Your cart is empty
E-commerce continues to have a dramatic impact on virtually every aspect of business. And following the 2009 recession on electronic commerce, its role is even more critical. Packed with the most cutting-edge coverage available, E-BUSINESS, 10E, International Edition equips readers with a solid understanding of the dynamics of this fast-paced industry. It delivers comprehensive coverage of emerging online business strategies and technologies in the electronic commerce marketplace. By detailing how the landscape of online commerce is evolving, this market-leading text reflects changes in the economy and how business and society are responding to those changes. Balancing technological issues with the strategic business aspects of successful e-commerce, the new edition includes expanded coverage of e-commerce growth in China and the developing world, social media and online marketing strategies, technology-enabled outsourcing, and the latest development in online payment processing systems.
It's time to become a Legend. Watched by millions and contested by the best professional gamers in the world, League of Legends is more than a game. Since the very beginnning of eSports, Fnatic have been competing at the highest level. In 2011, they won the World Championships and in 2015 they achieved the impossible: an entire regular season undefeated. In How to be a Professional Gamer, they take you inside the elite world of the sport, and into the world of competitive gaming. Sharing their knowledge, expertise, and strategies, it's only a matter of time before you're a world champion, too. Including tips on game strategy, teamwork and mental strength, How to be a Professional Gamer is both a guide for how to improve as a regular gamer, and the story of Fnatic and how they've conquered the world of eSports. Are you ready?
FULL COVERAGE OF L.A. NOIRE: Celebrating the launch of an enhanced L.A. Noire for a new generation with this indispensable guide providing analysis and strategy for the latest versions, including: - New Collectibles and Their Locations - Updated Achievements & Trophies - Brand New Control Schemes, Including VR and Nintendo Switch, with Touch & Gesture Commands THE COMPLETE EXPERIENCE: Collected in one place for the very first time, we provide in-depth coverage of L.A. Noire in its entirety, including every additional case and all new collectibles! THE VR CASE FILES: Each of the seven select cases featured in L.A. Noire: The VR Case Files is revealed in full detail, with gameplay tips and strategies to take on the role of Cole Phelps in virtual reality. EVERY MISSION: A complete walkthrough to rising through the ranks and solving every case with a perfect score. We'll guide you from Patrol, through the Traffic, Homicide, and Vice desks, all the way to the story's thrilling climax. CITY MAPS: Find everything you're looking for. We identify locations for all Landmarks and Collectibles, as well as critical mission waypoints. VEHICLE SHOWROOM: Stats for all vehicles and where to find them, including the hidden cars you will not discover on your own! DISCOVER NEW ITEMS AND ABILITIES: Find out how to get your hands on every new Detective Suit and where to find every Golden Vinyl and Novel Cover. DETECTIVE TRAINING: This is your essential resource to collecting evidence, interrogating suspects, and using intuition to uncover the truth. Plus: coverage of all Street Crimes, Outfits, and everything you need for 100% Completion! FREE eGUIDE Included: Mobile-friendly eGuide for strategy on the go, all optimized for a second-screen experience.
UNDERSTANDIING COMPUTERS: TODAY AND TOMORROW, INTRODUCTORY, 14e, International Edition gives readers a classic introduction to computer concepts with a modern twist! Known for its emphasis on industry insight and societal issues, this text makes concepts relevant to today's career-focused students.
Even more than authorship, ownership is challenged by the rise of digital and computational methods of design and production. These challenges are simultaneously legal, ethical and economic. How are new methods of fabrication and manufacture going to irreversibly change not only ways of working, but also designers ethics and their stance on ownership? In his 2013 second-term State of the Union address, President Obama stated that 3D printing has the potential to revolutionize the way we make almost everything . Nowhere will the impact of 3D printing be felt greater than in the architectural and design communities. When anyone can print out an object or structure from a digital file, will designers still exert the same creative rights or will they need to develop new practice and payment models? As architecture becomes more collaborative with open-source processes, will the emphasis on signature as the basis of ownership remain relevant? How will wider teams working globally be accredited and compensated? This issue of AD explores this subject; it features the work of designers who are developing wholly new approaches to practice by exploring means of commercialising process-based products rather than objects. Contributors: Phil Bernstein, Mark Garcia, Antoine Picon, Carlo Ratti and David Ruy Featured architects: Francis Bitonti, Marjan Colletti, Wendy W Fok, Panagiotis Michalatos, Jose Sanchez, Thibault Schwartz, Aaron Sprecher, Feng Xu and Philip Yuan
How do we create new ways of looking at the world? Join award-winning data storyteller RJ Andrews as he pushes beyond the usual how-to, and takes you on an adventure into the rich art of informing. Creating Info We Trust is a craft that puts the world into forms that are strong and true. It begins with maps, diagrams, and charts -- but must push further than dry defaults to be truly effective. How do we attract attention? How can we offer audiences valuable experiences worth their time? How can we help people access complexity? Dark and mysterious, but full of potential, data is the raw material from which new understanding can emerge. Become a hero of the information age as you learn how to dip into the chaos of data and emerge with new understanding that can entertain, improve, and inspire. Whether you call the craft data storytelling, data visualization, data journalism, dashboard design, or infographic creation -- what matters is that you are courageously confronting the chaos of it all in order to improve how people see the world. Info We Trust is written for everyone who straddles the domains of data and people: data visualization professionals, analysts, and all who are enthusiastic for seeing the world in new ways. This book draws from the entirety of human experience, quantitative and poetic. It teaches advanced techniques, such as visual metaphor and data transformations, in order to create more human presentations of data. It also shows how we can learn from print advertising, engineering, museum curation, and mythology archetypes. This human-centered approach works with machines to design information for people. Advance your understanding beyond by learning from a broad tradition of putting things "in formation" to create new and wonderful ways of opening our eyes to the world. Info We Trust takes a thoroughly original point of attack on the art of informing. It builds on decades of best practices and adds the creative enthusiasm of a world-class data storyteller. Info We Trust is lavishly illustrated with hundreds of original compositions designed to illuminate the craft, delight the reader, and inspire a generation of data storytellers.
Computer Concepts: Illustrated Introductory, 9/e, International Edition is designed to help students learn and retain the most relevant and essential information about computers and technology in today's digital world This edition has been revised to cover the latest important computing trends and skills, but maintains the pedagogical and streamlined design elements that instructors and students know and love about the Illustrated Series. New for this edition, make the most of Computer Concepts: Illustrated Introductory, 9/e, International Edition with the all-in-one CourseMate digital solution complete with a media-rich ebook, interactive quizzes and activities, and the Engagement Tracker for hassle-free, automatic grading.
The New State-of-the-Art in Information Security: Now Covers the Economics of Cyber Security and the Intersection of Privacy and Information Security For years, IT and security professionals and students have turned to "Security in Computing" as the definitive guide to information about computer security attacks and countermeasures. In their new fourth edition, Charles P. Pfleeger and Shari Lawrence Pfleeger have thoroughly updated their classic guide to reflect today's newest technologies, standards, and trends. The authors first introduce the core concepts and vocabulary of computer security, including attacks and controls. Next, the authors systematically identify and assess threats now facing programs, operating systems, database systems, and networks. For each threat, they offer best-practice responses. "Security in Computing, Fourth Edition," goes beyond technology, covering crucial management issues faced in protecting infrastructure and information. This edition contains an all-new chapter on the economics of cybersecurity, explaining ways to make a business case for security investments. Another new chapter addresses privacy--from data mining and identity theft, to RFID and e-voting. New coverage also includes
Bring your computer literacy course back to the BASICS. COMPUTER LITERACY BASICS: A COMPREHENSIVE GUIDE TO IC3 provides an introduction to computer concepts and skills, which maps to the newest Computing Core Certification (IC3) standards. Designed with new learners in mind, this text covers Computing Fundamentals, Key Applications, and Living Online - everything students need to pass the IC3 exam, and finish the course as confident computer users.
Students are guided through the latest trends in computer concepts and technology in an exciting and easy-to-follow format. Updated for currency, DISCOVERING COMPUTERS provides s the most up-to-date information on the latest technology in today's digital world.
A comprehensive guide to learning technologies that unlock the value in big data Cognitive Computing provides detailed guidance toward building a new class of systems that learn from experience and derive insights to unlock the value of big data. This book helps technologists understand cognitive computing's underlying technologies, from knowledge representation techniques and natural language processing algorithms to dynamic learning approaches based on accumulated evidence, rather than reprogramming. Detailed case examples from the financial, healthcare, and manufacturing walk readers step-by-step through the design and testing of cognitive systems, and expert perspectives from organizations such as Cleveland Clinic, Memorial Sloan-Kettering, as well as commercial vendors that are creating solutions. These organizations provide insight into the real-world implementation of cognitive computing systems. The IBM Watson cognitive computing platform is described in a detailed chapter because of its significance in helping to define this emerging market. In addition, the book includes implementations of emerging projects from Qualcomm, Hitachi, Google and Amazon. Today's cognitive computing solutions build on established concepts from artificial intelligence, natural language processing, ontologies, and leverage advances in big data management and analytics. They foreshadow an intelligent infrastructure that enables a new generation of customer and context-aware smart applications in all industries. Cognitive Computing is a comprehensive guide to the subject, providing both the theoretical and practical guidance technologists need. * Discover how cognitive computing evolved from promise to reality * Learn the elements that make up a cognitive computing system * Understand the groundbreaking hardware and software technologies behind cognitive computing * Learn to evaluate your own application portfolio to find the best candidates for pilot projects * Leverage cognitive computing capabilities to transform the organization Cognitive systems are rightly being hailed as the new era of computing. Learn how these technologies enable emerging firms to compete with entrenched giants, and forward-thinking established firms to disrupt their industries. Professionals who currently work with big data and analytics will see how cognitive computing builds on their foundation, and creates new opportunities. Cognitive Computing provides complete guidance to this new level of human-machine interaction.
Pro tips for macOS from "Dr. Mac" Your shiny new iMac or trusty old MacBook both rely on macOS to help you get things done. It helps to have an equally reliable guidebook to steer you through the tasks and steps that make macOS run efficiently. This fun and friendly guide provides the direction you need to easily navigate macOS. Longtime expert Bob "Dr. Mac" LeVitus shares his years of experience to help you better understand macOS and make it a timesaving tool in your life. Take a tour of the macOS interface Get organized and save time with macOS applications Get pro tips on speeding up your Mac Back up your data with ease Covering the fundamentals of the OS and offering insight into the most common functions of macOS, this is indispensable reading for new or inexperienced macOS users.
Contents: Preface. Orientation. 1. Computers and Digital Basics. 2. Computer Hardware. 3. Computer Software. 4. Operating Systems and File Management. 5. LANS and WLANS. 6. The Internet. 7. The Web and E-mail. 8. Digital Media. 9. The Computer Industry: History, Careers, and Ethics. 10. Information Systems Analysis and Design. 11. Databases. 12. Computer Programming. Credits. Glossary. Index.
Just say "no" to piles of sticky notes with your passwords and logins! A timely and valuable resource in the "Age of the Hacker." This essential notebook maintains your personal and financial safety. Record the necessarily complex passwords and user log-in names required to thwart hackers. This time- and headache-saving logbook has numerous tabbed alphabetical pages to make looking up a website address--and its corresponding log-in(s) and password(s) - easy to manage. It fits within a purse or briefcase, if you need to take it with you. Each entry has multiple locations to note new/changing log-ins or passwords, some notes about creating user names and passwords, Internet safety tips, locations to record software and hardware license numbers, home and business network settings, and more. For the ultimate in online safety, follow these tips: -- Forget the dictionary. -- Never use the same password twice. -- The longer your password, the longer it will take to crack. -- Just "jam" on your keyboard to create an entirely random password. -- Store your password off the computer. With this book, create and keep unique and difficult passwords and log-in names with ease!
Clear and easy-to follow instructions for using coding and scripting tools to create new, more advanced Roblox games. Take your game design to the next level, with this complete guide to Roblox coding and scripting! Learn how to code using the programing language Lua to create new objects and games in the Roblox world: from teleporting objects (or PCs/NPCs!), to adding and applying power ups, to creating a leaderboard, and allowing players to save their games. This book walks you through the basics of the studio tool, provides tutorials for specific actions and creations, then explains how to use all of that knowledge to create your own unique game world! With detailed instructions, example screenshots, and simple explanations of what code to use and how to use it, this book is a must-have guide for any Roblox game designer-from beginners to expert coders!
No longer just a mainstay of science fiction, VR has seen recent success with companies such as Oculus, Sony, and HTC. But little is known about its history, which reaches back decades. Ewalt chronicles its origins in Cold War military laboratories, and traces it through decades of hype and failed products, to a teenage gamer whose advancements made the recent breakthroughs in VR possible. Writing for a mainstream audience as well as technology enthusiasts, Ewalt offers a unique perspective on how VR got here, where it's going, and how and why it will change the way we live.
Improve your skills and confidence in digital photography with practical and inspirational advice from Tom Ang. Find your inner photographer and get the most out of your camera with Digital Photography Step by Step. Packed with expert knowledge, it is the perfect combination of practical photography advice and visual inspiration to help you make your own digital masterpieces in a flash. Teaching you the basics of how to approach a subject, develop ideas, and manipulate images in a series of inspiring photography projects, Digital Photography Step by Step covers all the latest advances in digital photography to help you master every step of taking successful photographs.
Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate vulnerability and security operations, this guide helps you understand the principles of the space and look beyond the individual technologies of the moment to develop durable comprehensive solutions. Numerous real-world examples illustrate the offensive and defensive concepts at work, including Conficker, Stuxnet, the Target compromise, and more. You will find clear guidance toward strategy, tools, and implementation, with practical advice on blocking systematic computer espionage and the theft of information from governments, companies, and individuals. Assaults and manipulation of computer networks are rampant around the world. One of the biggest challenges is fitting the ever-increasing amount of information into a whole plan or framework to develop the right strategies to thwart these attacks. This book clears the confusion by outlining the approaches that work, the tools that work, and resources needed to apply them. * Understand the fundamental concepts of computer network exploitation * Learn the nature and tools of systematic attacks * Examine offensive strategy and how attackers will seek to maintain their advantage * Understand defensive strategy, and how current approaches fail to change the strategic balance Governments, criminals, companies, and individuals are all operating in a world without boundaries, where the laws, customs, and norms previously established over centuries are only beginning to take shape. Meanwhile computer espionage continues to grow in both frequency and impact. This book will help you mount a robust offense or a strategically sound defense against attacks and exploitation. For a clear roadmap to better network security, Network Attacks and Exploitation is your complete and practical guide.
Get The Ins-and-Outs of SQL and PL/SQL From an Oracle Expert.
Perform database functions quickly and easily using the comprehensive information in this step-by-step guide. Oracle professional Christopher Allen begins with database basics and progresses to plain-language explanations and real-world examples of SQL statements and PL/SQL programs. Youll learn how to manage, query, and manipulate data, use SQL*Plus, create SQL functions, and write practical PL/SQL applications. Review questions, chapter summaries, and hands-on projects will have you understanding and exploiting the powerful features of Oracle Database 10"g" in no time.. . Create tables, rows, records, columns, and fields. Store text, numbers, dates, pictures, and soundfiles in tables and columns. Define, manipulate, retrieve, and delete data, using SQL commands. Select, sort, and filter records with SQL functions and procedures. Write SQL commands to declare variables using anchored types . Use SAVEPOINT and ROLLBACK commands to ensure multilevel undo. Perform time-based and hierarchical data queries. Edit and reuse commands in script files, using the SQL*Plus program . Use PL/SQL views, sequences, procedures, functions, and packages . Use triggers to automate auditing, security, and maintenance tasks. .
The gripping inside story of the race to build conversationally capable computers Chat with the author: ask your Alexa device to `open the voice computing book' __________________ The next great technological disruption is coming. The titans of Silicon Valley are racing to build the last, best computer that the world will ever need. They know that whoever successfully creates it will revolutionise our relationship with technology - and make billions of dollars in the process. They call it conversational AI. Computers that can speak and think like humans do may seem like the stuff of science fiction, but they are rapidly moving towards reality. In Talk to Me, veteran tech journalist James Vlahos meets the researchers at Google, Amazon and Apple who are leading the way to a voice computing revolution. He explores how voice tech will transform every sector of society: handing untold new powers to businesses, upending traditional notions of privacy, revolutionising access to information, and fundamentally altering the way we understand human consciousness. And he even tries to understand the significance of the revolution firsthand - by building a chatbot version of his terminally ill father. Vlahos's research leads him to one fundamental question: What happens when our computers become as articulate, compassionate, and creative as we are? __________________ `Brilliant and essential . . . You'll find insights and meaning on every page, and you'll keep turning them. This book is dynamite.' NICHOLAS THOMPSON, editor-in-chief of Wired `Conversational AI is a genuine paradigm shift in our experience with technology. Vlahos brings the whole story to life . . . A thoughtful and enjoyable read.' TOM GRUBER, co-creator of Siri `The baton of disruption has been passed from the smart phone to voice, and Vlahos helps make sense of this tectonic shift.' SCOTT GALLOWAY, author of The Four `Voice computing is revolutionising the way we interact with our devices. Talk to Me offers a road map showing how we got to this point and the opportunities and risks that lie ahead.' MARTIN FORD, author of The Rise of the Robots `James Vlahos has written an excellent book on how voice computing has become more and more of a growing presence in our everyday world.' RAY KURZWEIL, author of The Singularity Is Near
The Only Official Google Cloud Study Guide The Official?Google Cloud Certified Associate Cloud Engineer Study Guide, provides everything you need to prepare for this important exam and master the skills necessary to land that coveted Google Cloud Engineering certification. Beginning with a pre-book assessment quiz to evaluate what you know before you begin, each chapter features exam objectives and review questions, plus the online learning environment includes additional complete practice tests. Written by Dan Sullivan, a popular and experienced online course author for machine learning, big data, and Cloud topics, Official Google Cloud Certified Associate Cloud Engineer Study Guide is your ace in the hole for deploying and managing Google Cloud Services.? Select the right Google service from the various choices based on the application to be built Compute with Cloud VMs and managing VMs Plan and deploying storage Network and configure access and security Google Cloud Platform is a leading public cloud that provides its users to many of the same software, hardware, and networking infrastructure used to power Google services. Businesses, organizations, and individuals can launch servers in minutes, store petabytes of data, and implement global virtual clouds with the Google Cloud Platform. Certified Associate Cloud Engineers have demonstrated the knowledge and skills needed to deploy and operate infrastructure, services, and networks in the Google Cloud. This exam guide is designed to help you understand the Google Cloud Platform in depth so that you can meet the needs of those operating resources in the Google Cloud.
The fourth edition of Principles of Information Security explores the field of information security and assurance with updated content including new innovations in technology and methodologies. Readers will revel in the comprehensive coverage that includes a historical overview of information security, discussions on risk management and security technology, current certification information, and more. The text builds on internationally recognized standards and bodies of knowledge to provide the knowledge and skills students need for their future roles as business decision-makers. Information security in the modern organization is a management issue which technology alone cannot answer; it is a problem that has important economic consequences for which management will be held accountable. Readers can feel confident that they are using a standards-based, content-driven resource to prepare for their work in the field.
Joel Sklar has written the definitive text for Web site design, WEB DESIGN PRINCIPLES, 5e, International Edition guiding readers through the entire Web site creation process, while developing and enhancing your HTML, CSS, and visual design skills along the way. Now updated to include the latest Web design technologies and trends, this Fifth Edition features all-new sections on HTML5, CSS3, CSS page layouts, and enhanced navigation as well as technical updates and new screen shots throughout. Beginning with the Web design environment and the principles of sound Web design, readers will continue to planning site layout and navigation, and progress to Web typography, colors and images, working with CSS, and more. Armed with a priceless understanding and plenty of hands-on activities, readers will gain a solid foundation of designing successful, standards-based Web sites that are portable across different operating systems, browsers, and Web devices.
You may like...
Sasha Vodnik, Don Gosselin Paperback (1)
Systems Analysis and Design in a…
Stephen D. Burd, John W. Satzinger, … Hardcover (1)
Principles Of Web Design - The Web…
Joel Sklar Paperback
CISA Certified Information Systems…
David L Cannon, Brian T. O'Hara, … Paperback
Data Structures Using C++
D. Malik Paperback
A Guide To SQL
Philip Pratt, Mary Z Last Paperback
MIS 8 - with MIS Online, 1 term (6…
Hossein Bidgoli Paperback
Database Systems - Design…
Carlos Coronel, Steven Morris Hardcover
Principles Of Business Information…
Ralph Stair, George Reynolds, … Paperback (1)
R622 Discovery Miles 6 220
Database Systems - Design…
Steven Morris, Carlos Coronel Hardcover (2)