Managing the Web of Things: Linking the Real World to the Web presents a consolidated and holistic coverage of engineering, management, and analytics of the Internet of Things.
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers, Second Edition offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation.
Internet of Things: Principles and Paradigms captures the state-of-the-art research in Internet of Things, its applications, architectures, and technologies.
Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT).
The aim of Sentiment Analysis is to define automatic tools able to extract subjective information from texts in natural language, such as opinions and sentiments, in order to create structured and actionable knowledge to be used by either a decision support system or a decision maker.
Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments.
Internet Congestion Control provides a description of some of the most important topics in the area of congestion control in computer networks, with special emphasis on the analytical modeling of congestion control algorithms.
Digital Forensics Trial Graphics: Teaching the Jury Through Effective Use of Visuals helps digital forensic practitioners explain complex technical material to laypeople (i.
Development of Online Hybrid Testing: Theory and Applications to Structural Engineering provides comprehensive treatments of several topics pertinent to substructure online hybrid tests.
Online Social Networks: Human Cognitive Constraints in Facebook and Twitter provides new insights into the structural properties of personal online social networks and the mechanisms underpinning human online social behavior.
Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and privacy perspective.
Effective Security Management, Sixth Edition teaches practicing security professionals how to build their careers by mastering the fundamentals of good management.
Universal UX Design: Building Multicultural User Experience provides an ideal guide as multicultural UX continues to emerge as a transdisciplinary field that, in addition to the traditional UI and corporate strategy concerns, includes socio/cultural and neurocognitive concerns that constitute one of the first steps in a truly global product strategy.
Design and deliver an optimal user experience for all devicesAbout This BookGet to grips with the core functionality of RWD through examplesDiscover how to make layouts, content and media flexible, and explore why a content-first approach is more effectiveMaximize the performance of your web pages so that they work across all browsers and devices irrespective of the screen sizeWho This Book Is ForThis book is for web designers who are familiar with HTML and CSS, and want to begin with responsive web design.
The book provides a comprehensive review of lifelong learning, information literacy and internships including assessment techniques for lifelong learning, teamwork and information literacy as defined by the ABET criteria.
Learn the pytest way to write simple tests which can also be used to write complex testsKey FeaturesBecome proficient with pytest from day one by solving real-world testing problemsUse pytest to write tests more efficientlyScale from simple to complex and functional testingBook DescriptionPython's standard unittest module is based on the xUnit family of frameworks, which has its origins in Smalltalk and Java, and tends to be verbose to use and not easily extensible.
Safety of Web Applications: Risks, Encryption and Handling Vulnerabilities with PHP explores many areas that can help computer science students and developers integrate security into their applications.
Wireless Public Safety Networks, Volume Two: A Systematic Approach presents the latest advances in the wireless Public Safety Networks (PSNs) field, the networks established by authorities to either prepare the population for an eminent catastrophe, or those used for support during crisis and normalization phases.
E-Government in Asia offers a thorough examination of e-governance in Asia, including the uses of the Internet to mediate interactions between Asian governments and their citizens.
Smartphones and Information on Current Events provides unprecedented insights into young people's news consumption patterns and the ecology of mobile news.
Smartphones and Information on Current Events provides unprecedented insights into young people's news consumption patterns and the ecology of mobile news.
An illuminating insight into the Metaverse - what it is, how it works, and and why it will soon be playing a major role in business, technology and society.
Get hands-on with the browser-based JavaScript library for training and deploying machine learning models effectivelyKey FeaturesBuild, train and run machine learning models in the browser using TensorFlow.
Make web applications run faster by using advanced PHP, SQL and JavaScript techniquesKey FeaturesUse a customized PHP stack to create efficient data-driven web applicationsEnsure seamless implementation of a JavaScript & HTML 5 CSS based frontend and PHP based backend.
An Introduction to Web Matrix provides an easy to follow treatment of the application of this new software, which is rapidly becoming the preferred vehicle for the teaching of website design.
Today's critics of big online platforms tend to consider privacy breaches, monopolistic practices, and the deployment of surveillance technologies as the main problems.
In einer Welt, die zunehmend von digitalen Innovationen geprägt ist, gewinnen zwei Technologien besonders an Bedeutung: Non-Fungible Tokens (NFTs) und Künstliche Intelligenz (KI).
The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq.
Providers and consumers of mental health services are increasingly making use of the internet to gather information, consult, and participate in psychotherapy.
My Social Media for Seniors Step-by-step instructions for the tasks you care about most Large, full-color, close-up photos show you exactly what to do Common-sense help whenever you run into problems Tips and notes to help you along the way Learn how to get the most out of social media!
Ashley Friedlein's first book, Web Project Management: Delivering Successful Commercial Web Sites, became a bestseller and an essential reference for Web professionals developing new sites.
Written by industry thought leaders, Java Web Services Architecture is a no-nonsense guide to web services technologies including SOAP, WSDL, UDDI and the JAX APIs.