Publication Manual of the American Psychological Association(r)


American Psychological Association - 1952
    With millions of copies sold, the Publication Manual of the American Psychological Association is the style manual of choice for writers, editors, students, educators, and professionals in psychology, sociology, business, economics, nursing, social work, and justice administration, and other disciplines in which effective communication with words and data is fundamental.In addition to providing clear guidance on grammar, the mechanics of writing, and APA style, the Publication Manual offers an authoritative and easy-to-use reference and citation system and comprehensive coverage of the treatment of numbers, metrication, statistical and mathematical data, tables, and figures for use in writing, reports, or presentations. The new edition has been revised and updated to include: The latest guidelines and examples for referencing electronic and online sources New and revised guidelines for submitting papers electronically Improved guidelines for avoiding plagiarism Simplified formatting guidelines for writers using up-to-date word-processing software All new guidelines for presenting case studies Improved guidelines for the construction of tables Updates on copyright and permissions issues for writers New reference examples for audiovisual media and patents An expanded and improved index for quick and easy access Writers, scholars, and professionals will also find: New guidelines on how to choose text, tables, or figures to present data Guidelines for writing cover letters for submitting articles for publication, plus a sample letter Expanded guidelines on the retention of raw data New advice on establishing written agreements for the use of shared data New information on the responsibilities of co-authors New and experienced readers alike will find the 5th Edition a complete resource for writing, presenting, or publishing with clarity and persuasiveness.Approximately 400 pages

The Portable MLIS: Insights from the Experts


Ken Haycock - 2008
    This foundation to the profession covers the competencies needed by professional librarians and can serve as both introduction to the new student and an update to the veteran.Typically, interested laypeople and students are introduced to the knowledge, skills, and abilities of professional librarians piecemeal or through introductory or core courses. Unlike other fields (e.g., business administration, management), there is no published broad overview of the profession. Almost peculiarly, the basic foundation course in LIS education is about information in context, or libraries and their mission, but not about the competencies of professional librarians as a foundation for future courses.This book fills that gap, whether as an introduction to the profession or as a response to the question What does a librarian do?Here, experts in several fields of library and information science provide introductions to their areas of expertise, covering the competencies needed by professional librarians. Accessible and comprehensive, The Portable MLIS can serve as both an introduction for the new student and an update for the veteran.

Essential PHP Security


Chris Shiflett - 2005
    It also works beautifully with other open source tools, such as the MySQL database and the Apache web server. However, as more web sites are developed in PHP, they become targets for malicious attackers, and developers need to prepare for the attacks.Security is an issue that demands attention, given the growing frequency of attacks on web sites. Essential PHP Security explains the most common types of attacks and how to write code that isn't susceptible to them. By examining specific attacks and the techniques used to protect against them, you will have a deeper understanding and appreciation of the safeguards you are about to learn in this book.In the much-needed (and highly-requested) Essential PHP Security, each chapter covers an aspect of a web application (such as form processing, database programming, session management, and authentication). Chapters describe potential attacks with examples and then explain techniques to help you prevent those attacks.Topics covered include:Preventing cross-site scripting (XSS) vulnerabilitiesProtecting against SQL injection attacksComplicating session hijacking attemptsYou are in good hands with author Chris Shiflett, an internationally-recognized expert in the field of PHP security. Shiflett is also the founder and President of Brain Bulb, a PHP consultancy that offers a variety of services to clients around the world.

Why Software Sucks...and What You Can Do about It


David S. Platt - 2006
    . . . Put this one on your must-have list if you have software, love software, hate programmers, or even ARE a programmer, because Mr. Platt (who teaches programming) has set out to puncture the bloated egos of all those who think that just because they can write a program, they can make it easy to use. . . . This book is funny, but it is also an important wake-up call for software companies that want to reduce the size of their customer support bills. If you were ever stuck for an answer to the question, 'Why do good programmers make such awful software?' this book holds the answer."--John McCormick, Locksmith columnist, TechRepublic.com "I must say first, I don't get many computing manuscripts that make me laugh out loud. Between the laughs, Dave Platt delivers some very interesting insight and perspective, all in a lucid and engaging style. I don't get much of that either!"--Henry Leitner, assistant dean for information technology andsenior lecturer on computer science, Harvard University "A riotous book for all of us downtrodden computer users, written in language that we understand."--Stacy Baratelli, author's barber "David's unique take on the problems that bedevil software creation made me think about the process in new ways. If you care about the quality of the software you create or use, read this book."--Dave Chappell, principal, Chappell & Associates "I began to read it in my office but stopped before I reached the bottom of the first page. I couldn't keep a grin off my face! I'll enjoy it after I go back home and find a safe place to read."--Tsukasa Makino, IT manager "David explains, in terms that my mother-in-law can understand, why the software we use today can be so frustrating, even dangerous at times, and gives us some real ideas on what we can do about it."--Jim Brosseau, Clarrus Consulting Group, Inc. A Book for Anyone Who Uses a Computer Today...and Just Wants to Scream! Today's software sucks. There's no other good way to say it. It's unsafe, allowing criminal programs to creep through the Internet wires into our very bedrooms. It's unreliable, crashing when we need it most, wiping out hours or days of work with no way to get it back. And it's hard to use, requiring large amounts of head-banging to figure out the simplest operations.It's no secret that software sucks. You know that from personal experience, whether you use computers for work or personal tasks. In this book, programming insider David Platt explains why that's the case and, more importantly, why it doesn't have to be that way. And he explains it in plain, jargon-free English that's a joy to read, using real-world examples with which you're already familiar. In the end, he suggests what you, as a typical user, without a technical background, can do about this sad state of our software--how you, as an informed consumer, don't have to take the abuse that bad software dishes out.As you might expect from the book's title, Dave's expose is laced with humor--sometimes outrageous, but always dead on. You'll laugh out loud as you recall incidents with your own software that made you cry. You'll slap your thigh with the same hand that so often pounded your computer desk and wished it was a bad programmer's face. But Dave hasn't written this book just for laughs. He's written it to give long-overdue voice to your own discovery--that software does, indeed, suck, but it shouldn't.

A Practical Guide to Information Architecture


Donna Spencer - 2010
    Whether it's organising content, providing clear descriptions or ways for people to get to them, this book is armed with practical advice and examples.

It's Complicated: The Social Lives of Networked Teens


Danah Boyd - 2014
    . . It’s Complicated will update your mind.”—Alissa Quart, New York Times Book Review  “A fascinating, well-researched and (mostly) reassuring look at how today's tech-savvy teenagers are using social media.”—People  “The briefest possible summary? The kids are all right, but society isn’t.”—Andrew Leonard, Salon   What is new about how teenagers communicate through services such as Facebook, Twitter, and Instagram? Do social media affect the quality of teens’ lives? In this eye-opening book, youth culture and technology expert danah boyd uncovers some of the major myths regarding teens' use of social media. She explores tropes about identity, privacy, safety, danger, and bullying. Ultimately, boyd argues that society fails young people when paternalism and protectionism hinder teenagers’ ability to become informed, thoughtful, and engaged citizens through their online interactions. Yet despite an environment of rampant fear-mongering, boyd finds that teens often find ways to engage and to develop a sense of identity. Boyd’s conclusions are essential reading not only for parents, teachers, and others who work with teens but also for anyone interested in the impact of emerging technologies on society, culture, and commerce in years to come. Offering insights gleaned from more than a decade of original fieldwork interviewing teenagers across the United States, boyd concludes reassuringly that the kids are all right. At the same time, she acknowledges that coming to terms with life in a networked era is not easy or obvious. In a technologically mediated world, life is bound to be complicated.

Designing Social Interfaces


Christian Crumlish - 2009
    Designing sites that foster user interaction and community-building is a valuable skill for web developers and designers today, but it's not that easy to understand the nuances of the social web. Now you have help. Christian Crumlish and Erin Malone share hard-won insights into what works, what doesn't, and why. You'll learn how to balance opposing factions and grow healthy online communities by co-creating them with your users.Understand the overarching principles you need to consider for every website you createLearn basic design patterns for adding social components to an existing siteRein in misbehaving users on an active community siteBuild a social experience around a product or service and invite people to joinDevelop a social utility without having to build an entirely new infrastructureEnable users of your site's content to interact with one anotherOffer your members the opportunity to connect in the real worldLearn to recognize and avoid antipatterns: emergent bad practices in the social network and social media space

Web ReDesign 2.0: Workflow that Works


Kelly Goto - 2001
    So much so, in fact, that the 12-month design cycles cited in the last edition have shrunk to 6 or even 3 months today. Which is why, more than ever, you need a smart, practical guide that demonstrates how to plan, budget, organize, and manage your Web redesign - or even you initial design - projects from conceptualization to launch. This volume delivers! In these pages Web designer extraordinaire Kelly Goto and coauthor Emily Cotler have distilled their real-world experience into a sound approach to Web redesign workflow that is as much about business priorities as it is about good design. By focusing on where these priorities intersect, Kelly and Emily get straight to the heart of the matter. Each chapter includes a case study that illustrates a key step in the process, and you'll find a plethora of forms, checklists, and worksheets that help you put knowledge into action.This is an AIGA Design Press book published under Peachpit's New Riders imprint in partnership with AIGA.

Double Fold: Libraries and the Assault on Paper


Nicholson Baker - 2001
    But for fifty years our country's libraries—including the Library of Congress—have been doing just the opposite, destroying hundreds of thousands of historic newspapers and replacing them with microfilm copies that are difficult to read, lack all the color and quality of the original paper and illustrations, and deteriorate with age.With meticulous detective work and Baker's well-known explanatory power, Double Fold reveals a secret history of microfilm lobbyists, former CIA agents, and warehouses where priceless archives are destroyed with a machine called a guillotine. Baker argues passionately for preservation, even cashing in his own retirement account to save one important archive—all twenty tons of it. Written the brilliant narrative style that Nicholson Baker fans have come to expect, Double Fold is a persuasive and often devastating book that may turn out to be The Jungle of the American library system.

Structure and Interpretation of Computer Programs


Harold Abelson - 1984
    This long-awaited revision contains changes throughout the text. There are new implementations of most of the major programming systems in the book, including the interpreters and compilers, and the authors have incorporated many small changes that reflect their experience teaching the course at MIT since the first edition was published. A new theme has been introduced that emphasizes the central role played by different approaches to dealing with time in computational models: objects with state, concurrent programming, functional programming and lazy evaluation, and nondeterministic programming. There are new example sections on higher-order procedures in graphics and on applications of stream processing in numerical programming, and many new exercises. In addition, all the programs have been reworked to run in any Scheme implementation that adheres to the IEEE standard.

The Systems Bible: The Beginner's Guide to Systems Large and Small: Being the Third Edition of Systemantics


John Gall - 1977
    Hardcover published by Quadragle/The New York Times Book Co., third printing, August 1977, copyright 1975.

Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions


Gregor Hohpe - 2003
    The authors also include examples covering a variety of different integration technologies, such as JMS, MSMQ, TIBCO ActiveEnterprise, Microsoft BizTalk, SOAP, and XSL. A case study describing a bond trading system illustrates the patterns in practice, and the book offers a look at emerging standards, as well as insights into what the future of enterprise integration might hold. This book provides a consistent vocabulary and visual notation framework to describe large-scale integration solutions across many technologies. It also explores in detail the advantages and limitations of asynchronous messaging architectures. The authors present practical advice on designing code that connects an application to a messaging system, and provide extensive information to help you determine when to send a message, how to route it to the proper destination, and how to monitor the health of a messaging system. If you want to know how to manage, monitor, and maintain a messaging system once it is in use, get this book.

The Productive Programmer


Neal Ford - 2008
    The Productive Programmer offers critical timesaving and productivity tools that you can adopt right away, no matter what platform you use. Master developer Neal Ford not only offers advice on the mechanics of productivity-how to work smarter, spurn interruptions, get the most out your computer, and avoid repetition-he also details valuable practices that will help you elude common traps, improve your code, and become more valuable to your team. You'll learn to:Write the test before you write the codeManage the lifecycle of your objects fastidiously Build only what you need now, not what you might need later Apply ancient philosophies to software development Question authority, rather than blindly adhere to standardsMake hard things easier and impossible things possible through meta-programming Be sure all code within a method is at the same level of abstraction Pick the right editor and assemble the best tools for the job This isn't theory, but the fruits of Ford's real-world experience as an Application Architect at the global IT consultancy ThoughtWorks. Whether you're a beginner or a pro with years of experience, you'll improve your work and your career with the simple and straightforward principles in The Productive Programmer.

The Information Diet: A Case for Conscious Consumption


Clay A. Johnson - 2011
    Not eating, but gorging on information ceaselessly spewed from the screens and speakers we hold dear. Just as we have grown morbidly obese on sugar, fat, and flour—so, too, have we become gluttons for texts, instant messages, emails, RSS feeds, downloads, videos, status updates, and tweets.We're all battling a storm of distractions, buffeted with notifications and tempted by tasty tidbits of information. And just as too much junk food can lead to obesity, too much junk information can lead to cluelessness. The Information Diet shows you how to thrive in this information glut—what to look for, what to avoid, and how to be selective. In the process, author Clay Johnson explains the role information has played throughout history, and why following his prescribed diet is essential for everyone who strives to be smart, productive, and sane.In The Information Diet, you will:Discover why eminent scholars are worried about our state of attention and general intelligenceExamine how today’s media—Big Info—give us exactly what we want: content that confirms our beliefsLearn to take steps to develop data literacy, attention fitness, and a healthy sense of humorBecome engaged in the economics of information by learning how to reward good information providersJust like a normal, healthy food diet, The Information Diet is not about consuming less—it’s about finding a healthy balance that works for you

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws


Dafydd Stuttard - 2007
    The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.