![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > General
1. This book is useful and accessible background reading for those engaged in organized crime and cybercrime. It is written with the general reader in mind, so will be of interest to students and intelligent readers alike. 2. The book draws on a range of case studies from around the world, looking at Italian Mafias, Russian and Georgian criminal groups and drug cartels, and the Asian gangs such as the Yakuza and the Triads.
This textbook presents fundamental topics in discrete mathematics introduced from the perspectives of a pure mathematician and an applied computer scientist. The synergy between the two complementary perspectives is seen throughout the book; key concepts are motivated and explained through real-world examples, and yet are still formalized with mathematical rigor. The book is an excellent introduction to discrete mathematics for computer science, software engineering, and mathematics students.The first author is a leading mathematician in the area of logic, computability, and theoretical computer science, with more than 25 years of teaching and research experience. The second author is a computer science PhD student at the University of Washington specializing in database systems. The father-and-daughter team merges two different views to create a unified book for students interested in learning discrete mathematics, the connections between discrete mathematics and computer science, and the mathematical foundations of computer science.Readers will learn how to formally define abstract concepts, reason about objects (such as programs, graphs and numbers), investigate properties of algorithms, and prove their correctness. The textbook studies several well-known algorithmic problems including the path problem for graphs and finding the greatest common divisor, inductive definitions, proofs of correctness of algorithms via loop invariants and induction, the basics of formal methods such as propositional logic, finite state machines, counting, probability, as well as the foundations of databases such as relational calculus.
If you're a web designer or app developer interested in sophisticated page styling, improved accessibility, and less time and effort expended, this book is for you. This revised fifth edition provides a comprehensive guide to CSS implementation along with a thorough review of the latest CSS specifications. Authors Eric Meyer and Estelle Weyl show you how to improve user experience, speed development, avoid potential bugs, and add life and depth to your applications through layout, transitions and animations, borders, backgrounds, text properties, and many other tools and techniques. We read the specs so you don't have to! This guide covers: Selectors, specificity, and the cascade, including information on the new cascade layers New and old CSS values and units, including CSS variables and ways to size based on viewports Details on font technology and ways to use any available font variants Text styling, from basic decoration to changing the entire writing mode Padding, borders, outlines, and margins, now discussed in terms of the new block- and inline-direction layout paradigm used by modern browsers Colors, backgrounds, and gradients, including the conic gradients Accessible data tables Flexible box and grid layout systems, including new subgrid capabilities 2D and 3D transforms, transitions, and animation Filters, blending, clipping, and masking Media, feature, and container queries
Did you know the Nintendo Wii had a medical condition named after it? Or that the Sega Saturn almost had the Nintendo 64's graphics chip? Did you realise the Atari Jaguar contained five different processors? Are you aware that a fake website about beekeeping was used to promote an Xbox game? Learn about all of this and more in this unique trivia book about the history of video game consoles that gives you the complete stories in detail! These facts cover a wide range of subjects, such as which console introduced certain technology and features, esoteric hardware oddities, marketing fails and successes, stories behind key games, how certain indispensable people shaped the whole industry, development history, court cases, peculiar events, weird relationships between companies and technical explanations. Plenty of these would be obscure facts that you may not know, but even if you are familiar with them, do you know the full story? 31 video game consoles stretching from 1972 to 2017 are covered, containing more than 235 in-depth facts, numerous other pieces of trivia and over 350 images to create a single package unlike any other that gamers of all ages will find interesting! If you want to fill your head with plenty of knowledge about your favourite video game consoles to amaze your friends with, then this is for you!
Including the latest Microsoft 365 features and enhanced support for Mac users, Cengage's Illustrated Series® Collection, Microsoft® 365® & Office® 2021 Introductory, 1st edition, helps you quickly master the nuances of Microsoft® Office. Its concise, student-friendly approach uses a proven two-page layout that allows you to work through an entire task without turning the page. Each module begins with a brief overview of the principles covered while large, full-color screen images illustrate what you see on your computer. Module Learning Objectives are mapped to Microsoft Office Specialist (MOS) certification objectives, and module scenarios are based on Burning Glass market insights data -- helping you sharpen the critical skills you need for real-world success. In addition, MindTap and SAM (Skills Assessment Manager) online resources help maximize your study time -- and results.
Although Japanese universities have relied on information technology to resolve numerous problems, their high expectations are undermined by lags in implementing that technology. This innovative edited volume argues that lags in IT implementation in Japanese education are created by contradictory and challenging responses of the social environment. If this dialectic can be visualized as having hands, the right avidly promotes IT, while the left hand simultaneously blocks it. The result, of course, is an impasse. The issues central to this stalemate are significant because they point beyond the schools, to a broader set of problem areas in Japanese society. The contributors to Roadblocks on the Information Highway discover and discuss the contradictions inherent in Japanese society and culture as they are played out in the social contexts of IT service providers, web masters, and classroom teachers who implement IT. They then show how these contradictions indicate broader, structural problems that pervade the dynamic between Japanese education and the state and business sectors. Ultimately, in a reach that goes beyond Japan, this book examines relationships between technology and society, persuasively convincing readers that the modern age has created an inextricable link between the two.
Work in Flutter, a framework designed from the ground up for dual platform development, with support for native Java/Kotlin or Objective-C/Swift methods from Flutter apps. Write your next app in one language and build it for both Android and iOS. Deliver the native look, feel, and performance you and your users expect from an app written with each platform's own tools and languages. Deliver apps fast, doing half the work you were doing before and exploiting powerful new features to speed up development. Write once, run anywhere. Learn Flutter, Google's multi-platform mobile development framework. Instantly view the changes you make to an app with stateful hot reload and define a declarative UI in the same language as the app logic, without having to use separate XML UI files. You can also reuse existing platform-specific Android and iOS code and interact with it in an efficient and simple way. Use built-in UI elements - or build your own - to create a simple calculator app. Run native Java/Kotlin or Objective-C/Swift methods from your Flutter apps, and use a Flutter package to make HTTP requests to a Web API or to perform read and write operations on local storage. Apply visual effects to widgets, create transitions and animations, create a chat app using Firebase, and deploy everything on both platforms. Get native look and feel and performance in your Android and iOS apps, and the ability to build for both platforms from a single code base. What You Need: Flutter can be used for Android development on any Linux, Windows or macOS computer, but macOS is needed for iOS development.
How populism is fueled by the demise of the industrial order and the emergence of a new digital society ruled by algorithms In the revolutionary excitement of the 1960s, young people around the world called for a radical shift away from the old industrial order, imagining a future of technological liberation and unfettered prosperity. Industrial society did collapse, and a digital economy has risen to take its place, yet many have been left feeling marginalized and deprived of the possibility of a better life. The Inglorious Years explores the many ways we have been let down by the rising tide of technology, showing how our new interconnectivity is not fulfilling its promise. In this revelatory book, economist Daniel Cohen describes how today's postindustrial society is transforming us all into sequences of data that can be manipulated by algorithms from anywhere on the planet. As yesterday's assembly line was replaced by working online, the leftist protests of the 1960s have given way to angry protests by the populist right. Cohen demonstrates how the digital economy creates the same mix of promises and disappointments as the old industrial order, and how it revives questions about society that are as relevant to us today as they were to the ancients. Brilliant and provocative, The Inglorious Years discusses what the new digital society holds in store for us, and reveals how can we once again regain control of our lives.
'Heady, exhilarating, often astonishing' New York Times 'Iridescently original, deeply disorientating and yet somehow radically hopeful ... worth reading and rereading' Brian Eno 'Be prepared to re-evaluate your relationship with the amazing life forms with whom we share the planet. Fascinating, innovative and thought provoking: I thoroughly recommend Ways of Being' Dr Jane Goodall, DBE Recent years have seen rapid advances in 'artificial' intelligence, which increasingly appears to be something stranger than we ever imagined. At the same time, we are becoming more aware of the other intelligences which have been with us all along, unrecognized. These other beings are the animals, plants, and natural systems that surround us, and are slowly revealing their complexity and knowledge - just as the new technologies we've built are threatening to cause their extinction, and ours. In Ways of Being, writer and artist James Bridle considers the fascinating, uncanny and multiple ways of existing on earth. What can we learn from these other forms of intelligence and personhood, and how can we change our societies to live more equitably with one another and the non-human world? From Greek oracles to octopuses, forests to satellites, Bridle tells a radical new story about ecology, technology and intelligence. We must, they argue, expand our definition of these terms to build a meaningful and free relationship with the non-human, one based on solidarity and cognitive diversity. We have so much to learn, and many worlds to gain.
This book analyses the root causes of suicide terrorism at both the elite and rank-and- file levels of the Hamas and also explains why this tactic has disappeared in the post-2006 period. This volume adopts a multi-causal, multi-level approach to analyse the use of suicide bombings by Hamas and its individual operatives in the Israeli-Palestinian conflict. It uses extensive fieldwork and on-the-ground interviews in order to delve beneath the surface and understand why and how suicide operations were adopted as a sustained mechanism of engagement within the Israeli-Palestinian conflict. Three core factors fuelled Hamas's suicide bombing campaigns. First, Palestinian suicide operations are a complex combination of instrumental and expressive violence adopted by both organisations and individuals to achieve political and/or societal survival, retaliation and competition. In other words, suicide bombings not only serve distinct political and strategic goals for both Hamas and its operatives but they also serve to convey a symbolic message to various audiences, within Israel, the Palestinian territories and around the world. Second, suicide operations perform a crucial role in the formation and consolidation of Palestinian national identity and are also the latest manifestation of the historically entrenched cultural norm of militant heroic martyrdom. Finally, Hamas's use of political Islam also facilitates the articulation, justification and legitimisation of suicide operations as a modern-day jihad against Israel through the means of modern interpretations and fatwas. This approach not only facilitates a much needed, multifaceted, holistic understanding of suicide bombings in this particular region but also yields policy-relevant lessons to address extreme political violence in other parts of the world. This book will be of much interest to students of Hamas, terrorism, Middle East politics and security studies.
With the advent of Siri, iMessage, and iCloud, among others, people are anxious to learn about their new iPhones. This guide covers all aspects of iPhone usage.
This book is designed to be used as a primary textbook in a college-level first course in computing. It takes a fairly traditional approach, emphasizing problem solving, design, and programming as the core skills of computer science. However, these ideas are illustrated using a non-traditional language, namely Python. This textbook was written with a single overarching goal: to introduce fundamental computer science concepts as simply as possible without being simplistic. Using Python is central to this goal. Traditional systems languages such as C , Ada, and Java evolved to solve problems in large-scale programming, where the primary emphasis is on structure and discipline. They were not designed to make writing small- or medium-scale programs easy. The recent rise in popularity of scripting (sometimes called “agile”) languages, such as Python, suggests an alternative approach. Python is very flexible and makes experimentation easy. Solutions to simple problems are simply and elegantly expressed. Python provides a great laboratory for the neophyte programmer. Python has a number of features that make it a near-perfect choice as a first programming language. The basic structures are simple, clean, and well designed, which allows students to focus on the primary skills of algorithmic thinking and program design without getting bogged down in arcane language details. Concepts learned in Python carry over directly to subsequent study of systems languages such as C and Java. But Python is not a “toy language.” It is a real-world production language that is freely available for virtually every programming platform and comes standard with its own easy-to-use integrated programming environment. The best part is that Python makes learning to program fun again. New to the Third Edition The third edition continues the tradition of updating the text to reflect new technologies while maintaining a time-tested approach to teaching introductory computer science. An important change to this edition is the removal of most uses of eval and the addition of a discussion of its dangers. In our increasingly connected world, it’s never too early to begin considering computer security issues. Several new graphics examples, developed throughout chapters 4–12, have been added to introduce new features of the graphics library that support animations, including simple video game development. This brings the text up to date with the types of final projects that are often assigned in modern introductory classes. Smaller changes have been made throughout the text, including: Material on file dialogs has been added in Chapter 5. Chapter 6 has been expanded and reorganized to emphasize value-returning functions. Coverage has been streamlined and simplified to use IDLE (the standard “comes-with-Python” development environment) consistently. This makes the text more suitable for self-study as well as for use as a classroom textbook. Technology references have been updated. To further accommodate self-studiers, end-of-chapter solutions for this third edition will be freely available online. Classroom instructors wishing to use alternative exercises can request those from the publisher. Self-studiers and instructors alike will be able to visit this website to download the solutions.
The articles collected in this volume present different aspects of the use of typed feature structures in theoretical and computational linguistics. It covers a wide range of linguistics theories (CCG, Construction Grammar, HPSG, LTAG), a wide range of linguistic phenomena (aspect, concord, idioms, passive), and a wide range of applications (parsing, question answering, semantic composition).
Concluding the Commodore trilogy, this book takes a look at Commodore's resurgence in the late 1980's and then ultimate demise. This was a period of immense creativity from engineers within the company, who began “moonshot” projects using emerging CD-ROM technology. Get to know the people behind Commodore's successes and failures as they battle to stay relevant amidst blistering competition from Nintendo, Apple, and the onslaught of IBM PC clones. Told through interviews with company insiders, this examination of the now defunct company traces the engineering breakthroughs and baffling decisions that led to the demise of Commodore.
Social media has accelerated communication, expanded business horizons and connected millions of individuals who otherwise would never have met. But not everything social media touches turns to gold--much of it is brass. Social networking sites are used by scammers, criminals and sexual predators, and many people now self-diagnose illness based on misinformation shared online. Businesses make great claims about social media as a marketing tool but few show any real returns. We communicate through social media but are we really saying anything? Is social media doomed to be a conduit of narcissism or can it become a channel for responsible communication? Can social networking overcome its manifold violations of privacy? Must we sacrifice our identities in order to tweet or ""friend"" our associates? This book examines some of the legal and ethical issues surrounding social media, its impact on civil discourse and its role in suicides, murders and criminal enterprise.
Take the latest editions of the challenging RHCSA certification exam with confidence This comprehensive self-study guide clearly explains what you need to know—and gets you fully prepared—for the RHCSA certification exam. Written by a pair of Linux certification experts and experienced authors, this new edition has been thoroughly revised for Red Hat Enterprise Linux 9 and provides complete coverage of all exam objectives. RHCSA Red Hat Enterprise Linux 9 Certification Study Guide, Eighth Edition (Exam EX200) is an integrated study system based on proven pedagogy. Each chapter includes step-by-step exercises, special “Exam Watch” and “On the Job” sidebars, “Two-Minute Drills,” self-tests, and hands-on lab questions. The companion website contains searchable glossaries, downloadable virtual machine files, four complete lab-based practice exams (two for each exam), and 50+ lab-based exercises with answers and explanations. Features 50+ lab-based exercises with answers and in-depth explanations Online content includes two complete lab-based practice exams for RHSCA Written by a pair of Linux certification experts
Creative Food Photography is for photographers who already know how to shoot in manual mode, who have watched the Youtube videos, googled all things food photography and want MORE - more creativity, more information, more of what's not on the internet! In this beautiful, inspiring and thoughtful book, food photographer, stylist and photography teacher Kimberly Espinel explores the ways in which food photography can be brought to life, through planning, styling, and the study of natural light. With warmth, passion and gentle encouragement, Kimberly helps you to play with new ideas and grow in confidence as you discover your own unique style. If you're looking for a highly technical book and want to study artificial light, then this book is may not be the right fit for you. In turn, if you want to delve into your creativity, learn how to put together a professional mood board, understand how to compose your images far beyond the rule of thirds, develop your photographic eye, create images that evoke emotion and learn to style in your own unique way, then this book is for you!
Modern Operating Systems incorporates the latest developments and technologies in operating systems (OS) technologies. Author Andy Tanenbaum's clear and entertaining writing style outlines the concepts every OS designer needs to master. In-depth topic coverage includes processes, threads, memory management, file systems, I/O, deadlocks, interface design, multimedia, performance tradeoffs, and trends in OS design. Case studies explore popular OS and provide real-world context. Tanenbaum also provides information on current research based on his experience as an operating systems researcher. The 5th Edition keeps pace with modern OS with a new chapter on Windows 11, new security coverage, an emphasis on flash-based solid-state drives and more.
This fascinating and timely book traces the emergence and evolution of cybercrime as an increasingly intransigent threat to society. Cybercrime: Criminal Threats from Cyberspace is intended to explain two things: what cybercrime is and why the average citizen should care about it. To accomplish that task, the book offers an overview of cybercrime and an in-depth discussion of the legal and policy issues surrounding it. Enhancing her narrative with real-life stories, author Susan W. Brenner traces the rise of cybercrime from mainframe computer hacking in the 1950s to the organized, professional, and often transnational cybercrime that has become the norm in the 21st century. She explains the many different types of computer-facilitated crime, including identity theft, stalking, extortion, and the use of viruses and worms to damage computers, and outlines and analyzes the challenges cybercrime poses for law enforcement officers at the national and international levels. Finally, she considers the inherent tension between improving law enforcement's ability to pursue cybercriminals and protecting the privacy of U.S. citizens.
This updated edition of the Build Your Own Gaming PC Manual will help readers get the performance they want on a budget they can afford. Whether they want the cutting-edge technology or are just interested in streaming video of themselves playing the latest hit games, readers will find the guidance needed to make their perfect PC a reality. Regardless of if they are looking to upgrade an existing computer or build a new one from scratch, they'll be able to play the newest games in style and be ready to face the challenges of next year's hottest titles. The new edition includes information on virtual reality, along with all the latest software, accessories and video technology.
These poems attempt to apply the logic of an illiterate person writing the statement “I can’t read” to poetry. They all failed. Enjoy. |
![]() ![]() You may like...
Promoting Economic and Social…
Oscar Bernardes, Vanessa Amorim
Hardcover
R7,211
Discovery Miles 72 110
Thinking About Space and Time - 100…
Claus Beisbart, Tilman Sauer, …
Hardcover
R3,394
Discovery Miles 33 940
One Hundred Years of Gauge Theory…
Silvia De Bianchi, Claus Kiefer
Hardcover
R3,159
Discovery Miles 31 590
Blockchain Technology: Applications and…
Sandeep Kumar Panda, Ajay Kumar Jena, …
Hardcover
R5,123
Discovery Miles 51 230
|