"e;In what is certain to be a seminal work on metadata, John Horodyski masterfully affirms the value of metadata while providing practical examples of its role in our personal and professional lives.
Explore the world of Rocket-fueled web application development and the power of the Rust programming languageKey FeaturesDiscover solutions to the common problems faced while creating web applications with RocketLearn everything about Rust, from structs and crates to generics and debuggingCombine Rust and Rocket to create, test, and deploy a full-featured web appBook DescriptionLooking for a fast, powerful, and intuitive framework to build web applications?
For the geek who's an investor, and the investor who's a geek, we present Online Investing Hacks, 100 industrial-strength, bleeding edge tips, tools and techniques for analyzing and managing online portfolios.
Use the power of deep learning with Python to build and deploy intelligent web applicationsKey FeaturesCreate next-generation intelligent web applications using Python libraries such as Flask and DjangoImplement deep learning algorithms and techniques for performing smart web automationIntegrate neural network architectures to create powerful full-stack web applicationsBook DescriptionWhen used effectively, deep learning techniques can help you develop intelligent web apps.
Secure Your Systems Using the Latest IT Auditing TechniquesFully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Second Edition, explains, step by step, how to implement a successful, enterprise-wide IT audit program.
As the distributed architecture underpinning the initial Bitcoin anarcho-capitalist, libertarian project, 'blockchain' entered wider public imagination and vocabulary only very recently.
Translating traditional coaching methods and competencies for use in the online world, this informative and timely guide shows coaches how to transform their face-to-face practice into one that utilises technological means of communication with clients, mentors, and everyone else associated with their practice.
Cyber and its related technologies such as the Internet was introduced to the world only in late 1980s, and today it is unimaginable to think of a life without it.
"e;In what is certain to be a seminal work on metadata, John Horodyski masterfully affirms the value of metadata while providing practical examples of its role in our personal and professional lives.
All of the short essays in this volume look past the rhetoric of technological determinism and reliance on the natural logic of the market to consider the power of law and policy to steer new media in one direction or another.
The Windows 10 May 2019 Update adds a host of new and improved features to Microsofts flagship operating systemand this jargon-free guide helps you get the most out of every component.
Implement an Effective Security Metrics Project or ProgramIT Security Metrics provides a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data protection in your organization.
As modern society is extremely dependent on the Internet, social networks, and developing technologies, a threat to the security of both the individual and society as a whole has emerged.
The latest Web app attacks and countermeasures from world-renowned practitionersProtect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker.
In the first book of its kind, art information expert Lois Swan Jones discusses how to locate visual and textual information on the Internet and how to evaluate and supplement that information with material from other formats--print sources, CD-ROMS, documentary videos, and microfiche sets--to produce excellent research results.
Inside the Dark Web provides a broad overview of emerging digital threats and computer crimes, with an emphasis on cyberstalking, hacktivism, fraud and identity theft, and attacks on critical infrastructure.
Google's Programmable Search Engines (PSEs, previously called Custom Search Engines) provide search opportunities that are unavailable with any other tool.
In recent years, virtual meeting technology has become a part of the everyday lives of more and more people, often with the help of global online social networks (OSNs).
Applied User Data Collection and Analysis Using JavaScript and PHP is designed to provide the technical skills and competency to gather a wide range of user data from web applications in both active and passive methods.
This comprehensive and timely book, New Age Analytics: Transforming the Internet through Machine Learning, IoT, and Trust Modeling, explores the importance of tools and techniques used in machine learning, big data mining, and more.
Despite the range of studies into grief and mourning in relation to the digital, research to date largely focuses on the cultural practices and meanings that are played out in and through digital environments.
Firefox Hacks is ideal for power users who want to take full advantage of Firefox from Mozilla, the next-generation web browser that is rapidly subverting Internet Explorer's once-dominant audience.
Explore the world of Rocket-fueled web application development and the power of the Rust programming languageKey FeaturesDiscover solutions to the common problems faced while creating web applications with RocketLearn everything about Rust, from structs and crates to generics and debuggingCombine Rust and Rocket to create, test, and deploy a full-featured web appBook DescriptionLooking for a fast, powerful, and intuitive framework to build web applications?
In recent years, soft computing techniques have emerged as a successful tool to understand and analyze the collective behavior of service- oriented computing software.
Google's Programmable Search Engines (PSEs, previously called Custom Search Engines) provide search opportunities that are unavailable with any other tool.
In an environment where increasing amounts of information (and fake news) flood the internet on websites and social media, the information professional's job is getting harder.
As the distributed architecture underpinning the initial Bitcoin anarcho-capitalist, libertarian project, 'blockchain' entered wider public imagination and vocabulary only very recently.
Implement an Effective Security Metrics Project or ProgramIT Security Metrics provides a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data protection in your organization.