.jpg.7633371fa53fa19028f71f2e3a72fc4e.jpg)
Everything posted by Jessica Brown
-
Google It - Total Information Awareness
Google It /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Google It Total Information Awareness by Newton Lee Publisher Springer Published Date 2016-10-23 Page Count 564 Categories Computers / Information Technology, Computers / Artificial Intelligence / General, Computers / Data Science / Data Analytics, Computers / System Administration / Storage & Retrieval, Computers / Software Development & Engineering / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1493964151 From Google search to self-driving cars to human longevity, is Alphabet creating a neoteric Garden of Eden or Bentham’s Panopticon? Will King Solomon’s challenge supersede the Turing test for artificial intelligence? Can transhumanism mitigate existential threats to humankind? These are some of the overarching questions in this book, which explores the impact of information awareness on humanity starting from the Book of Genesis to the Royal Library of Alexandria in the 3rd century BC to the modern day of Google Search, IBM Watson, and Wolfram|Alpha. The book also covers Search Engine Optimization, Google AdWords, Google Maps, Google Local Search, and what every business leader must know about digital transformation. “Search is curiosity, and that will never be done,” said Google’s first female engineer and Yahoo’s sixth CEO Marissa Mayer. The truth is out there; we just need to know how to Google it! More Information
-
Null-A Continuum
Null-A Continuum /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Null-A Continuum by John C. Wright Publisher Macmillan Published Date 2008-05-13 Page Count 317 Categories Fiction / Historical / General, Fiction / Science Fiction / General Language EN Average Rating 5 (based on 1 ratings) Maturity Rating No Mature Content Detected ISBN 0765316293 Grandmaster A. E. van Vogt was one of the giants of the Golden Age of classic SF, the 1940s. Of his masterpieces, The World of Null-A is perhaps most influential. It was the first major trade SF hardcover ever, in 1949, and has been in print ever since. The careers of Philip K. Dick, Keith Laumer, Alfred Bester, Charles Harness, and Philip Jose Farmer were created or influenced by The World of Null-A. It is required reading for anyone who wishes to know the canon of SF classics. And so John C. Wright was inspired to write a sequel to the two novels of Null-A (the second was The Players of Null-A). To do this, he trained himself to write in the pulp style and manner of van Vogt. So return again to the Null-A future, in which the superhuman amnesiac with a double brain, Gilbert Gosseyn, must pit his wits once more against the remorseless galactic dictator Enro the Red and the mysterious shadow-being known as The Follower, while he is hurled headlong through unimaginable distances in space and in time and through alternate eternities to fend off the death, and complete the rebirth, of the Universe itself! More Information
-
Web Data Mining - Exploring Hyperlinks, Contents, and Usage Data
Web Data Mining /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Web Data Mining Exploring Hyperlinks, Contents, and Usage Data by Bing Liu Publisher Springer Science & Business Media Published Date 2007-05-30 Page Count 532 Categories Computers / Information Theory, Computers / System Administration / Storage & Retrieval, Mathematics / Probability & Statistics / General, Computers / Data Science / Data Analytics, Computers / Artificial Intelligence / Computer Vision & Pattern Recognition, Computers / Artificial Intelligence / General, Computers / Programming / Algorithms, Computers / Information Technology, Computers / Optical Data Processing Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 3540378820 The rapid growth of the Web in the last decade makes it the largest p- licly accessible data source in the world. Web mining aims to discover u- ful information or knowledge from Web hyperlinks, page contents, and - age logs. Based on the primary kinds of data used in the mining process, Web mining tasks can be categorized into three main types: Web structure mining, Web content mining and Web usage mining. Web structure m- ing discovers knowledge from hyperlinks, which represent the structure of the Web. Web content mining extracts useful information/knowledge from Web page contents. Web usage mining mines user access patterns from usage logs, which record clicks made by every user. The goal of this book is to present these tasks, and their core mining - gorithms. The book is intended to be a text with a comprehensive cov- age, and yet, for each topic, sufficient details are given so that readers can gain a reasonably complete knowledge of its algorithms or techniques without referring to any external materials. Four of the chapters, structured data extraction, information integration, opinion mining, and Web usage mining, make this book unique. These topics are not covered by existing books, but yet they are essential to Web data mining. Traditional Web mining topics such as search, crawling and resource discovery, and link analysis are also covered in detail in this book. More Information
-
Mouse Loves Snow - Ready-to-Read Pre-Level 1
Mouse Loves Snow /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Mouse Loves Snow Ready-to-Read Pre-Level 1 by Lauren Thompson Publisher Simon and Schuster Published Date 2017-11-14 Page Count 32 Categories Juvenile Nonfiction / Readers / Intermediate, Juvenile Fiction / Animals / Mice, Hamsters, Guinea Pigs, etc, Juvenile Fiction / Concepts / Seasons, Juvenile Fiction / Family / Parents, Juvenile Fiction / Science & Nature / Weather, Juvenile Fiction / Sports & Recreation / Winter Sports, Juvenile Fiction / Social Themes / New Experience, Juvenile Fiction / Readers / Beginner, Juvenile Fiction / Imagination & Play Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1534401822 On a bright, snowy day Mouse discovers sledding, skating, and making snow mice in this beautiful Pre-Level 1 Ready-to-Read book all about winter! When Mouse and Poppa venture into the great outdoors, they discover all the seasonal pastimes that make winter a special time of year for kids. From making snow angels to building a snowman—who looks more like a snow mouse—this book is brimming with fun. Young readers are sure to enjoy Lauren Thompson’s simple, energetic text and Buket Erdogan’s sweet, playful illustrations as they learn to recognize words and begin to read on their very own! More Information
-
The Art of Computer Programming: Sorting and searching
The Art of Computer Programming: Sorting and searching /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } The Art of Computer Programming: Sorting and searching by Donald Ervin Knuth Publisher Addison-Wesley Publishing Company Published Date 1973 Page Count 723 Categories Computers / Programming / General, Computers / Languages / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 020103803X Finally, after a wait of more than thirty-five years, the first part of Volume 4 is at last ready for publication. Check out the boxed set that brings together Volumes 1 - 4A in one elegant case, and offers the purchaser a $50 discount off the price of buying the four volumes individually. The Art of Computer Programming, Volumes 1-4A Boxed Set, 3/e ISBN: 0321751043 More Information
-
Framework Design Guidelines - Conventions, Idioms, and Patterns for Reusable .NET Libraries
Framework Design Guidelines /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Framework Design Guidelines Conventions, Idioms, and Patterns for Reusable .NET Libraries by Krzysztof Cwalina, Brad Abrams Publisher Addison-Wesley Published Date 2009 Page Count 436 Categories Computers / General, Computers / Networking / General, Computers / Languages / General, Computers / Languages / .NET, Computers / Internet / Web Services & APIs Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0321545613 Framework Design Guidelines, Second Edition, teaches developers the best practices for designing reusable libraries for the Microsoft .NET Framework. Expanded and updated for .NET 3.5, this new edition focuses on the design issues that directly affect the programmability of a class library, specifically its publicly accessible APIs. This book can improve the work of any .NET developer producing code that other developers will use. It includes copious annotations to the guidelines by thirty-five prominent architects and practitioners of the .NET Framework, providing a lively discussion of the reasons for the guidelines as well as examples of when to break those guidelines. Microsoft architects Krzysztof Cwalina and Brad Abrams teach framework design from the top down. From their significant combined experience and deep insight, you will learn The general philosophy and fundamental principles of framework design Naming guidelines for the various parts of a framework Guidelines for the design and extending of types and members of types Issues affecting-and guidelines for ensuring-extensibility How (and how not) to design exceptions Guidelines for-and examples of-common framework design patterns Guidelines in this book are presented in four major forms: Do, Consider, Avoid, and Do not. These directives help focus attention on practices that should always be used, those that should generally be used, those that should rarely be used, and those that should never be used. Every guideline includes a discussion of its applicability, and most include a code example to help illuminate the dialogue. Framework Design Guidelines, Second Edition, is the only definitive source of best practices for managed code API development, direct from the architects themselves. A companion DVD includes the Designing .NET Class Libraries video series, instructional presentations by the authors on design guidelines for developing classes and components that extend the .NET Framework. A sample API specification and other useful resources and tools are also included. More Information
-
Professional Development with Web APIs - Google, eBay, Amazon.com, MapPoint, FedEx
Professional Development with Web APIs /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Professional Development with Web APIs Google, eBay, Amazon.com, MapPoint, FedEx by Denise M. Gosnell Publisher John Wiley & Sons Published Date 2008-04-21 Page Count 324 Categories Computers / Programming Languages / C#, Computers / Programming / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0470331771 Shows developers how to harness the power of services such as Google, eBay, PayPal, and Amazon.com from within an application, whether it is Web-based, Windows-based, or even a Microsoft Office application After a quick review of the basics, readers will dive into more advanced techniques such as calling the APIs from mobile devices, Office VBA programs, Windows Forms and Web applications, and even how to integrate the various APIs together for a complete solution Veteran Wrox author Denise Gosnell skillfully guides readers through the ins and outs of the various services, the anatomy of an API query, which features are available via the APIs, and how to get results from their own applicationsReaders will build two fully functional applications to apply what they have learned-one a Windows program, the other a Web application More Information
-
DVD Authoring & Production
DVD Authoring & Production /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } DVD Authoring & Production by Ralph LaBarge Publisher CMP Books Published Date 2001 Page Count 477 Categories Computers / Interactive & Multimedia Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1578200822 DVD Authoring and Production is an authoritative and comprehensive guide to publishing content in the DVD-Video, DVD-ROM, and WebDVD formats. Readers learn everything they need to create, produce, and master DVDs including a firsthand look at professional production techniques employed in the authors StarGaze DVD. Professionals and aspiring DVD artists alike learn the latest tools and techniques as well as how to succeed in the business realm of the DVD world, including optimal methods of marketing, distributing, and selling. Save time and money with the latest tools and techniques for publishing content in any DVD format. Organize, execute and sell your projects efficiently with a complete understanding of the theory and the practice. Includes a product guide and the author's StarGaze DVD. More Information
-
Optimizat︠s︡ii︠a︡
Optimizat︠s︡ii︠a︡ /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Optimizat︠s︡ii︠a︡ by Unknown Author Publisher Akademii︠a︡ nauk SSSR, Sibirskoe otd-nie, Institut matematiki Published Date 1990 Page Count 640 Categories Mathematical optimization Language RU Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN N/A No description available. More Information
-
Programowanie liniowe i nieliniowe w organizacji i zarządzaniu
Programowanie liniowe i nieliniowe w organizacji i zarządzaniu /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Programowanie liniowe i nieliniowe w organizacji i zarządzaniu by Władysław Radzikowski Publisher Wydawn. Uniwersytetu Warszawskiego Published Date 1979 Page Count 366 Categories Computer programming Language PL Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN N/A No description available. More Information
-
Algorith logic
Algorith logic /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Algorith logic by Helena Rasiowa Publisher Published Date 1977 Page Count 205 Categories Algorithms Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN N/A No description available. More Information
-
Automated Environmental Change Detection
Automated Environmental Change Detection /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Automated Environmental Change Detection by Matthew Pitman Publisher Published Date 2001 Page Count 206 Categories "C" [programming language]. Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN N/A No description available. More Information
-
An Exploratory Study of Software Cost Estimating at the Electronic Systems Divsion
An Exploratory Study of Software Cost Estimating at the Electronic Systems Divsion /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } An Exploratory Study of Software Cost Estimating at the Electronic Systems Divsion by Thomas J. Devenny Publisher U.S. Air Force Air University Published Date 1976 Page Count 152 Categories Computer programming Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN N/A No description available. More Information
-
Rootkits - Subverting the Windows Kernel
Rootkits /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Rootkits Subverting the Windows Kernel by Greg Hoglund, James Butler Publisher Addison-Wesley Professional Published Date 2006 Page Count 324 Categories Computers / Database Administration & Management, Computers / Security / Network Security, Computers / Networking / Vendor Specific, Computers / Operating Systems / General, Computers / Security / General, Computers / Internet / Online Safety & Privacy, Computers / Networking / General Language EN Average Rating 4 (based on 10 ratings) Maturity Rating No Mature Content Detected ISBN 0321294319 "It's imperative that everybody working in the field of cyber-security read this book to understand the growing threat of rootkits." --Mark Russinovich, editor, Windows IT Pro / Windows & .NET Magazine "This material is not only up-to-date, it defines up-to-date. It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding." --Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible." --Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight. "Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine. "Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned." --Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley "Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list." --Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005) Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to Understand the role of rootkits in remote command/control and software eavesdropping Build kernel rootkits that can make processes, files, and directories invisible Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects Work with layered drivers to implement keyboard sniffers and file filters Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks More Information
-
IOS Programming - The Big Nerd Ranch Guide
IOS Programming /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } IOS Programming The Big Nerd Ranch Guide by Christian Keur, Aaron Hillegass Publisher Big Nerd Ranch Published Date 2016 Page Count 461 Categories Computers / Software Development & Engineering / General, Computers / Programming / Macintosh, Computers / Programming / Mobile Devices, Language Arts & Disciplines / Study & Teaching Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0134682335 iOS Programming: The Big Nerd Ranch Guide leads readers through the essential concepts, tools, and techniques for developing iOS applications. After completing this book, students will have the know-how and the confidence you need to tackle iOS projects on their own. Based on Big Nerd Ranch's popular iOS Bootcamp course and its well-tested materials and methodology, this bestselling guide teaches iOS concepts and coding in tandem. The result is instruction that is relevant and useful. Throughout the book, the authors explain what's important and share their insights into the larger context of the iOS platform. Readers get a real understanding of how iOS development works, the many features that are available, and when and where to apply what they have learned. More Information
-
Network Security, Firewalls, and VPNs
Network Security, Firewalls, and VPNs /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Network Security, Firewalls, and VPNs by J. Michael Stewart, Denise Kinsey Publisher Jones & Bartlett Learning Published Date 2020-10-15 Page Count 481 Categories Computers / Security / Network Security Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1284183653 Network Security, Firewalls, and VPNs, third Edition provides a unique, in-depth look at the major business challenges and threats that are introduced when an organization’s network is connected to the public Internet. More Information
-
Program Governance
Program Governance /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Program Governance by Muhammad Ehsan Khan Publisher CRC Press Published Date 2014-09-05 Page Count 220 Categories Business & Economics / Project Management, Computers / Information Technology, Technology & Engineering / Engineering (General), Computers / Computer Science, Computers / Networking / General, Technology & Engineering / Environmental / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1466568917 Although program management has received much attention in recent books, program governance remains a relatively new subject. While selected books and standards touch on this important topic, few are devoted to program governance as a subject. This book fills that need.Program Governance provides a thorough understanding of governance while reviewi More Information
-
Beginning iOS Game Development
Beginning iOS Game Development /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Beginning iOS Game Development by Patrick Alessi Publisher John Wiley & Sons Published Date 2011-11-21 Page Count 408 Categories Computers / Programming / Macintosh, Computers / Programming / General Language EN Average Rating 1 (based on 1 ratings) Maturity Rating No Mature Content Detected ISBN 1118231619 Get in the game and start building games for the iPhone or iPad! Whether you only have a little experience with iOS programming or even none at all, this accessible guide is ideal for getting started developing games for the iPhone and iPad. Experienced developer and author Patrick Alessi presents the iOS system architecture, gives you the step-by-step of game development, and introduces the languages used to develop games. From the basic building blocks to including drawing, responding to user interaction, animation, and sound, this book provides a one-stop-shop for getting your game up and running. Explores the tools and methodology used to develop games for the iPhone and iPad Requires no previous experience with building a game for the iOS platform Details how iOS games require different considerations than other applications Addresses working with the Xcode programming environment, how to draw with the Quartz 2D API, ways to handle user input, and techniques for incorporating animation with Core Animation and sound with Core Audio If you're ready to jump on the gaming app bandwagon, then this book is what you need to get started! More Information
-
Unicode Explained
Unicode Explained /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Unicode Explained by Jukka K. Korpela Publisher O'Reilly Media Published Date 2006-06-21 Page Count 658 Categories Computers / General, Computers / Computer Science, Computers / Programming / General, Computers / Software Development & Engineering / General, Computers / Languages / XML, Computers / User Interfaces Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 059610121X Fundamentally, computers just deal with numbers. They store letters and other characters by assigning a number for each one. There are hundreds of different encoding systems for mapping characters to numbers, but Unicode promises a single mapping. Unicode enables a single software product or website to be targeted across multiple platforms, languages and countries without re-engineering. It's no wonder that industry giants like Apple, Hewlett-Packard, IBM andMicrosoft have all adopted Unicode. Containing everything you need to understand Unicode, this comprehensive reference from O'Reilly takes you on a detailed guide through the complex character world. For starters, it explains how to identify and classify characters - whether they're common, uncommon, or exotic. It then shows you how to type them, utilize their properties, and process character data in a robust manner. The book is broken up into three distinct parts. The first few chapters provide you with a tutorial presentation of Unicode and character data. It gives you a firm grasp of the terminology you need to reference various components, including character sets, fonts and encodings, glyphs and character repertoires. The middle section offers more detailed information about using Unicode and other character codes. It explains the principles and methods of defining character codes, describes some of the widely used codes, and presents code conversion techniques. It also discusses properties of characters, collation and sorting, line breaking rules and Unicode encodings. The final four chapters cover more advanced material, such as programming to support Unicode. You simply can't afford to be without the nuggets of valuable information detailed in Unicode Explained. More Information
-
Computer Age Statistical Inference - Algorithms, Evidence, and Data Science
Computer Age Statistical Inference /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Computer Age Statistical Inference Algorithms, Evidence, and Data Science by Bradley Efron, Trevor Hastie Publisher Cambridge University Press Published Date 2016-07-21 Page Count 496 Categories Mathematics / Probability & Statistics / General, Computers / Optical Data Processing, Computers / Artificial Intelligence / General, Social Science / Research, Medical / Epidemiology, Business & Economics / Statistics, Psychology / Assessment, Testing & Measurement Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1108107958 The twenty-first century has seen a breathtaking expansion of statistical methodology, both in scope and in influence. 'Big data', 'data science', and 'machine learning' have become familiar terms in the news, as statistical methods are brought to bear upon the enormous data sets of modern science and commerce. How did we get here? And where are we going? This book takes us on an exhilarating journey through the revolution in data analysis following the introduction of electronic computation in the 1950s. Beginning with classical inferential theories - Bayesian, frequentist, Fisherian - individual chapters take up a series of influential topics: survival analysis, logistic regression, empirical Bayes, the jackknife and bootstrap, random forests, neural networks, Markov chain Monte Carlo, inference after model selection, and dozens more. The distinctly modern approach integrates methodology and algorithms with statistical inference. The book ends with speculation on the future direction of statistics and data science. More Information
-
Cyborg - Digital Destiny and Human Possibility in the Age of the Wearable Computer
Cyborg /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Cyborg Digital Destiny and Human Possibility in the Age of the Wearable Computer by Steve Mann, Hal Niedzviecki Publisher Doubleday Canada Published Date 2001 Page Count 288 Categories Biography & Autobiography / General, Computers / Social Aspects Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0385658257 cyborg, n. a person whose physiological functioning is aided by or dependent upon a mechanical or electronic device. Steve Mann is a cyborg, and the inventor of the wearable computer, called the WearComp. He sees the world as images imprinted onto his retina by rays of laser light. This allows him to transmit his viewpoint live to the Internet, block out billboards and other unwanted visual stimuli, and turn his world into a series of hyperlinks. Constantly connected to the WearComp system, Mann has all the capabilities of a standard office at his disposal, even as he utilizes shrinking technologies to turn himself into a portable movie studio. The first person to live in total constant intimate contact with the computer, Steve Mann exists at once in the real and virtual worlds, living an entirely videographic existence, seeing everything around him, including himself, through a wearable computer. Over the past twenty years, Steve Mann has been his own human guinea pig, testing his various wearable computer prototypes on himself. In "Cyborg," he uses his own unique experiences to assess the state of wearable computers and their potential impact on our lives, articulating a vision for a tomorrow that sees humanity freer, safer, and smarter in ways most of us can only imagine. Mann is fascinated by the possibilities of the cyborg future, but he does not shrink away from frankly discussing the dangers of a post-human age in which our computers come to control us. In this unique ground-breaking book, Mann charts the development of a wearable computer industry, and warns of dangers to our liberty, privacy, and democracy. He contrasts those dangers with his own sweeping inclusive vision of a wearable computing age that brings about new ways to teach, learn, make art, communicate, and even think. Part biography, part breath-taking manifesto, part startling look into the very near future, "Cyborg" is a powerful book that challenges preconceptions and invites readers to enter the mind of one of the most fascinating thinkers of our time. More Information
-
A Primer on Scientific Programming with Python
A Primer on Scientific Programming with Python /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } A Primer on Scientific Programming with Python by Hans Petter Langtangen Publisher Springer Berlin Heidelberg Published Date 2014-08-15 Page Count 872 Categories Computers / Computer Science, Computers / Programming / General, Computers / Software Development & Engineering / General, Computers / Data Science / General, Science / Physics / Mathematical & Computational, Mathematics / Applied, Mathematics / Discrete Mathematics Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 3642549608 The book serves as a first introduction to computer programming of scientific applications, using the high-level Python language. The exposition is example and problem-oriented, where the applications are taken from mathematics, numerical calculus, statistics, physics, biology and finance. The book teaches "Matlab-style" and procedural programming as well as object-oriented programming. High school mathematics is a required background and it is advantageous to study classical and numerical one-variable calculus in parallel with reading this book. Besides learning how to program computers, the reader will also learn how to solve mathematical problems, arising in various branches of science and engineering, with the aid of numerical methods and programming. By blending programming, mathematics and scientific applications, the book lays a solid foundation for practicing computational science. From the reviews: Langtangen ... does an excellent job of introducing programming as a set of skills in problem solving. He guides the reader into thinking properly about producing program logic and data structures for modeling real-world problems using objects and functions and embracing the object-oriented paradigm. ... Summing Up: Highly recommended. F. H. Wild III, Choice, Vol. 47 (8), April 2010 Those of us who have learned scientific programming in Python ‘on the streets’ could be a little jealous of students who have the opportunity to take a course out of Langtangen’s Primer.” John D. Cook, The Mathematical Association of America, September 2011 This book goes through Python in particular, and programming in general, via tasks that scientists will likely perform. It contains valuable information for students new to scientific computing and would be the perfect bridge between an introduction to programming and an advanced course on numerical methods or computational science. Alex Small, IEEE, CiSE Vol. 14 (2), March /April 2012 More Information
-
McGraw-Hill Dictionary of Electronics and Computer Technology
McGraw-Hill Dictionary of Electronics and Computer Technology /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } McGraw-Hill Dictionary of Electronics and Computer Technology by Sybil P. Parker Publisher McGraw-Hill Published Date 1984 Page Count 582 Categories Computers Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0070454167 No description available. More Information
-
Google Earth For Dummies
Google Earth For Dummies /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Google Earth For Dummies by David A. Crowder Publisher John Wiley & Sons Published Date 2011-02-09 Page Count 368 Categories Computers / General, Computers / Computer Science Language EN Average Rating 3 (based on 5 ratings) Maturity Rating No Mature Content Detected ISBN 1118051114 Explore the world from your computer! This interesting guide covers all aspects of Google Earth, the freely downloadable application from Google that allows users to view satellite images from all points of the globe Aimed at a diverse audience, including casual users who enjoy air shots of locales as well as geographers, real estate professionals, and GPS developers Includes valuable tips on various customizations that users can add, advice on setting up scavenger hunts, and guidance on using Google Earth to benefit a business Explains modifying general options, managing the layer and placemark systems, and tackling some of the more technical aspects, such as interfacing with GPS There are more than 400,000 registered users of Google Earth and the number is still growing More Information
-
Organizational Transformation and Managing Innovation in the Fourth Industrial Revolution
Organizational Transformation and Managing Innovation in the Fourth Industrial Revolution /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Organizational Transformation and Managing Innovation in the Fourth Industrial Revolution by Guerra Guerra, Alicia Publisher IGI Global Published Date 2018-11-16 Page Count 374 Categories Business & Economics / Operations Research, Business & Economics / General, Computers / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1522570756 With the growth and advancement of business and industry, there is a growing need for the advancement of the strategies that manage these modernizations. Adaptation to advancement is essential for the success of these organizations and using the proper methods to accomplish this essential adaptation is paramount. Organizational Transformation and Managing Innovation in the Fourth Industrial Revolution provides innovative insights into the management of advancements and the implementation of strategies to accommodate these changes. The content within this publication examines social engagement, cyber-journalism, and educational innovation. It is designed for managers, consultants, academicians, researchers, and professionals, and covers topics centered on the growth of businesses and how they change alongside the economy and infrastructure. More Information