Internet Infrastructure: Networking, Web Services, and Cloud Computing provides a comprehensive introduction to networks and the Internet from several perspectives: the underlying media, the protocols, the hardware, the servers, and their uses.
Internet Infrastructure: Networking, Web Services, and Cloud Computing provides a comprehensive introduction to networks and the Internet from several perspectives: the underlying media, the protocols, the hardware, the servers, and their uses.
Online Terrorist Propaganda, Recruitment, and Radicalization is most complete treatment of the rapidly growing phenomenon of how terrorists' online presence is utilized for terrorism funding, communication, and recruitment purposes.
Online Terrorist Propaganda, Recruitment, and Radicalization is most complete treatment of the rapidly growing phenomenon of how terrorists' online presence is utilized for terrorism funding, communication, and recruitment purposes.
Human interaction with technology is constantly evolving, with rapid developments in online interaction, gaming, and artificial intelligence all impacting upon and altering our behaviour.
Human interaction with technology is constantly evolving, with rapid developments in online interaction, gaming, and artificial intelligence all impacting upon and altering our behaviour.
Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy.
Mobile Cloud Computing: Models, Implementation, and Security provides a comprehensive introduction to mobile cloud computing, including key concepts, models, and relevant applications.
Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy.
The World Wide Web has undergone tremendous growth since the first edition of Web Wisdom: How to Evaluate and Create Information Quality on the Web was conceived and written in the mid to late 1990s.
The World Wide Web has undergone tremendous growth since the first edition of Web Wisdom: How to Evaluate and Create Information Quality on the Web was conceived and written in the mid to late 1990s.
Creative Direction in a Digital World provides designers the tools they need to craft compelling digital experiences across screens, devices and platforms.
Creative Direction in a Digital World provides designers the tools they need to craft compelling digital experiences across screens, devices and platforms.
In recent years, luxury goods markets have faced significant changes that have influenced both the dynamics of the competition, as well as their strategies.
In recent years, luxury goods markets have faced significant changes that have influenced both the dynamics of the competition, as well as their strategies.
In an era where advanced technology plays a critical role in maintaining national security, Artificial Intelligence for Military Applications with Blockchain investigates how combining AI and blockchain could transform military operations.
Follow this step-by-step illustrated guide to launch your own Flutter apps and gain hands-on experienceKey FeaturesGet up to speed with the basics of Dart programming and delve into Flutter developmentLearn about Flutter widgets, plugins, and animations to create a high-quality, user-friendly appPackage and deploy your Flutter apps to achieve native-like performancePurchase of the print or Kindle book includes a free PDF eBookBook DescriptionThere have been many attempts at creating frameworks that are truly cross-platform, but most struggle to create a native-like experience at high-performance levels.
The Internet's importance for freedom of expression and other rights comes in part from the ability it bestows on users to create and share information, rather than just receive it.
The Internet's importance for freedom of expression and other rights comes in part from the ability it bestows on users to create and share information, rather than just receive it.
This book intends to expound the complete concept of Web in Theory, Web in Research and Web in Practice with the help of worked out examples for better understanding.
This book intends to expound the complete concept of Web in Theory, Web in Research and Web in Practice with the help of worked out examples for better understanding.
This book on SDP is the first of this kind that attempts to put all SDP related RFCs together with their mandatory and optional texts in a chronological systematic way as if people can use a single "e;super-SDP RFC"e; with almost one-to-one integrity from beginning to end to see the big picture of SDP in addition to base SDP functionalities.
This book on SDP is the first of this kind that attempts to put all SDP related RFCs together with their mandatory and optional texts in a chronological systematic way as if people can use a single "e;super-SDP RFC"e; with almost one-to-one integrity from beginning to end to see the big picture of SDP in addition to base SDP functionalities.
From AI ethics and cybersecurity to augmented realities, virtual interfaces, and much more, Futureshock provides an accessible introduction to the leading edge topics of today.
This book includes a variety of articles which look critically and judiciously at Google and its products, with a focus on Google Scholar and Google Book Search.
This book includes a variety of articles which look critically and judiciously at Google and its products, with a focus on Google Scholar and Google Book Search.