Build modular React web apps that are scalable, maintainable and powerful using design patterns and insightful practicesKey FeaturesGet familiar with design patterns in React like Render props and Controlled/uncontrolled inputs Learn about class/ functional, style and high order components with ReactWork through examples that can be used to create reusable code and extensible designsBook DescriptionReact is an adaptable JavaScript library for building complex UIs from small, detached bits called components.
Cloud Computing: Theory and Practice, Second Edition, provides students and IT professionals with an in-depth analysis of the cloud from the ground up.
Advances in Computers, the latest volume in the series published since 1960, presents detailed coverage of innovations in computer hardware, software, theory, design, and applications.
Optimization of Manufacturing Systems Using the Internet of Things extends the IoT (Internet of Things) into the manufacturing field to develop an IoMT (Internet of Manufacturing Things) architecture with real-time traceability, visibility, and interoperability in production planning, execution, and control.
Managing the Web of Things: Linking the Real World to the Web presents a consolidated and holistic coverage of engineering, management, and analytics of the Internet of Things.
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers, Second Edition offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation.
Internet of Things: Principles and Paradigms captures the state-of-the-art research in Internet of Things, its applications, architectures, and technologies.
Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT).
The aim of Sentiment Analysis is to define automatic tools able to extract subjective information from texts in natural language, such as opinions and sentiments, in order to create structured and actionable knowledge to be used by either a decision support system or a decision maker.
Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments.
Internet Congestion Control provides a description of some of the most important topics in the area of congestion control in computer networks, with special emphasis on the analytical modeling of congestion control algorithms.
Digital Forensics Trial Graphics: Teaching the Jury Through Effective Use of Visuals helps digital forensic practitioners explain complex technical material to laypeople (i.
Development of Online Hybrid Testing: Theory and Applications to Structural Engineering provides comprehensive treatments of several topics pertinent to substructure online hybrid tests.
Online Social Networks: Human Cognitive Constraints in Facebook and Twitter provides new insights into the structural properties of personal online social networks and the mechanisms underpinning human online social behavior.
Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and privacy perspective.
Effective Security Management, Sixth Edition teaches practicing security professionals how to build their careers by mastering the fundamentals of good management.
Universal UX Design: Building Multicultural User Experience provides an ideal guide as multicultural UX continues to emerge as a transdisciplinary field that, in addition to the traditional UI and corporate strategy concerns, includes socio/cultural and neurocognitive concerns that constitute one of the first steps in a truly global product strategy.
Design and deliver an optimal user experience for all devicesAbout This BookGet to grips with the core functionality of RWD through examplesDiscover how to make layouts, content and media flexible, and explore why a content-first approach is more effectiveMaximize the performance of your web pages so that they work across all browsers and devices irrespective of the screen sizeWho This Book Is ForThis book is for web designers who are familiar with HTML and CSS, and want to begin with responsive web design.
The book provides a comprehensive review of lifelong learning, information literacy and internships including assessment techniques for lifelong learning, teamwork and information literacy as defined by the ABET criteria.
Learn the pytest way to write simple tests which can also be used to write complex testsKey FeaturesBecome proficient with pytest from day one by solving real-world testing problemsUse pytest to write tests more efficientlyScale from simple to complex and functional testingBook DescriptionPython's standard unittest module is based on the xUnit family of frameworks, which has its origins in Smalltalk and Java, and tends to be verbose to use and not easily extensible.
Safety of Web Applications: Risks, Encryption and Handling Vulnerabilities with PHP explores many areas that can help computer science students and developers integrate security into their applications.
Wireless Public Safety Networks, Volume Two: A Systematic Approach presents the latest advances in the wireless Public Safety Networks (PSNs) field, the networks established by authorities to either prepare the population for an eminent catastrophe, or those used for support during crisis and normalization phases.
E-Government in Asia offers a thorough examination of e-governance in Asia, including the uses of the Internet to mediate interactions between Asian governments and their citizens.
Smartphones and Information on Current Events provides unprecedented insights into young people's news consumption patterns and the ecology of mobile news.
Smartphones and Information on Current Events provides unprecedented insights into young people's news consumption patterns and the ecology of mobile news.
Get hands-on with the browser-based JavaScript library for training and deploying machine learning models effectivelyKey FeaturesBuild, train and run machine learning models in the browser using TensorFlow.
Make web applications run faster by using advanced PHP, SQL and JavaScript techniquesKey FeaturesUse a customized PHP stack to create efficient data-driven web applicationsEnsure seamless implementation of a JavaScript & HTML 5 CSS based frontend and PHP based backend.
An Introduction to Web Matrix provides an easy to follow treatment of the application of this new software, which is rapidly becoming the preferred vehicle for the teaching of website design.
Today's critics of big online platforms tend to consider privacy breaches, monopolistic practices, and the deployment of surveillance technologies as the main problems.
In einer Welt, die zunehmend von digitalen Innovationen geprägt ist, gewinnen zwei Technologien besonders an Bedeutung: Non-Fungible Tokens (NFTs) und Künstliche Intelligenz (KI).
The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq.