You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
To make sense of the world, we’re always trying to place things in context, whether our environment is physical, cultural, or something else altogether. Now that we live among digital, always-networked products, apps, and places, context is more complicated than ever—starting with "where" and "who" we are. This practical, insightful book provides a powerful toolset to help information architects, UX professionals, and web and app designers understand and solve the many challenges of contextual ambiguity in the products and services they create. You’ll discover not only how to design for a given context, but also how design participates in making context. Learn how people perceive context when touching and navigating digital environments See how labels, relationships, and rules work as building blocks for context Find out how to make better sense of cross-channel, multi-device products or services Discover how language creates infrastructure in organizations, software, and the Internet of Things Learn models for figuring out the contextual angles of any user experience
A guide to C♯ 3.0 and Visual Studio 2008 covers such topics as objects, data types and references, encapsulation, interfaces, exception handling, and LINQ.
Neogeography combines the complex techniques of cartography and GIS and places them within reach of users and developers. This Short Cut introduces you to the growing number of tools, frameworks, and resources available that make it easy to create maps and share the locations of your interests and history. Learn what existing and emerging standards such as GeoRSS, KML, and Microformats mean; how to add dynamic maps and locations to your web site; how to pinpoint the locations of your online visitors; how to create genealogical maps and Google Earth animations of your family's ancestry; or how to geotag and share your travel photographs.
Corporate Explorers Transform Disruption Into Opportunity With This Proven Framework Innovation used to be seen as a game best left to entrepreneurs, but now a new breed of corporate managers is flipping this logic on its head. These Corporate Explorers have the insight, resilience, and discipline to overcome the obstacles and build new ventures from inside even the largest organizations. Corporate Explorers are part entrepreneurs, using innovation disciplines to jump start cutting-edge ideas, and part change leaders, capable of creating support for investment. They see that corporations already own the ideas, resources, and—critically—the talent to build new ventures. Companies like Ama...
Your essential guide to key programming features in Microsoft SQL Server 2012 Take your database programming skills to a new level—and build customized applications using the developer tools introduced with SQL Server 2012. This hands-on reference shows you how to design, test, and deploy SQL Server databases through tutorials, practical examples, and code samples. If you’re an experienced SQL Server developer, this book is a must-read for learning how to design and build effective SQL Server 2012 applications. Discover how to: Build and deploy databases using the SQL Server Data Tools IDE Query and manipulate complex data with powerful Transact-SQL enhancements Integrate non-relational features, including native file streaming and geospatial data types Consume data with Microsoft ADO.NET, LINQ, and Entity Framework Deliver data using Windows Communication Foundation (WCF) Data Services and WCF RIA Services Move your database to the cloud with Windows Azure SQL Database Develop Windows Phone cloud applications using SQL Data Sync Use SQL Server BI components, including xVelocity in-memory technologies
The book wraps up with a look at the legal effects--both positive and negative--of open source/free software licensing.
While many resources for network and IT security are available, detailed knowledge regarding modern web application security has been lacking—until now. This practical guide provides both offensive and defensive security concepts that software engineers can easily learn and apply. Andrew Hoffman, a senior security engineer at Salesforce, introduces three pillars of web application security: recon, offense, and defense. You’ll learn methods for effectively researching and analyzing modern web applications—including those you don’t have direct access to. You’ll also learn how to break into web applications using the latest hacking techniques. Finally, you’ll learn how to develop mi...
Learn advanced threat analysis techniques in practice by implementing Elastic Stack security features Key FeaturesGet started with Elastic Security configuration and featuresLeverage Elastic Stack features to provide optimal protection against threatsDiscover tips, tricks, and best practices to enhance the security of your environmentBook Description Threat Hunting with Elastic Stack will show you how to make the best use of Elastic Security to provide optimal protection against cyber threats. With this book, security practitioners working with Kibana will be able to put their knowledge to work and detect malicious adversary activity within their contested network. You'll take a hands-on app...
Learning Agile is a comprehensive guide to the most popular agile methods, written in a light and engaging style that makes it easy for you to learn. Agile has revolutionized the way teams approach software development, but with dozens of agile methodologies to choose from, the decision to "go agile" can be tricky. This practical book helps you sort it out, first by grounding you in agile’s underlying principles, then by describing four specific—and well-used—agile methods: Scrum, extreme programming (XP), Lean, and Kanban. Each method focuses on a different area of development, but they all aim to change your team’s mindset—from individuals who simply follow a plan to a cohesive g...
As one of the applications in Microsoft Office, Word is the dominant word-processing program for both Windows and Mac users. Millions of people around the globe use it. But many, if not most, of them barely skim the surface of what is possible with Microsoft Word. Seduced by the application's supposed simplicity, they settle for just what's obvious--even if it doesn't satisfy their wants and needs. They may curse the wretched Bullets and Numbering buttons multiple times a day or take hours to change the font size of every heading in a lengthy report, yet they're reluctant to dig deeper to take advantage of Word's immense capabilities and limitless customization tools.Let Word Hacks be your s...