With Big Tech's breakthrough into finance with blockchain, it is imperative that finance players understand the ramifications and how they can defend their competitive advantage.
In 2011, amid the popular uprising against Egyptian president Hosni Mubarak, the government sought in vain to shut down the Internet-based social networks of its people.
The bestselling guide to building a knockout Web site, newly updated An effective Web site is the key to success for every venture from class reunions to major corporations.
This book introduces the Internet of Things (IoT), which is the convergence of connecting people, things, data and processes; it is transforming our life, business and everything in between.
Design winning presentations with the new version of PowerPointCreate dynamic and professional-quality presentations using sage advice, handy tips, and clear descriptions from PowerPoint expert Ellen Finkelstein.
Explore the world of Rocket-fueled web application development and the power of the Rust programming languageKey FeaturesDiscover solutions to the common problems faced while creating web applications with RocketLearn everything about Rust, from structs and crates to generics and debuggingCombine Rust and Rocket to create, test, and deploy a full-featured web appBook DescriptionLooking for a fast, powerful, and intuitive framework to build web applications?
Augmenting Public Relations examines how existing technologies used in Public Relations (PR) are being significantly augmented because of the advent of Artificial Intelligence (AI).
Create more robust applications with a test-first approach to JavaScript Reliable JavaScript, How to Code Safely in the World's Most Dangerous Language demonstrates how to create test-driven development for large-scale JavaScript applications that will stand the test of time and stay accurate through long-term use and maintenance.
In recent years, the proliferation of available video content and the popularity of the Internet have encouraged service providers to develop new ways of distributing content to clients.
An outstanding research guide for undergraduate students of American literature, this best-selling book is essential when it comes to researching American authors.
Pulitzer Prize-winning investigative journalist James Ball takes us into the depths of the internet to trace the origins and rapid ascent of QAnon, the movement that mutated from a niche online conspiracy theory into the world's first digital pandemic.
Cloud Computing and Digital Media: Fundamentals, Techniques, and Applications presents the fundamentals of cloud and media infrastructure, novel technologies that integrate digital media with cloud computing, and real-world applications that exemplify the potential of cloud computing for next-generation digital media.
This book explores the interdisciplinary nature of machine learning in multimedia, highlighting its intersections with fields such as computer vision, natural language processing, and audio signal processing.
While most books written about Rails cater to programmers looking for information on data structures, Learning Rails targets web developers whose programming experience is tied directly to the Web.
Smartphones and Information on Current Events provides unprecedented insights into young people's news consumption patterns and the ecology of mobile news.
This book sheds light on the cyber security challenges associated with nextgeneration computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations.
Schnell und einfach interaktive Webseiten programmieren: Andy Harris zeigt Ihnen alles, was Sie über JavaScript wissen müssen, um dieses Ziel zu erreichen.
SMART GRIDS AND INTERNET OF THINGS Smart grids and the Internet of Things (IoT) are rapidly changing and complicated subjects that are constantly changing and developing.
Cyber-Security Threats, Actors, and Dynamic Mitigation provides both a technical and state-of-the-art perspective as well as a systematic overview of the recent advances in different facets of cyber-security.