Browse Results

Showing 53,426 through 53,450 of 53,816 results

QuickTime for Java: A Developer's Notebook

by Chris Adamson

Java developers who need to add audio, video, or interactive media creation and playback to their applications find that QuickTime Java is a powerful toolkit, but one that's not easy to get into. This book offers the first real look at this important software with an informal, code-intensive style that lets impatient early adopters focus on learning by doing. You get just the functionality you need.

Xcode Treasures: Master the Tools to Design, Build, and Distribute Great Apps

by Chris Adamson

Learn the critical tips and techniques to make using Xcode for the iPhone, iPad, or Mac easier, and even fun. Explore the features and functionality of Xcode you may not have heard of. Go under the hood to discover how projects really work, so when they stop working, you'll know how to fix them. Explore the common problems developers face when using Xcode, and find out how to get the most out of your IDE. Dig into Xcode, and you'll discover it's richer and more powerful than you might have thought. Get a huge productivity boost by working with Xcode instead of against it. Instead of hacky code fixes and manual processes, once you know the the why and how of Xcode's process, you'll discover that doing things Xcode's way makes your app development more elegant and less aggravating. Explore the major features of Xcode: project management, building UIs with storyboards, code editing, compiling apps, fixing bugs and performance problems, unit- and UI testing, and source code management. Go beyond the basics and explore tasks that professionals deal with when they're working on big projects. Create storyboards that many developers can work on at once, even as projects grow to hundreds or thousands of files. Find the tools that make the code editor pleasant to work with, even in long coding sessions. Discover the right way to find and fix bugs when you have lots of code that's not always playing nicely together.Dig into specific and little-discussed features that help developers on Apple's other platforms: macOS, watchOS, and tvOS. When you're ready to distribute your app, learn how Apple's code-signing system really works. Find out when to let Xcode handle it automatically, and how to do it manually when needed. Discover how much easier and more fun iOS development is when you know the secrets of the tools. What You Need:This book requires Xcode 9 and a Mac running macOS High Sierra (10.13.2) or later. Additionally, an iOS device is recommended for on-device testing but not required.

Hands-On Cloud Development with WildFly: Develop, deploy, and configure cloud-based, enterprise Java applications with WildFly Swarm and OpenShift

by Tomasz Adamski

Create microservices using Java EE technologies using WildFly Swarm,deploy them in the OpenShift cloud, make them resilient to network failures using Hystrix, configure continuous integration using Jenkins, and security using Keycloak.Key FeaturesCreate functional microservices with WildFly SwarmUse OpenShift to deploy your microservices in the cloudMake your application production-ready using Jenkins, Hystrix, and KeycloakBook DescriptionThe book starts by introducing you to WildFly Swarm—a tool that allows you to create runnable microservices from Java EE components. You’ll learn the basics of Swarm operation—creating microservices containing only the parts of enterprise runtime needed in a specific case. Later, you’ll learn how to configure and test those services.In order to deploy our services in the cloud, we’ll use OpenShift. You’ll get to know basic information on its architecture, features, and relationship to Docker and Kubernetes. Later, you’ll learn how to deploy and configure your services to run in the OpenShift cloud.In the last part of the book, you’ll see how to make your application production-ready. You’ll find out how to configure continuous integration for your services using Jenkins, make your application resistant to network failures using Hystrix, and how to secure them using Keycloak. By the end of the book, you’ll have a functional example application and will have practical knowledge of Java EE cloud development that can be used as a reference in your other projects.What you will learnUtilize Java EE technology to develop modern cloud-enabled applicationsEasily create microservices with WildFly Swarm using proven Java EE technologiesSee the benefits of OpenShift – easy deployment of your services, out of the box scalability and healing, and integration with Continuous Integration toolsIntegrate the sample application with Jenkins’ Continuous Integration serverUtilize Hystrix to provide resilience​ to your applicationProvide security to your application using KeycloakWho this book is forIf you're an experienced developer familiar with Java EE technologies and would like to learn how you can use those technologies in the cloud with WildFly and OpenShift, then this book is for you.

Electronic Tribes

by Tyrone L. Adams Stephen A. Smith

Whether people want to play games and download music, engage in social networking and professional collaboration, or view pornography and incite terror, the Internet provides myriad opportunities for people who share common interests to find each other. The contributors to this book argue that these self-selected online groups are best understood as tribes, with many of the same ramifications, both positive and negative, that tribalism has in the non-cyber world. In Electronic Tribes, the authors of sixteen competitively selected essays provide an up-to-the-minute look at the social uses and occasional abuses of online communication in the new media era. They explore many current Internet subcultures, including MySpace. com, craftster. org, massively multiplayer online role-playing games (MMORPGs) such as World of Warcraft, music downloading, white supremacist and other counterculture groups, and Nigerian e-mail scams. Their research raises compelling questions and some remarkable answers about the real-life social consequences of participating in electronic tribes. Collectively, the contributors to this book capture a profound shift in the way people connect, as communities formed by geographical proximity are giving way to communities - both online and offline - formed around ideas.

The Freedom Bible: An A-to-Z Guide to Exercising Your Individual Rights, Protecting Your Privacy, Liberating Yourself from Corporate and Government Overreach

by Ted Adams

Learn How to Protect Your Family&’s Freedom!Freedom is the foundation on which America was born and continues to thrive. If you believe in the strength of freedom as more than an ideal, you can find smart ways to exercise it in all parts of your life! The Freedom Bible is your A-to-Z guide to knowing your individual rights and seeking more control and freedom through the decisions you face every day.Own healthcare decisions for you and your familyMake choices that direct your dollars where you want—for example, made in America, not overseasKnow your options to challenge governing boards—from home ownership associations to school boardsReduce your reliance on &“the grid&”Escape the invasiveness of all kinds of technologyGuard your privacy and free speech on social mediaAnd much more!Get freedom from…· Big Government· Big Tech· Dependence on Overseas Goods· Employer &“Requirements&”· HOAs· Social media jail· Spam callers· Taxes· And More!

Microsoft® .NET and SAP

by Scott Adams Steve Fox Juergen Daiberl Thomas Reimer

Get hands-on answers to frequently asked questions about using Microsoft .NET technologies to customize and extend SAP applications. Walk through dozens of real-world examples--from Web Services integration to business intelligence (BI) reporting and Microsoft Office-based solutions--direct from a team of Microsoft-SAP interoperability experts. Learn how to expose back-end SAP data through familiar Microsoft tools and UIs--for better productivity and lower TCO. Discover how to: Navigate the development environment and tools--including Microsoft Visual Studio®, Visual Studio Tools for Office, and BizTalk® Server Connect .NET and SAP via Web Services, tools like SAP Connector and Enterprise Service Explorer, and .NET Data Provider Implement BI solutions that unlock SAP data through familiar Microsoft UIs Expose data from SAP NetWeaver Portal in Microsoft Office SharePoint® Server Use the Business Data Catalog to display and search SAP content--no coding Build your own Office Business Applications (OBAs), or put Duet to work Add Microsoft Office presence functionality and forms solutions to SAP applications Deliver a single sign-on solution

Migrating to Swift from Flash and ActionScript

by Radoslava Leseva Adams Hristo Lesev

Build on your knowledge of ActionScript to take the fast track developing iOS apps with Apple's latest language, Swift. Swift's syntax is easier to understand than Objective-C for people already familiar with ActionScript. At the same time it offers a number of new features and richer expressiveness than both ActionScript and Objective-C. Switching to a new platform usually involves migration on three levels: tools, workflow, and programming language. This book is structured as a guide that will help you on each level with step-by-step tutorials. Apart from the tutorials, it comes with recipes for some of the most popular mobile development topics: social network integration and messaging, taking advantage of device capabilities, networking and working with local and iCloud data, advertising in your app or game, and 2D and 3D graphics. The book also includes a final chapter that takes you through Apple's App Store submission process. Don't just build your apps, sell them. What You Will Learn: Expand your development knowledge to native iOS programming with Swift Use the latest Xcode 7 IDE Migrate your existing ActionScript projects to Swift Create advanced UI, leverage the device hardware, integrate with social networks, take advantage of 2D and 3D graphics Diagnose your app quickly with Xcode's debugger and instruments Prepare and submit our iOS app in Apple's App Store Who This Book is For: Migrating to Swift from Flash and ActionScript is for Flash and Adobe AIR developers who want to move on to native iOS programming with the latest Apple Swift language. It's for the seasoned ActionScript programmer who is looking to add another language and platform to their tool belt quickly. Migrating to Swift from Flash and ActionScript is a good choice for developers who learn by doing and don't have time to read thick manuals and books for beginners in order to start programming in a new language.

Transparency: New Trajectories in Law (New Trajectories in Law)

by Rachel Adams

This book critiques the contemporary recourse to transparency in law and policy. This is, ostensibly, the information age. At the heart of the societal shift toward digitalisation is the call for transparency and the liberalisation of information and data. Yet, with the recent rise of concerns such as 'fake news', post-truth and misinformation, where the policy responses to all these phenomena has been a petition for even greater transparency, it becomes imperative to critically reflect on what this dominant idea means, whom it serves, and what the effects are of its power. In response, this book provides the first sustained critique of the concept of transparency in law and policy. It offers a concise overview of transparency in law and policy around the world, and critiques how this concept works discursively to delimit other forms of governance, other ways of knowing and other realities. It draws on the work of Michel Foucault on discourse, archaeology and genealogy, together with later Foucaultian scholars, including Gayatri Chakravorty Spivak and Judith Butler, as a theoretical framework for challenging and thinking anew the history and understanding of what has become one of the most popular buzzwords of 21st century law and governance. At the intersection of law and governance, this book will be of considerable interest to those working in these fields; but also to those engaged in other interdisciplinary areas, including society and technology, the digital humanities, technology laws and policy, global law and policy, as well as the surveillance society.

Lee de Forest

by Mike Adams

The life-long inventor, Lee de Forest invented the three-element vacuum tube used between 1906 and 1916 as a detector, amplifier, and oscillator of radio waves. Beginning in 1918 he began to develop a light valve, a device for writing and reading sound using light patterns. While he received many patents for his process, he was initially ignored by the film industry. In order to promote and demonstrate his process he made several hundred sound short films, he rented space for their showing; he sold the tickets and did the publicity to gain audiences for his invention. Lee de Forest officially brought sound to film in 1919. Lee De Forest: King of Radio, Television, and Film is about both invention and early film making; de Forest as the scientist and producer, director, and writer of the content. This book tells the story of de Forest's contribution in changing the history of film through the incorporation of sound. The text includes primary source historical material, U.S. patents and richly-illustrated photos of Lee de Forest's experiments. Readers will greatly benefit from an understanding of the transition from silent to audio motion pictures, the impact this had on the scientific community and the popular culture, as well as the economics of the entertainment industry.

Programming C# 4.0: Building Windows, Web, and RIA Applications for the .NET 4.0 Framework (Animal Guide)

by Matthew Adams Jesse Liberty Ian Griffiths

With its support for dynamic programming, C# 4.0 continues to evolve as a versatile language on its own. But when C# is used with .NET Framework 4, the combination is incredibly powerful. This bestselling tutorial shows you how to build web, desktop, and rich Internet applications using C# 4.0 with .NET's database capabilities, UI framework (WPF), extensive communication services (WCF), and more. In this sixth edition, .NET experts Ian Griffiths, Matthew Adams, and Jesse Liberty cover the latest enhancements to C#, as well as the fundamentals of both the language and framework. You'll learn concurrent programming with C# 4.0, and how to use .NET tools such as the Entity Framework for easier data access, and the Silverlight platform for browser-based RIA development. Learn C# fundamentals, such as variables, flow control, loops, and methods Build complex programs with object-oriented and functional programming techniques Process large collections of data with the native query features in LINQ Communicate across networks with Windows Communication Foundation (WCF) Learn the advantages of C# 4.0's dynamic language features Build interactive Windows applications with Windows Presentation Foundation (WPF) Create rich web applications with Silverlight and ASP.NET

Life and Its Future

by Josephine C. Adams Jürgen Engel

This book is aimed at those who wish to understand more about the molecular basis of life and how life on earth may change in coming centuries. Readers of this book will gain knowledge of how life began on Earth, the natural processes that have led to the great diversity of biological organisms that exist today, recent research into the possibility of life on other planets, and how the future of life on earth faces unprecedented pressures from human-made activities. Readers will obtain a perspective on the potential risks of chemical or nuclear warfare, and the ever-increasing risks from human activities that are causing pollution and climate change with global heating. Readers will also learn about ongoing research efforts to generate “designer lifeforms” through synthetic biology and applications of artificial intelligence. The book makes an integrated, up-to-date, overview of topics often considered as separate fields. It should be valuable to students, teachers, and people who are concerned about the future of life.

Learning Kendo UI Web Development

by John Adams

A practical tutorial with step-by-step example based approach.This book is for web developers who want to take advantage of cutting edge JavaScript and HTML 5 web site features, but who don't have the time or the knowledge to write all of that code by hand. The reader should be familiar with basic HTML 5 and JavaScript but does not need to be an expert.

Alice in Action with Java

by Joel Adams

The book provides CS1 users with a meaningful and motivating introduction to object-oriented programming. The author introduces key object-oriented topics using Alice 2.0, then circles back to the same concepts in Java. Alice was developed to help teach introductory programming techniques in a less syntax-intensive environment, and addresses some of the barriers that currently prevent many users from successfully learning to program.

Audio Assault. (Codename: Winger #3)

by Jeff Adams

Codename: Winger: Book ThreeFor teenage secret agent Theo Reese, summer break isn’t a time to relax. In addition to his duties for Tactical Operational Support, Theo’s got a school project and, more than anything, wants to spend time with his boyfriend, Eddie. A family trip to New York City is the last thing Theo needs. But a friend of Theo’s father is in need of the Reese family’s special skills. Oliver Glenwood heads a music empire, and his daughter, Sofia, is a rising pop star—one who’d drawn the attention of kidnappers. During the investigation, Theo discovers the threat poses more danger than originally suspected. Someone has planted code in Glenwood Music’s songs that can steal information from any personal device—or play a tone that can rouse uncontrollable rage. The consequences will be disastrous if the infected songs are downloaded by the public. Preventing worldwide catastrophe becomes even more difficult when Eddie arrives in the city, hoping to spend some quality time with Theo. No one ever said being a covert agent would be easy.

Netminder (Codename: Winger #4)

by Jeff Adams

Codename: Winger: Book FourFor teenage secret agent Theo Reese, summer brought one surprise after another, and now that he’s back at school, the shocks keep coming. The unthinkable has happened—enemies have breached Tactical Operational Support, forcing Theo and his parents to instigate the protocols they’ve put in place in case of a worst-case scenario. As Theo goes on the run and tries to stay ahead of those pursuing them, he realizes the TOS network is down… and he’s on his own.He soon discovers the renegade organization Blackbird is responsible. Theo's been targeted by an old nemesis, who will do whatever it takes to force his hand and obtain his help in taking global control of the internet. Theo must prevent the internet hijacking, and while he finds allies, they’re in the last place he expects….

Schooled (Codename: Winger #2)

by Jeff Adams

Theo Reese is a high school student who’s also a secret agent. Usually those lives are kept separate, but now he must be both at once. <p><p> Theo lends his expertise to his school’s computer science club as they gear up for a competition, but his talents are also required by the covert agency he works for. Someone has stolen an encrypted key that can allow them to control the nation’s energy grids. The possibilities are catastrophic unless Theo and his team can reclaim the file. <p> Theo locates the file in an unexpected place—the computer science competition. As Winger, his secret identity, he must recover the file and keep his teammates safe from the unscrupulous thieves…. But can he do it without revealing his secrets? He can’t blow his cover, especially with so many of his classmates around.

Tracker Hacker (Codename: Winger #1)

by Jeff Adams

Codename: Winger OneTheo Reese is just an average high school student with a passion for hockey and an uncanny talent when it comes to computers… at least on the surface. What his teammates, fellow students, and even his boyfriend don’t realize is that Theo leads a double life. When he’s not putting up his facade of normal, Theo is working as an agent for Tactical Operational Support, where his technical genius is more than just a hobby. At sixteen he is responsible for helping agents in the field and keeping the TOS network secure. It’s a secret he has to keep—from everyone. But secrecy becomes even harder when a hacker compromises the system TOS uses to track its agents and Theo’s dad goes missing. Theo must find him and stop the hacker, which means leaving the comfort of his computer screen and venturing into a very real and very deadly world. And if that’s not enough to deal with, all the secrecy is really putting a strain on Theo’s love life.

Fundamentals of Game Design (2nd Edition)

by Ernest Adams

A definitive guide to game theory and design by an industry insider. Comprehensive overview of video game design as it is done in industry. Chapters devoted to each of the major game genres. Exercises of real practical value to help hone your skills. Fundamentals of Game Design, Second Edition teaches the essential theory needed to design entertaining and enjoyable video games. It addresses such key issues as concept development, gameplay design, core mechanics, user interfaces, storytelling, and balancing. The book is aimed at both students in beginning game design courses and anyone that wants to get up-to-speed on the latest game design theory and practice.

Learning Airtable: Building Database-driven Applications With No-code

by Elliott Adams

Get a concise yet comprehensive overview of Airtable, one of the most versatile platforms to emerge from the no-code movement. Whether you're planning a new project, sharing data analysis within your organization, tracking a detailed initiative among stakeholders, or dealing with any other project that requires well-structured collaboration, this practical book shows you how Airtable is an accessible tool to tackle these challenges.Author Elliott Adams guides you through the process of structuring your data in a relational database, creating automations based on changes to data in Airtable, and building user-friendly interfaces for no-code applications. This showcases how Airtable is superior to the typical options of either non-developers using spreadsheets or making large investments in time-consuming application development.With this book, you will:Learn how Airtable can reduce the need for custom-built applicationsUse Airtable to replace internal tools such as spreadsheetsBuild applications utilizing relational data--without any knowledge of software programmingEvaluate whether you can build a solution on Airtable rather than purchasing softwareUnderstand the limitations of the Airtable platform when compared with writing a software application from scratch

See Yourself in Cyber: Security Careers Beyond Hacking

by Ed Adams

A one-of-a-kind discussion of how to integrate cybersecurity into every facet of your organization In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organization—inhabiting a variety of roles not traditionally associated with cybersecurity—can contribute to improving its cybersecurity backbone. You’ll discover how developers, DevOps professionals, managers, and others can strengthen your cybersecurity. You’ll also find out how improving your firm’s diversity and inclusion can have dramatically positive effects on your team’s talent. Using the familiar analogy of the color wheel, the author explains the modern roles and responsibilities of practitioners who operate within each “slice.” He also includes: Real-world examples and case studies that demonstrate the application of the ideas discussed in the book Many interviews with established industry leaders in a variety of disciplines explaining what non-security professionals can do to improve cybersecurity Actionable strategies and specific methodologies for professionals working in several different fields interested in meeting their cybersecurity obligationsPerfect for managers, directors, executives, and other business leaders, See Yourself in Cyber: Security Careers Beyond Hacking is also an ideal resource for policymakers, regulators, and compliance professionals.

Programming Jabber

by Dj Adams

Jabber is a set of protocols expressed in XML, and an extensible framework that allows people and applications to exchange all sorts of information, from simple text messages to being used to extend the backbone of an enterprise data system. Jabber gives you the power to build applications that have identity, presence, and that can take part in conversations. Programming Jabber offers developers a chance to learn and understand the Jabber technology and protocol from an implementer's point of view. Detailed information of each part of the Jabber protocol is introduced, explained, and discussed in the form of mini-projects, or simple and extended examples. Programming Jabber provides this foundation by: Showing you how to install and configure the Jabber server Providing a detailed overview of the server architecture and configuration options Covering the core Jabber technologies such as XML streams and Jabber identifiers Referencing all of Jabber's XML namespaces Examining the client registration and authentication phases Showing how to deploy your own Jabber-based messaging solutions Demonstrating how to embed XML-RPC-style call mechanisms into Jabber Programming Jabber is divided into two parts. The first part serves as an introduction to Jabber; you'll learn about its features, why it's more than an IM system, and how to install and configure a Jabber server of your own. The second part provides detailed information about the Jabber protocol, and a series of practical examples, which can be used to solve everyday problems. The examples, in Perl, Python, and Java, use various Jabber features as a way of illustrating parts of the protocol. Programming Jabber provides the foundation and framework for developers to hit the ground running, and is the essential book on Jabber.

Programming Jabber

by D. J. Adams

Programming Jabber offers developers a chance to learn and understand the Jabber technology and protocol from an implementer's point of view. Detailed information of each part of the Jabber protocol is introduced, explained, and discussed in the form of mini-projects, or simple and extended examples in Perl, Python, and Java. This book provides the foundation and framework for developers to hit the ground running, and is the essential book on Jabber.

Mastering JavaScript High Performance

by Chad R. Adams

If you are a JavaScript developer with some experience in development and want to increase the performance of JavaScript projects by building faster web apps, then this book is for you. You should know the basic concepts of JavaScript.

Learning Python Data Visualization

by Chad Adams

If you are a Python novice or an experienced developer and want to explore data visualization libraries, then this is the book for you. No prior charting or graphics experience is needed.

Researching a Posthuman World: Interviews with Digital Objects

by Catherine Adams Terrie Lynn Thompson

This book provides a practical approach for applying posthumanist insights to qualitative research inquiry. Adams and Thompson invite readers to embrace their inner – and outer – cyborg as they consider how today’s professional practices and everyday ways of being are increasingly intertwined with digital technologies. Drawing on posthuman scholarship, the authors offer eight heuristics for “interviewing objects” in an effort to reveal the unique – and sometimes contradictory – contributions the digital is making to work, learning and living. The heuristics are drawn from Actor Network Theory, phenomenology, postphenomenology, critical media studies and related sociomaterial approaches. This text offers a theoretically informed yet practical approach for asking critical questions of digital and non-digital things in professional and personal spaces, and ultimately, for considering the ethical and political implications of a technology mediated world. A thought-provoking and innovative study, this book will be of great interest to scholars and researchers of technology studies, digital learning, and sociology.

Refine Search

Showing 53,426 through 53,450 of 53,816 results