.jpg.7633371fa53fa19028f71f2e3a72fc4e.jpg)
Everything posted by Jessica Brown
-
Enterprise Integration Patterns - Designing, Building, and Deploying Messaging Solutions
Enterprise Integration Patterns /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Enterprise Integration Patterns Designing, Building, and Deploying Messaging Solutions by Gregor Hohpe, Bobby Woolf Publisher Addison-Wesley Professional Published Date 2004 Page Count 683 Categories Computers / Management Information Systems, Computers / Networking / Vendor Specific, Computers / Programming / Object Oriented, Computers / Web / General, Self-Help / Personal Growth / Self-Esteem, Technology & Engineering / Telecommunications, Computers / Networking / General, Computers / Internet / General Language EN Average Rating 4 (based on 1 ratings) Maturity Rating No Mature Content Detected ISBN 0321200683 Would you like to use a consistent visual notation for drawing integration solutions? Look inside the front cover. Do you want to harness the power of asynchronous systems without getting caught in the pitfalls? See "Thinking Asynchronously" in the Introduction. Do you want to know which style of application integration is best for your purposes? See Chapter 2, Integration Styles. Do you want to learn techniques for processing messages concurrently? See Chapter 10, Competing Consumers and Message Dispatcher. Do you want to learn how you can track asynchronous messages as they flow across distributed systems? See Chapter 11, Message History and Message Store. Do you want to understand how a system designed using integration patterns can be implemented using Java Web services, .NET message queuing, and a TIBCO-based publish-subscribe architecture? See Chapter 9, Interlude: Composed Messaging. Utilizing years of practical experience, seasoned experts Gregor Hohpe and Bobby Woolf show how asynchronous messaging has proven to be the best strategy for enterprise integration success. However, building and deploying messaging solutions presents a number of problems for developers. Enterprise Integration Patterns provides an invaluable catalog of sixty-five patterns, with real-world solutions that demonstrate the formidable of messaging and help you to design effective messaging solutions for your enterprise. The authors also include examples covering a variety of different integration technologies, such as JMS, MSMQ, TIBCO ActiveEnterprise, Microsoft BizTalk, SOAP, and XSL. A case study describing a bond trading system illustrates the patterns in practice, and the book offers a look at emerging standards, as well as insights into what the future of enterprise integration might hold. This book provides a consistent vocabulary and visual notation framework to describe large-scale integration solutions across many technologies. It also explores in detail the advantages and limitations of asynchronous messaging architectures. The authors present practical advice on designing code that connects an application to a messaging system, and provide extensive information to help you determine when to send a message, how to route it to the proper destination, and how to monitor the health of a messaging system. If you want to know how to manage, monitor, and maintain a messaging system once it is in use, get this book. 0321200683B09122003 More Information
-
The Science of Science
The Science of Science /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } The Science of Science by Dashun Wang, Albert-László Barabási Publisher Cambridge University Press Published Date 2021-03-25 Page Count 308 Categories Computers / Database Administration & Management, Computers / Data Science / Data Analytics, Computers / Programming / Algorithms, Language Arts & Disciplines / Library & Information Science / General, Science / General, Science / Physics / General, Science / Philosophy & Social Aspects Language EN Average Rating 4 (based on 1 ratings) Maturity Rating No Mature Content Detected ISBN 1108492665 This is the first comprehensive overview of the 'science of science,' an emerging interdisciplinary field that relies on big data to unveil the reproducible patterns that govern individual scientific careers and the workings of science. It explores the roots of scientific impact, the role of productivity and creativity, when and what kind of collaborations are effective, the impact of failure and success in a scientific career, and what metrics can tell us about the fundamental workings of science. The book relies on data to draw actionable insights, which can be applied by individuals to further their career or decision makers to enhance the role of science in society. With anecdotes and detailed, easy-to-follow explanations of the research, this book is accessible to all scientists and graduate students, policymakers, and administrators with an interest in the wider scientific enterprise. More Information
-
Robot Motion Planning - Edition en anglais
Robot Motion Planning /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Robot Motion Planning Edition en anglais by Jean-Claude Latombe Publisher Springer Science & Business Media Published Date 1991 Page Count 651 Categories Computers / Artificial Intelligence / General, Computers / Intelligence (AI) & Semantics, Computers / Software Development & Engineering / Computer Graphics, Computers / Artificial Intelligence / Computer Vision & Pattern Recognition, Computers / Computer Vision & Pattern Recognition, Technology & Engineering / Automation, Technology & Engineering / Electrical, Technology & Engineering / Electronics / General, Technology & Engineering / Robotics Language EN Average Rating 4 (based on 2 ratings) Maturity Rating No Mature Content Detected ISBN 0792391292 One of the ultimate goals in Robotics is to create autonomous robots. Such robots will accept high-level descriptions of tasks and will execute them without further human intervention. The input descriptions will specify what the user wants done rather than how to do it. The robots will be any kind of versatile mechanical device equipped with actuators and sensors under the control of a computing system. Making progress toward autonomous robots is of major practical inter est in a wide variety of application domains including manufacturing, construction, waste management, space exploration, undersea work, as sistance for the disabled, and medical surgery. It is also of great technical interest, especially for Computer Science, because it raises challenging and rich computational issues from which new concepts of broad useful ness are likely to emerge. Developing the technologies necessary for autonomous robots is a formidable undertaking with deep interweaved ramifications in auto mated reasoning, perception and control. It raises many important prob lems. One of them - motion planning - is the central theme of this book. It can be loosely stated as follows: How can a robot decide what motions to perform in order to achieve goal arrangements of physical objects? This capability is eminently necessary since, by definition, a robot accomplishes tasks by moving in the real world. The minimum one would expect from an autonomous robot is the ability to plan its x Preface own motions. More Information
-
Wikinomics - How Mass Collaboration Changes Everything
Wikinomics /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Wikinomics How Mass Collaboration Changes Everything by Don Tapscott, Anthony D. Williams Publisher Penguin Published Date 2008-04-17 Page Count 368 Categories Business & Economics / Management, Technology & Engineering / Telecommunications, Computers / Internet / General Language EN Average Rating 5 (based on 1 ratings) Maturity Rating No Mature Content Detected ISBN 1440639485 The acclaimed bestseller that's teaching the world about the power of mass collaboration. Translated into more than twenty languages and named one of the best business books of the year by reviewers around the world, Wikinomics has become essential reading for business people everywhere. It explains how mass collaboration is happening not just at Web sites like Wikipedia and YouTube, but at traditional companies that have embraced technology to breathe new life into their enterprises. This national bestseller reveals the nuances that drive wikinomics, and share fascinating stories of how masses of people (both paid and volunteer) are now creating TV news stories, sequencing the human gnome, remixing their favorite music, designing software, finding cures for diseases, editing school texts, inventing new cosmetics, and even building motorcycles. More Information
-
Colossus - The Secrets of Bletchley Park's Code-breaking Computers
Colossus /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Colossus The Secrets of Bletchley Park's Code-breaking Computers by B. Jack Copeland Publisher Oxford University Press Published Date 2010-03-18 Page Count 480 Categories Computers / Social Aspects, Computers / History, History / General, History / Europe / Great Britain / General, History / Military / General, History / Wars & Conflicts / World War II / General, History / Wars & Conflicts / World War II / European Theater, Language Arts & Disciplines / Linguistics / General, Law / Computer & Internet, Science / General, Science / History, Science / Philosophy & Social Aspects Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0199578141 At last - the secrets of Bletchley Park's powerful codebreaking computers. This is a history of Colossus, the world's first fully-functioning electronic digital computer. Colossus was used during the Second World War at the Government Code and Cypher School at Bletchley Park, where it played an invaluable role cracking enemy codes. Until very recently, much about the Colossus machine was shrouded in secrecy, largely because the codes that were employed remained in use by the British security services until a short time ago. This book only became possible due to the declassification in the US of wartime documents. With an introductory essay on cryptography and the history of code-breaking by Simon Singh, this book reveals the workings of Colossus and the extraordinary staff at Bletchley Park through personal accounts by those who lived and worked with the computer. Among them is the testimony of Thomas Flowers, who was the architect of Colossus and whose personal account, written shortly before he died, is published here for the first time. Other essays consider the historical importance of this remarkable machine, and its impact on the generations of computing technology that followed. More Information
-
WISC-IV Clinical Use and Interpretation - Scientist-Practitioner Perspectives
WISC-IV Clinical Use and Interpretation /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } WISC-IV Clinical Use and Interpretation Scientist-Practitioner Perspectives by Aurelio Prifitera, Donald H. Saklofske, Lawrence G. Weiss Publisher Academic Press Published Date 2005 Page Count 486 Categories Computers / Networking / General, Education / Testing & Measurement, Medical / General, Psychology / Developmental / Child, Psychology / Clinical Psychology, Psychology / Cognitive Psychology & Cognition, Psychology / Psychotherapy / Counseling, Psychology / Assessment, Testing & Measurement, Social Science / Human Services Language EN Average Rating 4.5 (based on 2 ratings) Maturity Rating No Mature Content Detected ISBN 0125649312 WISC-IV Clinical Use and Interpretation provides comprehensive information on using and interpreting the WISC-IV for clinical assessment and diagnosis. With chapters authored by recognized experts in intelligence research, test development, and assessment, this will be a valuable resource to anyone using the WISC-IV in practice. This information is available nowhere else and is a unique opportunity to understand the WISC-IV from the perspective of those who know it best. Most relevant to practitioners is the applied focus and interpretation of the WISC-IV in psychological and psychoeducational assessment. Divided into two sections, Section I discusses general advances in the assessment of children's intelligence, and how the WISC-IV differs from the WISC-III. Also discussed are the clinical considerations of this test, including the meaning of the FSIQ and four Index scores and how the WISC-IV relates to other assessment measures, including the WISC-IV Integrated. Section II discusses the use of WISC-IV with exceptional children, including those with learning disabilities, giftedness, mental retardation, hearing impairment, ADHD, neuropsychological injury, and/or cultural and ethnic differences. * Written by leading experts * Provides a comprehensive description of the WISC-IV from research to clinical practice * Discusses WISC-IV use with exceptional children including LD, AD/HD, Gifted, Mental Retardation, Language Disabilities, Hearing Impaired, Head/Brain Injury, and Cultural and Ethnically Different Children * Outlines integrated models of assessment of assessment that include the WISC-IV * Provides case studies illustrating WISC-IV clinical use * Contains additional validity data on WISC-IV not available elsewhere * Practical and directly relevant to practitioners who use the WISC-IV More Information
-
The Flowers of Evil / Les Fleurs du Mal : English - French Bilingual Edition - The famous volume of French poetry by Charles Baudelaire in two languages
The Flowers of Evil / Les Fleurs du Mal : English - French Bilingual Edition /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } The Flowers of Evil / Les Fleurs du Mal : English - French Bilingual Edition The famous volume of French poetry by Charles Baudelaire in two languages by Charles Baudelaire Publisher BoD - Books on Demand Published Date 2018-06-19 Page Count 144 Categories Poetry / General, Computers / Programming / General Language FR Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 2322144185 Les Fleurs du mal (English: The Flowers of Evil) is a volume of French poetry by Charles Baudelaire. First published in 1857, it was important in the symbolist and modernist movements. The poems deal with themes relating to decadence and eroticism. This Bilingual English - French edition provides the original text by Baudelaire and its English translation by Cyril Scott. The initial publication of the book was arranged in six thematically segregated sections: 1. Spleen et Idéal (Spleen and Ideal) 2. Tableaux parisiens (Parisian Scenes) 3. Le Vin (Wine) 4. Fleurs du mal (Flowers of Evil) 5. Révolte (Revolt) 6. La Mort (Death) Baudelaire dedicated the book to the poet Théophile Gautier, describing him as a parfait magicien des lettres françaises ("a perfect magician of French letters"). The foreword to the volume, Au Lecteur ("To the Reader"), identifying Satan with the pseudonymous alchemist Hermes Trismegistus. The author and the publisher were prosecuted under the regime of the Second Empire as an outrage aux bonnes moeurs ("an insult to public decency"). As a consequence of this prosecution, Baudelaire was fined 300 francs. Six poems from the work were suppressed and the ban on their publication was not lifted in France until 1949. These poems were "Lesbos"; "Femmes damnées (À la pâle clarté)" (or "Women Doomed (In the pale glimmer...)"); "Le Léthé" (or "Lethe"); "À celle qui est trop gaie" (or "To Her Who Is Too Joyful"); "Les Bijoux" (or "The Jewels"); and " Les "Métamorphoses du Vampire" (or "The Vampire's Metamorphoses"). These were later published in Brussels in a small volume entitled Les Épaves (Scraps or Jetsam). On the other hand, upon reading "The Swan" (or "Le Cygne") from Les Fleurs du mal, Victor Hugo announced that Baudelaire had created "un nouveau frisson" (a new shudder, a new thrill) in literature. In the wake of the prosecution, a second edition was issued in 1861 which added 35 new poems, removed the six suppressed poems, and added a new section entitled Tableaux Parisiens. A posthumous third edition, with a preface by Théophile Gautier and including 14 previously unpublished poems, was issued in 1868. More Information
-
Half-real - Video Games Between Real Rules and Fictional Worlds
Half-real /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Half-real Video Games Between Real Rules and Fictional Worlds by Jesper Juul Publisher MIT Press Published Date 2005 Page Count 233 Categories Computers / Computer Science, Computers / Virtual & Augmented Reality, Games & Activities / Video & Mobile Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0262101106 A video game is half-real: we play by real rules while imagining a fictional world. We win or lose the game in the real world, but we slay a dragon (for example) only in the world of the game. In this thought-provoking study, Jesper Juul examines the constantly evolving tension between rules and fiction in video games. Discussing games from Pong to The Legend of Zelda, from chess to Grand Theft Auto, he shows how video games are both a departure from and a development of traditional non-electronic games. The book combines perspectives from such fields as literary and film theory, computer science, psychology, economic game theory, and game studies, to outline a theory of what video games are, how they work with the player, how they have developed historically, and why they are fun to play. Locating video games in a history of games that goes back to Ancient Egypt, Juul argues that there is a basic affinity between games and computers. Just as the printing press and the cinema have promoted and enabled new kinds of storytelling, computers work as enablers of games, letting us play old games in new ways and allowing for new kinds of games that would not have been possible before computers. Juul presents a classic game model, which describes the traditional construction of games and points to possible future developments. He examines how rules provide challenges, learning, and enjoyment for players, and how a game cues the player into imagining its fictional world. Juul's lively style and eclectic deployment of sources will make Half-Real of interest to media, literature, and game scholars as well as to game professionals and gamers. More Information
-
Theories of the Information Society
Theories of the Information Society /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Theories of the Information Society by Frank Webster Publisher Psychology Press Published Date 2002 Page Count 304 Categories Computers / Information Technology, Computers / Social Aspects, Language Arts & Disciplines / Communication Studies, Social Science / General, Social Science / Sociology / General, Technology & Engineering / Social Aspects Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0415282012 Popular opinion suggests that information has become a distinguishing feature of the modern world. Where once economies were built on industry and conquest, we are now instead said to be part of a global information economy. In this new and thoroughly revised edition of his popular book, author Webster brings his work up-to-date both with new theoretical work and with social and technological changes - such as the rapid growth of the internet and accelerated globalization - and reassesses the work of key theorists in light of these changes. This book is essential reading for students of contemporary social theory and anybody interested in social and technological change in the post-war era. More Information
-
Software Studies - A Lexicon
Software Studies /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Software Studies A Lexicon by Matthew Fuller Publisher MIT Press Published Date 2008 Page Count 334 Categories Computers / General, Computers / Programming / General, Computers / Languages / General, Computers / Social Aspects, Computers / Human-Computer Interaction (HCI), Computers / Data Science / Data Visualization, Social Science / Media Studies Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0262062747 A cultural field guide to software: artists, computer scientists, designers, cultural theorists, programmers, and others define a new field of study and practice. This collection of short expository, critical, and speculative texts offers a field guide to the cultural, political, social, and aesthetic impact of software. Computing and digital media are essential to the way we work and live, and much has been said about their influence. But the very material of software has often been left invisible. In Software Studies, computer scientists, artists, designers, cultural theorists, programmers, and others from a range of disciplines each take on a key topic in the understanding of software and the work that surrounds it. These include algorithms; logical structures; ways of thinking and doing that leak out of the domain of logic and into everyday life; the value and aesthetic judgments built into computing; programming's own subcultures; and the tightly formulated building blocks that work to make, name, multiply, control, and interweave reality. The growing importance of software requires a new kind of cultural theory that can understand the politics of pixels or the poetry of a loop and engage in the microanalysis of everyday digital objects. The contributors to Software Studies are both literate in computing (and involved in some way in the production of software) and active in making and theorizing culture. Software Studies offers not only studies of software but proposes an agenda for a discipline that sees software as an object of study from new perspectives. Contributors Alison Adam, Wilfried Hou Je Bek, Morten Breinbjerg, Ted Byfield, Wendy Hui Kyong Chun, Geoff Cox, Florian Cramer, Cecile Crutzen, Marco Deseriis, Ron Eglash, Matthew Fuller, Andrew Goffey, Steve Goodman, Olga Goriunova, Graham Harwood, Friedrich Kittler, Erna Kotkamp, Joasia Krysa, Adrian Mackenzie, Lev Manovich, Michael Mateas, Nick Montfort, Michael Murtaugh, Jussi Parikka, Søren Pold, Derek Robinson, Warren Sack, Grzesiek Sedek, Alexei Shulgin, Matti Tedre, Adrian Ward, Richard Wright, Simon Yuill More Information
-
The Law of Cybercrimes and Their Investigations
The Law of Cybercrimes and Their Investigations /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } The Law of Cybercrimes and Their Investigations by George Curtis Publisher CRC Press Published Date 2011-08-09 Page Count 414 Categories Law / Criminal Law / General, Law / Forensic Science, Social Science / Criminology, Computers / Computer Science, Law / Computer & Internet, Computers / Security / General, Social Science / Sociology / General Language EN Average Rating 5 (based on 1 ratings) Maturity Rating No Mature Content Detected ISBN 1439858322 Cybercrime has become increasingly prevalent in the new millennium as computer-savvy criminals have developed more sophisticated ways to victimize people online and through other digital means. The Law of Cybercrimes and Their Investigations is a comprehensive text exploring the gamut of issues surrounding this growing phenomenon.After an introduct More Information
-
Apple Confidential 2.0 - The Definitive History of the World's Most Colorful Company
Apple Confidential 2.0 /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Apple Confidential 2.0 The Definitive History of the World's Most Colorful Company by Owen W. Linzmayer Publisher No Starch Press Published Date 2004 Page Count 344 Categories Computers / Hardware / Personal Computers / Macintosh, Business & Economics / Corporate & Business History Language EN Average Rating 3.5 (based on 8 ratings) Maturity Rating No Mature Content Detected ISBN 1593270100 Apple Confidential examines the tumultuous history of America's best-known Silicon Valley start-up--from its legendary founding almost 30 years ago, through a series of disastrous executive decisions, to its return to profitability, and including Apple's recent move into the music business. Linzmayer digs into forgotten archives and interviews the key players to give readers the real story of Apple Computer, Inc. This updated and expanded edition includes tons of new photos, timelines, and charts, as well as coverage of new lawsuit battles, updates on former Apple executives, and new chapters on Steve Wozniak and Pixar. More Information
-
Mar. 13, 2025 - Today's Open Source Project of the Day: 📌 free-programming-books
📌 Project Name: free-programming-books 🔗 URL: https://github.com/EbookFoundation/free-programming-books 📝 Description: :books: Freely available programming books ⭐ Stars: 352955 🛠 Language: HTML 🤖 AI Summary: The "free-programming-books" is an open-source project dedicated to compiling and offering a comprehensive list of freely available programming books. This resource is highly significant for programmers, computer science students, or anyone interested in learning coding, as it provides easy access to learning materials in different languages and aspects of programming. It includes books on various languages like Python, Java, C#, and specialties like Machine Learning, Data Science, and more. The collection is consistently updated and expanded by contributors, ensuring up-to-date and relevant content. Offering free educational materials makes technology and software development career opportunities more accessible, thereby helping to democratize the field.
-
The Power of Networks - Six Principles that Connect Our Lives
The Power of Networks /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } The Power of Networks Six Principles that Connect Our Lives by Christopher G. Brinton, Mung Chiang Publisher Princeton University Press Published Date 2017 Page Count 310 Categories Business & Economics / Industries / Computers & Information Technology, Computers / Networking / General, Computers / Distributed Systems / General, Computers / Internet / General, Computers / Social Aspects, Science / Philosophy & Social Aspects, Technology & Engineering / General, Technology & Engineering / Social Aspects Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0691170711 An accessible illustrated introducton to the networks we use every day, from Facebook and Google to WiFi and the Internet What makes WiFi faster at home than at a coffee shop? How does Google order search results? Why do Amazon, Netflix, and YouTube use fundamentally different rating and recommendation methods--and why does it matter? Is it really true that everyone on Facebook is connected in six steps or less? And how do cat videos--or anything else--go viral? The Power of Networks answers questions like these for the first time in a way that all of us can understand and use, whether at home, the office, or school. Using simple language, analogies, stories, hundreds of illustrations, and no more math than simple addition and multiplication, Christopher Brinton and Mung Chiang provide a smart but accessible introduction to the handful of big ideas that drive the technical and social networks we use every day--from cellular phone networks and cloud computing to the Internet and social media platforms. The Power of Networks unifies these ideas through six fundamental principles of networking, which explain the difficulties in sharing network resources efficiently, how crowds can be wise or not so wise depending on the nature of their connections, how there are many building-blocks of layers in a network, and more. Understanding these simple ideas unlocks the workings of everything from the connections we make on Facebook to the technology that runs such platforms. Along the way, the authors also talk with and share the special insights of renowned experts such as Google's Eric Schmidt, former Verizon Wireless CEO Dennis Strigl, and "fathers of the Internet" Vint Cerf and Bob Kahn. Networks are everywhere. The Power of Networks shows how they work--and what understanding them can do for you. More Information
-
Age of Context - Mobile, Sensors, Data and the Future of Privacy
Age of Context /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Age of Context Mobile, Sensors, Data and the Future of Privacy by Robert Scoble, Shel Israel Publisher Patrick Brewster Press Published Date 2014 Page Count 225 Categories Business & Economics / General, Business & Economics / E-Commerce / General, Computers / Information Technology, Computers / Internet / Social Media, Computers / Social Aspects, Law / Privacy, Technology & Engineering / Social Aspects, Technology & Engineering / Mobile & Wireless Communications Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1492348430 In 2006, co-authors Robert Scoble and Shel Israel wrote Naked Conversations, a book that persuaded businesses to embrace what we now call social media. Six years later they have teamed up again to report that social media is but one of five converging forces that promise to change virtually every aspect of our lives. You know these other forces already: mobile, data, sensors and location-based technology. Combined with social media they form a new generation of personalized technology that knows us better than our closest friends. Armed with that knowledge our personal devices can anticipate what we'll need next and serve us better than a butler or an executive assistant. The resulting convergent superforce is so powerful that it is ushering in a era the authors call the Age of Context. In this new era, our devices know when to wake us up early because it snowed last night; they contact the people we are supposed to meet with to warn them we're running late. They even find content worth watching on television. They also promise to cure cancer and make it harder for terrorists to do their damage. Astoundingly, in the coming age you may only receive ads you want to see. Scoble and Israel have spent more than a year researching this book. They report what they have learned from interviewing more than a hundred pioneers of the new technology and by examining hundreds of contextual products. What does it all mean? How will it change society in the future? The authors are unabashed tech enthusiasts, but as they write, an elephant sits in the living room of our book and it is called privacy. We are entering a time when our technology serves us best because it watches us; collecting data on what we do, who we speak with, what we look at. There is no doubt about it: Big Data is watching you. The time to lament the loss of privacy is over. The authors argue that the time is right to demand options that enable people to reclaim some portions of that privacy. More Information
-
European Research Activities in Cloud Computing
European Research Activities in Cloud Computing /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } European Research Activities in Cloud Computing by Dana Petcu, José Luis Vázquez-Poletti Publisher Cambridge Scholars Published Date 2012 Page Count 335 Categories Computers / Networking / General, Computers / Distributed Systems / General, Computers / Internet / General, COMPUTERS / Networking / Intranets & Extranets, COMPUTERS / Web / General, Reference / Research, Technology & Engineering / General, Technology & Engineering / Engineering (General) Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1443835072 Whatâ (TM)s new in the European research and development area? Cloud computing is a provision model where whatever computing resource that can be thought of (machines, network, software solutions, applications) is provided as a service. This new paradigm has changed the center of gravity of computing in both the academic and industry environments, but despite the considerable efforts and investments, there are critical problems that are not yet solved. The research and development community involved in distributed computing is searching for viable solutions that will increase the adoption of the cloud. This is the case of the collaborative work done by multi-national teams in the context of the FP7 programme of the European Commission. Students, researchers and developers working in the field of distributed computing will find in this book a snapshot of the on-going activities in research and development of cloud computing undertaken at the European level. These activities are organized by the latest hot topics of cloud computing research, which include services, management, automation and adoption. Summarizing, this book will help the reader understand and identify the research and development winds that are pushing the clouds to Europe. More Information
-
Working with Microsoft Office 365 - Running Your Small Business in the Cloud
Working with Microsoft Office 365 /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Working with Microsoft Office 365 Running Your Small Business in the Cloud by Brett Hill Publisher Microsoft Published Date 2012 Page Count 349 Categories Computers / General, Computers / Business & Productivity Software / General, Computers / Business & Productivity Software / Spreadsheets, Computers / Business & Productivity Software / Word Processing, Computers / Business & Productivity Software / Presentations, Computers / Business & Productivity Software / Email Clients, Computers / Business & Productivity Software / Office Suites Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0735658994 Learn how to deploy, manage, and support your Microsoft Office 365 for Small Business service, regardless of your level of IT knowledge and experience. This guide provides extensive walkthroughs, easy-to-follow procedures, and real-world troubleshooting tips to help you get you up and running with the Office 365 quickly and efficiently as possible. More Information
-
Federal Cloud Computing - Strategy and Considerations
Federal Cloud Computing /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Federal Cloud Computing Strategy and Considerations by Matthew Metheny, Robert A. Jones Publisher Nova Science Publishers, Incorporated Published Date 2012 Page Count 175 Categories Business & Economics / Industries / Computers & Information Technology, Computers / General, Computers / Security / General, Computers / Internet / Web Services & APIs, Computers / Distributed Systems / Cloud Computing, Political Science / Public Affairs & Administration Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1620819899 This book provides an overview of the current strategies and considerations regarding federal cloud computing. The Federal Government's current Information Technology (IT) environment is characterised by low asset utilisation, a fragmented demand for resources, duplicative systems, environments which are difficult to manage, and long procurement lead times. These inefficiencies negatively impact the Federal Government's ability to serve the American public. Cloud computing has the potential to play a major part in addressing these inefficiencies and improving government service delivery. The cloud computing model can significantly help agencies grappling with the need to provide highly reliable, innovative services quickly despite resource constraints. More Information
-
Cloud-Based Services for Your Library - A LITA Guide
Cloud-Based Services for Your Library /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Cloud-Based Services for Your Library A LITA Guide by Erik T. Mitchell Publisher American Library Association Published Date 2013-01-04 Page Count 161 Categories Computers / System Administration / Storage & Retrieval, Computers / Internet / Application Development, Computers / Internet / Web Programming, Computers / Internet / Web Services & APIs, Computers / Online Services, COMPUTERS / Online Services / Resource Directories, Language Arts & Disciplines / Library & Information Science / General, Language Arts & Disciplines / Library & Information Science / Collection Development, Language Arts & Disciplines / Library & Information Science / Digital & Online Resources, Computers / Software Development & Engineering / General, Computers / Internet / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1555708781 By exploring specific examples of cloud computing and virtualization, this book allows libraries considering cloud computing to start their exploration of these systems with a more informed perspective. More Information
-
The Cloud Security Ecosystem
The Cloud Security Ecosystem /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } The Cloud Security Ecosystem by Ryan Ko, Raymond Choo Publisher Syngress Published Date 2015 Page Count 570 Categories Cloud computing Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN N/A Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosystem comprehensively discusses a range of cloud security topics from multi-disciplinary and international perspectives, aligning technical security implementations with the most recent developments in business, legal, and international environments. The book holistically discusses key research and policy advances in cloud security - putting technical and management issues together with an in-depth treaties on a multi-disciplinary and international subject. The book features contributions from key thought leaders and top researchers in the technical, legal, and business and management aspects of cloud security. The authors present the leading edge of cloud security research, covering the relationships between differing disciplines and discussing implementation and legal challenges in planning, executing, and using cloud security. Presents the most current and leading-edge research on cloud security from a multi-disciplinary standpoint, featuring a panel of top experts in the field Focuses on the technical, legal, and business management issues involved in implementing effective cloud security, including case examples Covers key technical topics, including cloud trust protocols, cryptographic deployment and key management, mobile devices and BYOD security management, auditability and accountability, emergency and incident response, as well as cloud forensics Includes coverage of management and legal issues such as cloud data governance, mitigation and liability of international cloud deployment, legal boundaries, risk management, cloud information security management plans, economics of cloud security, and standardization efforts. More Information
-
Think Bigger - Developing a Successful Big Data Strategy for Your Business
Think Bigger /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Think Bigger Developing a Successful Big Data Strategy for Your Business by Mark Van Rijmenam Publisher AMACOM Published Date 2014 Page Count 288 Categories Apache Hadoop Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN N/A Big data--the enormous amount of data that is created as virtually every movement, transaction, and choice we make becomes digitized--is revolutionizing business. Offering real-world insight and explanations, this book provides a roadmap for organizations looking to develop a profitable big data strategy ... and reveals why it's not something they can leave to the I.T. department. Sharing best practices from companies that have implemented a big data strategy including Walmart, InterContinental Hotel Group, Walt Disney, and Shell, Think Bigger covers the most important big data trends affecting organizations, as well as key technologies like Hadoop and MapReduce, and several crucial types of analyses. In addition, the book offers guidance on how to ensure security, and respect the privacy rights of consumers. It also examines in detail how big data is impacting specific industries--and where opportunities can be found. Big data is changing the way businesses--and even governments--are operated and managed. Think Bigger is an essential resource for anyone who wants to ensure that their company isn't left in the dust. More Information
-
Mastering VMware VSphere 5
Mastering VMware VSphere 5 /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Mastering VMware VSphere 5 by Scott Lowe Publisher John Wiley & Sons Published Date 2011-10-18 Page Count 768 Categories Computers / Operating Systems / General, Computers / System Administration / Virtualization & Containerization, Computers / Hardware / General, Technology & Engineering / Electronics / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0470890800 A new and updated edition of bestselling Mastering VMware vSphere 4 Written by leading VMware expert, this book covers all the features and capabilities of VMware vSphere. You'll learn how to install, configure, operate, manage, and secure the latest release. Covers all the new features and capabilities of the much-anticipated new release of VMware vSphere Discusses the planning, installation, operation, and management for the latest release Reviews migration to the latest vSphere software Offers hands-on instruction and clear explanations with real-world examples Mastering VMware vSphere is the strategic guide you need to maximize the opportunities of virtualization. More Information
-
Trust and Records in an Open Digital Environment
Trust and Records in an Open Digital Environment /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Trust and Records in an Open Digital Environment by Hrvoje Stančić Publisher Routledge Published Date 2020-12-31 Page Count 260 Categories Computers / Internet / Online Safety & Privacy, Computers / Social Aspects, Computers / Design, Graphics & Media / General, Computers / Distributed Systems / Cloud Computing, Language Arts & Disciplines / Library & Information Science / General, Language Arts & Disciplines / Library & Information Science / Archives & Special Libraries, Language Arts & Disciplines / Library & Information Science / Digital & Online Resources Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 036743699X Trust and Records in an Open Digital Environment explores issues that arise when digital records are entrusted to the cloud and will help professionals to make informed choices in the context of a rapidly changing digital economy. Showing that records need to ensure public trust, especially in the era of alternative truths, this volume argues that reliable resources, which are openly accessible from governmental institutions, e-services, archival institutions, digital repositories, and cloud-based digital archives, are the key to an open digital environment. The book also demonstrates that current established practices need to be reviewed and amended to include the networked nature of the cloud-based records, to investigate the role of new players, like cloud service providers (CSP), and assess the potential for implementing new, disruptive technologies like blockchain. Stančic and the contributors address these challenges by taking three themes - state, citizens, and documentary form - and discussing their interaction in the context of open government, open access, recordkeeping, and digital preservation. Exploring what is needed to enable the establishment of an open digital environment, Trust and Records in an Open Digital Environment should be essential reading for data, information, document, and records management professionals. It will also be a key text for archivists, librarians, professors, and students working in the information sciences and other related fields. More Information
-
Cloud Computing - A Hands-on Approach
Cloud Computing /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Cloud Computing A Hands-on Approach by Arshdeep Bahga, Vijay Madisetti Publisher Universities Press Published Date 2014 Page Count 454 Categories Cloud computing Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 8173719233 No description available. More Information
-
Computer Networks, Big Data and IoT - Proceedings of ICCBI 2021
Computer Networks, Big Data and IoT /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Computer Networks, Big Data and IoT Proceedings of ICCBI 2021 by A. Pasumpon Pandian, Xavier Fernando, Wang Haoxiang Publisher Springer Nature Published Date 2022-05-21 Page Count 1010 Categories Technology & Engineering / Telecommunications, Technology & Engineering / Electrical, Computers / General, Computers / Database Administration & Management Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 9811908982 This book presents best selected research papers presented at the International Conference on Computer Networks, Big Data and IoT (ICCBI 2021), organized by Vaigai College Engineering, Madurai, Tamil Nadu, India, during December 9–10, 2021. The book covers original papers on computer networks, network protocols and wireless networks, data communication technologies and network security. The book is a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers and industry practitioners in those important areas. More Information