Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 10 of 10 matches in All Departments
This book explores 10 unique facets of Internet health and safety, including physical safety, information security, and the responsible use of technology, offering takeaways from interviews with experts in the field and suggestions for proactively improving users' Internet safety. The Internet has become for many people—especially students and young adults—an essential and intrinsic part of their lives. It makes information available to be shared worldwide, at any time; enables learning about any topic; and allows for instantaneous communication. And it provides endless entertainment as well. But the benefits of online access are accompanied by serious potential risks. This book covers the key elements of Internet health and safety, including physical safety, information security, and the responsible use of technology. It begins with an introductory essay that gives readers the necessary conceptual framework, and then explains specific topics such as cyberbullying, file sharing, online predators, Internet fraud, and obscene and offensive content. The book also answers readers' questions in a "Q & A" section with a subject expert and includes a directory of resources that provides additional information and serves as a gateway to further study.
This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact. What defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments, and the general public? And what motivates them to do so? This book traces the origins of hacking from the 1950s to today and provides an in-depth exploration of the ways in which hackers define themselves, the application of malicious and ethical hacking techniques, and how hackers' activities are directly tied to the evolution of the technologies we use every day. Rather than presenting an overly technical discussion of the phenomenon of hacking, this work examines the culture of hackers and the technologies they exploit in an easy-to-understand format. Additionally, the book documents how hacking can be applied to engage in various forms of cybercrime, ranging from the creation of malicious software to the theft of sensitive information and fraud-acts that can have devastating effects upon our modern information society. Documents how computer hacking fits into various forms of cybercrime Describes the subculture of computer hackers and explains how this social world plays an integral role in the business of hacking Clarifies the subtle differences between ethical and malicious hacks Focuses on the non-technical aspects of computer hacking to enable the reader to better understand the actors and their motives
Schell combines her research with findings from other studies to map the strategies, personality predispositions, and mood-coping capabilities for making it to the top of the corporate ladder--and for staying there. Nearly 400 of today's corporate leaders reveal their secrets for success and the stress and personality and mood disorders that go along with it. The result is an authoritative insight into the people who made it in today's corporate world, and a bold reconfirmation that life at the top is not always worth coveting. Schell's book is written for present-day corporate leaders and for those seeking to become leaders and is designed to help understand the special traits one needs to become successful. Schell reports in detail on corporate leaders' stress-coping strategies, influence strategies, personality dispositions, the ways they cope with their mood swings, and how they see themselves performing their own compensation negotiations. Managers and management aspirants, specialists in organizational psychology, and human resource executives will find Schell's book both enlightening and cautionary.
Hackers get a bad rap. Businesses, industries, and even society as a whole covet their skills, yet they are often misunderstood and frequently despised. Is their vilification justified? This is the first book to use previously validated psychological inventories to explore and profile the personalities and behavioral traits of more than 200 self-admitted hackers. Many of the profiled are at the top of their game, revered by both the good hackers (white hats) and their more malevolent peers (black hats). While there are serious reasons to fear the darker elements of the hacker community, there is also much to admire in their nobler counterparts. Fascinating case studies on hackers who have been caught and convicted of their crimes, as well as those betrayed by their peers, offer a unique, credible understanding of what makes hackers tick. The authors examine current laws meant to control hacking and its collateral crimes--stalking and terrorism--along with other means of reining in the irresponsible scriptkiddies and vicious black hats. Moderated and balanced, this book is an easy-to-read, authoritative source information for anyone interested in who hackers are, and how much we should worry about them.
This book discusses the dangers of too much technology use, explores the benefits of digital detoxing, and outlines the different programs and approaches available to help you unplug. It's an invaluable resource for readers looking to establish a healthier relationship with the digital world. Health professionals and the general public are becoming increasingly aware that addiction to the internet, social media, online games, and other forms of technology has become a real problem with significant negative impacts on physical, psychological, and social health. To combat this issue, some are now undertaking a "digital detox," and many options have emerged to help individuals unplug, whether for a weekend or for longer-term change. Digital Detox: Why Taking a Break from Technology Can Improve Your Well-Being explores both the dark side of technology's ever-present existence in today's world and what individuals can do to find better balance in their digital lives. Part I explores addiction to the internet and other novel technologies. What effect does overindulgence in social media, gaming, online shopping, or even "doomscrolling" through internet news sites have on our self-esteem, relationships with others, and happiness? This section also explores how researchers study and quantify technology addiction. Part II focuses on the digital detox countermovement, examining how various programs, support groups, retreats, and even technology itself can help individuals conquer their digital addictions. Provides readers with a solid understanding of the causes and symptoms of various forms of internet addiction Explores a range of strategies that can help readers develop a personal digital detox regimen Examines the latest study findings from experts in mental health, business, and information technology on which digital detox strategies work well in both the short term and long term for different segments of the population Includes resources to help readers delve further into digital detox topics of particular interest
An examination of the social impact of the Internet, this volume explores political, social, technical, legal, and economic controversies in a manner accessible to the general reader. Today more than one billion people worldwide use the Internet for communication, shopping, business, and research. But in the last five years they have lost over $10 billion to malicious computer attacks alone. Is there a way to keep the benefits and avoid the problems? The Internet and Society: A Reference Handbook explores both the positive aspects of the Internet and its darker side. Topically organized, it chronicles the background and history of the Internet, with a focus on the 1960s and beyond. Through analysis of the latest research in sociology, political science, economics, law, and computer science, it examines problems, varieties of cybercrime, controversies, and solutions related to the Internet's phenomenal growth. It also illuminates the likely directions of the Internet's future and the ongoing challenges it presents to societies around the globe. A glossary of key terms, such as algorithm, ARPAnet, Hyper Text Markup Language, identity theft, Internet protocol, malicious mode, and Moore's law, helps readers find their bearings in the high-tech world of the Internet Bibliographical sketches of 20 key personalities-both positive and negative-in Internet history bring this high-tech story to life
This book was written to help organizations and their members better manage stress. Through a simple framework, C-O-P-E, human resource managers are provided the tools with which to determine if they and their organization are in Control, are showing Outward signs of distress, have Personality predispositions which escalate or de-escalate stress levels, and are Energy-balanced. The book's tone is optimistic, and its theme is: If there is a stress problem, identify it, fix it, but never ignore it. Treatment interventions typically employed by stress experts for fixing stress problems are discussed. Case histories are discussed to give managers a clearer understanding of what can go wrong with coping efforts, and what individuals and organizations can do to turn a negative situation into a positive one. Professionals, such as human resource managers and industrial psychologists, and those teaching and researching in such fields as human resource development and training and organizational behavior, will be interested in this work.
Schell and Lanteigne provide a clear, objective, responsible, and readable analysis of the facts of stalking crimes against people in the workplace -- and a practical guide to protecting the organization against them. The authors have taken as their purpose the task of helping to reduce the potential for workplace and personal tragedies. They not only make people aware of the stalking cycle and the stages commonly found in stalking incidents, but they give ways to prevent the cycle from escalating into disaster. Their goal is to help organizations develop policies and strategies to identify and suppress stalking before it's too late. Their book is unique in several ways: it expands on other presentations of the topic; it goes into detail about how stalking victims act and react and why they deny that stalking is happening to them, and it provides clinical insights into the ways stalkers think and behave -- and why. Schell and Lanteigne differentiate sexual harrassment incidents from stalking. Their theme: If there is a stalking problem, it needs to be identified and corrected early. They detail various interventions proposed by experts in forensic psychiatry, law enforcement and security, and human resource management. With numerous case histories of real-life stalking incidents and responses from victims and their organizations' management, the authors make clear what can go wrong with an inappropriate intervention, and what individuals, businesses, and organizations can do to turn a psychologically devastating and potentially life threatening situation around. Their red flag indicators help readers to understand that a stalking crime may be happening to them. The authors also give readers and their supervisors the resources they need to deal with it. The result is an important contribution to the literature on a growing, extremely dangerous crime in today's organizations, and an essential resource for executives and managers who are compelled to cope with it.
Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications addresses various aspects of hacking and technology-driven crime, including the ability to understand computer-based threats, identify and examine attack dynamics, and find solutions. Including findings from experts in Criminal Justice, Business, and Information Technology Security from around the world, this book presents current research undertakings and findings in order to find interdisciplinary solutions to the complex domain of cyber crime and network breaches.
Covering topics ranging from web filters to laws aimed at preventing the flow of information, this book explores freedom-and censorship-of the Internet and considers the advantages and disadvantages of policies at each end of the spectrum. Combining reference entries with perspective essays, this timely book undertakes an impartial exploration of Internet censorship, examining the two sides of the debate in depth. On the one side are those who believe censorship, to a greater or lesser degree, is acceptable; on the other are those who play the critical role of information freedom fighters. In Internet Censorship: A Reference Handbook, experts help readers understand these diverse views on Internet access and content viewing, revealing how both groups do what they do and why. The handbook shares key events associated with the Internet's evolution, starting with its beginnings and culminating in the present. It probes the motivation of newsmakers like Julian Assange, the Anonymous, and WikiLeaks hacker groups, and of risk-takers like Private Bradley Manning. It also looks at ways in which Internet censorship is used as an instrument of governmental control and at the legal and moral grounds cited to defend these policies, addressing, for example, why the governments of China and Iran believe it is their duty to protect citizens by filtering online content believed to be harmful. Introduces key concepts and traces the evolution of Internet censorship from its earliest days Shows how anti-censorship groups-including the American Civil Liberties Union, the OpenNet Initiative, Reporters Without Borders, Anonymous, WikiLeaks, and the Censorware Project-band together to fight for freedom of information Explores the role of American businesses in facilitating Internet censorship abroad Shares opinions on Internet freedom versus Internet censorship from experts in a range of fields, including criminology, political science, philosophy, and psychology Includes an overview of Internet usage and penetration rates by region and an examination of the Freedom on the Net 2012 findings
|
You may like...
|