![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet > General
Handbook on Networked Multipoint Multimedia Conferencing and Multistream Immsersive Telepresence using SIP: Scalable Distributed Applications and Media Control over Internet is the first book to put together all IETF request for comments (RFCs), and the internet drafts standards related to the multipoint conferencing and immersive telepresence. This book includes mandatory and optional texts of all standards in a chronological and systematic way almost with one-to-one integrity from the beginning to end, allowing the reader to understand all aspects of the highly complex real-time applications. It is a book that network designers, software developers, product manufacturers, implementers, interoperability testers, professionals, professors, and researchers will find to be immensely useful. Practitioners and engineers in all spectrums who are concentrating on building the real-time, scalable, interoperable multipoint applications, can use this book to make informed choices based on technical standards in the market place, on all proprietary non-scalable and non-interposable products. This book will provide focus and foundation for these decision makers.
The amount of data in everyday life has been exploding. This data increase has been especially significant in scientific fields, where substantial amounts of data must be captured, communicated, aggregated, stored, and analyzed. Cloud Computing with e-Science Applications explains how cloud computing can improve data management in data-heavy fields such as bioinformatics, earth science, and computer science. The book begins with an overview of cloud models supplied by the National Institute of Standards and Technology (NIST), and then: Discusses the challenges imposed by big data on scientific data infrastructures, including security and trust issues Covers vulnerabilities such as data theft or loss, privacy concerns, infected applications, threats in virtualization, and cross-virtual machine attack Describes the implementation of workflows in clouds, proposing an architecture composed of two layers-platform and application Details infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS), and software-as-a-service (SaaS) solutions based on public, private, and hybrid cloud computing models Demonstrates how cloud computing aids in resource control, vertical and horizontal scalability, interoperability, and adaptive scheduling Featuring significant contributions from research centers, universities, and industries worldwide, Cloud Computing with e-Science Applications presents innovative cloud migration methodologies applicable to a variety of fields where large data sets are produced. The book provides the scientific community with an essential reference for moving applications to the cloud.
This work studies the development of bilateral relations in two pairs of states (dyads): Argentina-Brazil and Argentina-Chile. It takes on a moderate constructivist approach that incorporates into the analysis of international relations the role of identities, ideas and perceptions as well as of material forces, and understands that the former are affected and changed during interaction. It also uses to securitization theory to explain how issues come or cease to be considered security matters through social constructions.
Blog with the best of 'em! If you're looking for a complete guide to creating and solidifying your place in the blogosphere, you've come to the right place! With 8 books in one, Blogging All-in-One For Dummies is the only resource you'll need to get started or to improve your existing blog. Learn about the most popular blogging platforms, creating content worth reading, and methods for driving traffic to your blog. Cut through the confusion and find the facts about monetizing your blog, using the best blogging tools for you, and increasing reader engagement to become an active, successful member of the blogging community. You're ready to start blogging, so let Dummies show you the way! Perfect your blog idea and choose the best platform for you Get people to read your blog through search engine optimization and social media promotion Learn about the latest trends in the blogosphere Make money from your blog with creative monetization ideas Bloggers of all skill and experience levels will find valuable information in Blogging All-in-One For Dummies.
This book teaches beginners and aspiring game developers how to develop 2D games with Unity. Thousands of commercial games have been built with Unity. The reader will learn the complete process of 2D game development, step by step. The theory behind each step is fully explained. This book contains numerous color illustrations and access to all source code and companion videos. Key Features: Fully detailed game projects from scratch. Beginners can do the steps and create games right away. No coding experience is necessary. Numerous examples take a raw beginner toward professional coding proficiency in C# and Unity. Includes a thorough introduction to Unity 2020, including 2D game development, prefabs, cameras, animation, character controllers, lighting, and sound. Includes a step-by-step introduction to Unity 2019.3. Extensive coverage of GIMP, Audacity, and MuseScore for the creation of 2D graphics, sound effects, and music. All required software is free to use for any purpose including commercial applications and games. Franz Lanzinger is the owner and chief game developer of Lanzinger Studio, an independent game development and music studio in Sunnyvale, California. He started his career in game programming in 1982 at Atari Games, Inc., where he designed and programmed the classic arcade game Crystal Castles. In 1989, he joined Tengen, where he was a programmer and designer for Ms. Pac-Man and Toobin' on the NES. He co-founded Bitmasters, where he designed and coded games including Rampart and Championship Pool for the NES and SNES, and NCAA Final Four Basketball for the SNES and Sega Genesis. In 1996, he founded Actual Entertainment, publisher and developer of the Gubble video game series. He has a B.Sc. in mathematics from the University of Notre Dame and attended graduate school in mathematics at the University of California at Berkeley. He is a former world record holder on Centipede and Burgertime. He is a professional author, game developer, accompanist, and piano teacher. He is currently working on remaking the original Gubble game in Unity and Blender.
Visualizing with Text uncovers the rich palette of text elements usable in visualizations from simple labels through to documents. Using a multidisciplinary research effort spanning across fields including visualization, typography, and cartography, it builds a solid foundation for the design space of text in visualization. The book illustrates many new kinds of visualizations, including microtext lines, skim formatting, and typographic sets that solve some of the shortcomings of well-known visualization techniques. Key features: More than 240 illustrations to aid inspiration of new visualizations Eight new approaches to data visualization leveraging text Quick reference guide for visualization with text Builds a solid foundation extending current visualization theory Bridges between visualization, typography, text analytics, and natural language processing The author website, including teaching exercises and interactive demos and code, can be found here. Designers, developers, and academics can use this book as a reference and inspiration for new approaches to visualization in any application that uses text.
Visualizing with Text uncovers the rich palette of text elements usable in visualizations from simple labels through to documents. Using a multidisciplinary research effort spanning across fields including visualization, typography, and cartography, it builds a solid foundation for the design space of text in visualization. The book illustrates many new kinds of visualizations, including microtext lines, skim formatting, and typographic sets that solve some of the shortcomings of well-known visualization techniques. Key features: More than 240 illustrations to aid inspiration of new visualizations Eight new approaches to data visualization leveraging text Quick reference guide for visualization with text Builds a solid foundation extending current visualization theory Bridges between visualization, typography, text analytics, and natural language processing The author website, including teaching exercises and interactive demos and code, can be found here. Designers, developers, and academics can use this book as a reference and inspiration for new approaches to visualization in any application that uses text.
The Internet in China reflects many contradictions and complexities of the society in which it is embedded. Despite the growing significance of digital media and communication technologies, research on their contingent, non-linear, and sometimes paradoxical impact on civic engagement remains theoretically underdeveloped and empirically understudied. As importantly, many studies on the internet's implications in Chinese societies have focused on China. This book draws on a variety of theoretical and methodological approaches to advance a balanced and context-rich understanding of the effects of digital media and communication technologies, especially social media, for state legitimacy, the rise of issue-based networks, the growth of the public sphere, and various forms of civic engagement in China, Taiwan, and the global Chinese diaspora. Using ethnography, interview, experiment, survey, and the big data method, scholars from North America, Europe, and Asia show that the couture and impacts of digital activism depend on issue and context. This book was originally published as a special issue of Information, Communication & Society.
Increasingly, identity theft is a fact of life. We might once have hoped to protect ourselves from hackers with airtight passwords and aggressive spam folders, and those are good ideas as far as they go. But the truth is, there are people out there - a lot of them - who treat stealing your identity as a full-time job.One such company is a nameless firm located in Russia, which has a trove of over a billion internet passwords. Another set up a website full of live streams of hacked web cameras, showing everything from people's offices and lobbies to the feeds from baby monitors. Even purchases made in person are still logged by retailers like Target, who are famously vulnerable to hackers. Adam Levin, a longtime consumer advocate and identity fraud expert, is your guide to this brave new world. By telling memorable stories and extracting the relevant lessons, he offers a strategy for dealing with these risks. You may not be able to prevent identity theft, but you certainly shouldn't wait until it happens to take action. Levin's approach is defined by the three M's: minimizing risk, monitoring your identity, and managing the damage. The book is also organized around the different problems caused by identity theft: financial, criminal, medical, familial, etc., enabling readers to dip into the sections most relevant to them. Swiped is a practical, lively book that is essential to surviving the ever-changing world of online security. It is invaluable not only for preventing problems but helping cope when they arrive.
The every person's guide to social media... how to use it and what never to do. Are you trying to figure out how to safely use social media but finding yourself struggling? Here's a book specifically designed to help regular people figure out social media platforms. It begins with a chapter about social media basics: how they normally work, why people use them, and general safety tips. It is easy to get confused by the large number of options that are out there so this book breaks down each major network into its own chapter. Chapters are included for: Facebook Snapchat Pinterest LinkedIn Instagram YouTube Twitter Reddit, and Tumblr. Because each social media platform has its their own rules, benefits, and challenges, each chapter gives a summary of the platform and tells the reader why people use it. Next, each chapter has a glossary of terms to explain language and slang that are used. This will help people who are new to social media learn about terminology like subreddits, retweets, and more. If readers decide to use the platform (or already use it and want to learn more), each chapter guides users through a "how-to" of using each platform. This includes the basic functionality, setting up profiles, settings, and odd features that even current users may not know about. Privacy and safety are also covered, with a platform-specific section devoted to these important issues in each chapter. Two final chapters cover other notable social media platforms that readers might want to know about and archiving tips for saving social media posts and information. This book can help people new to social media, people joining new social media, and people who are already on but want to learn how to better manage and protect their accounts.
Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of the network, and (ii) security and privacy technologies that ensure the privacy of the participants of the network as well as provide controlled access to the information posted and exchanged by the participants. The authors explore security and privacy issues for social media systems, analyze such systems, and discuss prototypes they have developed for social media systems whose data are represented using semantic web technologies. These experimental systems have been developed at The University of Texas at Dallas. The material in this book, together with the numerous references listed in each chapter, have been used for a graduate-level course at The University of Texas at Dallas on analyzing and securing social media. Several experimental systems developed by graduate students are also provided. The book is divided into nine main sections: (1) supporting technologies, (2) basics of analyzing and securing social networks, (3) the authors' design and implementation of various social network analytics tools, (4) privacy aspects of social networks, (5) access control and inference control for social networks, (6) experimental systems designed or developed by the authors on analyzing and securing social networks, (7) social media application systems developed by the authors, (8) secure social media systems developed by the authors, and (9) some of the authors' exploratory work and further directions.
The Internet's importance for freedom of expression and other rights comes in part from the ability it bestows on users to create and share information, rather than just receive it. Within the context of existing freedom of expression guarantees, this book critically evaluates the goal of bridging the 'digital divide' - the gap between those who have access to the Internet and those who do not. Central to this analysis is the examination of two questions: first, is there a right to access the Internet, and if so, what does that right look like and how far does it extend? Second, if there is a right to access the Internet, is there a legal obligation on States to overcome the digital divide? Through examination of this debate's history, analysis of case law in the European Court of Human Rights and Inter-American Court of Human Rights, and a case study of one digital inclusion programme in Jalisco, Mexico, this book concludes that there is indeed currently a legal right to Internet access, but one that it is very limited in scope. The 2012 Joint Declaration on Freedom of Expression and the Internet is aspirational in nature, rather than a representative summary of current protections afforded by the international human rights legal framework. This book establishes a critical foundation from which some of these aspirations could be advanced in the future. The digital divide is not just a human rights challenge nor will it be overcome through human rights law alone. Nevertheless, human rights law could and should do more than it has thus far.
Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy. Topics include addressing vulnerabilities, building a secure enterprise, blocking intrusions, ethical and legal issues, and business continuity. Updates include topics such as cyber risks in mobile telephony, steganography, cybersecurity as an added value, ransomware defense, review of recent cyber laws, new types of cybercrime, plus new chapters on digital currencies and encryption key management.
In only a few years, Google has become an authoritative provider of multiple products which have changed the digital information landscape. This book discusses how libraries can go beyond Google's basic search and Scholar functions to expand services for their patrons. Respected authorities reveal the expanding variety of new Google applications developed in the past few years, many of which have not received wide attention and are as yet not often used in libraries. Applications explored include Google Co-op, Google News, Google Docs & Spreadsheets, Google Calendar, and Google Talk. This book also discusses different important aspects of the company's expansion of functions, such as the failure of the Google Answers experiment, the broad variety of free Google applications that librarians can use to collaborate, and the success of Google's Blogger, among others. A helpful chronology of Google's growth is provided, as well as comparative analyses between various Google functions and other functions that are currently available. The book is extensively referenced. This book is an invaluable resource for academic librarians, public librarians, school librarians, library science faculty, and special librarians. This book was published as a special issue of the Journal of Library Administration.
In only a few years, Google has become an authoritative provider of multiple products which have changed the digital information landscape. This book discusses how libraries can go beyond Google's basic search and Scholar functions to expand services for their patrons. Respected authorities reveal the expanding variety of new Google applications developed in the past few years, many of which have not received wide attention and are as yet not often used in libraries. Applications explored include Google Co-op, Google News, Google Docs & Spreadsheets, Google Calendar, and Google Talk. This book also discusses different important aspects of the company's expansion of functions, such as the failure of the Google Answers experiment, the broad variety of free Google applications that librarians can use to collaborate, and the success of Google's Blogger, among others. A helpful chronology of Google's growth is provided, as well as comparative analyses between various Google functions and other functions that are currently available. The book is extensively referenced. This book is an invaluable resource for academic librarians, public librarians, school librarians, library science faculty, and special librarians. This book was published as a special issue of the Journal of Library Administration.
Developing Semantic Web Services is "well-informed about work on WS [Web Services] and the SemWeb [Semantic Web], and in particular . . . understand[s] OWL-S . . . very well . . .. Also, the book . . . fill[s] a need that, to my knowledge, hasn't been met at all." ---David Martin, editor OWL-S Coalition The inventor of the World Wide Web, Tim Berners-Lee, is also the originator of the next generation Web architecture, the Semantic Web. Currently, his World Wide Web consortium (W3C) team works to develop, extend, and standardize the Web's markup languages and tools. The objective of the Semantic Web Architecture is to provide a knowledge representation of linked data in order to allow machine processing on a global scale. The W3C has developed a new generation of open standard markup languages which are now poised to unleash the power, flexibility, and above all---logic---of the next generation Web, as well as open the door to the next generation of Web Services. There are many ways in which the two areas of Web Services and the Semantic Web could interact to lead to the further development of Semantic Web Services. Berners-Lee has suggested that both of these technologies would benefit from integration that would combine the Semantic Web's meaningful content with Web Services' business logic. Areas such as UDDI and WSDL are ideally suited to be implemented using Semantic Web technology. In addition, SOAP could use RDF payloads, remote RDF query and updates, and interact with Semantic Web business rules engines, thereby laying the foundation for Semantic Web Services. This book presents the complete Language Pyramid of Web markup languages, including Resource Description Framework (RDF), Web Ontology Language (OWL) and OWL-Services (OWL-S) along with examples and software demos. The source code for the "Semantic Web Author," an Integrated Development Environment for Semantic Markup Languages is available on CD-ROM with the book.
This book showcases various ways in which digital archives allow for new approaches to journalism history. The chapters in this book were selected based on three overall objectives: 1) research that highlights specific concerns within journalism history through digital archives; 2) discussions of digital methodologies, as well as specific applications, that are accessible for journalism scholars with no prior experiences with such approaches; and 3) that journalism history and digital archives are connected in other ways than through specific methods, i.e., that the connection raises larger questions of historiography and power. The contributions address cases and developments in Asia, South and North America and Europe; and range from long-range, big-data, machine-leaning and topic modelling studies of journalistic characteristics and meta-journalistic discourses to critiques of archival practices and access in relation to gender, social movements and poverty. The chapters in this book were originally published as a special issue of Digital Journalism.
An illuminating insight into the Metaverse - what it is, how it works,
and and why it will soon be playing a major role in business,
technology and society.
The Semantic Web combines the descriptive languages RDF (Resource Description Framework) and OWL (Web Ontology Language), with the data-centric, customizable XML (eXtensible Mark-up Language) to provide descriptions of the content of Web documents. These machine-interpretable descriptions allow more intelligent software systems to be written, automating the analysis and exploitation of web-based information. Software agents will be able to create "automatically" new services from already published services, with potentially huge implications for models of e-Business. "Semantic Web Technologies" provides a comprehensive overview of key semantic knowledge technologies and research. The authors explain (semi-)automatic ontology generation and metadata extraction in depth, along with ontology management and mediation. Further chapters examine how Semantic Web technology is being applied in knowledge management ("Semantic Information Access") and in the next generation of Web services. "Semantic Web Technologies: " Provides a comprehensive exposition of the state-of-the art in Semantic Web research and key technologies. Explains the use of ontologies and metadata to achieve machine-interpretability. Describes methods for ontology learning and metadata generation. Discusses ontology management and evolution, covering ontology change detection and propagation, ontology dependency and mediation. Illustrates the theoretical concepts with three case studies on industrial applications in digital libraries, the legal sector and the telecommunication industry. Graduate and advanced undergraduate students, academic and industrial researchers in the field will all find "Semantic WebTechnologies" an essential guide to the technologies of the Semantic Web.
Written for Higher Education educators, managers and policy-makers, Plagiarism, the Internet and Student Learning combines theoretical understandings with a practical model of plagiarism and aims to explain why and how plagiarism developed. It offers a new way to conceptualize plagiarism and provides a framework for professionals dealing with plagiarism in higher education. Sutherland-Smith presents a model of plagiarism, called the plagiarism continuum, which usefully informs discussion and direction of plagiarism management in most educational settings. The model was developed from a cross-disciplinary examination of plagiarism with a particular focus on understanding how educators and students perceive and respond to issues of plagiarism. The evolution of plagiarism, from its birth in Law, to a global issue, poses challenges to international educators in diverse cultural settings. The case studies included are the voices of educators and students discussing the complexity of plagiarism in policy and practice, as well as the tensions between institutional and individual responses. A review of international studies plus qualitative empirical research on plagiarism, conducted in Australia between 2004-2006, explain why it has emerged as a major issue. The book examines current teaching approaches in light of issues surrounding plagiarism, particularly Internet plagiarism. The model affords insight into ways in which teaching and learning approaches can be enhanced to cope with the ever-changing face of plagiarism. This book challenges Higher Education educators, managers and policy-makers to examine their own beliefs and practices in managing the phenomenon of plagiarism in academic writing.
Initiatives, such as INSPIRE and the US DHS Geospatial Data Model, are working to develop a rich set of standards that will create harmonized models and themes for the spatial information infrastructure. However, this is only the first step. Semantically meaningful models must still be developed in order to stimulate interoperability. Creating Spatial Information Infrastructures (SII) presents solutions to the problems preventing the launch of a truly effective SII. Leading experts in SII development present a complete overview of SII, including user and application needs, theoretical and technological foundations, and examples of realized working SII's. The book includes semantic applications in each discussion and explains their importance to the future of geo-information standardization. Offering practical solutions to technical and nontechnical obstacles, this book provides the tools needed to take the next step toward a working semantic web-one that will revolutionize the way the world accesses and utilizes spatial information.
The fun and easy way to take poker online Five years ago, 50 million people were playing poker recreationally or professionally. Now that number is more than 100 million, including a huge influx of young people. Online betting is up nearly four-fold over the past year, with total wagers running over USD30 billion. Winning at Internet Poker For Dummies provides the lowdown on the hottest game around, highlighting the best sites and virtual games and showing how to make secure online bets. The book covers setting up an account, securing funds, navigating a basic online poker game, using Internet abbreviations and lingo, observing online poker etiquette, playing popular online poker games such as Texas Hold 'Em and Omaha, devising a winning strategy, and participating in tournaments. Mark "The Red" Harlan (Santa Clara, CA) is cofounder of CyberArts Licensing, a company working on the next-generation Internet poker room, gamesgrid.com. During the course of his 20-year Silicon Valley career, he designed eBay's bidding schema, was the Human Interface Evangelist at Apple Computer, and wrote the popular "Notes from the Fringe" column at InfoWorld.; Chris Derossi (Henderson, NV) is also a co
Ubiquitous and pervasive technologies such as RFID and smart computing promise a world of networked and interconnected devices. Everything from tires to toothbrushes could soon be in communications range, heralding the dawn of an era in which today's "Internet of People" gives way to tomorrow's "Internet of Things" - where billions of objects will have the ability to report their location, identity, and history over wireless connections. Connectivity and Communication - Anything, Anywhere, and Anytime An examination of the exciting expansion period in this research, The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems provides comprehensive, technical, and practical deploying policy guidance that covers fundamentals and recent advances in pervasive networked systems. The book addresses the conceptual and technical issues that influence the technology roadmap and gives an in-depth introduction to the "Internet of Things" and its effect on businesses and individuals. Discussing case studies, experience reports, and best practice, it contains information on emerging technologies, market opportunities, and policy implications. Practical Guidance and Balanced Coverage The first book of its kind to address major new technological developments and define the "Internet of Things," this text provides balanced coverage of theory and practical issues. Reflecting research trends and industry needs, itis a comprehensive technical and practical guide to recent advances in pervasive networked systems.
In this companion, a diverse, international and interdisciplinary group of contributors and editors examine the rapidly expanding, far-reaching field of mobile media as it intersects with art across a range of spaces-theoretical, practical and conceptual. As a vehicle for-and of-the everyday, mobile media is recalibrating the relationship between art and digital networked media, and reshaping how creative practices such as writing, photography, video art and filmmaking are being conceptualized and practised. In exploring these innovations, The Routledge Companion to Mobile Media Art pulls together comprehensive, culturally nuanced and interdisciplinary approaches; considerations of broader media ecologies and histories and political, social and cultural dynamics; and critical and considered perspectives on the intersections between mobile media and art. This book is the definitive publication for researchers, artists and students interested in comprehending all the various aspects of mobile media art, covering digital media and culture, internet studies, games studies, anthropology, sociology, geography, media and communication, cultural studies and design. |
![]() ![]() You may like...
Nahla and the 3D Machine - A rhyming…
Nahla-Rose Bartlett-Vanderpuye, Charlene Russell, …
Hardcover
R497
Discovery Miles 4 970
|