Service Alert
Delay in delivery of ZIP and Direct to Player materials
You may experience a delay in delivery of Direct to Player materials. All requests for materials will be delivered as soon as possible. Thank you for your patience.
You may experience a delay in delivery of Direct to Player materials. All requests for materials will be delivered as soon as possible. Thank you for your patience.
Showing 1 - 20 of 5154 items
By Sarah Horton, David Sloan. 2024
Accessibility is a core quality of digital products to be deliberately addressed throughout the development lifecycle. What Every Engineer Should…
Know About Digital Accessibility will prepare readers to integrate digital accessibility into their engineering practices. Readers will learn how to accurately frame accessibility as an engineering challenge so they are able to address the correct problems in the correct way.Illustrated with diverse perspectives from accessibility practitioners and advocates, this book describes how people with disabilities use technology, the nature of accessibility barriers in the digital world, and the role of engineers in breaking down those barriers. Accessibility competence for current, emerging, and future technologies is addressed through a combination of guiding principles, core attributes and requirements, and accessibility‑informed engineering practices.FEATURES Discusses how technology can support inclusion for people with disabilities and how rigorous engineering processes help create quality user experiences without introducing accessibility barriers Explains foundational principles and guidelines that build core competency in digital accessibility as they are applied across diverse and emerging technology platforms Highlights practical insights into how engineering teams can effectively address accessibility throughout the technology development lifecycle Uses international standards to define and measure accessibility quality Written to be accessible to non‑experts in the subject area, What Every Engineer Should Know About Digital Accessibility is aimed at students, professionals, and researchers in the field of software engineering.The Internet of Things (IoT) has numerous applications, including smart cities, industries, cloud-based apps, smart homes, and surveillance.The Internet of…
Things (IoT) enables smarter living by connecting devices, people, and objects. As networking became a crucial aspect of the Internet, rigorous design analysis led to the development of new research areas.The Internet of Things has revolutionized daily living in countless ways. It enables communication between buildings, people, portable gadgets, and vehicles, facilitating mobility. Smart cities and cloud-based data have transformed corporate practices. With billions of connected gadgets, everything will soon be able to communicate remotely. IoT networks, whether public or private, rely significantly on machine learning and software-defined networking. Indian and other governments have approved various research projects on IoT-based networking technologies. This field of study will significantly impact society in the future.Researchers are concerned about the many application areas and driving forces behind smart cities. The authors aim to provide insights into software-defined networking, artificial intelligence, and machine learning technologies used in IoT and networking. The framework focuses on practical applications and infrastructures. The book includes practical challenges, case studies, innovative concepts, and other factors that impact the development of realistic scenarios for smart surveillance. It also highlights innovative technology, designs, and algorithms that can accelerate the creation of smart city concepts.This resource includes real-world applications and case studies for smart city technology, enormous data management, and machine learning prediction, all with confidentiality and safety problems.By Lucas Lixinski, Yujie Zhu. 2024
Heritage, Conflict, and Peace-Building examines the possibilities arising from, and challenges associated with, transforming heritage from a casualty of conflict…
into an opportunity for peacebuilding.The contributors to this book, who hail from academia and practice, present case studies that shed light on the multifaceted factors and conditions influenced by diplomacy, nationalism, victimhood, and the roles of diverse institutional actors in fostering peace. They demonstrate the possibilities and pitfalls of the work heritage does for local communities, the nation-state, and the international community, when these different actors and their peace aspirations and agendas intersect. Looking at heritage and peace processes on all continents, the contributions in this volume amount to a compelling analytical account of how the discourses of heritage and peace connect, overlap, and diverge. They also emphasise that our shared aspiration for peace should not be taken for granted in a heritage context, and that it is incumbent upon heritage scholars and practitioners to be more intentional about the work they wish to do to promote peace.Heritage, Conflict, and Peace-Building will be of interest to scholars and practitioners working in heritage studies, transitional justice, museum studies, international relations, education, history, and law.By Adam M. Bishop. 2024
Robert of Nantes was Latin patriarch of Jerusalem from 1240 to 1254, and, according to Bernard Hamilton, was “the most…
important single person” in the Frankish Kingdom of Jerusalem after the Battle of Forbie in 1244. Despite this importance, he was a rather obscure figure: almost nothing is known about him before he became bishop of Nantes in 1236. How did he rise to such a prominent position in Jerusalem? Robert of Nantes, Patriarch of Jerusalem (1240–1254) follows Robert from his probable origins in Aquitaine, to Italy where he might have been the unnamed bishop of Aquino. He was briefly transferred to Nantes in the duchy of Brittany, but soon returned to Rome, where he was appointed patriarch of Jerusalem in 1240. As patriarch, he was present for the fall of Jerusalem to the Khwarizmian Turks, the Frankish defeat at Forbie, and the subsequent crusade of Louis IX of France.This is the first book-length biography of any of the Latin patriarchs of Jerusalem. It will be of interest not only to historians of the crusades but also to historians of Italy, Sicily, the Papal States, the Holy Roman Empire, Aquitaine and Brittany. It will hopefully inspire further research on other ecclesiastical and secular leaders of Jerusalem and Cyprus, who may not be traditionally considered “rulers”, but who nevertheless helped govern the Frankish kingdoms.By Roderick S. Graham, 'Shawn K. Smith. 2024
Cybercrime and Digital Deviance, Second Edition, combines insights from sociology, criminology, psychology, and cybersecurity to explore cybercrimes such as hacking,…
identity theft, and romance scams, along with forms of digital deviance such as pornography addiction, trolling, and “canceling” people for perceived violations of norms.Other issues are explored including cybercrime investigations, nation-state cybercrime, the use of algorithms in policing, cybervictimization, and expanded discussion of the theories used to explain cybercrime. Graham and Smith conceptualize the online space as a distinct environment for social interaction, framing their work with assumptions informed by their respective work in urban sociology and spatial criminology, and offering an engaging entry point for understanding what may appear to be a technologically complex course of study. The authors apply a modified version of a typology developed by David Wall: cybertrespass, cyberfraud, cyberviolence, and cyberpornography. This typology is simple enough for students just beginning their inquiry into cybercrime, while its use of legal categories of trespassing, fraud, violent crimes against persons, and moral transgressions provides a solid foundation for deeper study. In this edition each chapter includes a new “Current Events and Critical Thinking” section, using concepts from the chapter to explore a specific event or topic like the effect of disinformation on social cohesion and politics.Taken together, Graham and Smith’s application of a digital environment and Wall’s cybercrime typology makes this an ideal upper-level text for students in sociology and criminal justice. It is also an ideal introductory text for students within the emerging disciplines of cybercrime and cybersecurity.Power up your Windows security skills with expert guidance, in-depth technical insights, and dozens of real-world vulnerability examples from Google…
Project Zero&’s most renowned researcher! Learn core components of the system in greater depth than ever before, and gain hands-on experience probing advanced Microsoft security systems with the added benefit of PowerShell scripts.Windows Security Internals is a must-have for anyone needing to understand the Windows operating system&’s low-level implementations, whether to discover new vulnerabilities or protect against known ones. Developers, devops, and security researchers will all find unparalleled insight into the operating system&’s key elements and weaknesses, surpassing even Microsoft&’s official documentation.Author James Forshaw teaches through meticulously crafted PowerShell examples that can be experimented with and modified, covering everything from basic resource security analysis to advanced techniques like using network authentication. The examples will help you actively test and manipulate system behaviors, learn how Windows secures files and the registry, re-create from scratch how the system grants access to a resource, learn how Windows implements authentication both locally and over a network, and much more.You&’ll also explore a wide range of topics, such as:Windows security architecture, including both the kernel and user-mode applicationsThe Windows Security Reference Monitor (SRM), including access tokens, querying and setting a resource&’s security descriptor, and access checking and auditingInteractive Windows authentication and credential storage in the Security Account Manager (SAM) and Active DirectoryMechanisms of network authentication protocols, including NTLM and KerberosIn an era of sophisticated cyberattacks on Windows networks, mastering the operating system&’s complex security mechanisms is more crucial than ever. Whether you&’re defending against the latest cyber threats or delving into the intricacies of Windows security architecture, you&’ll find Windows Security Internals indispensable in your efforts to navigate the complexities of today&’s cybersecurity landscape.This book constitutes the refereed proceedings of the 15th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2024,…
held in Gardanne, France, during April 9–10, 2024. The 14 full papers included in this book were carefully reviewed and selected from 42 submissions. They were organized in topical sections as follows: Analyses and Tools; Attack Methods; Deep-Learning-Based Side-Channel Attacks; PUF/RNG; and Cryptographic Implementations.By Sanghamitra Misra. 2024
This book is an enquiry into the elision of the figure of the sovereign, cotton-producing Garo in the colonial archive…
and its savage transformation into imperialism’s quintessential ‘primitive’ in the period between 1760 CE and 1900 CE.The precolonial political economy of hill cotton produced by the Garos, its unhinging from the exercise of Garo sovereignty and its eventual commodification twined with the deterritorialization of the community as it made way for elephant mehals and reserved forests form the kernel of the book. This history is seen as participating in and mirroring analogous processes of colonization across vast contiguous swathes of India, including Mymensingh, Chittagong, Bhagalpur, the Khasi hills and the Cachar valley. A central theme explored is the long history of Garo rebellions and their rationality, examined in conjunction with contiguous polities such as that of the Khasis; even as the book follows the growing arc of colonial power in eastern and northeastern India as it converted territory and revenue appropriated through conquest, into dominium.The book makes an original contribution to the historiography of the colonial state, the ‘tribe’ and primitivism by making a case for the welded histories of war, ethnogenesis, revenue extraction and anthropological knowledge otherwise often studied as disparate fields of scholarship. It therefore also offers a new interpretation of the history of the colonization of eastern and northeastern India. The book will be of interest to academics and researchers of these regions and of empire and political economy, law and ‘primitivism’, and anthropology and colonial revenue.This book chronicles a University of Alabama historian’s efforts to engage public history over the course of a decade, highlighting…
personal and educational experiences inside and outside of the classroom.Each chapter reveals how Sharony Green, her students, and collaborators used various public places and spaces in Alabama, including the University of Alabama and Tuscaloosa, where she teaches, as “labs” to learn more about our shared past. Inspired by her familiar beginnings in a historic community in Miami, Florida, the author, a descendant of people from the American South and the Bahamas, unveils her encounters with the built environment, old documents and objects, motion pictures, music, and all kinds of historical actors. The book shares a variety of projects including exhibits and displays, images, videos, songs, and poetry, that serve as manifestations of her encounters with the places around her and her students. Together, these stories uncover an unexpected journey into public history, offering new ways to think about the field and humanities more generally.Teaching Public History Creatively in Alabama is an enlightening resource to both intentional and unintentional practitioners of public history, including scholars, students, and general readers interested in connecting with the past.By Joanne Reitano. 2024
Now in its second edition, New York State: Peoples, Places, and Priorities is an accessibly written book that explores the…
ever-shifting dynamics of New York State history in a single volume.The text is organized both chronologically and topically, balancing political, economic, social, and cultural history. It discusses key figures, groups, movements, and controversies, upstate and downstate. Each chapter is divided into teachable, digestible sections that examine the major developments and challenges of that period, with timelines and lists of online resources to aid student understanding. The new edition brings New York State’s history into the present with coverage of recent political and economic developments, the Covid-19 pandemic, immigration, and global warming. Throughout the book, material was added concerning the American Revolution, the Civil War, women’s rights, and environmental justice. Artwork, maps, charts, and textboxes illuminate the state’s rich history. Analytical questions accompanying figures and texts encourage deeper engagement with the past.Designed for undergraduates, this book is a concise and updated account of New York State’s history over the centuries, with a wealth of resources to benefit students and instructors alike.By Aram Sinnreich, Jesse Gilbert. 2024
How data surveillance, digital forensics, and generative AI pose new long-term threats and opportunities—and how we can use them to…
make better decisions in the face of technological uncertainty.In The Secret Life of Data, Aram Sinnreich and Jesse Gilbert explore the many unpredictable, and often surprising, ways in which data surveillance, AI, and the constant presence of algorithms impact our culture and society in the age of global networks. The authors build on this basic premise: no matter what form data takes, and what purpose we think it&’s being used for, data will always have a secret life. How this data will be used, by other people in other times and places, has profound implications for every aspect of our lives—from our intimate relationships to our professional lives to our political systems.With the secret uses of data in mind, Sinnreich and Gilbert interview dozens of experts to explore a broad range of scenarios and contexts—from the playful to the profound to the problematic. Unlike most books about data and society that focus on the short-term effects of our immense data usage, The Secret Life of Data focuses primarily on the long-term consequences of humanity&’s recent rush toward digitizing, storing, and analyzing every piece of data about ourselves and the world we live in. The authors advocate for &“slow fixes&” regarding our relationship to data, such as creating new laws and regulations, ethics and aesthetics, and models of production for our data-fied society.Cutting through the hype and hopelessness that so often inform discussions of data and society, The Secret Life of Data clearly and straightforwardly demonstrates how readers can play an active part in shaping how digital technology influences their lives and the world at large.By Maria Papadaki, Marinos Themistocleous, Khalid Al Marri, Marwan Al Zarouni. 2024
This book constitutes selected papers from the 20th European, Mediterranean, and Middle Eastern Conference, EMCIS 2023, which was held in…
Dubai, UAE, during December 11-12, 2023. EMCIS covers technical, organizational, business, and social issues in the application of information technology and is dedicated to the definition and establishment of Information Systems (IS) as a discipline of high impact for IS professionals and practitioners. It focuses on approaches that facilitate the identification of innovative research of significant relevance to the IS discipline following sound research methodologies that lead to results of measurable impact. The 43 papers presented in this volume were carefully reviewed and selected from a total of 126 submissions. They were organized in topical sections as follows: Part I: Metaverse; blockchain technology and applications; digital governance; healthcare information systems; artificial intelligence; Part II: Big data and analytics; digital services and social media; innovative research projects; managing information systems; smart cities.This book constitutes the refereed proceedings of CVM 2024, the 12th International Conference on Computational Visual Media, held in Wellington,…
New Zealand, in April 2024.The 34 full papers were carefully reviewed and selected from 212 submissions. The papers are organized in topical sections as follows:Part I: Reconstruction and Modelling, Point Cloud, Rendering and Animation, User Interations.Part II: Facial Images, Image Generation and Enhancement, Image Understanding, Stylization, Vision Meets Graphics.By Bob Reeves. 2015
Exam Board: AQALevel: AS/A-levelSubject: Computer ScienceFirst Teaching: September 2015First Exam: June 2016This title has been approved by AQA for use…
with the AS and A-level AQA Computer Science specifications. AQA A-level Computer Science gives students the chance to think creatively and progress through the AQA AS and A-level Computer Science specifications. Detailed coverage of the specifications will enrich understanding of the fundamental principles of computing, whilst a range of activities help to develop the programming skills and computational thinking skills at A-level and beyond. - Enables students to build a thorough understanding of the fundamental principles in the AQA AS and A-Level Computer Science specifications, with detailed coverage of programming, algorithms, data structures and representation, systems, databases and networks, uses and consequences.- Helps to tackle the various demands of the course confidently, with advice and support for programming and theoretical assessments and the problem-solving or investigative project at A-level.- Develops the programming and computational thinking skills for A-level and beyond - frequent coding and question practice will help students apply their knowledge of the principles of computer science, and design, program and evaluate problem-solving computer systems. Bob Reeves is an experienced teacher with examining experience, and well-respected author of resources for Computing and ICT across the curriculum.By Jo Thomas, Keely Rogers. 2015
The only series for MYP 4 and 5 developed in cooperation with the International Baccalaureate (IB)Develop your skills to become…
an inquiring learner; ensure you navigate the MYP framework with confidence using a concept-driven and assessment-focused approach presented in global contexts.- Develop conceptual understanding with key MYP concepts and related concepts at the heart of each chapter.- Learn by asking questions with a statement of inquiry in each chapter. - Prepare for every aspect of assessment using support and tasks designed by experienced educators.- Understand how to extend your learning through research projects and interdisciplinary opportunities.This title is also available in two digital formats via Dynamic Learning. Find out more by clicking on the links at the top of the page.Jo Thomas has been Head of History at the following IB schools: Munich International School, United World College of South East Asia (UWCSEA) and the British School of Brussels. Keely Rogers has been HOD and/or teacher of History at the following IB schools: United World College of South East Asia (UWCSEA), the International School of Brussels (ISB) and ACS Egham International School in Surrey, UK.Jo and Keely have written several textbooks for the IB diploma. They are also examiners and workshop leaders for the IB.By Anna Czarnowus, Janet M. Wilson. 2024
This volume maps the phenomenon of medievalism in Aotearoa, initially as an import by the early white settler society, and…
as a form of nation building that would reinforce Britishness and ancestral belonging. This colonial narrative underpins the volume’s focus on the imperial relationship in chapters on the academic study of the Middle Ages, on medievalism in film and music, in manuscript and book collections, and colonial stained glass and architecture. Through the alternative 21st-century frameworks of a global Middle Ages and Aotearoa’s bicultural nationalism, the volume also introduces Maori understandings of the ancestral past that parallel the European epoch and, at the opposite end of the spectrum, the phenomenon of global right-wing medievalism, as evidenced in the Alt-right extremism underpinning the Christchurch mosque attack of 2019.The 11 chapters trace the transcultural moves and networks that comprise the shift from the 20th-century study of the Middle Ages as an historical period to manifestations of medievalism as the reception and interpretation of the medieval past in postmedieval times. Collectively these are viewed as indications of the changing public perception about the meaning and practice of the European heritage from the colonial to contemporary era.The volume will appeal to educationists, scholars, and students interested in the academic history of the Middle Ages in New Zealand; enthusiasts of film, music, and performance of the medieval; members of the public interested in Aotearoa’s history and popular culture; and all who enjoy the colourful reinventions of medievalism.The trailblazing book that influenced a generation of writers, and proves that mature reflection needn&’t be lacking in attitude.In the…
beginning when everything was very sexual we talked about our fantasies. She thought about having a guy for some of it. She thought about having a gun. I had gone through a lot to get away from guys so I admit that the thought of going back to them, even for a little adventure, was surprising and disconcerting …Ann Rower&’s first book, If You&’re a Girl, published by Semiotext(e)&’s Native Agents series in 1991 in tandem with Cookie Mueller&’s Walking Through Clear Water in a Pool Painted Black, cemented her reputation as the Eve Babitz of lower Manhattan.Rower was fifty-three years old at the time. Her stories—urtexts of female autofiction—had long been circulating within the poetry and postpunk music scenes. They were unlike anyone else&’s: disarming, embarrassing, psuedoconfessional tales of everyday life dizzily told and laced with dry humor. In If You&’re a Girl, she recounts her adventures as Timothy Leary&’s babysitter, her artistic romance with actor Ron Vawter, and her attempts to evade a schizophrenic stalker.Rower went on to publish two novels: Armed Response (1995) and Lee & Elaine (2002). After the 2002 suicide of her partner, the writer Heather Lewis, Rower stopped writing for almost two decades. And then she picked up where If You&’re a Girl left off. No longer a girl, she produced dozens of stories from her life in New York as an octogenarian.This new, expanded edition includes most of the original book, together with selections from both her novels and her recent writings. If You&’re a Girl is a trailblazing book that manifests Rower&’s influence on a generation of writers, and proves that mature reflection needn&’t be lacking in attitude.By David MacLeod. 2024
One month. One hour a day. That&’s all it takes to start writing Rust code!Learn Rust in a Month of…
Lunches teaches you to write super fast and super safe Rust code through lessons you can fit in your lunch break. Crystal-clear explanations and focused, relevant examples make it accessible to anyone—even if you&’re learning Rust as your first programming language. By the time you&’re done reading Learn Rust in a Month of Lunches you&’ll be able to: Build real software in Rust Understand messages from the compiler and Clippy, Rust&’s coding coach Make informed decisions on the right types to use in any context Make sense of the Rust standard library and its commonly used items Use external Rust &“crates&” (libraries) for common tasks Comment and build documentation for your Rust code Work with crates that use async Rust Write simple declarative macros Explore test driven development in Rust Learn Rust in a Month of Lunches is full of 24 easy-to-digest lessons that ease you into real Rust programming. You&’ll learn essential Rust skills you can use for everything from system programming, to web applications, and games. By the time you&’re done learning, you&’ll know exactly what makes Rust unique—and be one of the thousands of developers who say it&’s their best loved language! About the technology Learn how to create fast powerful programs in Rust in just 24 short lessons! Rust gives you modern features like a top-notch compiler, a rich ecosystem of pre-built libraries, and the same low-level performance you get with a language like C, but without the awkward syntax, complex memory management, and code safety concerns. This book guides you step by step from your first line of code. About the book Learn Rust in a Month of Lunches breaks down the Rust language into concise hands-on lessons designed to be completed in an hour or less. The examples are fun and easy to follow, so you&’ll quickly progress from zero Rust knowledge to handling async and writing your own macros. You won&’t even need to install Rust—the book&’s code samples run in the browser-based Rust Playground. There&’s no easier way to get started! What's inside Build working Rust software Understand messages from the compiler and Clippy Use external Rust &“crates&” (libraries) for common tasks Explore test driven development in Rust About the reader No previous experience with Rust required. About the author Dave MacLeod was an educator, Korean-English translator, project controller, and copywriter before becoming a full-time Rust developer. The technical editor on this book was Jerry Kuch. Table of Contents 1 Some basics 2 Memory, variables, and ownership 3 More complex types 4 Building your own types 5 Generics, option, and result 6 More collections, more error handling 7 Traits: Making different types do the same thing 8 Iterators and closures 9 Iterators and closures again! 10 Lifetimes and interior mutability 11 Multiple threads and a lot more 12 More on closures, generics, and threads 13 Box and Rust documentation 14 Testing and building your code from tests 15 Default, the builder pattern, and Deref 16 Const, &“unsafe&” Rust, and external crates 17 Rust&’s most popular crates 18 Rust on your computer 19 More crates and async Rust 20 A tour of the standard library 21 Continuing the tour 22 Writing your own macros 23 Unfinished projects: Projects for you to finish 24 Unfinished projects, continuedBy Longbing Cao. 2024
This book provides answers to fundamental and challenging questions regarding the global response to COVID-19. It creates a historical record…
of COVID-19 research conducted over the four years of the pandemic, with a focus on how researchers have responded, quantified, and modeled COVID-19 problems. Since mid-2021, we have diligently monitored and analyzed global scientific efforts in tackling COVID-19. Our comprehensive global endeavor involves collecting, processing, analyzing, and discovering COVID-19 related scientific literature in English since January 2020. This provides insights into how scientists across disciplines and almost every country and regions have fought against COVID-19. Additionally, we explore the quantification of COVID-19 problems and impacts through mathematics, AI, machine learning, data science, epidemiology, and domain knowledge. The book reports findings on publication quantities, impacts, collaborations, and correlations with the economy and infectionsglobally, regionally, and country-wide. These results represent the first and only holistic and systematic studies aimed at scientifically understanding, quantifying, and containing the pandemic. We hope this comprehensive analysis will contribute to better preparedness, response, and management of future emergencies and inspire further research in infectious diseases. The book also serves as a valuable resource for research policy, funding management authorities, researchers, policy makers, and funding bodies involved in infectious disease management, public health, and emergency resilience.By Banh Tien Long, Kozo Ishizaki, Hyung Sun Kim, Yun-Hae Kim, Nguyen Duc Toan, Nguyen Thi Hong Minh, Pham Duc An. 2024
This book presents selected, peer-reviewed proceedings of the 3rd International Conference on Material, Machines and Methods for Sustainable Development (MMMS2022),…
held in the city of Can Tho, Vietnam, from 10 to 13 November 2022. The purpose of the conference is to explore and ensure an understanding of the critical aspects contributing to sustainable development with a focus on advanced mechanical engineering, automation, materials, machines and methods. The contributions published in this book come from authors representing universities, research institutes and industrial companies and reflect the results of a very broad spectrum of research, from micro- and nanoscale materials design and processing, to mechanical engineering technology in industry. Many of the contributions selected for these proceedings focus on materials modeling, eco-material processes and mechanical manufacturing. Volume 2 of this book focuses on topics dedicated to materials applications, machining, and renewable energy. Selected topics include: material machinability and economic efficiency, sustainable development manufacturing technology, environmental protection, as well as green development and climate change prevention.