The Internet Myth retraces and challenges the myth laying at the foundations of the network ideologies - the idea that networks, by themselves, are the main agents of social, economic, political and cultural change. By comparing and integrating different sources related to network histories, this book emphasizes how a dominant narrative has extensi...
Have you ever wished you could reprogram your brain, just as a hacker would a computer? In this 3-step guide to improving your mental habits, learn to take charge of your mind and banish negative thoughts, habits, and anxiety - in just 21 days!
A seasoned author, comedian, and entrepreneur, Sir John Hargrave once suffered from unhealthy addictio...
From paintings and food to illness and icebergs, science is happening everywhere. Rather than follow the path of a syllabus or textbook, Andrew Morris takes examples from the science we see every day and uses them as entry points to explain a number of fundamental scientific concepts - from understanding colour to the nature of hormones - in ways t...
Brexit will have significant consequences for the country, for Europe, and for global order. And yet much discussion of Brexit in the UK has focused on the causes of the vote and on its consequences for the future of British politics. This volume examines the consequences of Brexit for the future of Europe and the European Union, adopting an explic...
There's a lot of outdated information on the Web that leads new PHP users astray, propagating bad practices and insecure code. PHP: The Right Way is an easy-to-read, quick reference for PHP popular coding standards, links to authoritative tutorials around the Web and what the contributors consider to be best practices at the present time.
T...
This book is based on the MOOC Responsible Innovation offered by the TU Delft. It provides a framework to reflect on the ethics and risks of new technologies. How can we make sure that innovations do justice to social and ethical values? How can we minimize (unknown) risks?
The book explains:
- The concept and importance of responsible innovati...
Cloud applications have a unique set of characteristics. They run on commodity hardware, provide services to untrusted users, and deal with unpredictable workloads. These factors impose a range of problems that you, as a designer or developer, need to resolve. Your applications must be resilient so that they can recover from failures, secure to pro...
In today's world of pervasive Internet connectivity and rapidly evolving Web technology, online security is as critical as it is challenging. With the enhanced availability of information and services online and Web-based attacks and break-ins on the rise, security risks are at an all time high. Hacking Exposed Web Applications shows you, step...