The processes for gathering, organizing, analyzing, and ultimately infusing AI throughout your organization can be thought of as a ladder. A ladder helps you climb far higher than you could go on your own by turning an impossible leap into a series of steps. Knowing what the ladder looks like helps you evaluate your organization's readiness fo...
In the decade and a half since Napster first emerged, forever changing the face of digital culture, the claim that "internet pirates killed the music industry" has become so ubiquitous that it is treated as common knowledge. Piracy is a scourge on legitimate businesses and hard-working artists, we are told, a "cybercrime" simila...
he World Wide Web has now been in use for more than 20 years. From early browsers to today's principal source of information, entertainment and much else, the Web is an integral part of our daily lives, to the extent that some people believe 'if it's not online, it doesn't exist.' While this statement is not entirely true, ...
How are users influenced by social media platforms when they generate content, and does this influence affect users' compliance with copyright laws?
These are pressing questions in today's internet age, and Regulating Content on Social Media answers them by analysing how the behaviours of social media users are regulated from a copyrig...
In today's world of pervasive Internet connectivity and rapidly evolving Web technology, online security is as critical as it is challenging. With the enhanced availability of information and services online and Web-based attacks and break-ins on the rise, security risks are at an all time high. Hacking Exposed Web Applications shows you, step...
As the technology becomes more affordable, you may have interest in virtual reality (VR) as an educational tool. You may wonder, how might I use VR in my classroom or school? How do I set up a VR lab? How do I integrate VR applications into my curriculum? Is VR feasible in low resource settings? If you are eager to join the growing group of educato...
Web development is an evolving amalgamation of languages that work in concert to receive, modify, and deliver information between parties using the Internet as a mechanism of delivery.
While it is easy to describe conceptually, implementation is accompanied by an overwhelming variety of languages, platforms, templates, frameworks, guidelines, and ...
In this truly unique technical book, today's leading software architects present valuable principles on key development issues that go way beyond technology. More than four dozen architects - including Neal Ford, Michael Nygard, and Bill de hOra - offer advice for communicating with stakeholders, eliminating complexity, empowering developers, ...
While many resources for network and IT security are available, detailed knowledge regarding modern web application security has been lacking - until now. This practical guide provides both offensive and defensive security concepts that software engineers can easily learn and apply.
Andrew Hoffman, a senior security engineer at Salesforce, intro...
So you're a manager, or at least you want to be, and you're looking for a good roadmap to help you prepare. If you want to be the kind of manager people really admire, this ebook is a good place to start. Instead of tactics and solutions, author Robert Hoekman, Jr. provides you with a belief system - an approach to solutions that you can ...
This open book develops a framework for advancing agroecology transformations focusing on power, politics and governance. It explores the potential of agroecology as a sustainable and socially just alternative to today's dominant food regime. Agroecology is an ecological approach to farming that addresses climate change and biodiversity loss w...
This open book provides a concise introduction to economic approaches and mathematical methods for the study of water allocation and distribution problems. Written in an accessible and straightforward style, it discusses and analyzes central issues in integrated water resource management, water tariffs, water markets, and transboundary water manage...
This open book summarizes the first two decades of the NII Testbeds and Community for Information access Research (NTCIR). NTCIR is a series of evaluation forums run by a global team of researchers and hosted by the National Institute of Informatics (NII), Japan. The book is unique in that it discusses not just what was done at NTCIR, but also how ...
This open volume surveys the state of the field to examine whether a fifth wave of deterrence theory is emerging. Bringing together insights from world-leading experts from three continents, the volume identifies the most pressing strategic challenges, frames theoretical concepts, and describes new strategies.
The use and utility of deterrence in...
This open book summarizes the research done and results obtained in the second funding phase of the Priority Program 1648 "Software for Exascale Computing" (SPPEXA) of the German Research Foundation (DFG) presented at the SPPEXA Symposium in Dresden during October 21-23, 2019.
In that respect, it both represents a continuation of Vol. 1...
This open book takes a critical and international perspective to the mainstreaming of the Global Citizenship Concept and analyses the key issues regarding global citizenship education across the world. In that respect, it addresses a pressing need to provide further conceptual input and to open global citizenship agendas to diversity and indigeneit...
Kubernetes has become the operating system of today's cloud native world, providing a reliable and scalable platform for running containerized workloads. In this friendly, pragmatic book, cloud experts Justin Domingus and John Arundel show you what Kubernetes can do-and what you can do with it.
This updated second edition guides you through...
HD movies and videos, gigabyte photo and music collections, extreme games ... today's digital content is bigger and better than ever. And now you (and many others!) are interacting with this content simultaneously on an expanding range of Wi-Fi devices, from smartphones, tablets, and laptops to consumer electronics and appliances. The Wi-Fi of...
Existing textbooks on international relations treat history in a cursory fashion and perpetuate a Euro-centric perspective. This textbook pioneers a new approach by historicizing the material traditionally taught in International Relations courses, and by explicitly focusing on non-European cases, debates and issues. The volume is divided into thre...
The Lightning Network (LN) is a rapidly growing second-layer payment protocol that works on top of Bitcoin to provide near-instantaneous transactions between two parties. With this practical guide, authors Andreas M. Antonopoulos, Olaoluwa Osuntokun, and Rene Pickhardt explain how this advancement will enable the next level of scale for Bitcoin, in...
As we develop the applications to meet current and future needs, it is only natural to use current best practices and techniques for our designs and implementations. In the quest to improve how we develop, we can access a true wealth of information which is available on design patterns, object-oriented analysis, low-level code techniques and langua...
The European Experience brings together the expertise of nearly a hundred historians from eight European universities to internationalise and diversify the study of modern European history, exploring a grand sweep of time from 1500 to 2000. Offering a valuable corrective to the Anglocentric narratives of previous English-language textbooks, scholar...
Understanding the music industry as it exists today requires an understanding of how it developed over time. Today's music industry would most certainly not be the one anybody would design from scratch. It has many inefficiencies and quirks that reflect the economic pressures and musical concerns of bygone ages.
The history of music is clos...
DevOps engineers, developers, and security engineers have ever-changing roles to play in today's cloud native world. In order to build secure and resilient applications, you have to be equipped with security knowledge. Enter security as code.
In this book, authors BK Sarthak Das and Virginia Chu demonstrate how to use this methodology to se...