Browse Results What Format Should I Choose?

Showing 1,576 through 1,600 of 2,017 results

Reality Is Broken: Why Games Make Us Better and How They Can Change the World

by Jane Mcgonigal

Visionary game designer Jane McGonigal reveals how we can harness the power of games to solve real-world problems and boost global happiness. More than 174 million Americans are gamers, and the average young person in the United States will spend ten thousand hours gaming by the age of twenty-one. According to world-renowned game designer Jane McGonigal, the reason for this mass exodus to virtual worlds is that videogames are increasingly fulfilling genuine human needs. In this groundbreaking exploration of the power and future of gaming, McGonigal reveals how we can use the lessons of game design to fix what is wrong with the real world. Drawing on positive psychology, cognitive science, and sociology, Reality Is Broken uncovers how game designers have hit on core truths about what makes us happy and utilized these discoveries to astonishing effect in virtual environments. Videogames consistently provide the exhilarating rewards, stimulating challenges, and epic victories that are so often lacking in the real world. But why, McGonigal asks, should we use the power of games for escapist entertainment alone? Her research suggests that gamers are expert problem solvers and collaborators because they regularly cooperate with other players to overcome daunting virtual challenges, and she helped pioneer a fast-growing genre of games that aims to turn gameplay to socially positive ends. In Reality Is Broken, she reveals how these new alternate reality games are already improving the quality of our daily lives, fighting social problems such as depression and obesity, and addressing vital twenty-first-century challenges-and she forecasts the thrilling possibilities that lie ahead. She introduces us to games like World Without Oil, a simulation designed to brainstorm-and therefore avert- the challenges of a worldwide oil shortage, and Evoke, a game commissioned by the World Bank Institute that sends players on missions to address issues from poverty to climate change. McGonigal persuasively argues that those who continue to dismiss games will be at a major disadvantage in the coming years. Gamers, on the other hand, will be able to leverage the collaborative and motivational power of games in their own lives, communities, and businesses. Written for gamers and nongamers alike, Reality Is Broken shows us that the future will belong to those who can understand, design, and play games.

Record Label Marketing, 2nd ed.

by Paul Allen Tom Hutchison Amy Macy

Record Label Marketing offers a comprehensive look at the inner workings of record labels, showing how the record labels connect commercial music with consumers. In the current climate of selling music through both traditional channels and new media, authors Tom Hutchison, Paul Allen and Amy Macy carefully explain the components of the contemporary record label's marketing plan and how it is executed. This new edition is clearly illustrated throughout with figures, tables, graphs, and glossaries, and includes a valuable overview of the music industry.<P> Record Label Marketing has become essential reading for current and aspiring professionals, and for music business students everywhere. <P> Record Label Marketing.<P> * Gives you an exclusive and complete look at SoundScan and how it is used as a marketing tool<P> * Presents essential information on uses of new media, label publicity, advertising, retail distribution, and marketing research by record labels<P> * Offers insight into how successful labels use videos, promotional touring, and special products to build revenue<P> * Includes important specialized marketing strategies using the tools of grassroots promotion and international opportunities<P> * Reveals how labels are managing within their transitional digital industry<P> * Looks to the future of the music business - how online developments, technological diffusion, and convergence and new markets continue to reshape the industry

Recreation Programming

by J. Robert Roseman Barbara Elwood Schlatter

Used in numerous universities throughout the United States, Canada, Australia, and New Zealand, this book provides programming insights for educators, practitioners, and students. This book will present readers with the vital tools necessary in providing successful programs for their patrons.

Red Hat Linux 7.1 Bible, Unlimited Edition

by Christopher Megus

Complete guide to using Red Hat Linux

Red Hat Linux 9: Red Hat Linux x86 Installation Guide

by Red Hat Inc.

Installation manual for Red Hat Linux 9

Redis Applied Design Patterns

by Arun Chinnachamy

With new data stores making their way onto the market, it's necessary for businesses to understand the features and techniques to use data stores most effectively. Redis Applied Design Patterns is designed to guide you into the world of Redis and will help you understand how business problems can be solved using Redis in your application stack. This book introduces you to the NoSQL way of thinking and how it is different from SQL. It helps you understand various functionality of Redis through a series of use cases designed for you to learn the more complex and less well-known features of Redis in an incremental way. By the time you've read this book, you will be capable of designing a system using Redis. This book will guide you through various use cases along with code samples, easy-to-understand diagrams, and tips to help you take advantage of Redis. The book explains the benefits of adding Redis to the application stack and discusses various practical use cases for Redis such as the caching system, commenting system, and social networking.

Refactoring in Ruby

by William C. Wake Kevin Rutherford

Refactoring in Ruby gives you all the realistic, hands-on practice you need to refactor Ruby code quickly and effectively and shows when and how to refactor with both legacy code and during new test-driven development.

The Relational Database Dictionary

by C. J. Date

<p>Avoid misunderstandings that can affect the design, programming, and use of database systems. Whether you're using Oracle, DB2, SQL Server, MySQL, or PostgreSQL, <i>The Relational Database Dictionary</i> will prevent confusion about the precise meaning of database-related terms (e.g., attribute, 3NF, one-to-many correspondence, predicate, repeating group, join dependency), helping to ensure the success of your database projects. Carefully reviewed for clarity, accuracy, and completeness, this authoritative and comprehensive quick-reference contains more than 600 terms, many with examples, covering issues and concepts arising from the relational model of data.</p>

Remote Research

by Nate Bolt Tony Tulathimutte

Remote studies allow you to recruit subjects quickly, cheaply, and immediately, and give you the opportunity to observe users as they behave naturally in their on environment. In Remote Research, Nate Bolt and Tony Tulathimutte teach you how to design and conduct remote research studies, top to bottom, with little more than a phone and a laptop.

The Reputation Society: How Online Opinions Are Reshaping the Offline World

by Mark Tovey Hassan Masum

In making decisions, we often seek advice. Online, we check Amazon recommendations, eBay vendors' histories, TripAdvisor ratings, and even our elected representatives' voting records. These online reputation systems serve as filters for information overload. In this book, experts discuss the benefits and risks of such online tools. The contributors offer expert perspectives that range from philanthropy and open access to science and law, addressing reputation and reputation systems in theory and practice. Properly designed reputation systems, they argue, have the potential to create a "reputation society," reshaping society for the better by promoting accountability through the mediated judgments of billions of people. Effective design can also steer systems away from the pitfalls of online opinion sharing by motivating truth-telling, protecting personal privacy, and discouraging digital vigilantism.

Requirements Engineering Fundamentals

by Chris Rupp Klaus Pohl

In practice, requirements engineering tasks become more and more complex. In order to ensure a high level of knowledge and training, the International Requirements Engineering Board (IREB) worked out the training concept "Certified Professional for Requirements Engineering", which defines a requirements engineer's practical skills on different training levels. The book covers the different subjects of the curriculum for the "Certified Professional for Requirements Engineering" (CPRE) defined by the International Requirements Engineering Board (IREB). It supports its readers in preparing for the test to achieve the "Foundation Level" of the CPRE.

Research Methods in Human-computer Interaction

by Jonathan Lazar Harry Hochheiser Jinjuan Heidi Feng

A comprehensive research guide for both quantitative and qualitative research methods Written by a team of authorities in human-computer interaction (HCI) and usability, this pedagogical guide walks you through the methods used in HCI and examines what are considered to be appropriate research practices in the field. Featuring a plethora of real-world examples throughout, you'll discover how these methods have been used in HCI research so that you can gain a stronger understanding of the subject matter. Serves as an authoritative, comprehensive resource on all things related to research methods in human-computer interaction Addresses experimental research and design methods, statistical analysis, and time diaries Shares authentic case studies, interviews, and focus group experiences Reviews analyzing qualitative data, working with human subjects, handling automated computer data collection methods, and more If you are looking for a detailed, no-nonsense resource that offers in-depth coverage of HCI methods, then this is the book for you.

Research Strategies: Finding Your Way Through the Information Fog

by William Badke

Because of the dynamic nature of the Internet, any web addresses or links contained in this book may have changed since publication and may no longer be valid. The views expressed in this work are solely those of the author and do not necessarily reflect the views of the publisher, and the publisher hereby disclaims any responsibility for them.

Reset: Changing the Way We Look at Video Games

by Rusel Demaria

In this analysis of the increasingly violent and uncreative video gaming industry, author Rusel DeMaria offers a road map for parents, educators, gamers, and industry insiders to leverage the inherent potential of games to promote positive personal and social change.

RESI Basic Skills & Knowledge Lab Guide

by Stuart Palmer Whitney Freeman Gregory Ter-Oganov Joseph A. Coney

The RESI Basic Lab Guide provides an excellent hands-on component to emphasize the theoretical materials provided in the RESI Basic Concepts and Practices Training Guide. Applying chapter concepts developed in the textbook to these lab exercises is crucial in preparing for a successful career as a computer technician.

Resource Management in Real-Time Systems and Networks

by C. Siva Ram Murthy G. Manimaran

Real-time systems and networks are of increasing importance in many applications, including automated factories, telecommunication systems, defense systems, and space systems. This book introduces the concepts and state-of-the-art research developments of resource management in real-time systems and networks. Unlike other texts in the field, it covers the entire spectrum of issues in resource management, including task scheduling in uniprocessor real-time systems; task scheduling, fault-tolerant task scheduling, and resource reclaiming in multiprocessor real-time systems; conventional task scheduling and object-based task scheduling in distributed real-time systems; message scheduling; QoS routing; dependable communication; multicast communication; and medium access protocols in real-time networks. It provides algorithmic treatments for all of the issues addressed, highlighting the intuition behind each algorithm and giving examples. The book also includes two chapters of case studies.

Resumes for Dummies (4th Edition)

by Joyce Lain Kennedy

Get the jump on the competition with the first book that tells you how to create a resume that takes advantage of today's technology. Say goodbye to ugly, plain text formats and welcome the return of the handsome resume - fully formatted and reader friendly. This newly revised guide shows you how to craft a "Standout" resume that'll get your foot in the door.

Resumes in Cyberspace: Your Complete Guide to a Computerized Job Search (2nd edition)

by Pat Criscito

Updated to help job seekers take full advantage of the latest Internet trends and technology, this new edition provides detailed instruction on designing a resume for computer networking. Readers will learn to make their resumes scannable and searchable through use of key words. They'll also find advice on using the World Wide Web and a variety of commercial online services to land a job. New in this edition is a chapter containing career resources on the web, and instructions for building a network of contacts using e-mail and newsgroups.

Retro Gaming Hacks

by Chris Kohler

Maybe it was the recent Atari 2600 milestone anniversary that fueled nostalgia for the golden days of computer and console gaming. Every Game Boy must ponder his roots from time to time. But whatever is driving the current retro gaming craze, one thing is certain: classic games are back for a big second act, and they're being played in both old and new ways. Whether you've just been attacked by Space Invaders for the first time or you've been a Pong junkie since puberty, Chris Kohler's Retro Gaming Hacks is the indispensable new guide to playing and hacking classic games. Kohler has complied tons of how-to information on retro gaming that used to take days or weeks of web surfing to track down and sort through, and he presents it in the popular and highly readable Hacks style. Retro Gaming Hacks serves up 85 hard-nosed hacks for reviving the classic games. Want to game on an original system? Kohler shows you how to hack ancient hardware, and includes a primer for home-brewing classic software. Rather adapt today's equipment to run retro games? Kohler provides emulation techniques, complete with instructions for hacking a classic joystick that's compatible with a contemporary computer. This book also teaches readers to revive old machines for the original gaming experience: hook up an Apple II or a Commodore 64, for example, and play it like you played before. A video game journalist and author of Power Up: How Japanese Video Games Gave the World an Extra Life , Kohler has taught the history of video games at Tufts University. In Retro Gaming Hacks , he locates the convergence of classic games and contemporary software, revealing not only how to retrofit classic games for today's systems, but how to find the golden oldies hidden in contemporary programs as well. Whether you're looking to recreate the magic of a Robotron marathon or simply crave a little handheld Donkey Kong, Retro Gaming Hacks shows you how to set the way-back dial.

The Revealers

by Doug Wilhelm

Throwing light on a dark problem: Parkland Middle School is a place the students call Darkland, because no one in it does much to stop the daily harassment of kids by other kids. Three bullied seventh graders use their smarts to get the better of their tormentors by starting an unofficial e-mail forum at school in which they publicize their experiences. Unexpectedly, lots of other kids come forward to confess their similar troubles, and it becomes clear that the problem at their school is bigger than anyone knew. The school principal wants to clamp down on the operation, which she does when the trio, in their zealousness for revenge, libel a fellow student in what turns out to have been a setup. Now a new plan of attack is needed ... This suspenseful story of computer-era underground rebellion offers fresh perspectives on some of the most enduring themes in fiction for young readers.

Revolution in the Valley: The Insanely Great Story of How the Mac Was Made

by Andy Hertzfeld

There was a time, not too long ago, when the typewriter and notebook ruled, and the computer as an everyday tool was simply a vision. Revolution in the Valley traces this vision back to its earliest roots: the hallways and backrooms of Apple, where the groundbreaking Macintosh computer was born. The book traces the development of the Macintosh, from its inception as an underground skunkworks project in 1979 to its triumphant introduction in 1984 and beyond. The stories in Revolution in the Valley come on extremely good authority. That's because author Andy Hertzfeld was a core member of the team that built the Macintosh system software, and a key creator of the Mac's radically new user interface software. One of the chosen few who worked with the mercurial Steve Jobs, you might call him the ultimate insider. When Revolution in the Valley begins, Hertzfeld is working on Apple's first attempt at a low-cost, consumer-oriented computer: the Apple II. He sees that Steve Jobs is luring some of the company's most brilliant innovators to work on a tiny research effort the Macintosh. Hertzfeld manages to make his way onto the Macintosh research team, and the rest is history. Through lavish illustrations, period photos (many never before published), and Hertzfeld's vivid first-hand accounts, Revolution in the Valley reveals what it was like to be there at the birth of the personal computer revolution. The story comes to life through the book's portrait of the talented and often eccentric characters who made up the Macintosh team. Now, over 20 years later, millions of people are benefiting from the technical achievements of this determined and brilliant group of people.

Revolution in the Valley: The Insanely Great Story of How the Mac Was Made

by Andy Hertzfeld

There was a time, not too long ago, when the typewriter and notebook ruled, and the computer as an everyday tool was simply a vision. Revolution in the Valley traces this vision back to its earliest roots: the hallways and backrooms of Apple, where the groundbreaking Macintosh computer was born. The book traces the development of the Macintosh, from its inception as an underground skunkworks project in 1979 to its triumphant introduction in 1984 and beyond. The stories in Revolution in the Valley come on extremely good authority. That's because author Andy Hertzfeld was a core member of the team that built the Macintosh system software, and a key creator of the Mac's radically new user interface software. One of the chosen few who worked with the mercurial Steve Jobs, you might call him the ultimate insider.

RFID Security

by Anita Campbell Anand Das Brad Haines John Kleinschmidt Frank Thornton

RFID (Radio Frequency Identification) is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that allow them to receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ passes to dogs to beer kegs to library books. RFID tags use a standard that has already been hacked by several researchers. There are several motives for someone wanting to hack an RFID system: For monetary gain. Hacking a store's RFID system would allow a hacker to lower the pricing on any product(s). One could also steal cars (Prius or Lexus already have RFID keys) with RFID-encoded keys. Wreak havoc with someone's supply chain. Malicous/mischievous hackers can delete/alter/modify all identifying information for an entire shipment of products. Protect personal privacy. Privacy advocates fear that RFID tags embedded in products (which continue to transmit information after leaving a store) will be used to track consumer habits. RFID tags are also being tested as a means for identifying individuals on passports, driver's licenses, etc. This also has the ACLU types up in arms because, just like RFID tags in consumer products, these tags would be "always on" and broadcasting your personal information wherever you are.

The Rise of the Network Society: Economy, Society, and Culture (2nd edition)

by Manuel Castells

This first book in Castells' groundbreaking trilogy, with a substantial new preface, highlights the economic and social dynamics of the information age and shows how the network society has now fully risen on a global scale. Groundbreaking volume on the impact of the age of information on all aspects of society Includes coverage of the influence of the internet and the net-economy Describes the accelerating pace of innovation and social transformation Based on research in the USA, Asia, Latin America, and Europe

Risks, Controls, and Security: Concepts and Applications

by Vasant Raval Ashok Fichadia

An accountant's guide to managing control risks In today's networked world, security and risk control are no longer just the province of the IT department. Accountants and other business managers who are responsible for corporate risk management must fully understand the control and security risks that can affect the financial health of the entire organization. Risks,Controls and Security: Concepts and Applications introduces you to today's control risks and how to manage them. Beginning with basic systems controls and security awareness, the book provides you with a clear comprehension of the concepts,issues, and techniques of information security in a networked environment. Moving from theory to application, you'll cover all the key security principles that are applicable to all businesses,including e-businesses: * Enterprise risk management * Control and security frameworks * Basic cryptography and public key infrastructure * Security for operating systems, applications, database management systems, and telecommunications * Network and web security * Policy, regulation, and ethics Real-world problem scenarios and a wealth of pedagogical features--discussion questions, short exercises, example cases, and"concept maps" that help you visualize the material--ensure your confident grasp of the material and enable you to put "security into practice." Designed for practicing professionals as well as for students in accounting, business management, and computer science, Risks,Controls and Security will prepare you well for meeting the challenge of protecting information assets.

Showing 1,576 through 1,600 of 2,017 results

Help

Select your format based upon: 1) how you want to read your book, and 2) compatibility with your reading tool. To learn more about using Bookshare with your device, visit the "Using Bookshare" page in the Help Center.

Here is an overview of the specialized formats that Bookshare offers its members with links that go to the Help Center for more information.

  • Bookshare Web Reader - a customized reading tool for Bookshare members offering all the features of DAISY with a single click of the "Read Now" link.
  • DAISY (Digital Accessible Information System) - a digital book file format. DAISY books from Bookshare are DAISY 3.0 text files that work with just about every type of access technology that reads text. Books that contain images will have the download option of ‘DAISY Text with Images’.
  • BRF (Braille Refreshable Format) - digital Braille for use with refreshable Braille devices and Braille embossers.
  • MP3 (Mpeg audio layer 3) - Provides audio only with no text. These books are created with a text-to-speech engine and spoken by Kendra, a high quality synthetic voice from Ivona. Any device that supports MP3 playback is compatible.
  • DAISY Audio - Similar to the Daisy 3.0 option above; however, this option uses MP3 files created with our text-to-speech engine that utilizes Ivona's Kendra voice. This format will work with Daisy Audio compatible players such as Victor Reader Stream and Read2Go.