This groundbreaking, open access volume analyses and compares data practices across several fields through the analysis of specific cases of data journeys. It brings together leading scholars in the philosophy, history and social studies of science to achieve two goals: tracking the travel of data across different spaces, times and domains of research practice; and documenting how such journeys affect the use of data as evidence and the knowledge being produced. The volume captures the opportunities, challenges and concerns involved in making data move from the sites in which they are original... View More...
This text approaches the analysis of variance (ANOVA) from an exploratory point of view while retaining customary least squares fitting methods. The authors go beyond the standard steps of the ANOVA table to emphasize both the individual observations and the separate parts that the analysis produces. View More...
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security.The text contains 207 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare. View More...
An Independent and New Statesman Book of the Year Beyond the familiar online world that most of us inhabit--a world of Google, Facebook, and Twitter--lies a vast and often hidden network of sites, communities, and cultures where freedom is pushed to its limits, and where people can be anyone, or do anything, they want. This is the world of Bitcoin and Silk Road, of radicalism and pornography. This is the Dark Net. In this important and revealing book, Jamie Bartlett takes us deep into the digital underworld and presents an extraordinary look at the internet we don't know. Beginning with the ri... View More...
This textbook/software package covers first-order language in a method appropriate for first and second courses in logic. The unique on-line grading services instantly grades solutions to hundred of computer exercises. It is specially devised to be used by philosophy instructors in a way that is useful to undergraduates of philosophy, computer science, mathematics, and linguistics. The book is a completely rewritten and much improved version of The Language of First-order Logic. Introductory material is presented in a more systematic and accessible fashion. Advanced chapters include proofs of ... View More...
A really good web development framework anticipates your needs. jQuery does more-it practically reads your mind. Developers fall in love with this JavaScript library the moment they see 20 lines of code reduced to three. jQuery is concise and readable. jQuery in Action, Second Edition is a fast-paced introduction and guide. It shows you how to traverse HTML documents, handle events, perform animations, and add Ajax to your web pages. The book's unique lab pages anchor the explanation of each new concept in a practical example. You'll learn how jQuery interacts with other tools and frameworks a... View More...
To see the future we can build with information technology, we must look beyond mere information to the social context that creates and gives meaning to it. For years, pundits have predicted that information technology will obliterate the need for almost everything--from travel to supermarkets to business organizations to social life itself. Individual users, however, tend to be more sceptical. Beaten down by info-glut and exasperated by computer systems fraught with software crashes, viruses, and unintelligible error messages, they find it hard to get a fix on the true potential of the digita... View More...
What you need to significantly reduce software development failures before they become fatal and how to repair their causes so they don't re-surface Learn from the mistakes of others documented here in this hard-hitting, humorous, and career-enhancing book from the authors of the bestselling "AntiPatterns." Rise above the industry-wide malaise of mass denial and realize that you too can, and definitely must, master Software Configuration Management (SCM) for successful software engineering. In this much-needed book, the authors provide 16 new AntiPatterns covering the most common SCM mistakes... View More...
Get Started Fast with Modern OpenGL ES Graphics Programming for iPhone, iPod touch, and iPad OpenGL ES technology underlies the user interface and graphical capabilities of Apple's iPhone, iPod touch, and iPad-as well as devices ranging from video-game consoles and aircraft-cockpit displays to non-Apple smartphones. In this friendly, thorough introduction, Erik M. Buck shows how to make the most of Open GL ES in Apple's iOS environment. This highly anticipated title focuses on modern, efficient approaches that use the newest versions of OpenGL ES, helping you avoid the irrelevant, obsolete, ... View More...
Drawing on psychological and neurological studies that underscore how tightly people's happiness and satisfaction are tied to performing hard work in the real world, Carr reveals something we already suspect: shifting our attention to computer screens can leave us disengaged and discontented.From nineteenth-century textile mills to the cockpits of modern jets, from the frozen hunting grounds of Inuit tribes to the sterile landscapes of GPS maps, The Glass Cage explores the impact of automation from a deeply human perspective, examining the personal as well as the economic consequences of our g... View More...
Features Microsoft insiders who tell their stories in their own words. This work includes stories range from serious to surprising such as the programmer who married a woman he met in a bar and eleven months later was cleaned out, the woman who walked away from a fortune, the secretary who worked her way into management and retired at 34. View More...
The most dangerous threat we--individually and as a society and country--face today is no longer military, but rather the increasingly pervasive exposure of our personal information; nothing undermines our freedom more than losing control of information about ourselves. And yet, as daily events underscore, we are ever more vulnerable to cyber-attack. In this bracing book, Michael Chertoff makes clear that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be completely overhauled in the Internet era. On the one hand, the collection o... View More...