Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Access Denied
A study of Internet blocking and filtering around the world: analyses by leading researchers and survey results that document filtering practices in dozens of countries. Many countries around the world block or filter Internet content, denying access to information that they deem too sensitive for ordinary citizens - most often about politics, b...
Access Controlled
Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous "Great Firewall o...
Close Reading with Computers
Most contemporary digital studies are interested in distant-reading paradigms for large-scale literary history. This book asks what happens when such telescopic techniques function as a microscope instead. The first monograph to bring a range of computational methods to bear on a single novel in a sustained fashion, it focuses on the award-winning ...
Project Management Skills for All Careers
Project Management Skills for All Careers offers a framework for managing projects in any career area. The concepts can be applied no matter where you work. As a matter of fact, many of our dislocated workers are trained to become certified in Project Management. Project management skills are essential and invaluable for anyone who initiates or is ...
Web of Performance
If you love being involved in theatre and you're also searching for opportunities to make a positive difference in your community, this workbook was written for you. You may think that theatre and all the other things you are passionate about represent different directions in your life, but they don't have to be separate. They can converg...
Algorithmic Graph Theory and Sage
This is an introductory book on algorithmic graph theory. Theory and algorithms are illustrated using the Sage open source mathematics software....
2D Game Development: From Zero to Hero
This is a small project that aims to gather some knowledge about game development and make it available to everyone. As well as being a source of knowledge this project aims to be a learning experience for everyone involved too, by gathering contributions from the community, teaching others how to make a game, teaching algorithms but also learni...
Peer Participation and Software
Firefox, a free Web browser developed by the Mozilla Foundation, is used by an estimated 270 million people worldwide. To maintain and improve the Firefox browser, Mozilla depends not only on its team of professional programmers and managers but also on a network of volunteer technologists and enthusiasts - free/libre and open source software (FLOS...
The Internet Myth
The Internet Myth retraces and challenges the myth laying at the foundations of the network ideologies - the idea that networks, by themselves, are the main agents of social, economic, political and cultural change. By comparing and integrating different sources related to network histories, this book emphasizes how a dominant narrative has extensi...
Mind Hacking
Have you ever wished you could reprogram your brain, just as a hacker would a computer? In this 3-step guide to improving your mental habits, learn to take charge of your mind and banish negative thoughts, habits, and anxiety - in just 21 days! A seasoned author, comedian, and entrepreneur, Sir John Hargrave once suffered from unhealthy addictio...
Social Theory after the Internet
The internet has fundamentally transformed society in the past 25 years, yet existing theories of mass or interpersonal communication do not work well in understanding a digital world. Nor has this understanding been helped by disciplinary specialization and a continual focus on the latest innovations. Ralph Schroeder takes a longer-term view, synt...
Leading Cities
Leading Cities is a global review of the state of city leadership and urban governance today. Drawing on research into 202 cities in 100 countries, the book provides a broad, international evidence base grounded in the experiences of all types of cities. It offers a scholarly but also practical assessment of how cities are led, what challenges thei...
Regulating Content on Social Media
How are users influenced by social media platforms when they generate content, and does this influence affect users' compliance with copyright laws? These are pressing questions in today's internet age, and Regulating Content on Social Media answers them by analysing how the behaviours of social media users are regulated from a copyrig...
Musical Cities
Musical Cities represents an innovative approach to scholarly research and dissemination. A digital and interactive 'book', it explores the rhythms of our cities, and the role they play in our everyday urban lives, through the use of sound and music. Sara Adhitya first discusses why we should listen to urban rhythms in order to design ...
Brexit and Beyond
Brexit will have significant consequences for the country, for Europe, and for global order. And yet much discussion of Brexit in the UK has focused on the causes of the vote and on its consequences for the future of British politics. This volume examines the consequences of Brexit for the future of Europe and the European Union, adopting an explic...
Lisp Web Tales
The book is a set of tutorials and examples. It uses the Common Lisp language and some of the libraries we'll be using for the examples and tutorials include: - The hunchentoot web server - The Restas web framework - The SEXML library for outputting XML and HTML - Closure-template for HTML templating - Postmodern for PostgreSQL access, an...
Responsible Innovation
This book is based on the MOOC Responsible Innovation offered by the TU Delft. It provides a framework to reflect on the ethics and risks of new technologies. How can we make sure that innovations do justice to social and ethical values? How can we minimize (unknown) risks? The book explains: - The concept and importance of responsible innovati...
Building Real-World Cloud Apps with Windows Azure
This book walks you through a patterns-based approach to building real-world cloud solutions. The patterns apply to the development process as well as to architecture and coding practices. Developers who are curious about developing for the cloud, considering a move to the cloud, or are new to cloud development will find here a concise overview ...
Cloud Design Patterns
Cloud applications have a unique set of characteristics. They run on commodity hardware, provide services to untrusted users, and deal with unpredictable workloads. These factors impose a range of problems that you, as a designer or developer, need to resolve. Your applications must be resilient so that they can recover from failures, secure to pro...
The Kademlia Protocol Succinctly
With its novel XOR-based metric topology, Kademlia is the first peer-to-peer system to combine provable consistency and performance, latency-minimizing routing, and a symmetric, unidirectional topology. In The Kademlia Protocol Succinctly, author Marc Clifton leads readers through the positive aspects of Kademlia's decentralized specifications...
Entity Framework Core Succinctly
Entity Framework is Microsoft's flagship Object/Relation Mapper, and the recommended way to access relational databases. Entity Framework Core is a complete rewrite from the "classic" Entity Framework, building on the new multiplatform .NET Core framework and adding the ability to connect to nonrelational data sources while keeping t...
Docker Succinctly
Containers have revolutionized software development, allowing developers to bundle their applications with everything they need, from the operating system up, into a single package. Docker is one of the most popular platforms for containers, allowing them to be hosted on-premises or on the cloud, and to run on Linux, Windows, and Mac machines. With...
Cryptography in .NET Succinctly
Irresponsible ownership of data is the cause of many leaked emails, data, and other damaging information. Securing a user's personal information is the job of software developers. If you, as a developer, can decrypt the information stored in the database of the system you are working on, then so can anyone else. In Cryptography in .NET Succinc...
Implementing a Custom Language Succinctly
Custom languages provide many benefits, but many people fear the complexity that comes with trying to deploy them. Author Vassili Kaplan sweeps away the obstacles and shows how custom languages are a tool within reach of any developer. With Implementing a Custom Language Succinctly, readers will discover just how much they can accomplish with the s...
Application Security in .NET Succinctly
Security in software development should be a first-order requirement, but it's often implemented in projects as an afterthought. With Application Security in .NET Succinctly, author Stan Drapkin provides a refresher of .NET security practices and fills common knowledge gaps for experienced developers and novices alike. Learn about hashes, mach...
ASP.NET WebHooks Succinctly
Taking advantage of WebHooks is something that many developers want to achieve, but many struggle to find a starting point. In ASP.NET WebHooks Succinctly, Gaurav Arora guides readers through the necessary skills and processes to get started....
R Notes for Professionals
The R Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
PostgreSQL Notes for Professionals
The PostgreSQL Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
PHP Notes for Professionals
The PHP Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Mobile Media Learning
This book is an inspirational message about what is possible and practical in the name of learning through mobile media. We present stories from a diverse set of educators, a microcosm of the landscape of mobile media learning. Each author has found a way to create something new and beautiful in their own world. And though their results are exce...
Data Structures and Algorithms
Data Structures and Algorithms (DSA) features implementations of data structures and algorithms that are not implemented in any version of .NET. This book is the result of a series of emails sent back and forth between the two authors during the development of a library for the .NET framework of the same name. A key factor of this book and it...
Full Speed Python
This book aims to teach the Python programming language using a practical approach. Its method is quite simple: after a short introduction to each topic, the reader is invited to learn more by solving the proposed exercises. These exercises have been used extensively in my web development and distributed computing classes at the Superior School ...

1 ... 22 23 24 25 26 ... 34