Part technical and part theoretical, this practical guide to web typography helps designers understand how the typographic choices they make in layout and prototyping programs behave once they are turned into live code.
Recipient of the SJSU San Jose State University Annual Author & Artist Awards 2019In modern times, all individuals need to be knowledgeable about cybersecurity.
Recipient of the SJSU San Jose State University Annual Author & Artist Awards 2019In modern times, all individuals need to be knowledgeable about cybersecurity.
Published in association with the Society of American Archivists Trusting Records in the Cloud presents key findings of InterPARES Trust, an international research project that has investigated issues of trust in, and trustworthiness of records and data online, with respect to privacy, accessibility, portability, metadata and ownership.
Social tagging (including hashtags) is used over platforms such as Twitter, Facebook, Instagram, Pinterest, WordPress, Tumblr and YouTube across countries and cultures meaning that one single hashtag can link information from a variety of resources.
The most efficient way to learn J2EE programming techniques Two Oracle experts demonstrate techniques for working within J2EE and JDeveloper for the thousands of developers currently using Oracle Forms and the PL/SQL language.
An examination of how nonprofessional archivists, especially media fans, practice cultural preservation on the Internet and how “digital cultural memory” differs radically from print-era archiving.
Blogs and Tweets, Texting and Friending: Social Media and Online Professionalism in Health Care summarizes the most common mistakes - and their legal and ethical ramifications -made in social media by busy health care professionals.
Semantic Web for the Working Ontologist: Effective Modeling in RDFS and OWL, Second Edition, discusses the capabilities of Semantic Web modeling languages, such as RDFS (Resource Description Framework Schema) and OWL (Web Ontology Language).
Safety of Web Applications: Risks, Encryption and Handling Vulnerabilities with PHP explores many areas that can help computer science students and developers integrate security into their applications.
Mission-Critical Microsoft Exchange 2000 is the definitive book on how to design and maintain extremely reliable and adaptive Exchange Server messaging systems that rarely crash and that preserve valuable data and services in spite of technical disruptions.
Microsoft(R) Exchange Server 2003 Deployment and Migration describes everything that you need to know about designing, planning, and implementing an Exchange 2003 environment.
This authoritative book teaches IT professionals responsible for Exchange messaging systems how to efficiently manage the program's many and complex system capabilities and features.
Microsoft Outlook Programming unleashes the power of Microsoft Outlook, allowing administrators and end users to customize Outlook in the same way that they've used macros and templates to customize other programs like Excel and Word.
Interactive media are a human-machine interface that allows people to connect with each other by making them active participants in the media they consume through text, graphics, audio and video.
Nationwide and around the world, instant messaging use is growing, with more than 7 billion instant messages being sent every day worldwide, according to IDC.
This book offers a comprehensive overview of the current state of cybersecurity in smart cities and explores how AI and IoT technologies can be used to address cybersecurity challenges.
One of the challenges of administering and supporting Microsoft(R) Outlook 2003 is that it stores settings in so many different places - in the Windows registry, as files in the user's profile folders, and in the information store itself.