Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Blown to Bits
For thousands of years, people have been saying that the world is changing and will never again be the same. Yet the profound changes happening today are different, because they result from a specific technological development. It is now possible, in principle, to remember everything that anyone says, writes, sings, draws, or photographs. Everythi...
An Introduction to Computer Networks
An Introduction to Computer Networks, a free and open general-purpose computer-networking free book, complete with diagrams and exercises. It covers the LAN, internetworking and transport layers, focusing primarily on TCP/IP. Particular attention is paid to congestion; other special topics include queuing, real-time traffic, network management, sec...
Blockchain and Crypt Currency
This book contributes to the creation of a cyber ecosystem supported by blockchain technology in which technology and people can coexist in harmony. Blockchains have shown that trusted records, or ledgers, of permanent data can be stored on the Internet in a decentralized manner. The decentralization of the recording process is expected to signific...
Digital Business Models
The spread of the Internet into all areas of business activities has put a particular focus on business models. The digitalization of business processes is the driver of changes in company strategies and management practices alike. This textbook provides a structured and conceptual approach, allowing students and other readers to understand the com...
Guide to Computer Network Security
This definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the rapidly evolving ubiquitous technology we are increasingly dependent on. Fully revised and updated, this timely new edition encompasses the latest developments ...
Multimedia Big Data Computing for IoT Applications
This book considers all aspects of managing the complexity of Multimedia Big Data Computing (MMBD) for IoT applications and develops a comprehensive taxonomy. It also discusses a process model that addresses a number of research challenges associated with MMBD, such as scalability, accessibility, reliability, heterogeneity, and Quality of Service (...
Windows 10 IT Pro Essentials: Support Secrets
That group includes full-time professional trainers, of course, but it also includes IT pros and those brave souls who staff the help desk in corporations. Most of all, it includes the incredibly large population of people who have earned a reputation for being "the person who knows Windows." With that knowledge comes a seemingly endle...
Data Science with Microsoft SQL Server 2016
R is one of the most popular, powerful data analytics languages and environments in use by data scientists. Actionable business data is often stored in Relational Database Management Systems (RDBMS), and one of the most widely used RDBMS is Microsoft SQL Server. Much more than a database server, it's a rich ecostructure with advanced analytic ...
The Piracy Crusade
In the decade and a half since Napster first emerged, forever changing the face of digital culture, the claim that "internet pirates killed the music industry" has become so ubiquitous that it is treated as common knowledge. Piracy is a scourge on legitimate businesses and hard-working artists, we are told, a "cybercrime" simila...
Regulating Content on Social Media
How are users influenced by social media platforms when they generate content, and does this influence affect users' compliance with copyright laws? These are pressing questions in today's internet age, and Regulating Content on Social Media answers them by analysing how the behaviours of social media users are regulated from a copyrig...
How the World Changed Social Media
How the World Changed Social Media is the first book in Why We Post, a book series that investigates the findings of anthropologists who each spent 15 months living in communities across the world. This book offers a comparative analysis summarising the results of the research and explores the impact of social media on politics and gender, educatio...
Hacking Exposed Web Applications
In today's world of pervasive Internet connectivity and rapidly evolving Web technology, online security is as critical as it is challenging. With the enhanced availability of information and services online and Web-based attacks and break-ins on the rise, security risks are at an all time high. Hacking Exposed Web Applications shows you, step...
Operating Systems and Middleware
Suppose you sit down at your computer to check your email. One of the messages includes an attached document, which you are to edit. You click the attachment, and it opens up in another window. After you start editing the document, you realize you need to leave for a trip. You save the document in its partially edited state and shut down the comput...
Introducing Windows 10 for IT Professionals
Get a head start evaluating Windows 10-with technical insights from award-winning journalist and Windows expert Ed Bott. This guide introduces new features and capabilities, providing a practical, high-level overview for IT professionals ready to begin deployment planning now. The goal of this book is to help you sort out what's new in Wind...
Linux Network Administrator's Guide
Linux, a Unix-compatible operating system that runs on personal computers and larger servers, is valued above all for its networking strengths. The Linux Network Administrator's Guide spells out all the information needed for joining a network, whether it's a simple UUCP connection or a full LAN with a Linux system serving as a firewall, ...
The Big Data Agenda
This book highlights that the capacity for gathering, analysing, and utilising vast amounts of digital (user) data raises significant ethical issues. Annika Richterich provides a systematic contemporary overview of the field of critical data studies that reflects on practices of digital data collection and analysis. The book assesses in detail one ...
Mining Social Media
Did fake Twitter accounts help sway a presidential election? What can Facebook and Reddit archives tell us about human behavior? In Mining Social Media, senior BuzzFeed reporter Lam Thuy Vo shows you how to use Python and key data analysis tools to find the stories buried in social media. Whether you're a professional journalist, an academi...
Paths
This open access book explores the amazing similarity between paths taken by people and many other things in life, and its impact on the way we live, teach and learn. Offering insights into the new scientific field of paths as part of the science of networks, it entertainingly describes the universal nature of paths in large networked structures. ...
The Impact of Digital Technologies on Public Health in Developed and Developing Countries
This open access book constitutes the refereed proceedings of the 18th International Conference on String Processing and Information Retrieval, ICOST 2020, held in Hammamet, Tunisia, in June 2020.* The 17 full papers and 23 short papers presented in this volume were carefully reviewed and selected from 49 submissions. They cover topics such as: Io...
Warez
When most people think of piracy, they think of Bittorrent and The Pirate Bay. These public manifestations of piracy, though, conceal an elite worldwide, underground, organized network of pirate groups who specialize in obtaining media - music, videos, games, and software - before their official sale date and then racing against one another to rele...
Defense against the Black Arts
As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It...
Beej's Guide to Network Programming
Back in the mid 90s, Beej got tired of all his friends asking him how to do this stuff with networking programming in C, so he put pen to paper on the early World Wide Web and wrote down everything he knew just to get them off his back. Since then, the Guide has expanded significantly, with plenty of examples, and covers IPv6. Inside you'll fi...
HackSpace Magazine: Issue 60
The Internet of Things is playground for makers. From practical projects such as pet feeders and automatic blind, to silly things like a texting pot plant, there are as many ways of connecting ordinary object to the internet as you can imagine. Let's explore! - Meet the mom behind Geek Mom Projects - Build a flatpack rocket - Turn 3D prin...
Media Resistance
This book is about those who dislike, protest, and try to abstain from media, both new and old. It explains why media resistance persists and answers two questions: What is at stake for resisters and how does media resistance inspire organized action? Yet, despite the interest in media scepticism and dislike, there seems to be no book on the market...
Managing Risk and Information Security
Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while m...
Manifesto of the New Economy
How do social networking services earn money?What is the "second hand of the market" and how does it operate? Why does society need so many different kinds of goods? What does happiness economics not reveal about happiness?What is the link between talent, success and "stardom"? What is the business development model for the ent...
Library and Information Sciences
This book explores the development, trends and research of library and information sciences (LIS) in the digital age. Inside, readers will find research and case studies written by LIS experts, educators and theorists, most of whom have visited China, delivered presentations there and drafted their articles based on feedback they received. As a res...
The Onlife Manifesto
What is the impact of information and communication technologies (ICTs) on the human condition? In order to address this question, in 2012 the European Commission organized a research project entitled The Onlife Initiative: concept reengineering for rethinking societal concerns in the digital transition. This volume collects the work of the Onlife ...
Networks in the Russian Market Economy
A PDF version of this book is available for free in open access via the OAPEN Library platform, www.oapen.org. This book examines the significance of networks among the firms operative in the contemporary Russian software industry in the St. Petersburg region....
Secondary Analysis of Electronic Health Records
This open book trains the next generation of scientists representing different disciplines to leverage the data generated during routine patient care. It formulates a more complete lexicon of evidence-based recommendations and support shared, ethical decision making by doctors with their patients. Diagnostic and therapeutic technologies continue ...
Preparing for Life in a Digital Age
Ability to use information and communication technologies (ICT) is an imperative for effective participation in today's digital age. Schools worldwide are responding to the need to provide young people with that ability. But how effective are they in this regard? The IEA International Computer and Information Literacy Study (ICILS) responded t...
Entity-Oriented Search
This book covers all facets of entity-oriented search—where "search" can be interpreted in the broadest sense of information access—from a unified point of view, and provides a coherent and comprehensive overview of the state of the art. It represents the first synthesis of research in this broad and rapidly developing area. Selected ...

1 2 3 4 ... 6