You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Experience the revolutionary search powers of AltaVista.
To many people, the use of computers and the Internet as research tools is not a new concept. To others, though, computers are a relatively recent if necessary addition to their research toolkit. A lack of experience presents many difficulties for first-time users and others with limited computer know-how. This work, a second edition to the acclaimed Internet Research: Theory and Practice provides useful information for anyone who wants to broaden the range and scope of their research tools or anyone who wants to increase their knowledge about what is available electronically. The author discusses the following: basic methods of research using Internet protocols, Internet history, techniques for online searching, research theory and suggestions for maximizing results, mechanisms helpful in distinguishing good from bad or mediocre information, and ways for individuals to improve their research skills. Also included is an expanded discussion of Internet search engines and their operation, issues in scholarly communication and other emerging matters, and an enlarged and updated bibliography.
The Skeptical Environmentalist challenges widely held beliefs that the environmental situation is getting worse and worse. The author, himself a former member of Greenpeace, is critical of the way in which many environmental organisations make selective and misleading use of the scientific evidence. Using the best available statistical information from internationally recognised research institutes, Bjørn Lomborg systematically examines a range of major environmental problems that feature prominently in headline news across the world. His arguments are presented in non-technical, accessible language and are carefully backed up by over 2500 footnotes allowing readers to check sources for themselves. Concluding that there are more reasons for optimism than pessimism, Bjørn Lomborg stresses the need for clear-headed prioritisation of resources to tackle real, not imagined problems. The Skeptical Environmentalist offers readers a non-partisan stocktaking exercise that serves as a useful corrective to the more alarmist accounts favoured by campaign groups and the media.
In this updated edition, authors Deborah and Eric Ray use crystal-clear instructions and friendly prose to introduce you to all of today's Unix essentials. You’ll find the information you need to get started with the operating system and learn the most common Unix commands and concepts so that Unix can do the hard work for you. After mastering the basics of Unix, you’ll move on to how to use directories and files, work with a shell, and create and edit files. You’ll then learn how to manipulate files, configure a Unix environment, and run–and even write–scripts. Throughout the book–from logging in to being root–the authors offer essential coverage of Unix.
The bestselling bible for social media is now completely revised and updated! The Social Media Bible, Second Edition (www.TSMB2.com) is the most comprehensive resource that transforms the way corporate, small business, and non-profit companies use social media to reach their desired audiences with power messages and efficiency. In this Second Edition, each of the three parts - Tactics, Tools, and Strategies - have been updated to reflect the most current social media trends. Covers all major new software applications, including features and benefits, in detail Lists more than 120 companies integral to the social media industry with updated data, products, services, and links Includes advanced topics like measuring social media return on investment (ROI) and how to develop and implement the Five Steps to Social Media Success strategy plan Includes dozens of social media ROI case studies Author is a widely acknowledged social media authority with numerous media appearances and speaking engagements The Social Media Bible, Second Edition gives you a fully up-to-date toolbox to revamp your marketing strategy and create new opportunities for growth.
Shows Web developers how to use two popular open source technologies, the PHP scripting language and MySQL database, to build Web database applications This updated edition covers changes in PHP 5 and the latest version of MySQL, including programming techniques for the new PHP default setting, methods for handling MySQL security problems, and extended information about Apache Web Server and Mac OS X versions of PHP and MySQL Explains how to install Windows, Linux, and Mac OS X versions of PHP and MySQL Includes two complete sample applications: an online catalog and a members-only Web site Features a companion Web site with code examples from the book and links to the author's successful site Kevin Beaver has more than fifteen years of experience in security and information technology, specializing in security assessments and incident response Features a companion Web site with links to various utilities discussed throughout the book and practical security checklists
A Database-Powered Website--Easier and Yet More Powerful Than Ever The latest release of ColdFusion represents a giant leap forward in the creation of dynamic, database-driven websites. Mastering ColdFusion MX is the resource you need to take advantage of everything MX has to offer. Whether you're just getting started or making the transition from an earlier version, you'll quickly gain the skills that will take you to the next level. Master database interactions, integrate with Flash applications, build and consume web services, manage and secure your server--and, most importantly, develop full-blown, dynamic web applications. Coverage Includes: * Including outside code * Creating and manip...
The standards for usability and interaction design for Web sites and software are well known. While not everyone uses those standards, or uses them correctly, there is a large body of knowledge, best practice, and proven results in those fields, and a good education system for teaching professionals "how to." For the newer field of Web application design, however, designers are forced to reuse the old rules on a new platform. This book provides a roadmap that will allow readers to put complete working applications on the Web, display the results of a process that is running elsewhere, and update a database on a remote server using an Internet rather than a network connection. Web Application...
When you first hear the term Information Assurance you tend to conjure up an image of a balanced set of reasonable measures that have been taken to protect the information after an assessment has been made of risks that are posed to it. In truth this is the Holy Grail that all organisations that value their information should strive to achieve, but which few even understand. Information Assurance is a term that has recently come into common use. When talking with old timers in IT (or at least those that are over 35 years old), you will hear them talking about information security, a term that has survived since the birth of the computer. In the more recent past, the term Information Warfare ...