Book picks similar to
Social Software in Libraries: Building Collaboration, Communication, and Community Online by Meredith G. Farkas
non-fiction
nonfiction
technology
libraries
Web Form Design: Filling in the Blanks
Luke WroblewskiMicah Alpern - 2008
In Web Form Design, Luke Wroblewski draws on original research, his considerable experience at Yahoo! and eBay, and the perspectives of many of the field's leading designers to show you everything you need to know about designing effective and engaging Web forms.
Literacy Is Not Enough: 21st Century Fluencies for the Digital Age
Lee Crockett - 2011
If students are to thrive in their academic and 21st century careers, then independent and creative thinking hold the highest currency. The authors explain in detail how to add these new components of literacy:Solution Fluency Information Fluency Creativity Fluency Collaboration Fluency Students must master a completely different set of skills to succeed in a culture of technology-driven automation, abundance, and access to global labor markets. The authors present an effective framework for integrating comprehensive literacy or fluency into the traditional curriculum.
The Power of Reading: Insights from the Research
Stephen D. Krashen - 1993
Krashen also explores research surrounding the role of school and public libraries and the research indicating the necessity of a print-rich environment that provides light reading (comics, teen romances, magazines) as well as the best in literature to assist in educating children to read with understanding and in second language acquisition. He looks at the research surrounding reading incentive/rewards programs and specifically at the research on AR (Accelerated Reader) and other electronic reading products.
Systems Analysis and Design
Alan Dennis - 2002
Building on their experience as professional systems analysts and award-winning teachers, authors Dennis, Wixom, and Roth capture the experience of developing and analyzing systems in a way that students can understand and apply.With
Systems Analysis and Design, 4th edition
, students will leave the course with experience that is a rich foundation for further work as a systems analyst.
The Five Dysfunctions of a Team: A Leadership Fable
Patrick Lencioni - 2002
This time, he turns his keen intellect and storytelling power to the fascinating, complex world of teams. Kathryn Petersen, Decision Tech's CEO, faces the ultimate leadership crisis: Uniting a team in such disarray that it threatens to bring down the entire company. Will she succeed? Will she be fired? Will the company fail? Lencioni's utterly gripping tale serves as a timeless reminder that leadership requires as much courage as it does insight. Throughout the story, Lencioni reveals the five dysfunctions which go to the very heart of why teams even the best ones-often struggle. He outlines a powerful model and actionable steps that can be used to overcome these common hurdles and build a cohesive, effective team. Just as with his other books, Lencioni has written a compelling fable with a powerful yet deceptively simple message for all those who strive to be exceptional team leaders.
Hanging Out, Messing Around, and Geeking Out: Kids Living and Learning With New Media
Mizuko ItoDilan Mahendran - 2009
Yet there is little actual research that investigates the intricate dynamics of youths' social and recreational use of digital media. "Hanging Out, Messing Around, and Geeking Out" fills this gap, reporting on an ambitious three-year ethnographic investigation into how young people are living and learning with new media in varied settings -- at home, in after-school programs, and in online spaces. Integrating twenty-three case studies -- which include Harry Potter podcasting, video-game playing, music sharing, and online romantic breakups -- in a unique collaborative authorship style, " Hanging Out, Messing Around, and Geeking Ou"t is distinctive for its combination of in-depth description of specific group dynamics with conceptual analysis.
How the Internet Happened: From Netscape to the iPhone
Brian McCullough - 2018
In How the Internet Happened, he chronicles the whole fascinating story for the first time, beginning in a dusty Illinois basement in 1993, when a group of college kids set off a once-in-an-epoch revolution with what would become the first “dotcom.”Depicting the lives of now-famous innovators like Netscape’s Marc Andreessen and Facebook’s Mark Zuckerberg, McCullough also reveals surprising quirks and unknown tales as he tracks both the technology and the culture around the internet’s rise. Cinematic in detail and unprecedented in scope, the result both enlightens and informs as it draws back the curtain on the new rhythm of disruption and innovation the internet fostered, and helps to redefine an era that changed every part of our lives.
The Library: A Fragile History
Andrew Pettegree - 2021
Along the way, they introduce us to the antiquarians and philanthropists who shaped the world's great collections, trace the rise and fall of fashions and tastes, and reveal the high crimes and misdemeanours committed in pursuit of rare and valuable manuscripts.
Head First C#
Andrew Stellman - 2007
Built for your brain, this book covers C# 3.0 and Visual Studio 2008, and teaches everything from language fundamentals to advanced topics including garbage collection, extension methods, and double-buffered animation. You'll also master C#'s hottest and newest syntax, LINQ, for querying SQL databases, .NET collections, and XML documents. By the time you're through, you'll be a proficient C# programmer, designing and coding large-scale applications. Every few chapters you will come across a lab that lets you apply what you've learned up to that point. Each lab is designed to simulate a professional programming task, increasing in complexity until-at last-you build a working Invaders game, complete with shooting ships, aliens descending while firing, and an animated death sequence for unlucky starfighters. This remarkably engaging book will have you going from zero to 60 with C# in no time flat.
CSS: The Missing Manual
David Sawyer McFarland - 2006
You can tap into the real power of this tool with CSS: The Missing Manual. This second edition combines crystal-clear explanations, real-world examples, and dozens of step-by-step tutorials to show you how to design sites with CSS that work consistently across browsers. Witty and entertaining, this second edition gives you up-to-the-minute pro techniques. You'll learn how to: - Create HTML that's simpler, uses less code, is search-engine friendly, and works well with CSS- Style text by changing fonts, colors, font sizes, and adding borders- Turn simple HTML links into complex and attractive navigation bars -- complete with rollover effects- Create effective photo galleries and special effects, including drop shadows- Get up to speed on CSS 3 properties that work in the latest browser versions- Build complex layouts using CSS, including multi-column designs Style web pages for printing With CSS: The Missing Manual, Second Edition, you'll find all-new online tutorial pages, expanded CSS 3 coverage, and broad support for Firebox, Safari, and other major web browsers, including Internet Explorer 8. Learn how to use CSS effectively to build new websites, or refurbish old sites that are due for an upgrade.
Disrupted: My Misadventure in the Start-Up Bubble
Dan Lyons - 2016
His job no longer existed. "I think they just want to hire younger people," his boss at Newsweek told him. Fifty years old and with a wife and two young kids, Dan was, in a word, screwed. Then an idea hit. Dan had long reported on Silicon Valley and the tech explosion. Why not join it? HubSpot, a Boston start-up, was flush with $100 million in venture capital. They offered Dan a pile of stock options for the vague role of "marketing fellow." What could go wrong? HubSpotters were true believers: They were making the world a better place ... by selling email spam. The office vibe was frat house meets cult compound: The party began at four thirty on Friday and lasted well into the night; "shower pods" became hook-up dens; a push-up club met at noon in the lobby, while nearby, in the "content factory," Nerf gun fights raged. Groups went on "walking meetings," and Dan's absentee boss sent cryptic emails about employees who had "graduated" (read: been fired). In the middle of all this was Dan, exactly twice the age of the average HubSpot employee, and literally old enough to be the father of most of his co-workers, sitting at his desk on his bouncy-ball "chair."Mixed in with Lyons's uproarious tale of his rise and fall at Hubspot is a trenchant analysis of the start-up world, a de facto conspiracy between those who start companies and those who fund them, a world where bad ideas are rewarded with hefty investments, where companies blow money lavishing perks on their post-collegiate workforces, and where everybody is trying to hang on just long enough to reach an IPO and cash out. With a cast of characters that includes devilish angel investors, fad-chasing venture capitalists, entrepreneurs and "wantrapreneurs," bloggers and brogrammers, social climbers and sociopaths, Disrupted is a gripping and definitive account of life in the (second) tech bubble.
Modern Operating Systems
Andrew S. Tanenbaum - 1992
What makes an operating system modern? According to author Andrew Tanenbaum, it is the awareness of high-demand computer applications--primarily in the areas of multimedia, parallel and distributed computing, and security. The development of faster and more advanced hardware has driven progress in software, including enhancements to the operating system. It is one thing to run an old operating system on current hardware, and another to effectively leverage current hardware to best serve modern software applications. If you don't believe it, install Windows 3.0 on a modern PC and try surfing the Internet or burning a CD. Readers familiar with Tanenbaum's previous text, Operating Systems, know the author is a great proponent of simple design and hands-on experimentation. His earlier book came bundled with the source code for an operating system called Minux, a simple variant of Unix and the platform used by Linus Torvalds to develop Linux. Although this book does not come with any source code, he illustrates many of his points with code fragments (C, usually with Unix system calls). The first half of Modern Operating Systems focuses on traditional operating systems concepts: processes, deadlocks, memory management, I/O, and file systems. There is nothing groundbreaking in these early chapters, but all topics are well covered, each including sections on current research and a set of student problems. It is enlightening to read Tanenbaum's explanations of the design decisions made by past operating systems gurus, including his view that additional research on the problem of deadlocks is impractical except for "keeping otherwise unemployed graph theorists off the streets." It is the second half of the book that differentiates itself from older operating systems texts. Here, each chapter describes an element of what constitutes a modern operating system--awareness of multimedia applications, multiple processors, computer networks, and a high level of security. The chapter on multimedia functionality focuses on such features as handling massive files and providing video-on-demand. Included in the discussion on multiprocessor platforms are clustered computers and distributed computing. Finally, the importance of security is discussed--a lively enumeration of the scores of ways operating systems can be vulnerable to attack, from password security to computer viruses and Internet worms. Included at the end of the book are case studies of two popular operating systems: Unix/Linux and Windows 2000. There is a bias toward the Unix/Linux approach, not surprising given the author's experience and academic bent, but this bias does not detract from Tanenbaum's analysis. Both operating systems are dissected, describing how each implements processes, file systems, memory management, and other operating system fundamentals. Tanenbaum's mantra is simple, accessible operating system design. Given that modern operating systems have extensive features, he is forced to reconcile physical size with simplicity. Toward this end, he makes frequent references to the Frederick Brooks classic The Mythical Man-Month for wisdom on managing large, complex software development projects. He finds both Windows 2000 and Unix/Linux guilty of being too complicated--with a particular skewering of Windows 2000 and its "mammoth Win32 API." A primary culprit is the attempt to make operating systems more "user-friendly," which Tanenbaum views as an excuse for bloated code. The solution is to have smart people, the smallest possible team, and well-defined interactions between various operating systems components. Future operating system design will benefit if the advice in this book is taken to heart. --Pete Ostenson
Design for How People Learn
Julie Dirksen - 2011
Many of us are also teaching, even when it's not in our job descriptions. Whether it's giving a presentation, writing documentation, or creating a website or blog, we need and want to share our knowledge with other people. But if you've ever fallen asleep over a boring textbook, or fast-forwarded through a tedious e-learning exercise, you know that creating a great learning experience is harder than it seems.In Design For How People Learn, you'll discover how to use the key principles behind learning, memory, and attention to create materials that enable your audience to both gain and retain the knowledge and skills you're sharing. Using accessible visual metaphors and concrete methods and examples, Design For How People Learn will teach you how to leverage the fundamental concepts of instructional design both to improve your own learning and to engage your audience.
Design for Hackers
David Kadavy - 2011
The term 'hacker' has been redefined to consist of anyone who has an insatiable curiosity as to how things work--and how they can try to make them better. This book is aimed at hackers of all skill levels and explains the classical principles and techniques behind beautiful designs by deconstructing those designs in order to understand what makes them so remarkable. Author and designer David Kadavy provides you with the framework for understanding good design and places a special emphasis on interactive mediums. You'll explore color theory, the role of proportion and geometry in design, and the relationship between medium and form. Packed with unique reverse engineering design examples, this book inspires and encourages you to discover and create new beauty in a variety of formats. Breaks down and studies the classical principles and techniques behind the creation of beautiful design. Illustrates cultural and contextual considerations in communicating to a specific audience. Discusses why design is important, the purpose of design, the various constraints of design, and how today's fonts are designed with the screen in mind. Dissects the elements of color, size, scale, proportion, medium, and form. Features a unique range of examples, including the graffiti in the ancient city of Pompeii, the lack of the color black in Monet's art, the style and sleekness of the iPhone, and more.By the end of this book, you'll be able to apply the featured design principles to your own web designs, mobile apps, or other digital work.
CISSP Study Guide
Eric Conrad - 2010
The exam is designed to ensure that someone who is handling computer security in a company has a standardized body of knowledge. The book is composed of 10 domains of the Common Body of Knowledge. In each section, it defines each domain. It also provides tips on how to prepare for the exam and take the exam. It also contains CISSP practice quizzes to test ones knowledge. The first domain provides information about risk analysis and mitigation. It also discusses security governance. The second domain discusses different techniques for access control, which is the basis for all the security disciplines. The third domain explains the concepts behind cryptography, which is a secure way of communicating that is understood only by certain recipients. Domain 5 discusses security system design, which is fundamental for operating the system and software security components. Domain 6 is a critical domain in the Common Body of Knowledge, the Business Continuity Planning, and Disaster Recovery Planning. It is the final control against extreme events such as injury, loss of life, or failure of an organization. Domains 7, 8, and 9 discuss telecommunications and network security, application development security, and the operations domain, respectively. Domain 10 focuses on the major legal systems that provide a framework in determining the laws about information system.