Filter
(found 6653 products)
Book cover image
Since its launch in 2006, Twitter has served as a major platform for political performance, social justice activism, and large-scale public debates over race, ethnicity, gender, sexuality, and nationality. It has empowered minoritarian groups to organize protests, articulate often-underrepresented perspectives, and form community. It has also spread hashtags that have ...
#identity: Hashtagging Race, Gender, Sexuality, and Nation
Since its launch in 2006, Twitter has served as a major platform for political performance, social justice activism, and large-scale public debates over race, ethnicity, gender, sexuality, and nationality. It has empowered minoritarian groups to organize protests, articulate often-underrepresented perspectives, and form community. It has also spread hashtags that have been used to bully and silence women, people of color, and LGBTQ people. #identity is among the first scholarly books to address the positive and negative effects of Twitter on our contemporary world. Hailing from diverse scholarly fields, all contributors are affiliated with The Color of New Media, a scholarly collective based at the University of California, Berkeley. The Color of New Media explores the intersections of new media studies, critical race theory, gender and women's studies, and postcolonial studies. The essays in #identity consider topics such asthe social justice movements organized through #BlackLivesMatter, #Ferguson, and #SayHerName; the controversies around #WhyIStayed and #CancelColbert; Twitter use in India and Africa; the integration of hashtags such as #nohomo and #onfleek that have become part of everyday online vernacular; and other ways in which Twitter has been used by, for, and against women, people of color, LGBTQ, and Global South communities. Collectively, the essays in this volume offer a critically interdisciplinary view of how and why social media has been at the heart of U.S. and global political discourse for over a decade.
https://magrudy-assets.storage.googleapis.com/9780472054152.jpg
36.700000 USD

#identity: Hashtagging Race, Gender, Sexuality, and Nation

Paperback / softback
Book cover image
The internet of things (IoT) revolution has given rise to smart cities and villages all over the world. With technology advancements such as cloud computing, fog computing, and software-defined networking, it is necessary to examine ways that these environments can implement innovation for cost-effective citizen services and e-governance. Also, as ...
Handbook of Research on Implementation and Deployment of IoT Projects in Smart Cities
The internet of things (IoT) revolution has given rise to smart cities and villages all over the world. With technology advancements such as cloud computing, fog computing, and software-defined networking, it is necessary to examine ways that these environments can implement innovation for cost-effective citizen services and e-governance. Also, as cyber-physical systems are becoming more vulnerable with IoT attacks threatening their security and privacy, there is an even greater need for solutions that offer protection for all of these advancing technologies. The Handbook of Research on Implementation and Deployment of IoT Projects in Smart Cities is an essential research publication that combines theory and practice, reflecting on advancing technologies for the automation, protection, and sustainability of urban environments. Highlighting a wide range of topics such as blockchain, smart grid, and sustainability, this book is ideal for researchers, academicians, scientists, engineers, programmers, IT consultants, professionals, and policymakers.
https://magrudy-assets.storage.googleapis.com/9781522591993.jpg
309.750000 USD

Handbook of Research on Implementation and Deployment of IoT Projects in Smart Cities

Hardback
Book cover image
Thanks to Facebook and Instagram, our childhoods have been captured and preserved online, never to go away. But what happens when we can't leave our most embarrassing moments behind? Until recently, the awkward moments of growing up could be forgotten. But today we may be on the verge of losing ...
The End of Forgetting: Growing Up with Social Media
Thanks to Facebook and Instagram, our childhoods have been captured and preserved online, never to go away. But what happens when we can't leave our most embarrassing moments behind? Until recently, the awkward moments of growing up could be forgotten. But today we may be on the verge of losing the ability to leave our pasts behind. In The End of Forgetting, Kate Eichhorn explores what happens when images of our younger selves persist, often remaining just a click away. For today's teenagers, many of whom spend hours each day posting on social media platforms, efforts to move beyond moments they regret face new and seemingly insurmountable obstacles. Unlike a high school yearbook or a shoe box full of old photos, the information that accumulates on social media is here to stay. What was once fleeting is now documented and tagged, always ready to surface and interrupt our future lives. Moreover, new innovations such as automated facial recognition also mean that the reappearance of our past is increasingly out of our control. Historically, growing up has been about moving on-achieving a safe distance from painful events that typically mark childhood and adolescence. But what happens when one remains tethered to the past? From the earliest days of the internet, critics have been concerned that it would endanger the innocence of childhood. The greater danger, Eichhorn warns, may ultimately be what happens when young adults find they are unable to distance themselves from their pasts. Rather than a childhood cut short by a premature loss of innocence, the real crisis of the digital age may be the specter of a childhood that can never be forgotten.
https://magrudy-assets.storage.googleapis.com/9780674976696.jpg
32.34 USD

The End of Forgetting: Growing Up with Social Media

by Kate Eichhorn
Hardback
Book cover image
Currently, the demand by consumption of agricultural products may be predicted quantitatively; moreover, the variation of harvest and production by the change of a farm's cultivated area, weather change, disease, insect damage, etc. is a challenge that has led to improper control of the supply and demand of agricultural products. ...
IoT and WSN Applications for Modern Agricultural Advancements: Emerging Research and Opportunities
Currently, the demand by consumption of agricultural products may be predicted quantitatively; moreover, the variation of harvest and production by the change of a farm's cultivated area, weather change, disease, insect damage, etc. is a challenge that has led to improper control of the supply and demand of agricultural products. Advancements in IoT and wireless sensor networks in precision agriculture and the cloud computing technology needed to deploy them can be used to address and solve these issues. IoT and WSN Applications for Modern Agricultural Advancements: Emerging Research and Opportunities is an essential research book that focuses on the development of effective data-computing operations on agricultural advancements that are fully supported by IoT, cloud computing, and wireless sensor network systems and explores prospective applications of computing, analytics, and networking in various interdisciplinary domains of engineering. Featuring a range of topics such as power monitoring, healthcare, and GIS, this book is ideal for IT practitioners, farmers, network analysts, researchers, professionals, academicians, industry experts, and students.
https://magrudy-assets.storage.googleapis.com/9781522590040.jpg
183.750000 USD

IoT and WSN Applications for Modern Agricultural Advancements: Emerging Research and Opportunities

Hardback
Book cover image
Understand the crux of legacy systems-their architecture, analysis, and security constraints Key Features Understand what legacy systems are and strategies for their maintenance Explore basic and advanced architectures of legacy systems Discover how to analyze and secure legacy systems Book DescriptionThe IT industry is constantly evolving with the introduction of ...
Working with Legacy Systems: A practical guide to looking after and maintaining the systems we inherit
Understand the crux of legacy systems-their architecture, analysis, and security constraints Key Features Understand what legacy systems are and strategies for their maintenance Explore basic and advanced architectures of legacy systems Discover how to analyze and secure legacy systems Book DescriptionThe IT industry is constantly evolving with the introduction of new technologies. While it is important to keep up with advancements, maintaining legacy systems is equally necessary to ensure that the infrastructure of your organization functions to the best of its ability. Sound knowledge of techniques that can be used for maintaining legacy systems can help you avoid common pitfalls. The book begins with a quick overview of what a real legacy system looks like, how it works, and common issues that may be faced when trying to maintaining it. You'll then explore the architecture of a legacy system in detail and understand each of its components. As you progress, you'll discover a variety of techniques for analyzing a legacy system and how to apply them. Once you get to grips with the security constraints associated with legacy systems, you'll explore ways to secure them. Finally, you'll be able to easily make changes in legacy systems to enhance their performance. By the end of this book, you'll have developed the skills and confidence to work with legacy systems and efficiently maintain them. What you will learn Perform static and dynamic analyses of legacy systems Implement best practices to secure your legacy systems Use techniques such as data cleansing and process cleansing to stabilize your system Apply structural changes in your legacy system to make it highly available Identify and resolve common issues with legacy systems Understand a variety of tests that can help you secure and maintain legacy systems Who this book is forIf you're new to working with legacy systems and want to understand how they work and how to maintain them, this book is for you.
https://magrudy-assets.storage.googleapis.com/9781838982560.jpg
26.240000 USD

Working with Legacy Systems: A practical guide to looking after and maintaining the systems we inherit

by Robert Annett
Paperback / softback
Book cover image
'Masterful . . . [Thompson] illuminates both the fascinating coders and the bewildering technological forces that are transforming the world in which we live.' David Grann, author of The Lost City of Z Facebook's algorithms shaping the news. Uber's cars flocking the streets. Revolution on Twitter and romance on Tinder. ...
Coders: Who They Are, What They Think and How They Are Changing Our World
'Masterful . . . [Thompson] illuminates both the fascinating coders and the bewildering technological forces that are transforming the world in which we live.' David Grann, author of The Lost City of Z Facebook's algorithms shaping the news. Uber's cars flocking the streets. Revolution on Twitter and romance on Tinder. We live in a world constructed of computer code. Coders - software programmers - are the people who built it for us. And yet their worlds and minds are little known to outsiders. In Coders, Wired columnist Clive Thompson presents a brilliantly original anthropological reckoning with the most influential tribe in today's world, interrogating who they are, how they think, what they value, what qualifies as greatness in their world, and what should give us pause. One of the most prominent journalists writing on technology today, Clive Thompson takes us into the minds of coders, the most quietly influential people on the planet, in a journey into the heart of the machine - and the men and women who made it.
https://magrudy-assets.storage.googleapis.com/9781529018981.jpg
34.12 USD

Coders: Who They Are, What They Think and How They Are Changing Our World

by Clive Thompson
Hardback
Book cover image
Design a complete Voice over IP (VoIP) or traditional PBX system with Asterisk, even if you have only basic telecommunications knowledge. This bestselling guide makes it easy with a detailed roadmap that shows you how to install and configure this open source software, whether you're upgrading your existing phone system ...
Asterisk: The Definitive Guide: Open Source Telephony for the Enterprise
Design a complete Voice over IP (VoIP) or traditional PBX system with Asterisk, even if you have only basic telecommunications knowledge. This bestselling guide makes it easy with a detailed roadmap that shows you how to install and configure this open source software, whether you're upgrading your existing phone system or starting from scratch. Ideal for Linux administrators, developers, and power users, this updated fifth edition shows you how to set up VoIP-based private telephone switching systems within the enterprise. You'll get up to speed on the features in Asterisk 16, the latest long-term support release from Digium. This book also includes new chapters on WebRTC and the Asterisk Real-time Interface (ARI). Discover how WebRTC provides a new direction for Asterisk Gain the knowledge to build a simple but complete phone system Build an interactive dialplan, using best practices for Asterisk's advanced features Learn how ARI has emerged as the API of choice for interfacing web development languages with Asterisk
https://magrudy-assets.storage.googleapis.com/9781492031604.jpg
88.71 USD

Asterisk: The Definitive Guide: Open Source Telephony for the Enterprise

by Leif Madsen, Russell Bryant, Jim Van Muggelen
Paperback / softback
Book cover image
Elm brings the safety and stability of functional programing to front-end development, making it one of the most popular new languages. Elm's functional nature and static typing means that run-time errors are nearly impossible, and it compiles to JavaScript for easy web deployment. This book helps you take advantage of ...
Programming Elm
Elm brings the safety and stability of functional programing to front-end development, making it one of the most popular new languages. Elm's functional nature and static typing means that run-time errors are nearly impossible, and it compiles to JavaScript for easy web deployment. This book helps you take advantage of this new language in your web site development. Learn how the Elm Architecture will help you create fast applications. Discover how to integrate Elm with JavaScript so you can update legacy applications. See how Elm tooling makes deployment quicker and easier. Functional programming offers safer applications with decreased runtime errors, but functional solutions that are type safe and easy to use have been hard to find, until the Elm language. Elm has the benefits of functional languages while compiling to JavaScript. This book provides a complete tutorial for the Elm language, starting with a simple static application that introduces Elm syntax, modules, and the virtual DOM, to exploring how to create a UI using functions. See how Elm handles the issues of state in functional languages. You'll continue to build up larger applications involving HTTP requests for communication. Integrate your Elm applications with JavaScript so you can update legacy applications or take advantage of JavaScript resources. Elm also provides built-in tooling to alleviate the tooling creep that's so common in JavaScript. This book covers Elm's deployment and testing tools that ease development confusion. Dive into advanced concepts including creating single-page applications, and creating performance improvements. Elm expert Jeremy Fairbank brings his years of web development experience to teaching how to use Elm for front-end development. Your web UIs will be faster, safer, and easier to develop with Elm and this tutorial. What You Need: You will need the latest version of Elm, 0.18, along with a browser to run the examples in this book.
https://magrudy-assets.storage.googleapis.com/9781680502855.jpg
56.29 USD

Programming Elm

by Jeremy Fairbank
Paperback / softback
Book cover image
DESCRIPTION In today's world, user interfaces have to be highly dynamic, asynchronous, and reliable. To meet these demands, the programming world is undergoing a radical shift towards something called Functional Reactive Programming (FRP), or just Reactive Programming. FRP offers programmers a new way to construct their applications so that they ...
RxJava for Android Developers
DESCRIPTION In today's world, user interfaces have to be highly dynamic, asynchronous, and reliable. To meet these demands, the programming world is undergoing a radical shift towards something called Functional Reactive Programming (FRP), or just Reactive Programming. FRP offers programmers a new way to construct their applications so that they respond directly to change. And developers spend less time tracing obscure problems and more time focusing on what their code should be doing. Grokking Reactive User Interfaces teaches programmers a new way ofthinking about programs and data as well as how to build robust and extensible user interfaces. This well-illustrated book presents lots of concrete, real-world problems and then shows how FRP helps to solve them. It begins by looking at examples that get readers into the mindset of data flows and goes on to introduce the concept of a View Model. Readers also learn how FRP enables them to better manage change and introduce new features. The final part of this book focuses on higherlevel application design concerns and strategies as you look at architectural approaches and frameworks that work well with FRP thinking. KEY FEATURES* Provides lots of illustrations and real-life app examples * Teaches a new way of thinking about programs and data * Using FRP in day-to-day programming * Teaches how to handle increasing complexity in UIs AUDIENCE Readers should have a basic understanding of mobile UI development and be familiar with traditional object-oriented programming paradigms. ABOUT THE TECHNOLOGY FRP offers a new way to construct applications so that they respond directly to change. FRP is not a typical technology B that obviously and immediately replaces an inferior technology A. It's more of a way of thinking rather than a mechanical solution.
https://magrudy-assets.storage.googleapis.com/9781617293368.jpg
41.50 USD

RxJava for Android Developers

by Timo Tuominen
Paperback / softback
Book cover image
We live in a world increasingly ruled by technology; we seem as governed by technology as we do by laws and regulations. Frighteningly often, the influence of technology in and on our lives goes completely unchallenged by citizens and governments. We comfort ourselves with the soothing refrain that technology has ...
Rage Inside the Machine: The Prejudice of Algorithms, and How to Stop the Internet Making Bigots of Us All
We live in a world increasingly ruled by technology; we seem as governed by technology as we do by laws and regulations. Frighteningly often, the influence of technology in and on our lives goes completely unchallenged by citizens and governments. We comfort ourselves with the soothing refrain that technology has no morals and can display no prejudice, and it's only the users of technology who distort certain aspects of it. But is this statement actually true? Dr Robert Smith thinks it is dangerously untrue in the modern era. Having worked in the field of artificial intelligence for over 30 years, Smith reveals the mounting evidence that the mechanical actors in our lives do indeed have, or at least express, morals: they're just not the morals of the progressive modern society that we imagined we were moving towards. Instead, as we are just beginning to see - in the US elections and Brexit to name but a few - there are increasing incidences of machine bigotry, greed and the crass manipulation of our basest instincts. It is easy to assume that these are the result of programmer prejudices or the product of dark forces manipulating the masses through the network of the Internet. But what if there is something more fundamental and explicitly mechanical at play, something inherent within technology itself? This book demonstrates how non-scientific ideas have been encoded deep into our technological infrastructure. Offering a rigorous, fresh perspective on how technology has brought us to this place, Rage Inside the Machine challenges the long-held assumption that technology is an apolitical and amoral force. Shedding light on little-known historical stories and investigating the complex connections between scientific philosophy, institutional prejudice and new technology, this book offers a new, honest and more truly scientific vision of ourselves.
https://magrudy-assets.storage.googleapis.com/9781472963888.jpg
34.12 USD

Rage Inside the Machine: The Prejudice of Algorithms, and How to Stop the Internet Making Bigots of Us All

by Robert Elliott Smith
Hardback
Book cover image
As the internet and its applications grow more sophisticated and widespread, so too do the strategies of modern terrorist groups. The existence of the dark web adds to the online arsenal of groups using digital networks and sites to promulgate ideology or recruit supporters. It is necessary to understand how ...
Utilization of New Technologies in Global Terror: Emerging Research and Opportunities
As the internet and its applications grow more sophisticated and widespread, so too do the strategies of modern terrorist groups. The existence of the dark web adds to the online arsenal of groups using digital networks and sites to promulgate ideology or recruit supporters. It is necessary to understand how terrorist cells are using and adapting online tools in order to counteract their efforts. Utilization of New Technologies in Global Terror: Emerging Research and Opportunities is an informative resource that explores new developments in technological advancements and the progression of terror organizations while also examining non-government activist organizations and their new role in protecting internet freedom and combating cyberterrorism. Featuring relevant topics such as social media, cyber threats, and counterterrorism, this publication will benefit government officials, political scientists, policymakers, researchers, academicians, and graduate students interested in political science, mass communication, and cyberwarfare.
https://magrudy-assets.storage.googleapis.com/9781522588764.jpg
141.750000 USD

Utilization of New Technologies in Global Terror: Emerging Research and Opportunities

by Emily B. Stacey
Hardback
Book cover image
With the internet, smartphones, and video games easily available to increasing portions of society, researchers are becoming concerned with the potential side effects and consequences of their prevalence in people's daily lives. Many individuals are losing control of their internet use, using it and other devices excessively to the point ...
Multifaceted Approach to Digital Addiction and Its Treatment
With the internet, smartphones, and video games easily available to increasing portions of society, researchers are becoming concerned with the potential side effects and consequences of their prevalence in people's daily lives. Many individuals are losing control of their internet use, using it and other devices excessively to the point that they negatively affect their wellbeing as these individuals withdraw from social life and use their devices to escape from the pressure of the real world. As such, it is imperative to seek new methods and strategies for identifying and treating individuals with digital addictions. Multifaceted Approach to Digital Addiction and Its Treatment is an essential research publication that explores the definition and different types of digital addiction, including internet addiction, smartphone addiction, and online gaming addition, and examines overall treatment approaches while covering sample cases by practitioners working with digital addiction. This book highlights topics such as neuroscience, pharmacology, and psychodynamics. It is ideal for psychologists, therapists, psychiatrists, counselors, health professionals, students, educators, researchers, and practitioners.
https://magrudy-assets.storage.googleapis.com/9781522584490.jpg
236.250000 USD

Multifaceted Approach to Digital Addiction and Its Treatment

Hardback
Book cover image
No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider. Did you know that these twenty-six words are responsible for much of America's multibillion-dollar online industry? What we can and cannot write, say, and ...
The Twenty-Six Words That Created the Internet
No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider. Did you know that these twenty-six words are responsible for much of America's multibillion-dollar online industry? What we can and cannot write, say, and do online is based on just one law-a law that protects online services from lawsuits based on user content. Jeff Kosseff exposes the workings of Section 230 of the Communications Decency Act, which has lived mostly in the shadows since its enshrinement in 1996. Because many segments of American society now exist largely online, Kosseff argues that we need to understand and pay attention to what Section 230 really means and how it affects what we like, share, and comment upon every day. The Twenty-Six Words That Created the Internet tells the story of the institutions that flourished as a result of this powerful statute. It introduces us to those who created the law, those who advocated for it, and those involved in some of the most prominent cases decided under the law. Kosseff assesses the law that has facilitated freedom of online speech, trolling, and much more. His keen eye for the law, combined with his background as an award-winning journalist, demystifies a statute that affects all our lives -for good and for ill. While Section 230 may be imperfect and in need of refinement, Kosseff maintains that it is necessary to foster free speech and innovation. For filings from many of the cases discussed in the book and updates about Section 230, visit jeffkosseff.com
https://magrudy-assets.storage.googleapis.com/9781501714412.jpg
28.300000 USD

The Twenty-Six Words That Created the Internet

by Jeff Kosseff
Hardback
Book cover image
ReasonML is a new, type-safe, functional language that compiles to efficient, readable JavaScript. ReasonML interoperates with existing JavaScript libraries and works especially well with React, one of the most popular front-end frameworks. Learn how to take advantage of the power of a functional language while keeping the flexibility of the ...
Web Development with ReasonML
ReasonML is a new, type-safe, functional language that compiles to efficient, readable JavaScript. ReasonML interoperates with existing JavaScript libraries and works especially well with React, one of the most popular front-end frameworks. Learn how to take advantage of the power of a functional language while keeping the flexibility of the whole JavaScript ecosystem. Move beyond theory and get things done faster and more reliably with ReasonML today. ReasonML is a new syntax for OCaml, a battle-tested programming language used in industry for over 20 years. Designed to be familiar to JavaScript programmers, ReasonML code compiles to highly readable JavaScript. With ReasonML, you get OCaml's powerful functional programming features: a strong static type system with an excellent type inference engine, pattern matching, and features for functional programming with immutable variables. ReasonML also allows flexibility with opt-in side effects, mutation, and object-oriented programming. ReasonML hits the sweet spot between the pure theoretical world and the laissez-faire approach of JavaScript. Start using ReasonML's powerful type system as you learn the essentials of the language: variables and arithmetic operations. Gain expressive power as you write functions with named parameters and currying. Define your own data types, and integrate all these capabilities into a simple web page. Take advantage of ReasonML's functional data structures with map and reduce functions. Discover new ways to write algorithms with ReasonML's recursion support. Interoperate with existing JavaScript libraries with bindings, and write reactive web applications using ReasonML in tandem with React. Reinforce concepts with examples that range from short, tightly focused functions to complete programs, and practice your new skills with exercises in each chapter. With ReasonML, harness the awesome power of a functional language while retaining the best features of JavaScript to produce concise, fast, type-safe programs. What You Need: You'll need to have node.js (version 10.0 or above) and npm (version 5.6 or above). Once you install the bs-platform package and fire up a text editor, you're ready to go. (There are plugins for many popular editors that will make editing easier.)
https://magrudy-assets.storage.googleapis.com/9781680506334.jpg
63.12 USD

Web Development with ReasonML

by J. David Eisenberg
Paperback / softback
Book cover image
'Masterful . . . [Thompson] illuminates both the fascinating coders and the bewildering technological forces that are transforming the world in which we live.' David Grann, author of The Lost City of Z Facebook's algorithms shaping the news. Uber's cars flocking the streets. Revolution on Twitter and romance on Tinder. ...
Coders: Who They Are, What They Think and How They Are Changing Our World
'Masterful . . . [Thompson] illuminates both the fascinating coders and the bewildering technological forces that are transforming the world in which we live.' David Grann, author of The Lost City of Z Facebook's algorithms shaping the news. Uber's cars flocking the streets. Revolution on Twitter and romance on Tinder. We live in a world constructed of computer code. Coders - software programmers - are the people who built it for us. And yet their worlds and minds are little known to outsiders. In Coders, Wired columnist Clive Thompson presents a brilliantly original anthropological reckoning with the most influential tribe in today's world, interrogating who they are, how they think, what they value, what qualifies as greatness in their world, and what should give us pause. One of the most prominent journalists writing on technology today, Clive Thompson takes us into the minds of coders, the most quietly influential people on the planet, in a journey into the heart of the machine - and the men and women who made it.
https://magrudy-assets.storage.googleapis.com/9781529018998.jpg
23.62 USD

Coders: Who They Are, What They Think and How They Are Changing Our World

by Clive Thompson
Paperback / softback
Book cover image
WebAssembly fulfills the long-awaited promise of web technologies: fast code, type-safe at compile time, execution in the browser, on embedded devices, or anywhere else. Rust delivers the power of C in a language that strictly enforces type safety. Combine both languages and you can write for the web like never ...
Programming WebAssembly with Rust
WebAssembly fulfills the long-awaited promise of web technologies: fast code, type-safe at compile time, execution in the browser, on embedded devices, or anywhere else. Rust delivers the power of C in a language that strictly enforces type safety. Combine both languages and you can write for the web like never before! Learn how to integrate with JavaScript, run code on platforms other than the browser, and take a step into IoT. Discover the easy way to build cross-platform applications without sacrificing power, and change the way you write code for the web. WebAssembly is more than just a revolutionary new technology. It's reshaping how we build applications for the web and beyond. Where technologies like ActiveX and Flash have failed, you can now write code in whatever language you prefer and compile to WebAssembly for fast, type-safe code that runs in the browser, on mobile devices, embedded devices, and more. Combining WebAssembly's portable, high-performance modules with Rust's safety and power is a perfect development combination. Learn how WebAssembly's stack machine architecture works, install low-level wasm tools, and discover the dark art of writing raw wast code. Build on that foundation and learn how to compile WebAssembly modules from Rust by implementing the logic for a checkers game. Create wasm modules in Rust to interoperate with JavaScript in many compelling ways. Apply your new skills to the world of non-web hosts, and create everything from an app running on a Raspberry Pi that controls a lighting system, to a fully-functioning online multiplayer game engine where developers upload their own arena-bound WebAssembly combat modules. Get started with WebAssembly today, and change the way you think about the web. What You Need: You'll need a Linux, Mac, or Windows workstation with an Internet connection. You'll need an up-to-date web browser that supports WebAssembly. To work with the sample code, you can use your favorite text editor or IDE. The book will guide you through installing the Rust and WebAssembly tools needed for each chapter.
https://magrudy-assets.storage.googleapis.com/9781680506365.jpg
63.12 USD

Programming WebAssembly with Rust

by Kevin Hoffman
Paperback / softback
Book cover image
The Internet of Things is all about communications-between objects and machines instead of people. The technology powering this revolution is often referred to as machine-to-machine or M2M. We will soon see tens of billions of IoT connected devices worldwide. The result will be a more efficient, more sustainable world. M2M ...
Plunkett's Internet of Things (IoT) & Machine-to-Machine (M2M) Industry Almanac 2019
The Internet of Things is all about communications-between objects and machines instead of people. The technology powering this revolution is often referred to as machine-to-machine or M2M. We will soon see tens of billions of IoT connected devices worldwide. The result will be a more efficient, more sustainable world. M2M can be as simple as a refrigerator that lets a smartphone app know when you are running low on milk (via Wi-Fi) to a vast, exceedingly complex network of wireless devices connecting all devices in a massive factory. M2M systems that automatically collect data from patients' bedsides; analyze, chart and store that data; and make the data available to doctors or nurses so that they may take any necessary actions are becoming increasingly powerful. Elsewhere, remote sensors can monitor and transmit the stress level or metal fatigue in a highway bridge or an aircraft wing, or monitor manufacturing processes and product quality in a factory. In our age of growing focus on environmental quality, they can be designed to analyze surrounding air for chemicals, pollutants or particles. Energy efficiency is going to benefit greatly, particularly in newly-built offices and factories. General Electric, Microsoft, Intel and many other top global firms are investing billions of dollars in M2M. The end result will be more reliability, greater safety, sustainability and efficiency in everything from industrial plants to personal cars to air conditioners and agricultural fields.
https://magrudy-assets.storage.googleapis.com/9781628315158.jpg
398.990000 USD

Plunkett's Internet of Things (IoT) & Machine-to-Machine (M2M) Industry Almanac 2019

by Jack W. Plunkett
Paperback / softback
Book cover image
The Esri ArcGIS Desktop Professional Certification Study Guide is tailored to meet the preparation needs of candidates taking the latest ArcGIS Desktop Professional exam, which uses the 10.5 software version. Designed for those familiar with GIS concepts and the ArcGIS platform, this study guide prepares candidates for certification as professional ...
Esri ArcGIS Desktop Professional Certification Study Guide
The Esri ArcGIS Desktop Professional Certification Study Guide is tailored to meet the preparation needs of candidates taking the latest ArcGIS Desktop Professional exam, which uses the 10.5 software version. Designed for those familiar with GIS concepts and the ArcGIS platform, this study guide prepares candidates for certification as professional users. Each comprehensive chapter covers a section of the exam and integrates the tested GIS concepts with authentic application for reinforced learning. For each exam objective, the study guide uses an easy-to-follow format: * Prepare-topics in the ArcGIS documentation that candidates need to know for the exam; * Practice-tasks to perform, or links to resources, including web courses, to get hands-on software practice; and * Skills check-in-a list of tasks that candidates should be able to perform. The Esri ArcGIS Desktop Professional Certification Study Guide points to existing resources whenever possible to ensure the book is always current and that candidates have the most relevant, up-to-date resources when preparing for the exam. Written by a senior instructor at Esri, the Esri ArcGIS Desktop Professional Certification Study Guide fulfills candidates' need for a complete, consolidated resource to confidently master the exam and pursue GIS-related professional development.
https://magrudy-assets.storage.googleapis.com/9781589485358.jpg
52.490000 USD

Esri ArcGIS Desktop Professional Certification Study Guide

by Mike Flanagan
Paperback / softback
Book cover image
The Only Official Google Cloud Study Guide The Official?Google Cloud Certified Associate Cloud Engineer Study Guide, provides everything you need to prepare for this important exam and master the skills necessary to land that coveted Google Cloud Engineering certification. Beginning with a pre-book assessment quiz to evaluate what you know ...
Official Google Cloud Certified Associate Cloud Engineer Study Guide
The Only Official Google Cloud Study Guide The Official?Google Cloud Certified Associate Cloud Engineer Study Guide, provides everything you need to prepare for this important exam and master the skills necessary to land that coveted Google Cloud Engineering certification. Beginning with a pre-book assessment quiz to evaluate what you know before you begin, each chapter features exam objectives and review questions, plus the online learning environment includes additional complete practice tests. Written by Dan Sullivan, a popular and experienced online course author for machine learning, big data, and Cloud topics, Official Google Cloud Certified Associate Cloud Engineer Study Guide is your ace in the hole for deploying and managing Google Cloud Services.? Select the right Google service from the various choices based on the application to be built Compute with Cloud VMs and managing VMs Plan and deploying storage Network and configure access and security Google Cloud Platform is a leading public cloud that provides its users to many of the same software, hardware, and networking infrastructure used to power Google services. Businesses, organizations, and individuals can launch servers in minutes, store petabytes of data, and implement global virtual clouds with the Google Cloud Platform. Certified Associate Cloud Engineers have demonstrated the knowledge and skills needed to deploy and operate infrastructure, services, and networks in the Google Cloud. This exam guide is designed to help you understand the Google Cloud Platform in depth so that you can meet the needs of those operating resources in the Google Cloud.
https://magrudy-assets.storage.googleapis.com/9781119564416.jpg
52.500000 USD

Official Google Cloud Certified Associate Cloud Engineer Study Guide

by Dan Sullivan
Paperback / softback
Book cover image
This book provides a solid, encompassing definition of Internet memes, exploring both the common features of memes around the globe and their particular regional traits. It identifies and explains the roles that these viral texts play in Internet communication: cultural, social and political implications; significance for self-representation and identity formation; ...
Internet Memes and Society: Social, Cultural, and Political Contexts
This book provides a solid, encompassing definition of Internet memes, exploring both the common features of memes around the globe and their particular regional traits. It identifies and explains the roles that these viral texts play in Internet communication: cultural, social and political implications; significance for self-representation and identity formation; promotion of alternative opinion or trending interpretation; and subversive and resistant power in relation to professional media, propaganda, and traditional and digital political campaigning. It also offers unique comparative case studies of Internet memes in Russia and the United States.
https://magrudy-assets.storage.googleapis.com/9781138602786.jpg
157.500000 USD

Internet Memes and Society: Social, Cultural, and Political Contexts

by Anastasia Denisova
Hardback
Book cover image
Explains both cloud security and privacy, and digital forensics in a unique, systematical way * Discusses both security and privacy of cloud and digital forensics in a systematic way * Contributions by top U.S., Chinese and international researchers, and professionals active in the field of information / network security, digital ...
Security, Privacy, and Digital Forensics in the Cloud
Explains both cloud security and privacy, and digital forensics in a unique, systematical way * Discusses both security and privacy of cloud and digital forensics in a systematic way * Contributions by top U.S., Chinese and international researchers, and professionals active in the field of information / network security, digital / computer forensics, and the cloud and big data * Of interest to those focused upon security and implementation, and those focused upon incident management * Logical, well-structured and organized
https://magrudy-assets.storage.googleapis.com/9781119053286.jpg
141.750000 USD

Security, Privacy, and Digital Forensics in the Cloud

Hardback
Book cover image
We like to think that we are in control of the future of artificial intelligence. The reality, though, is that we--the everyday people whose data powers AI--aren't actually in control of anything. When, for example, we speak with Alexa, we contribute that data to a system we can't see and ...
The Big Nine: How the Tech Titans and Their Thinking Machines Could Warp Humanity
We like to think that we are in control of the future of artificial intelligence. The reality, though, is that we--the everyday people whose data powers AI--aren't actually in control of anything. When, for example, we speak with Alexa, we contribute that data to a system we can't see and have no input into--one largely free from regulation or oversight. The big nine corporations--Amazon, Google, Facebook, Tencent, Baidu, Alibaba, Microsoft, IBM and Apple--are the new gods of AI and are short-changing our futures to reap immediate financial gain. In this book, Amy Webb reveals the pervasive, invisible ways in which the foundations of AI--the people working on the system, their motivations, the technology itself--are broken. Within our lifetimes, AI will, by design, begin to behave unpredictably, thinking and acting in ways which defy human logic. The big nine corporations may be inadvertently building and enabling vast arrays of intelligent systems that don't share our motivations, desires, or hopes for the future of humanity. Much more than a passionate, human-centered call-to-arms, this book delivers a strategy for changing course, and provides a path for liberating us from algorithmic decision-makers and powerful corporations.
https://magrudy-assets.storage.googleapis.com/9781541773752.jpg
28.350000 USD

The Big Nine: How the Tech Titans and Their Thinking Machines Could Warp Humanity

by Amy Webb
Hardback
Book cover image
Connect your cloud and on-premise applications. This comprehensive guide to SAP Cloud Platform Integration will teach you how to integrate processes and data in your system by developing and configuring integration flows. In this updated and expanded practical guide, explore prepackaged integration content in the Integration Content Catalog, debug and ...
SAP Cloud Platform Integration: The Comprehensive Guide
Connect your cloud and on-premise applications. This comprehensive guide to SAP Cloud Platform Integration will teach you how to integrate processes and data in your system by developing and configuring integration flows. In this updated and expanded practical guide, explore prepackaged integration content in the Integration Content Catalog, debug and secure integration projects, enable B2B integration, develop custom adapters, and more. Follow step-by-step instructions to guide you through the full integration process. Key Features include: a. Fundamentals Find out how SAP Cloud Platform Integration fits into SAP's cloud strategy. Explore its architecture and tools, and learn how to run your first integration flow. b. Integration Development Whether you're using prepackaged integration content or developing custom integrations, this guide has you covered. Explore the development environment, the SAP Cloud Platform Integration runtime, and processes like debugging and error handling. c. Updated and Expanded Revised to include new connectivity options, keystore management, and integration flow migration. Explore new chapters on using SAP API Management and SAP Cloud Platform Integration together and business-to-business capabilities.
https://magrudy-assets.storage.googleapis.com/9781493217069.jpg
94.450000 USD

SAP Cloud Platform Integration: The Comprehensive Guide

by Volker Stiehl, Mandy Krimmel, Peter Gutsche, John Mutumba Bilay
Hardback
Book cover image
Advances in computing, communications, and control have bridged the physical components of reality and cyberspace leading to the smart internet of things (IoT). The notion of IoT has extraordinary significance for the future of several industrial domains. Hence, it is expected that the complexity in the design of IoT applications ...
Smart Devices, Applications, and Protocols for the IoT
Advances in computing, communications, and control have bridged the physical components of reality and cyberspace leading to the smart internet of things (IoT). The notion of IoT has extraordinary significance for the future of several industrial domains. Hence, it is expected that the complexity in the design of IoT applications will continue to increase due to the integration of several cyber components with physical and industrial systems. As a result, several smart protocols and algorithms are needed to communicate and exchange data between IoT devices. Smart Devices, Applications, and Protocols for the IoT is a collection of innovative research that explores new methods and techniques for achieving reliable and efficient communication in recent applications including machine learning, network optimization, adaptive methods, and smart algorithms and protocols. While highlighting topics including artificial intelligence, sensor networks, and mobile network architectures, this book is ideally designed for IT specialists and consultants, software engineers, technology developers, academicians, researchers, and students seeking current research on up-to-date technologies in smart communications, protocols, and algorithms in IoT.
https://magrudy-assets.storage.googleapis.com/9781522578116.jpg
236.250000 USD

Smart Devices, Applications, and Protocols for the IoT

Hardback
Book cover image
Everything you need to know for the Solutions Architect - Associate Exam, fully updated The AWS Certified Solutions Architect Study Guide: Associate (SAA-C01) Exam is your complete and fully updated resource to the AWS Solutions Architect - Associate certification. This invaluable Sybex study guide covers all relevant aspects of the ...
AWS Certified Solutions Architect Study Guide: Associate SAA-C01 Exam
Everything you need to know for the Solutions Architect - Associate Exam, fully updated The AWS Certified Solutions Architect Study Guide: Associate (SAA-C01) Exam is your complete and fully updated resource to the AWS Solutions Architect - Associate certification. This invaluable Sybex study guide covers all relevant aspects of the AWS Solutions Architect job role, including mapping multi-tier architectures to AWS services, loose coupling and stateless systems, applying AWS security features, deploying and managing services, designing large scale distributed systems, and many more. Written by two AWS subject-matter experts, this self-study guide and reference provides all the tools and information necessary to master the exam, earn your certification, and gain insights into the job of an AWS Solutions Architect. Efficient and logical presentation of exam objectives allows for flexible study of topics, and powerful learning tools increase comprehension and retention of key exam elements. Practice questions, chapter reviews, and detailed examination of essential concepts fully prepare you for the AWS Solutions Architect - Associate certification. The certification is highly valued in IT and cloud computing professionals. Now in a new edition--reflecting the latest changes, additions, and updates to the AWS Solutions Architect - Associate certification exam guide--this book is your complete, one-stop resource: Access the Sybex interactive learning environment and test bank, including chapter tests, practice exams, electronic flashcards, and a searchable glossary of key terms. Learn all the components of the AWS exam and know what to expect on exam day Review challenging exam topics and focus on the areas that need improvement Expand your AWS skillset and keep pace with current cloud computing technologies The AWS Certified Solutions Architect Study Guide: Associate (SAA-C01) Exam enables you to validate your skills, increase your competitive advantage, and take the next step on your career path. Comprehensive and up-to-date content and superior study tools make this guide a must-have resource for those seeking AWS Solutions Architect - Associate certification.
https://magrudy-assets.storage.googleapis.com/9781119504214.jpg
63.000000 USD

AWS Certified Solutions Architect Study Guide: Associate SAA-C01 Exam

by David Clinton, Ben Piper
Paperback / softback
Book cover image
Artificial Intelligence for the Internet of Everything considers the foundations, metrics and applications of IoE systems. It covers whether devices and IoE systems should speak only to each other, to humans or to both. Further, the book explores how IoE systems affect targeted audiences (researchers, machines, robots, users) and society, ...
Artificial Intelligence for the Internet of Everything
Artificial Intelligence for the Internet of Everything considers the foundations, metrics and applications of IoE systems. It covers whether devices and IoE systems should speak only to each other, to humans or to both. Further, the book explores how IoE systems affect targeted audiences (researchers, machines, robots, users) and society, as well as future ecosystems. It examines the meaning, value and effect that IoT has had and may have on ordinary life, in business, on the battlefield, and with the rise of intelligent and autonomous systems. Based on an artificial intelligence (AI) perspective, this book addresses how IoE affects sensing, perception, cognition and behavior. Each chapter addresses practical, measurement, theoretical and research questions about how these things may affect individuals, teams, society or each other. Of particular focus is what may happen when these things begin to reason, communicate and act autonomously on their own, whether independently or interdependently with other things .
https://magrudy-assets.storage.googleapis.com/9780128176368.jpg
163.72 USD

Artificial Intelligence for the Internet of Everything

Paperback / softback
Book cover image
Description Recommender systems are practically a necessity for keeping a site's content current, useful, and interesting to visitors. Recommender systems are everywhere, helping you find everything from movies to jobs, restaurants to hospitals, even romance. Practical Recommender Systems goes behind the curtain to show readers how recommender systems work and, ...
Practical Recommender Systems
Description Recommender systems are practically a necessity for keeping a site's content current, useful, and interesting to visitors. Recommender systems are everywhere, helping you find everything from movies to jobs, restaurants to hospitals, even romance. Practical Recommender Systems goes behind the curtain to show readers how recommender systems work and, more importantly, how to create and apply them for their site. This hands-on guide covers scaling problems and other issues they may encounter as their site grows. Key features * A behind the scenes look at recommender systems * Hands-on lessons * Step-by-step guide Audience This book assumes you're comfortable reading code in Python and have some experience with databases. About the Technology Using behavioral and demographic data, these systems make predictions about what users will be most interested in at a particular time, resulting in high-quality, ordered, personalized suggestions.
https://magrudy-assets.storage.googleapis.com/9781617292705.jpg
52.490000 USD

Practical Recommender Systems

by Kim Falk
Paperback / softback
Book cover image
News in a Digital Age
https://magrudy-assets.storage.googleapis.com/9781977402318.jpg
36.750000 USD

News in a Digital Age

by Jennifer Kavanagh
Paperback / softback
Book cover image
Usernames and passwords: online organizer in handy 5x8 format.
https://magrudy-assets.storage.googleapis.com/9781076314673.jpg
7.340000 USD

Usernames and passwords: online organizer in handy 5x8 format.

by Password Keepers
Paperback / softback
Book cover image
Usernames and passwords: online organizer in handy 5x8 format.
https://magrudy-assets.storage.googleapis.com/9781076314635.jpg
7.340000 USD

Usernames and passwords: online organizer in handy 5x8 format.

by Password Keepers
Paperback / softback
Page 1 of 40