Browse Results

Showing 53,276 through 53,300 of 53,546 results

Digital Production, Design and Development T Level: Core

by Sonia Stuart Maureen Everett

Tackle the core component of the Digital Production, Design and Development T Level with this comprehensive resource.Written by highly respected authors, Mo Everett and Sonia Stuart, this clear, accessible and thorough textbook will guide learners through the key principles, concepts and terminology, as well as providing the inside track into what it takes to kick-start a career in the Digital world.- Simplify complex topics with summary tables, diagrams, key term definitions and a glossary.- Track and strengthen knowledge by using learning outcomes at the beginning of every unit and 'Test Yourself' questions.- Apply knowledge and understanding across 100s of engaging activities and research tasks.- Prepare for exams and the employer-set project using practice questions and project practice exercises.- Get ready for the workplace with industry tips and real-world examples.- Be guided through the course by expert authors Mo Everett and Sonia Stuart, who draw on their extensive industry and teaching experience.

Computational Visual Media: 12th International Conference, CVM 2024, Wellington, New Zealand, April 10–12, 2024, Proceedings, Part I (Lecture Notes in Computer Science #14592)

by Fang-Lue Zhang Andrei Sharf

​This book constitutes the refereed proceedings of CVM 2024, the 12th International Conference on Computational Visual Media, held in Wellington, New Zealand, in April 2024.The 34 full papers were carefully reviewed and selected from 212 submissions. The papers are organized in topical sections as follows:Part I: Reconstruction and Modelling, Point Cloud, Rendering and Animation, User Interations.Part II: Facial Images, Image Generation and Enhancement, Image Understanding, Stylization, Vision Meets Graphics.

Information Systems: 20th European, Mediterranean, and Middle Eastern Conference, EMCIS 2023, Dubai, United Arab Emirates, December 11-12, 2023, Proceedings, Part I (Lecture Notes in Business Information Processing #501)

by Maria Papadaki Marinos Themistocleous Khalid Al Marri Marwan Al Zarouni

This book constitutes selected papers from the 20th European, Mediterranean, and Middle Eastern Conference, EMCIS 2023, which was held in Dubai, UAE, during December 11-12, 2023. EMCIS covers technical, organizational, business, and social issues in the application of information technology and is dedicated to the definition and establishment of Information Systems (IS) as a discipline of high impact for IS professionals and practitioners. It focuses on approaches that facilitate the identification of innovative research of significant relevance to the IS discipline following sound research methodologies that lead to results of measurable impact. The 43 papers presented in this volume were carefully reviewed and selected from a total of 126 submissions. They were organized in topical sections as follows: Part I: Metaverse; blockchain technology and applications; digital governance; healthcare information systems; artificial intelligence; Part II: Big data and analytics; digital services and social media; innovative research projects; managing information systems; smart cities.

The Secret Life of Data: Navigating Hype and Uncertainty in the Age of Algorithmic Surveillance (The Information Society Series)

by Aram Sinnreich Jesse Gilbert

How data surveillance, digital forensics, and generative AI pose new long-term threats and opportunities—and how we can use them to make better decisions in the face of technological uncertainty.In The Secret Life of Data, Aram Sinnreich and Jesse Gilbert explore the many unpredictable, and often surprising, ways in which data surveillance, AI, and the constant presence of algorithms impact our culture and society in the age of global networks. The authors build on this basic premise: no matter what form data takes, and what purpose we think it&’s being used for, data will always have a secret life. How this data will be used, by other people in other times and places, has profound implications for every aspect of our lives—from our intimate relationships to our professional lives to our political systems.With the secret uses of data in mind, Sinnreich and Gilbert interview dozens of experts to explore a broad range of scenarios and contexts—from the playful to the profound to the problematic. Unlike most books about data and society that focus on the short-term effects of our immense data usage, The Secret Life of Data focuses primarily on the long-term consequences of humanity&’s recent rush toward digitizing, storing, and analyzing every piece of data about ourselves and the world we live in. The authors advocate for &“slow fixes&” regarding our relationship to data, such as creating new laws and regulations, ethics and aesthetics, and models of production for our data-fied society.Cutting through the hype and hopelessness that so often inform discussions of data and society, The Secret Life of Data clearly and straightforwardly demonstrates how readers can play an active part in shaping how digital technology influences their lives and the world at large.

Constructive Side-Channel Analysis and Secure Design: 15th International Workshop, COSADE 2024, Gardanne, France, April 9–10, 2024, Proceedings (Lecture Notes in Computer Science #14595)

by Romain Wacquez

This book constitutes the refereed proceedings of the 15th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2024, held in Gardanne, France, during April 9–10, 2024. The 14 full papers included in this book were carefully reviewed and selected from 42 submissions. They were organized in topical sections as follows: Analyses and Tools; Attack Methods; Deep-Learning-Based Side-Channel Attacks; PUF/RNG; and Cryptographic Implementations.

Windows Security Internals: A Deep Dive into Windows Authentication, Authorization, and Auditing

by James Forshaw

Power up your Windows security skills with expert guidance, in-depth technical insights, and dozens of real-world vulnerability examples from Google Project Zero&’s most renowned researcher! Learn core components of the system in greater depth than ever before, and gain hands-on experience probing advanced Microsoft security systems with the added benefit of PowerShell scripts.Windows Security Internals is a must-have for anyone needing to understand the Windows operating system&’s low-level implementations, whether to discover new vulnerabilities or protect against known ones. Developers, devops, and security researchers will all find unparalleled insight into the operating system&’s key elements and weaknesses, surpassing even Microsoft&’s official documentation.Author James Forshaw teaches through meticulously crafted PowerShell examples that can be experimented with and modified, covering everything from basic resource security analysis to advanced techniques like using network authentication. The examples will help you actively test and manipulate system behaviors, learn how Windows secures files and the registry, re-create from scratch how the system grants access to a resource, learn how Windows implements authentication both locally and over a network, and much more.You&’ll also explore a wide range of topics, such as:Windows security architecture, including both the kernel and user-mode applicationsThe Windows Security Reference Monitor (SRM), including access tokens, querying and setting a resource&’s security descriptor, and access checking and auditingInteractive Windows authentication and credential storage in the Security Account Manager (SAM) and Active DirectoryMechanisms of network authentication protocols, including NTLM and KerberosIn an era of sophisticated cyberattacks on Windows networks, mastering the operating system&’s complex security mechanisms is more crucial than ever. Whether you&’re defending against the latest cyber threats or delving into the intricacies of Windows security architecture, you&’ll find Windows Security Internals indispensable in your efforts to navigate the complexities of today&’s cybersecurity landscape.

Cybercrime and Digital Deviance

by Roderick S. Graham 'Shawn K. Smith

Cybercrime and Digital Deviance, Second Edition, combines insights from sociology, criminology, psychology, and cybersecurity to explore cybercrimes such as hacking, identity theft, and romance scams, along with forms of digital deviance such as pornography addiction, trolling, and “canceling” people for perceived violations of norms.Other issues are explored including cybercrime investigations, nation-state cybercrime, the use of algorithms in policing, cybervictimization, and expanded discussion of the theories used to explain cybercrime. Graham and Smith conceptualize the online space as a distinct environment for social interaction, framing their work with assumptions informed by their respective work in urban sociology and spatial criminology, and offering an engaging entry point for understanding what may appear to be a technologically complex course of study. The authors apply a modified version of a typology developed by David Wall: cybertrespass, cyberfraud, cyberviolence, and cyberpornography. This typology is simple enough for students just beginning their inquiry into cybercrime, while its use of legal categories of trespassing, fraud, violent crimes against persons, and moral transgressions provides a solid foundation for deeper study. In this edition each chapter includes a new “Current Events and Critical Thinking” section, using concepts from the chapter to explore a specific event or topic like the effect of disinformation on social cohesion and politics.Taken together, Graham and Smith’s application of a digital environment and Wall’s cybercrime typology makes this an ideal upper-level text for students in sociology and criminal justice. It is also an ideal introductory text for students within the emerging disciplines of cybercrime and cybersecurity.

Emerging Technologies and the Application of WSN and IoT: Smart Surveillance, Public Security, and Safety Challenges (Prospects in Smart Technologies)

by Shalli Rani

The Internet of Things (IoT) has numerous applications, including smart cities, industries, cloud-based apps, smart homes, and surveillance.The Internet of Things (IoT) enables smarter living by connecting devices, people, and objects. As networking became a crucial aspect of the Internet, rigorous design analysis led to the development of new research areas.The Internet of Things has revolutionized daily living in countless ways. It enables communication between buildings, people, portable gadgets, and vehicles, facilitating mobility. Smart cities and cloud-based data have transformed corporate practices. With billions of connected gadgets, everything will soon be able to communicate remotely. IoT networks, whether public or private, rely significantly on machine learning and software-defined networking. Indian and other governments have approved various research projects on IoT-based networking technologies. This field of study will significantly impact society in the future.Researchers are concerned about the many application areas and driving forces behind smart cities. The authors aim to provide insights into software-defined networking, artificial intelligence, and machine learning technologies used in IoT and networking. The framework focuses on practical applications and infrastructures. The book includes practical challenges, case studies, innovative concepts, and other factors that impact the development of realistic scenarios for smart surveillance. It also highlights innovative technology, designs, and algorithms that can accelerate the creation of smart city concepts.This resource includes real-world applications and case studies for smart city technology, enormous data management, and machine learning prediction, all with confidentiality and safety problems.

What Every Engineer Should Know About Digital Accessibility (ISSN)

by Sarah Horton David Sloan

Accessibility is a core quality of digital products to be deliberately addressed throughout the development lifecycle. What Every Engineer Should Know About Digital Accessibility will prepare readers to integrate digital accessibility into their engineering practices. Readers will learn how to accurately frame accessibility as an engineering challenge so they are able to address the correct problems in the correct way.Illustrated with diverse perspectives from accessibility practitioners and advocates, this book describes how people with disabilities use technology, the nature of accessibility barriers in the digital world, and the role of engineers in breaking down those barriers. Accessibility competence for current, emerging, and future technologies is addressed through a combination of guiding principles, core attributes and requirements, and accessibility‑informed engineering practices.FEATURES Discusses how technology can support inclusion for people with disabilities and how rigorous engineering processes help create quality user experiences without introducing accessibility barriers Explains foundational principles and guidelines that build core competency in digital accessibility as they are applied across diverse and emerging technology platforms Highlights practical insights into how engineering teams can effectively address accessibility throughout the technology development lifecycle Uses international standards to define and measure accessibility quality Written to be accessible to non‑experts in the subject area, What Every Engineer Should Know About Digital Accessibility is aimed at students, professionals, and researchers in the field of software engineering.

Modern Data Analytics in Excel: Using Power Query, Power Pivot, And More For Enhanced Data Analytics

by George Mount

If you haven't modernized your data cleaning and reporting processes in Microsoft Excel, you're missing out on big productivity gains. And if you're looking to conduct rigorous data analysis, more can be done in Excel than you think. This practical book serves as an introduction to the modern Excel suite of features along with other powerful tools for analytics.George Mount of Stringfest Analytics shows business analysts, data analysts, and business intelligence specialists how to make bigger gains right from your spreadsheets by using Excel's latest features. You'll learn how to build repeatable data cleaning workflows with Power Query, and design relational data models straight from your workbook with Power Pivot. You'll also explore other exciting new features for analytics, such as dynamic array functions, AI-powered insights, and Python integration.Learn how to build reports and analyses that were previously difficult or impossible to do in Excel. This book shows you how to:Build repeatable data cleaning processes for Excel with Power QueryCreate relational data models and analysis measures with Power PivotPull data quickly with dynamic arraysUse AI to uncover patterns and trends from inside ExcelIntegrate Python functionality with Excel for automated analysis and reporting

Frontier Information Technology and Systems Research in Cooperative Economics (Studies in Systems, Decision and Control #316)

by Aleksei V. Bogoviz Alexander E. Suglobov Alexandr N. Maloletko Olga V. Kaurova Svetlana V. Lobova

This book is the very first book-length study devoted to the advances in technological development and systems research in cooperative economics. The chapters provide, first of all, a coherent framework for understanding and applying the concepts and approaches of complexity and systems science for the advanced study of cooperative networks and particular cooperative enterprises and communities. Second, the book serves as a unique source of reliable information on the frontier information technologies available for the production, consumer, credit, and agricultural cooperative enterprises, discussing predominant strategies, potential drivers of change, and responses to complex problems. Given the diverse range of backgrounds and advanced research results, researchers, decision-makers, and stakeholders from all fields of cooperative economics in any country of the world will undoubtedly benefit from this book.

Smart and Healthy Walking: Toward Better Health and Life in Smart Cities (SpringerBriefs in Applied Sciences and Technology)

by Tin-Chih Toly Chen Yun-Ju Lee

This book examines smart technologies and their invaluable role in augmenting the walking experience of mobile users. From meticulously planned walking routes to precise footprint detection and analysis, as well as cutting-edge fall detection and prevention mechanisms, these intelligent technologies have the potential to revolutionize healthy and smart walking. Against the backdrop of the post-COVID-19 era, where unrestricted mobility has become pivotal for restoring normalcy, the demand for smart healthcare solutions has soared. The book explores latest advances in sensor technology, cloud computing, deep learning, and networking and related innovative applications that can leverage smart technologies to enhance healthy walking.

Störungstolerante Datenauthentifizierung für drahtlose Kommunikation

by Obaid Ur-Rehman Natasa Zivic

Dieses Buch gibt einen Einblick in die Herausforderungen der Datenauthentifizierung über drahtlose Kommunikationskanäle. Die Autoren gehen davon aus, dass die etablierten Standard-Authentifizierungsmechanismen nicht ausreichen, um Daten wie Sprache, Bilder und Videos über drahtlose Kanäle zu authentifizieren, da die drahtlose Kommunikation durch zahlreiche Störungen gekennzeichnet ist. Die Autoren schlagen neue Mechanismen vor, die auf so genannten Soft-Authentifizierungsalgorithmen basieren, die einige Änderungen an den zu schützenden Daten tolerieren. Die Autoren erklären, dass das Ziel dieser Algorithmen darin besteht, tolerant gegenüber inhaltlichen Änderungen auf Grund von Übertragungsfehler zu sein, aber dennoch in der Lage zu sein, Fälschungen zu erkennen. Ein weiterer Vorteil der Soft-Authentifizierungsalgorithmen besteht darin, dass sie in der Lage sind, die veränderten Stellen zu identifizieren und sie nach Möglichkeit zu korrigieren. Die Autoren zeigen, wie man dies erreicht, indem man die Datenmerkmale mit Hilfe von fehlerkorrigierenden Codes schützt. · Erörtert Methoden zur Authentifizierung von Daten (insbesondere von Bildern) bei Übertragungsstörungen, die bei der drahtlosen Kommunikation auftreten; · Stellt eine neue Klasse von Soft-Authentifizierungsmethoden vor, die anstelle der üblichen Hard-Authentifizierungsmethoden verwendet werden, um geringfügige Änderungen der Bilddaten zu tolerieren; · Verfügt über Authentifizierungsmethoden, die auf der Verwendung von Authentifizierungscodes und digitalen Wasserzeichen basieren

Computational Fluid Dynamics: Finite Difference Method and Lattice Boltzmann Method (Engineering Applications of Computational Methods #20)

by Guoxiang Hou Caikan Chen Shenglei Qin Yuan Gao Kai Wang

This book provides a concise and comprehensive introduction to several basic methods with more attention to their theoretical basis and applications in fluid dynamics. Furthermore, some new ideas are presented in this book, for example, a method to solve the transition matrix by difference operator transformation. For this method, the book gives the definition of Fourier integral transformation of translation operator, and proves the transition matrix equaling to the differential operator transformation, so that it is extended to general situations of explicit, implicit, multi-layer difference equations, etc. This flexible approach is also used in the differential part. In addition, the book also includes six types of equivalent stability definitions in two ways and deeply analyzes their errors, stabilities and convergences of the difference equations. What is more important, some new scientific contributions on lattice Boltzmann method (LBM) in recent years are presented in the book as well. The authors write the book combining their ten years teaching experience and research results and this book is intended for graduate students who are interested in the area of computational fluid dynamics (CFD). Authors list some new research achievements, such as simplified lattice Boltzmann method, the simplified lattice Boltzmann flux solver and discrete unified gas kinetic scheme, and expect that this new information could give readers possible further investigating ideas in their future research on CFD area.

Information Technologies and Intelligent Decision Making Systems: Third International Scientific and Practical Conference, ITIDMS 2023, Moscow, Russia, December, 12-14, 2023, Revised Selected Papers (Communications in Computer and Information Science #2112)

by Arthur Gibadullin

This book constitutes the refereed post proceedings of the Third International Scientific and Practical Conference on Information Technologies and Intelligent Decision Making Systems, ITIDMS 2023, held in Moscow, Russia, during December, 12-14, 2023. The 18 full papers included in this book were carefully reviewed and selected from 54 submissions. The papers presented in this volume focus on topics such as digital, intellectual and information transformation, the development of computer models and the improvement of automated and computing processes.

Big Data und Advanced Analytics im Controlling: Potenziale, Herausforderungen und Implikationen für die Praxis

by Andreas Vorndran

Die Digitalisierung und Entwicklungen im Gebiet der künstlichen Intelligenz haben in den letzten Jahren erhebliche Veränderungen in der Gesellschaft und der Unternehmenspraxis hervorgerufen. Aufkommende Technologien in den Feldern Big Data und Advanced Analytics werden auch im Controlling zunehmend diskutiert oder bereits eingesetzt. Dabei befinden sich der Wissensstand, inwieweit Big Data und Advanced Analytics das Controlling beeinflussen und verändern können, und die praktische Anwendung noch in einem frühen Stadium. Diese Arbeit befasst sich deshalb mit der Untersuchung der möglichen Auswirkungen von Big Data und Advanced Analytics im Controlling. Vor diesem Hintergrund werden die Einflüsse dieser digitalen Trends auf den Informationsversorgungsprozess des Controllings, auf die Erfüllung Controlling-spezifischer Anforderungen an Informationen und auf das Forecasting, die Budgetierung und die strategische Planung analysiert. Ferner werden praxisrelevante Herausforderungen, Grenzen und Risiken bei der Implementierung und Nutzung identifiziert sowie Implikationen zu deren Umgang zur Ausschöpfung der Potenziale abgeleitet.

Predicting the Winner: The Untold Story of Election Night 1952 and the Dawn of Computer Forecasting

by Ira Chinoy

The history of American elections changed profoundly on the night of November 4, 1952. An outside-the-box approach to predicting winners from early returns with new tools—computers—was launched live and untested on the newest medium for news: television. Like exhibits in a freak show, computers were referred to as &“electronic brains&” and &“mechanical monsters.&” Yet this innovation would help fuel an obsession with numbers as a way of understanding and shaping politics. It would engender controversy down to our own time. And it would herald a future in which the public square would go digital. The gamble was fueled by a crisis of credibility stemming from faulty election-night forecasts four years earlier, in 1948, combined with a lackluster presentation of returns. What transpired in 1952 is a complex tale of responses to innovation, which Ira Chinoy makes understandable via a surprising history of election nights as venues for rolling out new technologies, refining methods of prediction, and providing opportunities for news organizations to shine. In Predicting the Winner Chinoy tells in detail for the first time the story of the 1952 election night—a night with continuing implications for the way forward from the dramatic events of 2020–21 and for future election nights in the United States.

Proceedings of the 12th International Conference on Robotics, Vision, Signal Processing and Power Applications (Lecture Notes in Electrical Engineering #1123)

by Nur Syazreen Ahmad Junita Mohamad-Saleh Jiashen Teh

This book presents selected papers from the Proceedings of the International Conference 12th International Conference on Robotics, Vision, Signal Processing, and Power Applications ROVISP 2023, held in Penang, Malaysia, covering topic areas divided into the following tracks: (1) Robotics, Control, Mechatronics, and Automation; (2) Vision, Image and Signal Processing; (3) Telecommunication Systems and Applications; (4) Electronic Design and Applications; (5) Electrical Power, Energy, and Industrial Applications. Its content highlights state-of-the-art technologies adopted by the relevant industries which appeal to researchers and industrial practitioners working in the field.

Fourth Congress on Intelligent Systems: CIS 2023, Volume 2 (Lecture Notes in Networks and Systems #869)

by Sandeep Kumar K. Balachandran Joong Hoon Kim Jagdish Chand Bansal

This book is a collection of selected papers presented at the Fourth Congress on Intelligent Systems (CIS 2023), organized by CHRIST (Deemed to be University), Bangalore, India, under the technical sponsorship of the Soft Computing Research Society, India, during September 4–5, 2023. It includes novel and innovative work from experts, practitioners, scientists, and decision-makers from academia and industry. It covers topics such as the Internet of Things, information security, embedded systems, real-time systems, cloud computing, big data analysis, quantum computing, automation systems, bio-inspired intelligence, cognitive systems, cyber-physical systems, data analytics, data/web mining, data science, intelligence for security, intelligent decision-making systems, intelligent information processing, intelligent transportation, artificial intelligence for machine vision, imaging sensors technology, image segmentation, convolutional neural network, image/video classification, soft computing for machine vision, pattern recognition, human-computer interaction, robotic devices and systems, autonomous vehicles, intelligent control systems, human motor control, game playing, evolutionary algorithms, swarm optimization, neural network, deep learning, supervised learning, unsupervised learning, fuzzy logic, rough sets, computational optimization, and neuro-fuzzy systems.

Data Management: Der Weg zum datengetriebenen Unternehmen

by Klaus-Dieter Gronwald

Dieses Lehrbuch betrachtet Data Management als interdisziplinäres Konzept mit Fokus auf den Zielen datengetriebener Unternehmen. Im Zentrum steht die interaktive Entwicklung eines Unternehmensdatenmodells für ein virtuelles Unternehmen mit Unterstützung eines online Learning Games unter Einbeziehung der Aufgaben, Ziele und Grundsätze des Data Managements, typischer Data-Management-Komponenten und Frameworks wie Datenmodellierung und Design, Metadaten Management, Data Architecture, und Data Governance, und verknüpft diese mit datengetriebenen Anwendungen wie Business Warehousing, Big Data, In-Memory Data Management, und Machine Learning im Data Management Kontext.Das Buch dient als Lehrbuch für Studierende der Informatik, der Wirtschaft und der Wirtschaftsinformatik an Universitäten, Hochschulen und Fachschulen und zur industriellen Aus- und Weiterbildung.

OCR GCSE Computer Science, Second Edition

by George Rouse Lorne Pearcey Gavin Craddock Ian Paget

Written by leading Computer Science teachers, this brand-new textbook will guide students through the updated OCR GCSE Computer Science specification topic by topic, and provide them with standalone recap and review sections, worked examples and clear explanations of complex topics.This Student Book:>> develops computational thinking skills in line with the new Practical Programming element of Component 02>> provides differentiated material with the 'beyond the spec' feature>> includes standalone recap and review sections at the end of each chapter>> includes answers to the Knowledge Check questions to support independent learning>> provides definitions of technical terms, along with a glossary of words that will be needed for assessment.Looking for answers for the Student Book? They can be found at the back of the print textbook.You can now access a free set of practice questions on the Hodder Education website. Please note, these questions are not endorsed by OCR and have not been subject to any OCR quality assurance processes.George Rouse, Lorne Pearcey and Gavin Craddock are highly respected and widely published authors of resources.

AQA A level Computer Science

by Bob Reeves

Exam Board: AQALevel: AS/A-levelSubject: Computer ScienceFirst Teaching: September 2015First Exam: June 2016This title has been approved by AQA for use with the AS and A-level AQA Computer Science specifications. AQA A-level Computer Science gives students the chance to think creatively and progress through the AQA AS and A-level Computer Science specifications. Detailed coverage of the specifications will enrich understanding of the fundamental principles of computing, whilst a range of activities help to develop the programming skills and computational thinking skills at A-level and beyond. - Enables students to build a thorough understanding of the fundamental principles in the AQA AS and A-Level Computer Science specifications, with detailed coverage of programming, algorithms, data structures and representation, systems, databases and networks, uses and consequences.- Helps to tackle the various demands of the course confidently, with advice and support for programming and theoretical assessments and the problem-solving or investigative project at A-level.- Develops the programming and computational thinking skills for A-level and beyond - frequent coding and question practice will help students apply their knowledge of the principles of computer science, and design, program and evaluate problem-solving computer systems. Bob Reeves is an experienced teacher with examining experience, and well-respected author of resources for Computing and ICT across the curriculum.

Digital Production, Design and Development T Level: Core

by Sonia Stuart Maureen Everett

Tackle the core component of the Digital Production, Design and Development T Level with this comprehensive resource.Written by highly respected authors, Mo Everett and Sonia Stuart, this clear, accessible and thorough textbook will guide learners through the key principles, concepts and terminology, as well as providing the inside track into what it takes to kick-start a career in the Digital world.- Simplify complex topics with summary tables, diagrams, key term definitions and a glossary.- Track and strengthen knowledge by using learning outcomes at the beginning of every unit and 'Test Yourself' questions.- Apply knowledge and understanding across 100s of engaging activities and research tasks.- Prepare for exams and the employer-set project using practice questions and project practice exercises.- Get ready for the workplace with industry tips and real-world examples.- Be guided through the course by expert authors Mo Everett and Sonia Stuart, who draw on their extensive industry and teaching experience.

Kotlin Design Patterns and Best Practices: Elevate your Kotlin skills with classical and modern design patterns, coroutines, and microservices

by Alexey Soshin

Dive deep into Kotlin design patterns, explore idiomatic functional programming, and master microservices with frameworks like Arrow, Ktor, and Vert.x.Key FeaturesStart from basic Kotlin syntax and go all the way to advanced topics like Coroutines and structural concurrencyLearn how to select and implement the right design pattern for your next Kotlin projectGet to grips with concurrent and reactive microservices with Ktor and Vert.xBook DescriptionFor developers who are working with design patterns in Kotlin, this practical guide offers an opportunity to put their knowledge into practice. The book covers classical and modern design patterns, and provides a hands-on approach to implementation, along with associated methodologies. The third edition stays current with Kotlin updates, spanning from version 1.6 onwards, and offers in-depth insights into topics like structured concurrency and context receivers. The book starts by introducing essential Kotlin syntax and the significance of design patterns, covering classic Creational, Structural, and Behavioral patterns. It then progresses to explore functional programming, Reactive, and Concurrent patterns, including detailed discussions on coroutines and structured concurrency. As you navigate through these advanced concepts, you'll enhance your Kotlin coding skills. The book also delves into the latest architectural trends, focusing on microservices design patterns and aiding your decision-making process when choosing between architectures. By the end of the book, you will have a solid grasp of these advanced concepts and be able to apply them in your own projects.What you will learnUtilize functional programming and coroutines with the Arrow frameworkUse classical design patterns in the Kotlin programming languageScale your applications with reactive and concurrent design patternsDiscover best practices in Kotlin and explore its new featuresApply the key principles of functional programming to KotlinFind out how to write idiomatic Kotlin code and learn which patterns to avoidHarness the power of Kotlin to design concurrent and reliable systems with easeCreate an effective microservice with Kotlin and the Ktor frameworkWho this book is forThis book is for developers who want to apply design patterns they've learned from other languages in Kotlin and build reliable, scalable, and maintainable applications. You'll need a good grasp on at least one programming language before you get started with this book. Familiarity with classical design patterns from your language of choice would be helpful, but you'll still be able to follow along if you code in other languages

How They Broke Britain: The Instant Sunday Times Bestseller

by James O'Brien

***THE RUNAWAY BESTSELLER, WITH NEW MATERIAL FOR THE PAPERBACK***THE REVEALING, DEFINING ACCOUNT OF THE DARK NETWORK THAT BROKE OUR COUNTRY.Something has gone really wrong in Britain.Our economy has tanked, our freedoms are shrinking, and social divisions are growing. Our politicians seem most interested in their own careers, and much of the media only make things worse. We are living in a country almost unrecognisable from the one that existed a decade ago. But whose fault is it really? Who broke Britain and how did they do it?Bold and incisive as ever, James O'Brien reveals the shady network of influence that has created a broken Britain of strikes, shortages and scandals. He maps the web connecting dark think tanks to Downing Street, the journalists involved in selling it to the public and the media bosses pushing their own agendas. Over ten chapters, each focusing on a particular person complicit in the downfall, James O'Brien reveals how a select few have conspired - sometimes by incompetence, sometimes by design - to bring Britain to its knees.

Refine Search

Showing 53,276 through 53,300 of 53,546 results