![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > General
Begin your JavaScript journey with this comprehensive, hands-on guide. You’ll learn everything there is to know about professional JavaScript programming, from core language concepts to essential client-side tasks. Build dynamic web applications with step-by-step instructions and expand your knowledge by exploring server-side development and mobile development. Work with advanced language features, write clean and efficient code, and much more! · Your all-in-one guide to JavaScript· Work with objects, reference types, events, forms, and web APIs· Build server-side applications, mobile applications, desktop applications, and more· Consult and download practical code examples Language ReviewRefresh your knowledge or learn JavaScript as a beginner with in-depth coverage of JavaScript basics. Understand how to store values, use data types, control flow, and debug your code. Client-Side ProgrammingBuild dynamic web applications by learning to process events, load content, create images, and use web APIs. Advanced ConceptsExplore server-side application development with Node.js, mobile application development with React Native and Iconic, and desktop programming with Electron and NW.js. Work with advanced language features and more. This book includes: 1) More than 1,000 pages of JavaScript knowledge from a leading expert 2) A compendium of basics and advanced topics for professionals 3) Detailed, numbered code listings 4) Diagrams, charts, tables, note boxes, definitions, and background information 5) Numerous illustrations and screenshots 6) A comprehensive index This book is for you if: 1) You’re a beginner without extensive programming experience who wants to learn the JavaScript language: In addition to JavaScript basics, this book provides you with information about programming concepts and paradigms, as well as the most important APIs and application areas of JavaScript. The best way to work with the book as a beginner is to read it from cover to cover. Prior knowledge of HTML and CSS will make it easier to follow along with this book. 2) You’re a professional programmer looking to add JavaScript to your language repertoire: You can deepen your knowledge and learn from a comprehensive and versatile reference guide. Explore advanced topics and follow along with in-depth exercises. Since the code examples do not build on each other, you can read the chapters in any order you prefer. Highlights: Reference types Objects Events Forms Web APIs Object-oriented programming Functional programming Client-side applications Server-side applications Mobile and desktop applications
This book looks at the growing segment of Internet of Things technology (IoT) known as Internet of Medical Things (IoMT), an automated system that aids in bridging the gap between isolated and rural communities and the critical healthcare services that are available in more populated and urban areas. Many technological aspects of IoMT are still being researched and developed, with the objective of minimizing the cost and improving the performance of the overall healthcare system. This book focuses on innovative IoMT methods and solutions being developed for use in the application of healthcare services, including post-surgery care, virtual home assistance, smart real-time patient monitoring, implantable sensors and cameras, and diagnosis and treatment planning. It also examines critical issues around the technology, such as security vulnerabilities, IoMT machine learning approaches, and medical data compression for lossless data transmission and archiving. Internet of Medical Things is a valuable reference for researchers, students, and postgraduates working in biomedical, electronics, and communications engineering, as well as practicing healthcare professionals.
Can you imagine swapping your body for a virtual version? This technology-based look at the afterlife chronicles America's fascination with death and reveals how digital immortality may become a reality. The Internet has reinvented the paradigm of life and death: social media enables a discourse with loved ones long after their deaths, while gaming sites provide opportunities for multiple lives and life forms. In this thought-provoking work, author Kevin O'Neill examines America's concept of afterlife—as imagined in cyberspace—and considers how technologies designed to emulate immortality present serious challenges to our ideas about human identity and to our religious beliefs about heaven and hell. The first part of the work—covering the period between 1840 and 1860—addresses post-mortem photography, cemetery design, and spiritualism. The second section discusses Internet afterlife, including online memorials and cemeteries; social media legacy pages; and sites that curate passwords, bequests, and final requests. The work concludes with chapters on the transhumanist movement, the philosophical and religious debates about Internet immortality, and the study of technologies attempting to extend life long after the human form ceases.
With the aim to sequentially determine optimal allocations across a set of assets, Online Portfolio Selection (OLPS) has significantly reshaped the financial investment landscape. Online Portfolio Selection: Principles and Algorithms supplies a comprehensive survey of existing OLPS principles and presents a collection of innovative strategies that leverage machine learning techniques for financial investment. The book presents four new algorithms based on machine learning techniques that were designed by the authors, as well as a new back-test system they developed for evaluating trading strategy effectiveness. The book uses simulations with real market data to illustrate the trading strategies in action and to provide readers with the confidence to deploy the strategies themselves. The book is presented in five sections that: Introduce OLPS and formulate OLPS as a sequential decision task Present key OLPS principles, including benchmarks, follow the winner, follow the loser, pattern matching, and meta-learning Detail four innovative OLPS algorithms based on cutting-edge machine learning techniques Provide a toolbox for evaluating the OLPS algorithms and present empirical studies comparing the proposed algorithms with the state of the art Investigate possible future directions Complete with a back-test system that uses historical data to evaluate the performance of trading strategies, as well as MATLAB® code for the back-test systems, this book is an ideal resource for graduate students in finance, computer science, and statistics. It is also suitable for researchers and engineers interested in computational investment. Readers are encouraged to visit the authors’ website for updates: http://olps.stevenhoi.org.
Although the terms "data mining" and "knowledge discovery and data mining" (KDDM) are sometimes used interchangeably, data mining is actually just one step in the KDDM process. Data mining is the process of extracting useful information from data, while KDDM is the coordinated process of understanding the business and mining the data in order to identify previously unknown patterns. Knowledge Discovery Process and Methods to Enhance Organizational Performance explains the knowledge discovery and data mining (KDDM) process in a manner that makes it easy for readers to implement. Sharing the insights of international KDDM experts, it details powerful strategies, models, and techniques for managing the full cycle of knowledge discovery projects. The book supplies a process-centric view of how to implement successful data mining projects through the use of the KDDM process. It discusses the implications of data mining including security, privacy, ethical and legal considerations. Provides an introduction to KDDM, including the various models adopted in academia and industry Details critical success factors for KDDM projects as well as the impact of poor quality data or inaccessibility to data on KDDM projects Proposes the use of hybrid approaches that couple data mining with other analytic techniques (e.g., data envelopment analysis, cluster analysis, and neural networks) to derive greater value and utility Demonstrates the applicability of the KDDM process beyond analytics Shares experiences of implementing and applying various stages of the KDDM process in organizations The book includes case study examples of KDDM applications in business and government. After reading this book, you will understand the critical success factors required to develop robust data mining objectives that are in alignment with your organization’s strategic business objectives.
In order to perform effective analysis of today’s information security systems, numerous components must be taken into consideration. This book presents a well-organized, consistent solution created by the author, which allows for precise multilevel analysis of information security systems and accounts for all of the significant details. Enabling the multilevel modeling of secure systems, the quality of protection modeling language (QoP-ML) approach provides for the abstraction of security systems while maintaining an emphasis on quality protection. This book introduces the basis of the QoP modeling language along with all the advanced analysis modules, syntax, and semantics. It delineates the steps used in cryptographic protocols and introduces a multilevel protocol analysis that expands current understanding. Introduces quality of protection evaluation of IT Systems Covers the financial, economic, and CO2 emission analysis phase Supplies a multilevel analysis of Cloud-based data centers Details the structures for advanced communication modeling and energy analysis Considers security and energy efficiency trade-offs for the protocols of wireless sensor network architectures Includes case studies that illustrate the QoP analysis process using the QoP-ML Examines the robust security metrics of cryptographic primitives Compares and contrasts QoP-ML with the PL/SQL, SecureUML, and UMLsec approaches by means of the SEQUAL framework The book explains the formal logic for representing the relationships between security mechanisms in a manner that offers the possibility to evaluate security attributes. It presents the architecture and API of tools that ensure automatic analysis, including the automatic quality of protection analysis tool (AQoPA), crypto metrics tool (CMTool), and security mechanisms evaluation tool (SMETool). The book includes a number of examples and case studies that illustrate the QoP analysis process by the QoP-ML. Every operation defined by QoP-ML is described within parameters of security metrics to help you better evaluate the impact of each operation on your system's security.
An engrossing origin story for the personal computer—showing how the Apple II’s software helped a machine transcend from hobbyists’ plaything to essential home appliance. Skip the iPhone, the iPod, and the Macintosh. If you want to understand how Apple Inc. became an industry behemoth, look no further than the 1977 Apple II. Designed by the brilliant engineer Steve Wozniak and hustled into the marketplace by his Apple cofounder Steve Jobs, the Apple II became one of the most prominent personal computers of this dawning industry. The Apple II was a versatile piece of hardware, but its most compelling story isn’t found in the feat of its engineering, the personalities of Apple’s founders, or the way it set the stage for the company’s multibillion-dollar future. Instead, historian Laine Nooney shows, what made the Apple II iconic was its software. In software, we discover the material reasons people bought computers. Not to hack, but to play. Not to code, but to calculate. Not to program, but to print. The story of personal computing in the United States is not about the evolution of hackers—it’s about the rise of everyday users. Recounting a constellation of software creation stories, Nooney offers a new understanding of how the hobbyists’ microcomputers of the 1970s became the personal computer we know today. From iconic software products like VisiCalc and The Print Shop to historic games like Mystery House and Snooper Troops to long-forgotten disk-cracking utilities, The Apple II Age offers an unprecedented look at the people, the industry, and the money that built the microcomputing milieu—and why so much of it converged around the pioneering Apple II.
Attention to design patterns is unquestionably growing in software engineering because there is a strong belief that using made to measure solutions for solving frequently occurring problems encountered throughout the design phase greatly reduces the total cost and the time of developing software products. Stable Design Patterns for Software and Systems presents a new and fresh approach for creating stable, reusable, and widely applicable design patterns. It deals with the concept of stable design patterns based on software stability as a contemporary approach for building stable and highly reusable and widely applicable design patterns. This book shows that a formation approach to discovering and creating stable design patterns accords with Alexander’s current understanding of architectural patterns. Stable design patterns are a type of knowledge pattern that underline human problem solving methods and appeal to the pattern community. This book examines software design patterns with respect to four central themes: How do we develop a solution for the problem through software stability concepts? This book offers a direct application of using software stability concepts for modeling solutions. How do we achieve software stability over time and design patterns that are effective to use? What are the unique roles of stable design patterns in modeling the accurate solution of the problem at hand and in providing stable and undisputed design for such problems? This book enumerates a complete and domain-less list of stable patterns that are useful for designing and modeling solutions for frequently recurring problems. What is the most efficient way to document the stable design patters to ensure efficient reusability? This book is an extension to the contemporary templates that are used in documenting design patterns. This book gives a pragmatic and a novel approach toward understanding the problem domain and in proposing stable solutions for engineering stable software systems, components, and frameworks.
Learn the ins and outs of the IT security field and efficiently prepare for the CompTIA Security+ Exam SY0-601 with one easy-to-follow resource CompTIA Security+ Review Guide: Exam SY0-601, Fifth Edition helps you to efficiently review for the leading IT security certification—CompTIA Security+ SY0-601. Accomplished author and security expert James Michael Stewart covers each domain in a straightforward and practical way, ensuring that you grasp and understand the objectives as quickly as possible. Whether you’re refreshing your knowledge or doing a last-minute review right before taking the exam, this guide includes access to a companion online test bank that offers hundreds of practice questions, flashcards, and glossary terms. Covering all five domains tested by Exam SY0-601, this guide reviews: Attacks, Threats, and Vulnerabilities Architecture and Design Implementation Operations and Incident Response Governance, Risk, and Compliance This newly updated Fifth Edition of CompTIA Security+ Review Guide: Exam SY0-601 is not just perfect for anyone hoping to take the SY0-601 Exam, but it is also an excellent resource for those wondering about entering the IT security field.
This book investigates how bodily information contributes to categorization processes for at least some conceptual classes and thus to the individual mastery of meanings for at least some word classes. The bodily information considered is mainly that provided by the so-called proprioceptive and interoceptive systems introduced by Sherrington. The authors reconsider this in a new Gibsonian fashion calling it more generally “proprioception”, which indicates the complex of all the bodily signals we are aware of and the qualitative experiences these give rise to. The book shows that proprioceptive information understood in this sense is essential for explaining (among others) how we develop broad categories such as animate vs. inanimate, concepts denoting bodily experiences such as hunger or pain as well as emotions and abstract concepts such as friendship and freedom and in accounting for how we master the meanings of the corresponding words in our language.
Understand Kubernetes and other orchestration systems deeply by building your own using Go and the Docker API. In Build an Orchestrator in Go you will learn how to: Identify the components that make up any orchestration system Schedule containers on to worker nodes Start and stop containers using the Docker API Manage a cluster of worker nodes using a simple API Work with algorithms taken from cutting-edge Google Borg research papers Demystify orchestration systems like Kubernetes and Nomad Orchestration systems like Kubernetes coordinate other software subsystems and services to create a complete organized system. Although orchestration tools have a reputation for complexity, they’re designed around few important patterns that apply across many aspects of software development. Build an Orchestrator in Go reveals the inner workings of orchestration frameworks by guiding you as you design and implement your own using the Go SDK. As you create your own orchestration framework, you’ll improve your understanding of Kubernetes and its role in distributed system design. You’ll also build the skills required to design custom orchestration solutions for those times when an out-of-the-box solution isn’t a good fit. about the technology Orchestration systems provide the management framework for software and infrastructure that’s distributed across multiple machines and services. By managing the many individual components and containers in a large application, they ensure web apps are resilient and reliable, automatically switching between resources in response to crashes and outages. A properly designed orchestration system can seamlessly scale to handle traffic loads, and reduce time-consuming manual work for sysadmin and site reliability engineers. about the book Build an Orchestrator in Go teaches you to implement an orchestrator from scratch. You’ll discover the components that make up all orchestration systems, and use the Docker API and Go SDK to build layers of functionality from tasks, to workers, to the manager. Learn how to save on costs by maximising the usage of a cluster, or spread tasks among workers to avoid overload and downtime. Once you’ve built your working system, you’ll even implement a command line user interface to easily manage your orchestrator.
Learn favorite techniques from this group of twenty-two Excel MVPs. The Excel MVPs are friends and competitors who each pulled out their favorite tricks to impress you and their fellow MVPs.
Robotic Process Automation will continue its exponential growth over the next five years. With more than 54 vendors, different kinds of tools, generic applicability and as a cognitive and AI platform, RPA has fast become an opportunity that is too good to miss. So, how do you leverage the massive potential business value? Based on four years of research into over 420 business deployments, this book identifies the distinctive leading practices of front-runners, and a Total Value of Ownership (TVO) framework to drive out value across the RPA life-cycle. This book brings a new focus on RPA's strategic potential: the innovations made possible and how to deliver through effective sourcing stakeholder-buy-in, governance, change management, and capability development practices. RPA as a platform, linking with cognitive and AI technologies as part of digital transformation is highlighted. The central messages - think and behave strategically, start right, institutionalize fast, and innovate continuously - are demonstrated, with multiple client experiences, trials and lessons. From dealing with old world process and IT challenges, RPA is now being applied towards building the new digital world and becoming strategic in its application. * Based on extensive new research by world renowned authors * Comprehensive market overview * A systematic set of action principles across the RPA life-cycle * Challenges, and where value is being left on the table * A focus on metrics and Total Value of Ownership * Multiple client case studies * RPA as a foundation for cognitive and AI
The Charter of the United Nations was signed in 1945 by 51 countries representing all continents, paving the way for the creation of the United Nations on 24 October 1945. The Statute of the International Court of Justice forms part of the Charter. The aim of the Charter is to save humanity from war; to reaffirm human rights and the dignity and worth of the human person; to proclaim the equal rights of men and women and of nations large and small; and to promote the prosperity of all humankind. The Charter is the foundation of international peace and security.
Designed to provide you with the knowledge and skills needed to protect your technology devices from increasingly sophisticated cyberattacks, SECURITY AWARENESS: APPLYING PRACTICAL CYBERSECURITY IN YOUR WORLD, 6th EDITION continues to present the same practical information that has made previous editions so popular. For most students, practical cybersecurity poses daunting challenges: Do I need antivirus software? How can I manage all my passwords? Can I prevent a ransomware attack? Is there a way to make my Web browser secure? What are patches? This text is designed to help you understand the answers to these questions and to protect your devices and even Wi-Fi networks from cyberattacks. In addition, hands-on projects and case studies give you the opportunity to test your knowledge and apply what you have learned.
Learn by doing with this user-friendly introduction to time series data analysis in R. This book explores the intricacies of managing and cleaning time series data of different sizes, scales and granularity, data preparation for analysis and visualization, and different approaches to classical and machine learning time series modeling and forecasting. A range of pedagogical features support students, including end-of-chapter exercises, problems, quizzes and case studies. The case studies are designed to stretch the learner, introducing larger data sets, enhanced data management skills, and R packages and functions appropriate for real-world data analysis. On top of providing commented R programs and data sets, the book's companion website offers extra case studies, lecture slides, videos and exercise solutions. Accessible to those with a basic background in statistics and probability, this is an ideal hands-on text for undergraduate and graduate students, as well as researchers in data-rich disciplines
A unique set of 100 cards with over 200 TikTok challenges for you to shoot and upload, from lip synchs, dances and dares to ridiculous pranks.
See Dungeons & Dragons come to life through the incredible craftwork of pop-up legend Matthew Reinhart! Let a paper craft D20 guide your adventure as you explore iconic D&D locations and enjoy scores of easter eggs waiting to be discovered behind interactive doors and flaps! This immersive pop-up book is a unique addition to any D&D collection! Experience the Forgotten Realms like you've never seen it before! From lands such as Waterdeep and Icewind Dale, to creatures like mind flayers, dragons, mimics, owl bears, and beholders, the expansive world of Dungeons & Dragons is brought to life in a whole new way through this immersive pop-up book. Use this pop-up book's paper craft D20 to guide your adventure! Readers who roll a critical hit will discover auspicious interactive features, while others may meet certain doom. Packed with easter eggs from fan-favourite campaigns, a wealth of hidden surprises to discover, and all-new artwork, Dungeons & Dragons: The Ultimate Pop-Up Book is a must have for any D&D fan!
Successful use of information and communication technologies depends on usable designs that do not require expensive training, accommodate the needs of diverse users and are low cost. There is a growing demand and increasing pressure for adopting innovative approaches to the design and delivery of education, hence, the use of online learning (also called E-learning) as a mode of study. This is partly due to the increasing number of learners and the limited resources available to meet a wide range of various needs, backgrounds, expectations, skills, levels, ages, abilities and disabilities. The advances of new technology and communications (WWW, Human Computer Interaction and Multimedia) have made it possible to reach out to a bigger audience around the globe. By focusing on the issues that have impact on the usability of online learning programs and their implementation, this specifically fills-in a gap in this area, which is particularly invaluable to practitioners.
‘Joan Didion at a startup’ Rebecca Solnit ‘Impossibly pleasurable’ Jia Tolentino ‘This is essential reading’ Stylist At twenty-five years old, Anna Wiener was beginning to tire of her assistant job in New York publishing. There was no room to grow, and the voyeuristic thrill of answering someone else’s phone had worn thin. Within a year she had moved to Silicon Valley to take up a job at a data analytics startup in San Francisco. Leaving her business casual skirts and shirts in the wardrobe, she began working in company-branded T-shirts. She had a healthy income for the first time in her life. She felt like part of the future. But a tide was beginning to turn. People were speaking of tech startups as surveillance companies. Out of sixty employees, only eight of her colleagues were women. Casual sexism was rife. Sexual harassment cases were proliferating. And soon, like everyone else, she was addicted to the internet, refreshing the news, refreshing social media, scrolling and scrolling and scrolling. Slowly, she began to realise that her blind faith in ambitious, arrogant young men from America’s soft suburbs wasn’t just her own personal pathology. It had become a global affliction. Uncanny Valley is a coming of age story set against the backdrop of our generation’s very own gold rush. It’s a story about the tension between old and new, between art and tech, between the quest for money and the quest for meaning – about how our world is changing forever.
This volume presents the main results of the 4th International
Conference on Multivariate Approximation, which was held at
Witten-Bommerholz, September 24-29, 2000. Nineteen selected,
peer-reviewed contributions cover recent topics in constructive
approximation on varieties, approximation by solutions of partial
differential equations, application of Riesz bases and frames,
multiwavelets and subdivision.
A unique, practical guide to the power of simulation in the art of logistics management. Authors show better ways to manage complex logistics systems than seat of the pants decision making, and argue that information systems people must provide management with simulations that are timely and easily understood. In doing so, Nersesian and Swartz demonstrate the inadequacy of conventional quantitative methods in dealing with complex logistical systems, and show how simulation can address various logistics management issues. Important reading for logistics managers and computer staffs and for educators seeking better ways to make logistical decisions. |
![]() ![]() You may like...
Adaptive Filtering - Theories and…
Lino Garcia Morales
Hardcover
|