- Table View
- List View
The Internet of Things in the Cloud: A Middleware Perspective
by Honbo ZhouAlthough the Internet of Things (IoT) is a vast and dynamic territory that is evolving rapidly, there has been a need for a book that offers a holistic view of the technologies and applications of the entire IoT spectrum. Filling this void, The Internet of Things in the Cloud: A Middleware Perspective provides a comprehensive introduction to the Io
The Internet of Things in the Industrial Sector: Security and Device Connectivity, Smart Environments, and Industry 4.0 (Computer Communications and Networks)
by Zaigham MahmoodThis book has a focus on the development and deployment of the Industrial Internet of Things (IIoT) paradigm, discussing frameworks, methodologies, benefits and limitations, as well as providing case studies of employing the IoT vision in the industrial domain. IIoT is becoming an attractive business reality for many organisations such as manufacturing, logistics, oil and gas, energy and other utilities, mining, aviation, and many more. The opportunities for this paradigm are huge, and according to one report, the IIoT market is predicted to reach $125 billion by 2021. The driving philosophy behind the IIoT is that smart machines are better than humans at accurately capturing, analysing and communicating real-time data. The underlying technologies include distributed computing, machine learning, artificial intelligence, and machine-to-machine communication, with a typical IIoT system consisting of intelligent systems (applications, controllers, sensors, and security mechanisms), data communication infrastructure (cloud computing, edge computing, etc.), data analytics (to support business intelligence and corporate decision making), and most importantly the human element. The promised benefits of the IIoT include enhanced safety, better reliability, smart metering, inventory management, equipment tracking, and facilities management. There are, however, numerous issues that are also becoming the focus of active research, such as concerns regarding service availability, data security, and device communication. Lack of ubiquitous interoperability between heterogeneous devices is also a major concern. This book intends to fill a gap in the IIoT literature by providing the scientific contributions and latest developments from researchers and practitioners of international repute, focusing on frameworks, methodologies, benefits, and inherent issues/barriers to connected environments, especially in industrial settings.The intended audience includes network specialists, hardware engineers, and security experts who wish to adopt newer approaches for device connectivity, IoT security, and sensor-based devices design. University level students, researchers and practitioners will also find the latest innovation in technology and newer approaches relevant to the IIoT from a distributed computing perspective.
The Internet of Things, revised and updated edition (The MIT Press Essential Knowledge series)
by Samuel GreengardA guided tour of the rapidly evolving networked world of connected devices, objects, and people that is changing the way we live and work.Since the publication of the original edition of this volume in the MIT Press Essential Knowledge series, the Internet of Things (IoT) has evolved from a novelty (look! my phone connects to my lamp!) to a mainstream technology framework that we rely on every day to accomplish many tasks. This revised and updated edition reports on the latest developments in this rapidly evolving networked world of connected devices, objects, and people that is changing the way we live and work. Business and technology writer Samuel Greengard takes us on a guided tour of the IoT, describing smart lightbulbs, sensors in phones that trigger earthquake warnings, 3D headsets that connect users to business expos through completely immersive virtual reality environments, and more. He offers a clear explanation of the technology that builds and manages the IoT and examines the growing array of consumer devices now available, from smart door locks to augmented reality fitting rooms. Greengard also shows how the IoT is part of the Fourth Industrial Revolution, which is transforming business through smart manufacturing, end-to-end supply chain visibility, integrated artificial intelligence, and much more. He considers risks associated with the IoT, including threats to free speech, growing inequality, and an increase in cybercrime. Finally, he takes a look at the future of a hyperconnected world and what it means to people and human interaction.
The Internet of Things: Enabling Technologies, Platforms, and Use Cases
by Pethuru Raj Anupama C. RamanAs more and more devices become interconnected through the Internet of Things (IoT), there is an even greater need for this book,which explains the technology, the internetworking, and applications that are making IoT an everyday reality. The book begins with a discussion of IoT "ecosystems" and the technology that enables them, which includes: Wireless Infrastructure and Service Discovery Protocols Integration Technologies and Tools Application and Analytics Enablement Platforms A chapter on next-generation cloud infrastructure explains hosting IoT platforms and applications. A chapter on data analytics throws light on IoT data collection, storage, translation, real-time processing, mining, and analysis, all of which can yield actionable insights from the data collected by IoT applications. There is also a chapter on edge/fog computing. The second half of the book presents various IoT ecosystem use cases. One chapter discusses smart airports and highlights the role of IoT integration. It explains how mobile devices, mobile technology, wearables, RFID sensors, and beacons work together as the core technologies of a smart airport. Integrating these components into the airport ecosystem is examined in detail, and use cases and real-life examples illustrate this IoT ecosystem in operation. Another in-depth look is on envisioning smart healthcare systems in a connected world. This chapter focuses on the requirements, promising applications, and roles of cloud computing and data analytics. The book also examines smart homes, smart cities, and smart governments. The book concludes with a chapter on IoT security and privacy. This chapter examines the emerging security and privacy requirements of IoT environments. The security issues and an assortment of surmounting techniques and best practices are also discussed in this chapter.
The Internet of Things: Foundation for Smart Cities, eHealth, and Ubiquitous Computing (Advances In Information Security, Privacy, And Ethics Ser.)
by Ricardo Armentano, Robin Singh Bhadoria, Parag Chatterjee and Ganesh Chandra DekaThis book provides a dual perspective on the Internet of Things and ubiquitous computing, along with their applications in healthcare and smart cities. It also covers other interdisciplinary aspects of the Internet of Things like big data, embedded Systems and wireless Sensor Networks. Detailed coverage of the underlying architecture, framework, and state-of the art methodologies form the core of the book.
The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems (Wireless Networks And Mobile Communications Ser. #12405)
by Laurence T. Yang Yan Zhang Huansheng Ning Lu YanUbiquitous and pervasive technologies such as RFID and smart computing promise a world of networked and interconnected devices. Everything from tires to toothbrushes could soon be in communications range, heralding the dawn of an era in which today's Internet of People gives way to tomorrow's Internet of Things- where billions of obje
The Internet of Toys: Practices, Affordances and the Political Economy of Children’s Smart Play (Studies in Childhood and Youth)
by Giovanna Mascheroni Donell HollowayThe Internet of Toys (IoToys) is a developing market within our Internet of Things (IoT) ecosystem. This book examines the rise of internet-connected toys and aims to anticipate the opportunities and risks of IoToys before their widespread diffusion. Contributors to this volume each provide a critical analysis of the design, production, regulation, representation and consumption of internet-connected toys. In order to address the theoretical, methodological and policy questions that arise from the study of these new playthings, and contextualise the diverse opportunities and challenges that IoToys pose to educators, families and children themselves, the chapters engage with notions of mediatization, datafication, robotification, connected and post-digital play. This timely engagement with a key transformation in children’s play will appeal to all readers interested in understanding the social uses and consequences of IoToys, and primarily to researchers and students in children and media, early childhood studies, media and communications, sociology, education, social psychology, law and design.
The Internet's Coming Of Age
by National Research Council Compature Science Telecommunications BoardWhat most of us know as "the Internet" is actually a set of largely autonomous, loosely coordinated communication networks. As the influence of the Internet continues to grow, understanding its real nature is imperative to acting on a wide range of policy issues.This timely new book explains basic design choices that underlie the Internet's success, identifies key trends in the evolution of the Internet, evaluates current and prospective technical, operational, and management challenges, and explores the resulting implications for decision makers. The committee-composed of distinguished leaders from both the corporate and academic community-makes recommendations aimed at policy makers, industry, and researchers, going on to discuss a variety of issues: How the Internet's constituent parts are interlinked, and how economic and technical factors make maintaining the Internet's seamless appearance complicated. How the Internet faces scaling challenges as it grows to meet the demands of users in the future. Tensions inherent between open innovation on the Internet and the ability of innovators to capture the commercial value of their breakthroughs. Regulatory issues posed by the Internet's entry into other sectors, such as telephony.
The Internet: Getting Connected (Fountas and Pinnell Benchmark Assessment System 2 #Level X, Nonfiction)
by George CapaccioThe Internet: Getting Connected by George Capaccio
The Internet: The Missing Manual (Missing Manual)
by David Pogue J. D. BiersdorferThe Internet is almost synonymous with change--that's one of its charms, and one of its headaches. You may think you know the Internet, but are you really up to speed on internet telephones, movie and TV downloading, blogging, gaming, online banking, dating, and photosharing? This utterly current book covers:Getting Online. Readers will have all the information they need to decide what kind of broadband connection works best for them, which browser they should use, and what kind of spyware-fighting and virus-and spam-protection measures they need to protect themselves.Finding Information. Google may be the leading search site, but it's certainly not the only game in town. This book introduces a diverse and useful collection of sites that help uncover everything from health care information, to shopping, travel and finance, to dependable reviews and ratings.Movies, music, and photos. The Web's teeming with entertainment--and not just the sort of postage-stamp sized videos that only a geek could love. Learn where to download movies, watch TV online, listen to music, play games, and post and share photos with friends.Keeping in touch. Email's only the beginning. This book introduces readers to the many tools that make the modern Internet such a great way to stay connected. From Web-based discussion groups to instant messaging programs, and from blogs and podcasts to Internet-based phone calls, this book will help you join the conversation.Ideal for anyone just venturing into cyberspace, this book is also perfect for more experienced users who could use an update to today's most exciting internet applications.
The Interplay of Data, Technology, Place and People for Smart Learning: Proceedings Of The 3rd International Conference On Smart Learning Ecosystems And Regional Development (Smart Innovation, Systems And Technologies #95)
by Elvira Popescu Hendrik Knoche Antonio CartelliThis book gathers contributions to the 3rd International Conference on Smart Learning Ecosystems and Regional Developments (SLERD 2018), held at Aalborg University, Denmark on 23–25 May 2018. What characterizes smart learning ecosystems? What is their role in city and regional development and innovation? How can we promote citizen engagement in smart learning ecosystems? These are some of the questions addressed at SLERD 2018 and documented in these proceedings, which include a diverse range of papers intended to help understand, conceive, and promote innovative human-centric design and development methods, education/training practices, informal social learning, and citizen-driven policies. The papers elaborate on the notion of smart learning ecosystems, assess the relation of smart learning ecosystems with their physical surroundings, and identify new resources for smart learning. SLERD 2018 contributes to foster the social innovation sectors, ICT and economic development and deployment strategies, as well as new policies for smarter, more proactive citizens. As such, these proceedings are relevant for researchers and policymakers alike.
The Intersection of 6G, AI/Machine Learning, and Embedded Systems: Pioneering Intelligent Wireless Technologies
by Ashutosh Sharma Shruti Sharma Trinh Van ChienThis comprehensive guide to the emerging areas and synergistic relationships among the domains of 6G, machine learning, and embedded systems offers readers a detailed analysis of their converging paths and contributions to the development of intelligent wireless systems. Readers will gain a solid understanding of the principles and technologies behind 6G, machine learning, and embedded systems. They will learn how these three areas intertwine and why this intersection is pivotal for the next generation of wireless technologies.The contributors to this volume present a thorough and detailed analysis of this technology, highlighting its promising features, underlying technologies, and potential applications. The book first explores various applications of machine learning algorithms in areas such as network optimization, resource allocation, interference management, and intelligent data processing and analysis. Design considerations and challenges are presented, and case studies of innovative applications, such as smart cities, autonomous vehicles, healthcare, and industrial automation, are examined. The book concludes with a discussion of future trends and opportunities in this rapidly evolving field. Readers will benefit from the theoretical foundations and practical insights presented within and will be prepared to address future challenges and opportunities in these three fields.This book is a valuable resource for academic researchers and industry professionals working in the fields of wireless communication, machine learning, embedded systems, and artificial intelligence.
The Intimate Life of Computers: Digitizing Domesticity in the 1980s
by Reem HiluA feminist perspective on the early history of personal computing, revealing how computers were integrated into the most intimate aspects of family life The Intimate Life of Computers shows how the widespread introduction of home computers in the 1980s was purposefully geared toward helping sustain heteronormative middle-class families by shaping relationships between users. Moving beyond the story of male-dominated computer culture, this book emphasizes the neglected history of the influence of women&’s culture and feminist critique on the development of personal computing despite women&’s underrepresentation in the industry. Proposing the notion of &“companionate computing,&” Reem Hilu reimagines the spread of computers into American homes as the history of an interpersonal, romantic, and familial medium. She details the integration of computing into family relationships—from helping couples have better sex and offering thoughtful simulations of masculine seduction to animating cute robot companions and giving voice to dolls that could talk to lonely children—underscoring how these computer applications directly responded to the companionate needs of their users as a way to ease growing pressures on home life. The Intimate Life of Computers is a vital contribution to feminist media history, highlighting how the emergence of personal computing dovetailed with changing gender roles and other social and cultural shifts. Eschewing the emphasis on technologies and institutions typically foregrounded in personal-computer histories, Hilu uncovers the surprising ways that domesticity and family life guided the earlier stages of our all-pervasive digital culture.
The Introduction to Private Cloud using Oracle Exadata and Oracle Database
by Okcan Yasin SaygiliPrivate clouds allow for managing multiple databases under one roof, avoiding unnecessary resource management. Private cloud solutions can be applied in sectors such as healthcare, retail, and software. The Introduction to Private Cloud using Oracle Exadata and Oracle Database will explore the general architecture of private cloud databases with a focus on Oracle’s Exadata database machine. The book describes the private cloud using fundamental-level Exadata and database. Exadata has been Oracle’s pioneer product for almost a decade. In the last few years, Oracle has positioned Exadata for customers to consume as a cloud service. This book will provide a timely introduction to Exadata for current and potential Oracle customers and other IT professionals.
The Invisible Computer: Why Good Products Can Fail, the Personal Computer Is So Complex, and Information Appliances Are the Solution
by Donald A. NormanTechnologies have a life cycle, says Donald A. Norman, and they must change as they pass from youth to maturity. Alas, the computer industry thinks it is still in its rebellious teenage years, exalting in technical complexity.
The Invisible Promise: A Field Guide to Marketing in an Upside-Down World
by Harry BeckwithOur service economy is dominated by outmoded marketing models from the world of products. The Invisible Promise reveals the critical differences between service and product marketing and outlines a service-centric strategy for planning your business, persuading your prospects, and relating to your clients. Unlike products, you can&’t see, touch, or feel services. Marketing services requires an approach that doesn&’t rely on the traditional 4 Ps of product marketing: product, price, place, and promotion. Selling invisible services requires making the promise of their yet-unseen value resonate with prospective clients. In The Invisible Promise, Harry Beckwith, New York Times bestselling author of Selling the Invisible, applies his 40-plus years of advising businesses around the world and his research in the last 10 years to impart the proven guidance that businesses of all sizes desperately need. In this new age in marketing, he details how to build messages that enhance your reputation for integrity, stand out from the clutter, and can produce exponential growth while saving you both time and money. If you are responsible for marketing a service, the tried-and-true strategies for product marketing simply will not fit. You need to alter your approach radically. That&’s where The Invisible Promise comes in.
The IoT Architect's Guide to Attainable Security and Privacy
by Damilare D. Fagbemi David M Wheeler JC WheelerThis book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usability on security. The book also unveils the impact of digital currency and the dark web on the loT-security economy. It's both informative and entertaining. "Filled with practical and relevant examples based on years of experience ... with lively discussions and storytelling related to loT security design flaws and architectural issues."— Dr. James F. Ransome, Senior Director of Security Development Lifecycle (SOL) Engineering, Intel 'There is an absolute treasure trove of information within this book that will benefit anyone, not just the engineering community. This book has earned a permanent spot on my office bookshelf."— Erv Comer, Fellow of Engineering, Office of Chief Architect Zebra Technologies 'The importance of this work goes well beyond the engineer and architect. The IoT Architect's Guide to Attainable Security & Privacy is a crucial resource for every executive who delivers connected products to the market or uses connected products to run their business."— Kurt Lee, VP Sales and Strategic Alliances at PWNIE Express "If we collectively fail to follow the advice described here regarding loT security and Privacy, we will continue to add to our mounting pile of exploitable computing devices. The attackers are having a field day. Read this book, now."— Brook S.E. Schoenfield, Director of Advisory Services at IOActive, previously Master Security Architect at McAfee, and author of Securing Systems
The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things
by Aditya GuptaTake a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture. You’ll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE or ZigBee. You'll also learn to assess a device physically by opening it, looking at the PCB, and identifying the chipsets and interfaces. You'll then use that information to gain entry to the device or to perform other actions, such as dumping encryption keys and firmware. As the IoT rises to one of the most popular tech trends, manufactures need to take necessary steps to secure devices and protect them from attackers. The IoT Hacker's Handbook breaks down the Internet of Things, exploits it, and reveals how these devices can be built securely.What You’ll LearnPerform a threat model of a real-world IoT device and locate all possible attacker entry points Use reverse engineering of firmware binaries to identify security issues Analyze,assess, and identify security issues in exploited ARM and MIPS based binariesSniff, capture, and exploit radio communication protocols, such as Bluetooth Low Energy (BLE), and ZigBeeWho This Book is ForThose interested in learning about IoT security, such as pentesters working in different domains, embedded device developers, or IT people wanting to move to an Internet of Things security role.
The IoT Product Manager: A Handbook for Engineers, Data Analysts, and Other IT Professionals
by Padmaraj NidagundiEnhance your product management skills and set yourself apart from other product managers working in the IoT industry. This book shows you how to navigate through the world of small and Edge devices to successfully launch and monitor products connected together to make smart environments.Working in Agile environments, you'll learn to guide UI builds that serve customer needs and function the way top tech companies expect. Then measure the right product metrics and create reporting dashboards for your IoT products. That way you can effectively engage partners, engineers, and stakeholders. And you’ll learn the entire end-to-end development process of IoT products so that you can make sure you make the right moves at the right stages. After mastering the IoT product lifecycle and measuring your success against KPIs, you’ll see how to work with marketing to effectively launch your product in the marketplace. Finally, a self-interview section has been provided so that you can evaluate your skills and responses to common IoT Product Manager questions. Then take what you've learned and go out into the world to develop integrated IoT products that your customers love!What You'll LearnCreate UI/UX experiences that engage and wow your customersWork in Agile environments with best business practicesNegotiate effectively at each step of the product lifecycleWho This Book Is ForAny wanting to build a IoT products. Aspiring Internet of Things product managers, product owners, analysts, business consultants, engineers, and business owners.
The Isogeometric Boundary Element Method (Lecture Notes in Applied and Computational Mechanics #90)
by Gernot Beer Benjamin Marussig Christian DuenserThis book discusses the introduction of isogeometric technology to the boundary element method (BEM) in order to establish an improved link between simulation and computer aided design (CAD) that does not require mesh generation. In the isogeometric BEM, non-uniform rational B-splines replace the Lagrange polynomials used in conventional BEM. This may seem a trivial exercise, but if implemented rigorously, it has profound implications for the programming, resulting in software that is extremely user friendly and efficient. The BEM is ideally suited for linking with CAD, as both rely on the definition of objects by boundary representation. The book shows how the isogeometric philosophy can be implemented and how its benefits can be maximised with a minimum of user effort. Using several examples, ranging from potential problems to elasticity, it demonstrates that the isogeometric approach results in a drastic reduction in the number of unknowns and an increase in the quality of the results. In some cases even exact solutions without refinement are possible. The book also presents a number of practical applications, demonstrating that the development is not only of academic interest. It then elegantly addresses heterogeneous and non-linear problems using isogeometric concepts, and tests them on several examples, including a severely non-linear problem in viscous flow. The book makes a significant contribution towards a seamless integration of CAD and simulation, which eliminates the need for tedious mesh generation and provides high-quality results with minimum user intervention and computing.
The Jamstack Book: Beyond static sites with JavaScript, APIs, and markup
by Raymond Camden Brian RinaldiJamstack = JavaScript, APIs, and Markup. Use established standard technologies to build super-fast static websites without sacrificing rich, dynamic features.In The Jamstack Book, you will learn how to: Use different static site generators to build websites Deploy Jamstack sites with 11ty, Next.js, Hugo, and Jekyll Add dynamic capabilities like form processing and eCommerce Enhance your Jamstack site with serverless capabilities Integrate a CMS with a Jamstack site Jamstack sites use JavaScript, APIs, and Markup to create fast, dynamic pages without the overhead of heavyweight frameworks. The Jamstack Book is your essential guide to this exciting new web architecture. Written by renowned Jamstack experts Raymond Camden and Brian Rinaldi, it&’s filled with real-world projects to develop and hone your skills. You&’ll learn how to lay out and generate a site, set up your own CMS, and add dynamic features like user logins and search functionality. Confusing jargon is demystified. Plus, you&’ll get the chance to try out different static site generators and find the one that works best for you. Pick up this book today, and you&’ll discover how the Jamstack answers your need for speed and simplicity. About the technology JavaScript, APIs, and pre-rendered Markup put the JAM in Jamstack. This modern web architecture delivers the quick load times of static sites along with the dynamic functionality you need for user-friendly interactive features. Built with lightweight standards and tools, Jamstack sites are fast, secure, easy to maintain, and naturally optimized for mobile and SEO. About the book The Jamstack Book teaches effectively by creating a portfolio of sites, ranging from a simple blog to an eCommerce store. Each new project introduces important skills, including cloud deployment, user logins, and search. You&’ll get hands-on experience with tools like 11ty, Next.js, and Netlify. As your skills grow, the examples become more sophisticated, including serverless technology, dynamic forms, and an integrated CMS. What's inside Use different static site generators to build websites Add dynamic capabilities like form processing and eCommerce Enhance your Jamstack site with serverless capabilities Integrate a CMS with a Jamstack site About the reader For web developers and CMS site developers. About the author Raymond Camden is the author of multiple books on web development and has been blogging and presenting for almost twenty years. Brian Rinaldi has been involved in static site and Jamstack development since the early days. Table of Contents 1 Why Jamstack? 2 Building a basic Jamstack site 3 Building a blog 4 Building a documentation site 5 Building an e-commerce site 6 Deployment 7 Adding dynamic elements 8 Working with serverless computing 9 Adding a content management system 10 Migrating to the Jamstack
The Java Module System
by Nicolai ParlogSummaryJava's much-awaited "Project Jigsaw" is finally here! Java 11 includes a built-in modularity framework, and The Java Module System is your guide to discovering it. In this new book, you'll learn how the module system improves reliability and maintainability, and how it can be used to reduce tight coupling of system components.Foreword by Kevlin Henney.Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. You'll find registration instructions inside the print book.About the TechnologyPackaging code into neat, well-defined units makes it easier to deliver safe and reliable applications. The Java Platform Module System is a language standard for creating these units. With modules, you can closely control how JARs interact and easily identify any missing dependencies at startup. This shift in design is so fundamental that starting with Java 9, all core Java APIs are distributed as modules, and libraries, frameworks, and applications will benefit from doing the same.About the BookThe Java Module System is your in-depth guide to creating and using Java modules. With detailed examples and easy-to-understand diagrams, you'll learn the anatomy of a modular Java application. Along the way, you'll master best practices for designing with modules, debugging your modular app, and deploying to production.What's insideThe anatomy of a modular Java appBuilding modules from source to JARMigrating to modular JavaDecoupling dependencies and refining APIsHandling reflection and versioningCustomizing runtime imagesUpdated for Java 11About the ReaderPerfect for developers with some Java experience.About the AuthorNicolai Parlog is a developer, author, speaker, and trainer. His home is codefx.org. Table of ContentsPART 1 - Hello, modulesFirst piece of the puzzleAnatomy of a modular applicationDefining modules and their propertiesBuilding modules from source to JARRunning and debugging modular applicationsPART 2 - Adapting real-world projectsCompatibility challenges when moving to Java 9 or laterRecurring challenges when running on Java 9 or laterIncremental modularization of existing projectsMigration and modularization strategiesPART 3 - Advanced module system featuresUsing services to decouple modulesRefining dependencies and APIsReflection in a modular worldModule versions: What's possible and what's notCustomizing runtime images with jlinkPutting the pieces together
The Java Workshop: A Practical, No-Nonsense Introduction to Java Development
by Eric Foster-Johnson Andreas Goransson David CuartiellesCut through the noise and get real results with a step-by-step approach to learning Java programming Key Features Ideal for the Java beginner who is getting started for the first time A step-by-step Java tutorial with exercises and activities that help build key skills Structured to let you progress at your own pace, on your own terms Use your physical copy to redeem free access to the online interactive edition Book Description You already know you want to learn Java, and a smarter way to learn Java 12 is to learn by doing. The Java Workshop focuses on building up your practical skills so that you can develop high-performance Java applications that work flawlessly within the JVM across web, mobile and desktop. You'll learn from real examples that lead to real results. Throughout The Java Workshop, you'll take an engaging step-by-step approach to understanding Java. You won't have to sit through any unnecessary theory. If you're short on time you can jump into a single exercise each day or spend an entire weekend learning about Reactive programming and Unit testing. It's your choice. Learning on your terms, you'll build up and reinforce key skills in a way that feels rewarding. Every physical copy of The Java Workshop unlocks access to the interactive edition. With videos detailing all exercises and activities, you'll always have a guided solution. You can also benchmark yourself against assessments, track progress, and receive free content updates. You'll even earn a secure credential that you can share and verify online upon completion. It's a premium learning experience that's included with your printed copy. To redeem, follow the instructions located at the start of your Java book. Fast-paced and direct, The Java Workshop is the ideal companion for Java beginners. You'll build and iterate on your code like a software developer, learning along the way. This process means that you'll find that your new skills stick, embedded as best practice. A solid foundation for the years ahead. What you will learn Get to grips with fundamental concepts and conventions of Java 12 Write clean and well-commented code that's easy to maintain Debug and compile logical errors and handle exceptions in your programs Understand how to work with Java APIs and Java streams Learn how to use third-party libraries and software development kits (SDKs) Discover how you can work with information stored in databases Understand how you can keep data secure with cryptography and encryption Learn how to keep your development process bug-free with unit testing in Java Who this book is for Our goal at Packt is to help you be successful, in whatever it is you choose to do. The Java Workshop is an ideal Java tutorial for the Java beginner who is just getting started. Pick up a Workshop today, and let Packt help you develop skills that stick with you for life.
The JavaScript Workshop: A New, Interactive Approach to Learning JavaScript
by Joseph Labrecque Nick Turner Jahred Love Daniel Rosenbaum Gaurav MehlaFlorian
The Jazz Theory Book
by Mark Levine Sher MusicThe most highly-acclaimed jazz theory book ever published! Over 500 pages of comprehensive, but easy to understand text covering every aspect of how jazz is constructed---chord construction, II-V-I progressions, scale theory, chord/scale relationships, the blues, reharmonization, and much more. A required text in universities world-wide, translated into five languages, endorsed by Jamey Aebersold, James Moody, Dave Liebman, etc.