Book picks similar to
Foundations of Information Privacy and Data Protection: A Survey of Global Concepts, Laws and Practices by Peter P. Swire
non-fiction
privacy
technical
privacy-law
CSS3: The Missing Manual
David Sawyer McFarland - 2012
This Missing Manual shows you how to take your HTML and CSS skills to the next level, with valuable tips, tricks, and step-by-step instructions. You’ll quickly learn how to build web pages that look great and run fast on devices and screens of all sizes.The important stuff you need to know:Start with the basics. Write CSS3-friendly HTML, including the HTML5 tags recognized by today’s browsers.Apply real-world design. Format text, create navigation tools, and enhance pages with graphics.Make your pages lively. Create eye-catching animations and give your visitors attractive tables and forms.Take control of page layouts. Use professional design techniques such as floats and positioning.Look great on any device. Craft websites that adapt to desktop, tablet, and mobile browsers.Get advanced techniques. Use CSS3 more effectively and efficiently, and ensure that your web pages look good when printed.
Information Technology Project Management
Kathy Schwalbe - 1999
The author explains the foundations of project management - project integration, scope, time, cost, quality, human resources, communications, risk, and procurement - using the experiences of real-life businesses. This new fourth edition includes a running case, new PMBOK Guide, and coverage of Microsoft Project 2003. Accompanying the book is a revised companion Web site, www.course.com/mis/schwalbe4e.
Content Strategy for the Web
Kristina Halvorson - 2009
Redesigning your home page won't help. Investing in a new content management system won't fix it, either. So, where do you start? Without meaningful content, your website isn't worth much to your key audiences. But creating (and caring for) "meaningful" content is far more complicated than we're often willing to acknowledge. Content Strategy for the Web explains how to create and deliver useful, usable content for your online audiences, when and where they need it most. It also shares content best practices so you can get your next website redesign right, on time and on budget. For the first time, you'll: See content strategy (and its business value) explained in plain languageFind out why so many web projects implode in the content development phase ... and how to avoid the associated, unnecessary costs and delaysLearn how to audit and analyze your contentMake smarter, achievable decisions about which content to create and howFind out how to maintain consistent, accurate, compelling content over timeGet solid, practical advice on staffing for content-related roles and responsibilities "
Modern Operating Systems
Andrew S. Tanenbaum - 1992
What makes an operating system modern? According to author Andrew Tanenbaum, it is the awareness of high-demand computer applications--primarily in the areas of multimedia, parallel and distributed computing, and security. The development of faster and more advanced hardware has driven progress in software, including enhancements to the operating system. It is one thing to run an old operating system on current hardware, and another to effectively leverage current hardware to best serve modern software applications. If you don't believe it, install Windows 3.0 on a modern PC and try surfing the Internet or burning a CD. Readers familiar with Tanenbaum's previous text, Operating Systems, know the author is a great proponent of simple design and hands-on experimentation. His earlier book came bundled with the source code for an operating system called Minux, a simple variant of Unix and the platform used by Linus Torvalds to develop Linux. Although this book does not come with any source code, he illustrates many of his points with code fragments (C, usually with Unix system calls). The first half of Modern Operating Systems focuses on traditional operating systems concepts: processes, deadlocks, memory management, I/O, and file systems. There is nothing groundbreaking in these early chapters, but all topics are well covered, each including sections on current research and a set of student problems. It is enlightening to read Tanenbaum's explanations of the design decisions made by past operating systems gurus, including his view that additional research on the problem of deadlocks is impractical except for "keeping otherwise unemployed graph theorists off the streets." It is the second half of the book that differentiates itself from older operating systems texts. Here, each chapter describes an element of what constitutes a modern operating system--awareness of multimedia applications, multiple processors, computer networks, and a high level of security. The chapter on multimedia functionality focuses on such features as handling massive files and providing video-on-demand. Included in the discussion on multiprocessor platforms are clustered computers and distributed computing. Finally, the importance of security is discussed--a lively enumeration of the scores of ways operating systems can be vulnerable to attack, from password security to computer viruses and Internet worms. Included at the end of the book are case studies of two popular operating systems: Unix/Linux and Windows 2000. There is a bias toward the Unix/Linux approach, not surprising given the author's experience and academic bent, but this bias does not detract from Tanenbaum's analysis. Both operating systems are dissected, describing how each implements processes, file systems, memory management, and other operating system fundamentals. Tanenbaum's mantra is simple, accessible operating system design. Given that modern operating systems have extensive features, he is forced to reconcile physical size with simplicity. Toward this end, he makes frequent references to the Frederick Brooks classic The Mythical Man-Month for wisdom on managing large, complex software development projects. He finds both Windows 2000 and Unix/Linux guilty of being too complicated--with a particular skewering of Windows 2000 and its "mammoth Win32 API." A primary culprit is the attempt to make operating systems more "user-friendly," which Tanenbaum views as an excuse for bloated code. The solution is to have smart people, the smallest possible team, and well-defined interactions between various operating systems components. Future operating system design will benefit if the advice in this book is taken to heart. --Pete Ostenson
The World Is Flat: A Brief History of the Twenty-first Century
Thomas L. Friedman - 2005
With his inimitable ability to translate complex foreign policy and economic issues, Friedman explains how the flattening of the world happened at the dawn of the 21st century; what it means to countries, companies, communities and individuals; and how governments and societies can, and must, adapt.
Effective C++: 55 Specific Ways to Improve Your Programs and Designs
Scott Meyers - 1991
But the state-of-the-art has moved forward dramatically since Meyers last updated this book in 1997. (For instance, there s now STL. Design patterns. Even new functionality being added through TR1 and Boost.) So Meyers has done a top-to-bottom rewrite, identifying the 55 most valuable techniques you need now to be exceptionally effective with C++. Over half of this edition s content is new. Templates broadly impact C++ development, and you ll find them everywhere. There s extensive coverage of multithreaded systems. There s an entirely new chapter on resource management. You ll find substantial new coverage of exceptions. Much is gained, but nothing s lost: You ll find the same depth of practical insight that first made Effective C++ a classic all those years ago. Bill Camarda, from the July 2005 href="http://www.barnesandnoble.com/newslet... Only
Foundations of Earth Science
Frederick K. Lutgens - 1996
This highly visual, non- technical survey emphasizes broad, up-to-date coverage of basic topics and principles in geology, oceanography, meteorology, and astronomy. The text's flexible design lends itself to the diversity of Earth science courses in both content and approach. As in previous editions, the main focus is to foster student understanding of basic earth science principles.
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Dafydd Stuttard - 2007
The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.
Python Cookbook
David Beazley - 2002
Packed with practical recipes written and tested with Python 3.3, this unique cookbook is for experienced Python programmers who want to focus on modern tools and idioms.Inside, you’ll find complete recipes for more than a dozen topics, covering the core Python language as well as tasks common to a wide variety of application domains. Each recipe contains code samples you can use in your projects right away, along with a discussion about how and why the solution works.Topics include:Data Structures and AlgorithmsStrings and TextNumbers, Dates, and TimesIterators and GeneratorsFiles and I/OData Encoding and ProcessingFunctionsClasses and ObjectsMetaprogrammingModules and PackagesNetwork and Web ProgrammingConcurrencyUtility Scripting and System AdministrationTesting, Debugging, and ExceptionsC Extensions
ServSafe Coursebook [with Answer Sheet]
National Restaurant Association - 2001
It is the ideal solution for the academic setting, multiple-day training, or individuals in need of more extensive food safety training. Food safety has never been more important to the restaurant industry and its customers. Based on the "2013""FDA Food Code, " the "ServSafe Coursebook" focuses on the preventative measures to keep food safe. The content in the "ServSafe Coursebook" goes beyond the principles found in the "ServSafe""Manager Book" and adds greater depth and breadth of food safety practices by featuring expanded sections on food defense, high-risk populations, active managerial control, and crisis management. Food safety topics are presented in a user-friendly, practical way with more real-world case studies and stories to help readers understand the day-to-day importance of food safety. Developed by the industry, for the industry, ServSafe(R) is a proven way to minimize risk and maximize protection for foodservice owners, employees, and customers. Recognized as the industry standard, ServSafe offers a complete suite of printed and online products and is the most important ingredient to food safety training and certification success. The "ServSafe Coursebook" is available packaged with MyServSafeLab(TM). MyServSafeLab is an online homework, tutorial, and assessment program that truly engages students in learning. It helps students better prepare for class, quizzes, and exams-resulting in better performance in the course-and provides educators a dynamic set of tools for gauging individual and class progress. The "ServSafe Coursebook" 6th Edition is available packaged in a number of ways to suit your specific needs. ISBN: 0133883507 is a package containing the book and the answer sheet for the pencil/paper version of the ServSafe Food Protection Manager exam" ServSafe Coursebook with Answer Sheet 6th Edition " Also available: Stand-alone book: "ServSafe Coursebook "6th Edition ISBN: 0133883604A package containing the book, the answer sheet for the pencil/paper version of the ServSafe Food Protection Manager exam, AND MyServSafeLab with Pearson eText Access Card: " ServSafe Coursebook with Answer Sheet, Revised Plus NEW MyServSafeLab with Pearson eText -- Access Card Package, "6/e ISBN: 0133962733A package containing the book and online exam voucher: "ServSafe Coursebook with Online Exam Voucher 6th Edition "ISBN: 0133883515A package containing the book, online exam voucher, AND MyServSafeLab with Pearson eText Access Card: "ServSafe Coursebook with Online Exam Voucher, Revised Plus NEW MyServSafeLab with Pearson eText -- Access Card Package, 6/e "ISBN: 0133962725Students, if interested in purchasing this title with MyServSafeLab, ask your instructor for the correct package ISBN. MyServSafeLab is not a self-paced technology and should only be purchased when required by an instructor. Instructors, contact your Pearson representative for more information.
The Filter Bubble: What the Internet is Hiding From You
Eli Pariser - 2011
Instead of giving you the most broadly popular result, Google now tries to predict what you are most likely to click on. According to MoveOn.org board president Eli Pariser, Google's change in policy is symptomatic of the most significant shift to take place on the Web in recent years - the rise of personalization. In this groundbreaking investigation of the new hidden Web, Pariser uncovers how this growing trend threatens to control how we consume and share information as a society-and reveals what we can do about it.Though the phenomenon has gone largely undetected until now, personalized filters are sweeping the Web, creating individual universes of information for each of us. Facebook - the primary news source for an increasing number of Americans - prioritizes the links it believes will appeal to you so that if you are a liberal, you can expect to see only progressive links. Even an old-media bastion like "The Washington Post" devotes the top of its home page to a news feed with the links your Facebook friends are sharing. Behind the scenes a burgeoning industry of data companies is tracking your personal information to sell to advertisers, from your political leanings to the color you painted your living room to the hiking boots you just browsed on Zappos.In a personalized world, we will increasingly be typed and fed only news that is pleasant, familiar, and confirms our beliefs - and because these filters are invisible, we won't know what is being hidden from us. Our past interests will determine what we are exposed to in the future, leaving less room for the unexpected encounters that spark creativity, innovation, and the democratic exchange of ideas.While we all worry that the Internet is eroding privacy or shrinking our attention spans, Pariser uncovers a more pernicious and far-reaching trend on the Internet and shows how we can - and must - change course. With vivid detail and remarkable scope, The Filter Bubble reveals how personalization undermines the Internet's original purpose as an open platform for the spread of ideas and could leave us all in an isolated, echoing world.
The Master Switch: The Rise and Fall of Information Empires
Tim Wu - 2010
With all our media now traveling a single network, an unprecedented potential is building for centralized control over what Americans see and hear. Could history repeat itself with the next industrial consolidation? Could the Internet—the entire flow of American information—come to be ruled by one corporate leviathan in possession of “the master switch”? That is the big question of Tim Wu’s pathbreaking book.As Wu’s sweeping history shows, each of the new media of the twentieth century—radio, telephone, television, and film—was born free and open. Each invited unrestricted use and enterprising experiment until some would-be mogul battled his way to total domination. Here are stories of an uncommon will to power, the power over information: Adolph Zukor, who took a technology once used as commonly as YouTube is today and made it the exclusive prerogative of a kingdom called Hollywood . . . NBC’s founder, David Sarnoff, who, to save his broadcast empire from disruptive visionaries, bullied one inventor (of electronic television) into alcoholic despair and another (this one of FM radio, and his boyhood friend) into suicide . . . And foremost, Theodore Vail, founder of the Bell System, the greatest information empire of all time, and a capitalist whose faith in Soviet-style central planning set the course of every information industry thereafter.Explaining how invention begets industry and industry begets empire—a progress often blessed by government, typically with stifling consequences for free expression and technical innovation alike—Wu identifies a time-honored pattern in the maneuvers of today’s great information powers: Apple, Google, and an eerily resurgent AT&T. A battle royal looms for the Internet’s future, and with almost every aspect of our lives now dependent on that network, this is one war we dare not tune out.Part industrial exposé, part meditation on what freedom requires in the information age, The Master Switch is a stirring illumination of a drama that has played out over decades in the shadows of our national life and now culminates with terrifying implications for our future.
Universal Methods of Design: 100 Ways to Research Complex Problems, Develop Innovative Ideas, and Design Effective Solutions
Bella Martin - 2012
Universal Methods of Design serves as an invaluable compendium of methods that can be easily referenced and used by cross-disciplinary teams in nearly any design project. Methods and techniques are organized alphabetically for ongoing, quick reference. Each method is presented in a two-page format. The left-hand page contains a concise description of the method, accompanied by references for further reading. On the right-hand page, images and cases studies for each method are presented visually. The relevant phases for design application are highlighted as numbered icons along the right side of the page, from phases 1 (planning) through 5 (launch and monitor).Build more meaningful products with these methods and more: A/B Testing, Affinity Diagramming, Behavioral Mapping, Bodystorming, Contextual Design, Critical Incident Technique, Directed Storytelling, Flexible Modeling, Image Boards, Graffiti Walls, Heuristic Evaluation, Parallel Prototyping, Simulation Exercises, Touchstone Tours, and Weighted Matrix. This essential guide:Dismantles the myth that user research methods are complicated, expensive, and time-consumingCreates a shared meaning for cross-disciplinary design teamsIllustrates methods with compelling visualizations and case studiesCharacterizes each method at a glanceIndicates when methods are best employed to help prioritize appropriate design research strategiesUniversal Methods of Design is an essential resource for designers of all levels and specializations.
Ethics And Technology: Ethical Issues In An Age Of Information And Communication Technology
Herman T. Tavani - 2003
. . . We need a good book in cyberethics to deal with the present and prepare us for an uncertain future. Tavani's Ethics and Technology is such a book." --from the foreword by James Moor, Dartmouth College Is there privacy in a world of camera phones and wireless networking? Does technology threaten your civil liberties? How will bioinformatics and nanotechnology affect us? Should you worry about equity and access in a globalized economy? From privacy and security to free speech and intellectual property to globalization and outsourcing, the issues and controversies of the information age are serious, complex, and pervasive. In this new edition of his groundbreaking book, Herman Tavani introduces computer professionals to the emerging field of Cyberethics, the interdisciplinary field of study that addresses these new ethical issues from all perspectives: technical, social, and philosophical. Using fascinating real-world examples--including the latest court decisions in such cases as Verizon v. RIAA, MGM v. Grokster, Google versus the Bush Administration, and the Children's Online Pornography Act (CIPA) --as well as hypothetical scenarios, he shows you how to understand and analyze the practical, moral, and legal issues that impact your work and your life. Tavani discusses such cutting-edge areas as: * Globalization and outsourcing * Property rights and open source software * HIPAA (privacy laws) and surveillance * The Patriot Act and civil liberties * Bioinformatics and genomics research * Converging technologies--pervasive computing and nanocomputing * Children's online pornography laws Updating and expanding upon the previous edition, Ethics and Technology, Second Edition provides a much-needed ethical compass to help computer and non-computer professionals alike navigate the challenging waters of cyberspace. About the Author Herman T. Tavani is Professor of Philosophy at Rivier College and Co-Director of the International Society for Ethics and Information Technology (INSEIT). He is the author, editor, or co-editor of five books on ethical aspects of information technology. www.wiley.com/college/tavani
Elements of Electromagnetics
Matthew N.O. Sadiku - 1993
The book also provides a balanced presentation of time-varying and static fields, preparingstudents for employment in today's industrial and manufacturing sectors. Streamlined to facilitate student understanding, this edition features worked examples in every chapter that explain how to use the theory presented in the text to solve different kinds of problems. Numerical methods, including MATLAB and vector analysis, are also included to help students analyzesituations that they are likely to encounter in industry practice. Elements of Electromagnetics, Fifth Edition, is designed for introductory undergraduate courses in electromagnetics.
