Computers and Systems Engineering from Al-Azhar University, Cairo, Egypt in 1995. Between 2003 and 2011, he was in academia and industry, including Texas A&M University. Between 2011 and 2013, he was with Spirent Communications, NJ, USA. Since 2013, he has been with Microsoft, USA. He is also an affiliate associate professor at University of Washington, Tacoma, WA, USA, teaching graduate courses on IoT and distributed systems and collaborating on 5G research and innovations. He has had many patents and technical publications in conferences and journals. He is a registered professional Engineer with the Association of Professional Engineers, British Columbia, Canada. He is the author of the recent book 5G LTE Narrowband Internet of Things (NB-IoT). His research interest is in wireless communications and radio networks and protocols, cellular quality of service, radio resource management, traffic and packet scheduling, network analytics, and mobility.
The digital music revolution and the rise of piracy cultures has transformed the music world as we knew it. Digital Music Distribution aims to go beyond the polarized and reductive perception of 'piracy wars' to offer a broader and richer understanding of the paradoxes inherent in new forms of distribution. Covering both production and consumption perspectives, Spilker analyses the changes and regulatory issues through original case studies, looking at how digital music distribution has both changed and been changed by the cultural practices and politicking of ordinary youth, their parents, music counter cultures, artists and bands, record companies, technology developers, mass media and regulatory authorities. Exploring the fundamental change in distribution, Spilker investigates paradoxes such as: The criminalization of file-sharing leading not to conflicts, but to increased collaboration between youths and their parents; Why the circulation of cultural content, extremely damaging for its producers, has instead been advantageous for the manufacturers of recording equipment; Why more artists are recording in professional sound studios, despite the proliferation of good quality equipment for home recording; Why mass media, hit by many of the same challenges as the music industry, has been so critical of the way it has tackled these challenges. A rare and timely volume looking at the changes induced by the digitalization of music distribution, Digital Music Distribution will appeal to undergraduate students and policy makers interested in fields such as Media Studies, Digital Media, Music Business, Sociology and Cultural Studies. |
You may like...
Digital Afterlife - Death Matters in a…
Maggi Savin-Baden, Victoria Mason-Robbie
Paperback
R1,298
Discovery Miles 12 980
Smart Innovation of Web of Things
Aarti Jain, Ruben Gonzalez Crespo, …
Hardcover
R4,167
Discovery Miles 41 670
How to Cheat at Administering Office…
Anthony Piltzecker
Paperback
|