Computer science Books
Pearson Education Adobe Animate CC Classroom in a Book 2018 release
Book Synopsis
£52.70
Pearson Education (US) GO All in One
Book SynopsisAbout our authors Shelley Gaskin (series editor) is a professor in the Business and Computer Technology Division at Pasadena City College in Pasadena, California. She holds a bachelor's degree in Business Administration from Robert Morris College (Pennsylvania), a master's degree in Business from Northern Illinois University, and a doctorate in Adult and Community Education from Ball State University (Indiana). Before joining Pasadena City College, she spent 12 years in the computer industry, where she was a systems analyst, sales representative, and director of Customer Education with Unisys Corporation. She also worked for Ernst & Young on the development of large systems applications for their clients. She has written and developed training materials for custom systems applications in both the public and private sector and has also written and edited numerous computer application textbooks. Debra?Geoghan (PowerPoint author) is a PTable of ContentsTable of Contents Concepts: Computers and Information Processing Concepts: Hardware Concepts: System Software Concepts: Networks, Security, and Privacy Concepts: Troubleshooting and Maintenance Concepts: Application Software Concepts: The Internet Concepts: Digital Ethics and Awareness Applications: Cloud Computing Project 9A: Google Productivity Project 9B: Microsoft Cloud Computing and OneNote Project 9C: Using Professional Networks Applications: Microsoft Office Features and Windows 10 File Management Project I0A: Chef Notes Project 10B: Hotel Files MICROSOFT WORD 2019 Applications: Creating Documents with Microsoft Word Project 11A: Flyer Project 11B: Information Handout Applications: Creating Cover Letters and Using Tables to Create Resumes Project 12A: Resume Project 12B: Cover Letter and Envelope Applications: Creating Research Papers, Newsletters, and Merged Mailing Labels Project 13A: Research Paper Project 13B: Newsletter with Optional Mailing Labels MICROSOFT EXCEL 2019 Applications: Creating a Worksheet and Charting Data Project 14A: Sales Report with Embedded Column Chart and Sparklines Project 14B: Inventory Valuation Applications: Using Functions, Creating Tables, and Managing Large Workbooks Project 15A: Inventory Status Report Project 15B: Weekly Sales Summary Applications: Analyzing Data with Pie Charts, Line Charts, and What-If Analysis Tools Project 16A: Enterprise Fund Pie Chart Project 16B: Tourism Spending Projection with Line Chart MICROSOFT ACCESS 2019 Applications: Getting Started with Microsoft Access 2019 Project 17A: Advising Database with Two Tables Project 17B: Instructors and Courses Database Project 17C: Athletic Scholarships Database MICROSOFT POWERPOINT 2019 Applications: Getting Started with Microsoft PowerPoint Project 18A: Company Overview Presentation Project 18B: Itinerary Presentation Project 18C: Employee Training Presentation
£179.99
Pearson Education (US) CompTIA Linux Portable Command Guide
Book SynopsisTable of Contents Introduction xxx Part I: Hardware and System Confi gurationCHAPTER 1 Explain Linux boot process concepts 1 Boot Loaders 1 Boot Options 3 File Locations 6 Boot Modules and Files 7 Kernel Panic 9CHAPTER 2 Given a scenario, install, confi gure, and monitor kernel modules 11 Commands 11 Files 15CHAPTER 3 Given a scenario, confi gure and verify network connection parameters 17 Diagnostic Tools 18 Configuration Files 28 Bonding 34CHAPTER 4 Given a scenario, manage storage in a Linux environment 37 Basic Partitions 38 Filesystem Hierarchy 40 Device Mapper 41 Tools 44 Location 54 Filesystem Types 58CHAPTER 5 Compare and contrast cloud and virtualization concepts and technologies 59 Templates 60 Bootstrapping 62 Storage 63 Network Considerations 65 Types of Hypervisors 66 Tools 67CHAPTER 6 Given a scenario, confi gure localization options 69 File Locations 70 Commands 70 Environment Variables 73 Character Sets 75 UTF-8 75 Part II: Systems Operation and MaintenanceCHAPTER 7 Given a scenario, conduct software installations, confi gurations, updates, and removals 77 Package Types 78 Installation Tools 78 Build Tools 86 Repositories 88 Acquisition Commands 89CHAPTER 8 Given a scenario, manage users and groups 93 Creation 94 Modification 94 Deletion 96 Queries 96 Quotas 98 Profiles 102 Important Files and File Contents 106CHAPTER 9 Given a scenario, create, modify, and redirect fi les 109 Text Editors 110 File Readers 114 Output Redirection 117 Text Processing 123 File and Directory Operations 129 Bonus: regex 141CHAPTER 10 Given a scenario, manage services 143 Systemd Management 144 Systemd-analyze blame 148 Unit Files 148 SysVinit 152CHAPTER 11 Summarize and explain server roles 157 NTP 158 SSH 158 Web 159 Certificate Authority 159 Name Server 159 DHCP 160CHAPTER 12 Given a scenario, automate and schedule jobs 165 cron 165 at 165 crontab 167 fg 170 bg 171 & 171 kill 171 Ctrl-c 172 Ctrl-z 172 nohup 172CHAPTER 13 Explain the use and operation of Linux devices 173 Types of Devices 174 Monitoring and Configuration Tools 176 File Locations 182 Hot Pluggable Devices 185CHAPTER 14 Compare and Contrast Linux Graphical User Interfaces 187 Servers 187 GUI 188 Remote Desktop 189 Accessibility 192 Part III: SecurityCHAPTER 15 Given a scenario, apply or acquire the appropriate user and/or group permissions and ownership 193 File and Directory Permissions 194 Context-Based Permissions 203 Privilege Escalation 209 User Types 211CHAPTER 16 Given a scenario, confi gure and implement appropriate access and authentication methods 213 PAM 214 SSH 221 TTYs 228 PTYs 230 PKI 230 VPN as a Client 231 SSL/TLS 232 Transport Mode 232 Tunnel Mode 232 IPSec 232 DTLS 233CHAPTER 17 Summarize security best practices in a Linux environment 235 Boot Security 236 Additional Authentication Methods 237 Multifactor Authentication 237 Importance of Disabling Root Login via SSH 239 Password-Less Login 239 Chroot Jail Services 240 No Shared IDs 240 Importance of Denying Hosts 240 Separation of OS Data from Application Data 241 Change Default Ports 241 Importance of Disabling or Uninstalling Unused and Unsecure Services 242 Importance of Enabling SSL/TLS 243 Importance of Enabling auditd 243 CVE Monitoring 243 Discouraging Use of USB Devices 243 Disk Encryption 244 Restrict cron Access 244 Disable Ctrl-Alt-Del 244 Add Banner 245 MOTD 245CHAPTER 18 Given a scenario, implement logging services 247 Key File Locations 247 Log Management 249CHAPTER 19 Given a scenario, implement and confi gure Linux fi rewalls 257 Access Control Lists 258 Technologies 259 IP Forwarding 263 Dynamic Rule Sets 263 Common Application 265CHAPTER 20 Given a scenario, backup, restore, and compress fi les 267 Archive and Restore Utilities 268 Compression 269 Backup Types 272 Off-Site/Off-System Storage 274 Integrity Checks 275 Part IV: Linux Troubleshooting and DiagnosticsCHAPTER 21 Given a scenario, analyze system properties and remediate accordingly 277 Network Monitoring and Configuration 278 Storage Monitoring and Configuration 287 CPU Monitoring and Configuration 289 Memory Monitoring and Configuration 292 Lost Root Password 295CHAPTER 22 Given a scenario, analyze system processes in order to optimize performance 297 Process Management 297 Process States 297 Priorities 298 Kill Signals 299 Commands 300 PIDs 305CHAPTER 23 Given a scenario, analyze and troubleshoot user issues 307 Permissions 307 Access 309 Authentication 309 File Creation 310 Insufficient Privileges for Authorization 312 Environment and Shell Issues 312CHAPTER 24 Given a scenario, analyze and troubleshoot application and hardware issues 313 SELinux Context Violations 314 Storage 314 Firewall 317 Permission 318 Service Accounts 319 Group Memberships 319 Dependencies 319 Troubleshooting Additional Hardware Issues 320 Part V: Automation and ScriptingCHAPTER 25 Given a scenario, deploy and execute basic BASH scripts 327 Shell Environments and Shell Variables 328 #!/ bin/bash 332 Sourcing Scripts 332 Directory and File Permissions 333 Extensions 333 Commenting 333 File Globbing 334 Shell Expansions 334 Redirection and Piping 336 Exit Codes 336 Metacharacters 336 Positional Parameters 337 Looping Constructs 337 Conditional Statements 338 Escaping Characters 340CHAPTER 26 Given a scenario, carry out version control using Git 343 Arguments 343 Files 349CHAPTER 27 Summarize orchestration processes and concepts 351 Agent 351 Agentless 352 Procedures 352 Attributes 352 Infrastructure Automation 352 Infrastructure as Code 352 Inventory 353 Automated Configuration Management 353 Build Automation 353 APPENDIX Create your own journal 355 9780135591840, TOC, 7/19/19
£23.39
Pearson Education (US) IT Essentials Course Booklet v7
Book SynopsisCisco Networking Academy is an innovative Cisco education initiative that delivers information and communication technology skills to improve career and economic opportunities around the world. The Academy provides online courses, interactive tools, and lab activities to prepare individuals for information technology and networking careers in virtually every industry.Table of Contents Chapter 1 Introduction to Personal Computer Hardware 1 1.0 Introduction to Personal Computers 1 1.1 Personal Computers 1 1.1.1 What is in a Computer? 1 1.1.2 Electrical and ESD Safety 1 1.2 PC Components 2 1.2.1 Case and power supplies 2 1.2.2 Motherboards 4 1.2.3 CPUs and Cooling Systems 6 1.2.4 Memory 6 1.2.5 Adapter Cards and Expansion Slots 8 1.2.6 Hard disk drives and SSDs 9 1.2.7 Optical Storage Devices 11 1.2.8 Ports, Cables, and Adaptors 11 1.2.9 Input Devices 12 1.2.10 Output Devices 12 1.3 Computer Disassembly 13 1.3.1 The Technician’s Toolkit 13 1.3.2 Computer Disassembly 13 1.4 Summary 14 Chapter 1 Quiz 15 Chapter 1 Exam 15 Your Chapter Notes 15 Chapter 2 PC Assembly 17 2.0 Introduction to PC Assembly 17 2.1 Assemble the Computer 17 2.1.1 General and Fire Safety 17 2.1.2 Open the Case and Connect the Power Supply 17 2.1.3 Install the Motherboard Components 19 2.1.4 Install Internal Drives 21 2.1.5 Install the Adapter Cards 23 2.1.6 Select Additional Storage 25 2.1.7 Install the Cables 26 2.2 Summary 28 Chapter 2 Quiz 30 Chapter 2 Exam 30 Your Chapter Notes 30 Chapter 3 Advanced Computer Hardware 31 3.0 Introduction to Advanced Computer Hardware 31 3.1 Boot the Computer 31 3.1.1 POST, BIOS, CMOS and UEFI 31 3.1.2 BIOS/UEFI Configuration 33 3.2 Electrical Power 35 3.2.1 Wattage and Voltage 35 3.2.2 Power Fluctuation and Protection 36 3.3 Advanced Computer Functionality 37 3.3.1 CPU Architectures and Operation 37 3.3.2 RAID 39 3.3.3 Ports, Connectors, and Cables 40 3.3.4 Monitors 41 3.4 Computer Configuration 42 3.4.1 Upgrade Computer Hardware 42 3.4.2 Configurations for Specialized Computers 45 3.5 Protecting the Environment 47 3.5.1 Safe Disposal of Equipment and Supplies 47 3.6 Summary 48 Chapter 3 Quiz 50 Chapter 3 Exam 50 Your Chapter Notes 50 Chapter 4 Preventive Maintenance and Troubleshooting 51 4.0 Introduction 51 4.1 Preventive Maintenance 51 4.1.1 PC Preventive Maintenance Overview 51 4.2 Troubleshooting Process 53 4.2.1 Troubleshooting Process Steps 53 4.2.2 Common Problems and Solutions for PCs 58 4.2.3 Apply Troubleshooting Process to Computer Components and Peripherals 58 4.3 Summary 60 Chapter 4 Quiz 61 Chapter 4 Exam 61 Your Chapter Notes 61 Chapter 5 Networking Concepts 63 5.0 Introduction 63 5.1 Network Components and Types 63 5.1.1 Types of Networks 63 5.1.2 Internet Connection Types 64 5.2 Networking Protocols, Standards, and Services 67 5.2.1 Transport Layer Protocols 67 5.2.2 Application Port Numbers 68 5.2.3 Wireless Protocols 69 5.2.4 Network Services 70 5.3 Network Devices 73 5.3.1 Basic Network Devices 73 5.3.2 Security Devices 76 5.3.3 Other Network Devices 77 5.4 Network Cables 79 5.4.1 Network Tools 79 5.4.2 Copper Cables and Connectors 79 5.4.3 Fiber Cables and Connectors 80 5.5 Summary 81 Chapter 5 Quiz 83 Chapter 5 Exam 83 Your Chapter Notes 83 Chapter 6 Applied Networking 85 6.0 Introduction 85 6.1 Device to Network Connection 85 6.1.1 Network Addressing 85 6.1.2 Configure a NIC 89 6.1.3 Configure a Wired and Wireless Network 92 6.1.4 Firewall Settings 94 6.1.5 IoT Device Configuration 97 6.2 Basic Troubleshooting Process for Networks 98 6.2.1 Applying the Troubleshooting Process to 98 6.2.2 Network Problems and Solutions 99 6.3 Summary 99 Chapter 6 Quiz 101 Chapter 6 Exam 101 Your Chapter Notes 101 Chapter 7 Laptops and Other Mobile Devices 103 7.0 Introduction 103 7.1 Characteristics of laptops and other mobile devices 103 7.1.1 Mobile Device Overview 103 7.1.2 Laptop Components 106 7.1.3 Laptop Display Components 108 7.2 Laptop Configuration 109 7.2.1 Power Settings Configuration 109 7.2.2 Wireless Configuration 110 7.3 Laptop Hardware and Component Installation and Configuration 112 7.3.1 Expansion Slots 112 7.3.2 Replacing Laptop Components 114 7.4 Other Mobile Device Hardware Overview 117 7.4.1 Other Mobile Device Hardware 117 7.4.2 Specialty Mobile Devices 118 7.5 Network Connectivity and Email 119 7.5.1 Wireless and Cellular Data Networks 119 7.5.2 Bluetooth 121 7.5.3 Configuring Email 122 7.5.4 Mobile Device Synchronization 124 7.6 Preventive Maintenance for Laptops and other Mobile Devices 126 7.6.1 Scheduled Maintenance for Laptops and other Mobile Devices 126 7.7 Basic Troubleshooting Process for Laptops and other Mobile Devices 127 7.7.1 Applying the Troubleshooting Process to Laptops and other Mobile Devices 127 7.7.2 Common Problems and Solutions for Laptops and Other Mobile Devices 128 7.8 Summary 129 Chapter 7 Quiz 131 Chapter 7 Exam 131 Your Chapter Notes 131 Chapter 8 Printers 133 8.0 Introduction 133 8.1 Common Printer Features 133 8.1.1 Characteristics and Capabilities 133 8.1.2 Printer Connections 135 8.2 Printer Type Comparison 135 8.2.1 Inkjet Printers 135 8.2.2 Laser Printers 135 8.2.3 Laser Printing Process 136 8.2.4 Thermal Printers and Impact Printers 136 8.2.5 Virtual Printers 137 8.2.6 3D Printers 137 8.3 Installing and Configuring Printers 138 8.3.1 Installing and Updating a Printer 138 8.3.2 Configuring Options and Default Settings 139 8.3.3 Optimizing Printer Performance 139 8.4 Sharing Printers 140 8.4.1 Operating System Settings for Sharing Printers 140 8.4.2 Print Servers 141 8.5 Maintaining and Troubleshooting Printers 143 8.5.1 Printer Preventive Maintenance 143 8.5.2 Inkjet Printer Preventive Maintenance 143 8.5.3 Laser Printer Preventive Maintenance 144 8.5.4 Thermal Printer Preventive Maintenance 145 8.5.5 Impact Printer Preventive Maintenance 145 8.5.6 3D Printer Preventive Maintenance 145 8.5.7 Applying the Troubleshooting Process to Printers 146 8.5.8 Problems and Solutions 147 8.6 Summary 147 Chapter 8 Quiz 149 Chapter 8 Exam 149 Your Chapter Notes 149 Chapter 9 Virtualization and Cloud Computing 151 9.0 Introduction 151 9.1 Virtualization 151 9.1.1 Virtualization 151 9.1.2 Client-Side Virtualization 153 9.2 Cloud Computing 155 9.2.1 Cloud Computing Applications 155 9.2.2 Cloud Services 155 9.3 Summary 156 Chapter 9 Quiz 158 Chapter 9 Exam 158 Your Chapter Notes 158 Chapter 10 Windows Installation 159 10.0 Introduction 159 10.1 Modern Operating Systems 159 10.1.1 Operating System Features 159 10.1.2 Customer Requirements for an Operating System 160 10.1.3 Operating System Upgrades 162 10.2 Disk Management 163 10.2.1 Disk Management 163 10.3 Installation and Boot Sequence 166 10.3.1 Basic Windows Installation 166 10.3.2 Custom Installation Options 167 10.3.3 Windows Boot Sequence 170 10.4 Summary 171 Chapter 10 Quiz 172 Chapter 10 Exam 172 Your Chapter Notes 172 Chapter 11 Windows Configuration 173 11.0 Introduction 173 11.1 Windows Desktop and File Explorer 173 11.1.1 Comparing Windows Versions 173 11.1.2 The Windows Desktop 175 11.1.3 Windows Task Manager 178 11.1.4 Windows File Explorer 180 11.2 Configure Windows with Control Panels 183 11.2.1 Control Panel Utilities 183 11.2.2 User and Account Control Panel Items 184 11.2.3 Network and Internet Control Panels 185 11.2.4 Display Settings and Control Panel 187 11.2.5 Power and System Control Panels 188 11.2.6 Hardware and Sound Control Panels 190 11.2.7 Clock, Region, and Language 191 11.2.8 Programs and Features Control Panels 192 11.2.9 Other Control Panels 193 11.3 System Administration 194 11.3.1 Administrative Tools 194 11.3.2 System Utilities 197 11.3.3 Disk Management 199 11.3.4 Application Installation and Configuration 202 11.4 Command-Line Tools 204 11.4.1 Using Windows CLI 204 11.4.2 File System CLI Commands 205 11.4.3 Disk CLI Commands 206 11.4.4 Task and System CLI Commands 207 11.4.5 Other Useful CLI Commands 207 11.5 Windows Networking 208 11.5.1 Network Sharing and Mapping Drives 208 11.5.2 Sharing Local Resources with Others 210 11.5.3 Configure a Wired Network Connection 211 11.5.4 Configure a Wireless Network Interfaces in Windows 213 11.5.5 Remote Access Protocols 213 11.5.6 Remote Desktop and Assistance 214 11.6 Common Preventive Maintenance Techniques for Operating Systems 215 11.6.1 OS Preventive Maintenance Plan 215 11.6.2 Backup and Restore 217 11.7 Basic Troubleshooting Process for Windows Operating Systems 218 11.7.1 Applying Troubleshooting Process to Windows Operating Systems 218 11.7.2 Common Problems and Solutions for Windows Operating Systems 219 11.7.3 Advanced Troubleshooting for Windows Operating Systems 219 11.8 Summary 219 Chapter 11 Quiz 221 Chapter 11 Exam 221 Your Chapter Notes 221 Chapter 12 Mobile, Linux, and macOS Operating Systems 223 12.0 Introduction 223 12.1 Mobile Operating Systems 223 12.1.1 Android vs. iOS 223 12.1.2 Android Touch Interface 224 12.1.3 iOS Touch Interface 224 12.1.4 Common Mobile Device Features 225 12.2 Methods for Securing Mobile Devices 227 12.2.1 Screen Locks and Biometric Authentication 227 12.2.2 Cloud-Enabled Services for Mobile Devices 227 12.2.3 Software Security 228 12.3 Linux and macOS Operating Systems 230 12.3.1 Linux and macOS tools and features 230 12.3.2 Linux and macOS Best Practices 233 12.3.3 Basic CLI Commands 234 12.4 Basic Troubleshooting Process for Mobile, Linux, and macOS Operating Systems 236 12.4.1 Applying the Troubleshooting Process to Mobile, Linux, and macOS Operating Systems 236 12.4.2 Common Problems and Solutions for Other Operating Systems 237 12.5 Summary 237 Chapter 12 Quiz 239 Chapter 12 Exam 239 Your Chapter Notes 239 Chapter 13 Security 241 13.0 Introduction 241 13.1 Security Threats 241 13.1.1 Malware 241 13.1.2 Preventing Malware 243 13.1.3 Network Attacks 246 13.1.4 Social Engineering Attacks 247 13.2 Security Procedures 248 13.2.1 Security Policy 248 13.2.2 Protecting Physical Equipment 249 13.2.3 Protecting Data 250 13.2.4 Data Destruction 253 13.3 Securing Windows Workstations 254 13.3.1 Securing a Workstation 254 13.3.2 Windows Local Security Policy 256 13.3.3 Managing Users and Groups 258 13.3.4 Windows Firewall 260 13.3.5 Web Security 262 13.3.6 Security Maintenance 264 13.4 Wireless Security 265 13.4.1 Configure Wireless Security 265 13.5 Basic Troubleshooting Process for Security 268 13.5.1 Applying the Troubleshooting Process to Security 268 13.5.2 Common Problems and Solutions for Security 269 13.6 Summary 269 Chapter 13 Quiz 271 Chapter 13 Exam 271 Your Chapter Notes 271 Chapter 14 The IT Professional 273 14.0 Introduction 273 14.1 Communication Skills and the IT Professional 273 14.1.1 Communication Skills, Troubleshooting, and Professional Behavior 273 14.1.2 Working with a Customer 275 14.1.3 Professional Behavior 276 14.1.4 The Customer Call 277 14.2 Operational Procedures 280 14.2.1 Documentation 280 14.2.2 Change Management 281 14.2.3 Disaster Prevention and Recovery 281 14.3 Ethical and Legal Considerations 284 14.3.1 Ethical and Legal Considerations in the IT Profession 284 14.3.2 Legal Procedures Overview 287 14.4 Call Center Technicians 289 14.4.1 Call Centers, Level One and Level Two Technicians 289 14.4.2 Basic Scripting and the IT Professional 291 14.5 Summary 292 Chapter 14 Quiz 294 Chapter 14 Exam 294 Your Chapter Notes 294 9780135612163 TOC 10/1/2019
£23.81
Penguin Books Ltd Turings Cathedral
Book SynopsisGeorge Dyson''s fascinating account of the early years of computers: Turing''s Cathedral is the story behind how the PC, ipod, smartphone and almost every aspect of modern life came into being.In 1945 a small group of brilliant engineers and mathematicians gathered at the Institute for Advanced Study in Princeton, determined to build a computer that would make Alan Turing''s theory of a ''universal machine'' reality. Led by the polymath émigré John von Neumann, they created the numerical framework that underpins almost all modern computing - and ensured that the world would never be the same again.George Dyson is a historian of technology whose interests include the development (and redevelopment) of the Aleut kayak. He is the author of Baidarka; Project Orion; and Darwin Among the Machines.''Unusual, wonderful, visionary'' Francis Spufford, Guardian''Fascinating . . . the story Dyson tells is intensely human . . . a grippiTrade ReviewRiveting . . . conveys the electrifying sense of possibility that the first computers unleashed . . . a page-turner * New Scientist *Brings to life a myriad cast of extraordinary characters, each of whom contributed to ushering in today's digital age * Daily Telegraph *An engrossing and well-researched book that recounts an important chapter in the history of 20th-century computing -- Evgeny Morozov * Observer *
£12.59
Oxford University Press Natural General Intelligence
Book SynopsisSince the time of Turing, computer scientists have dreamed of building artificial general intelligence (AGI) - a system that can think, learn and act as humans do. Over recent years, the remarkable pace of progress in machine learning research has reawakened discussions about AGI. But what would a generally intelligent agent be able to do? What algorithms, architectures, or cognitive functions would it need? To answer these questions, we turn to the study of natural intelligence. Humans (and many other animals) have evolved precisely the sorts of generality of function that AI researchers see as the defining hallmark of intelligence. The fields of cognitive science and neuroscience have provided us with a language for describing the ingredients of natural intelligence in terms of computational mechanisms and cognitive functions and studied their implementation in neural circuits. Natural General Intelligence describes the algorithms and architectures that are driving progress in AI research in this language, by comparing current AI systems and biological brains side by side. In doing so, it addresses deep conceptual issues concerning how perceptual, memory and control systems work, and discusses the language in which we think and the structure of our knowledge. It also grapples with longstanding controversies about the nature of intelligence, and whether AI researchers should look to biology for inspiration. Ultimately, Summerfield aims to provide a bridge between the theories of those who study biological brains and the practice of those who are seeking to build artificial brains.Trade ReviewThis book will be of interest to students and researchers in cognitive psychology, neuroscience, computer science, and cognitive science. * Choice *Table of Contents1: Turing's question 2: The nature of intelligence 3: The language of thought 4: The structure of knowledge 5: The problem of abstraction 6: The value of action 7: The control of memory 8: A picture of the mind
£56.00
Oxford University Press Inc Ethical Data Science
Book SynopsisCan data science truly serve the public interest? Data-driven analysis shapes many interpersonal, consumer, and cultural experiences yet scientific solutions to social problems routinely stumble. All too often, predictions remain solely a technocratic instrument that sets financial interests against service to humanity. Amidst a growing movement to use science for positive change, Anne L. Washington offers a solution-oriented approach to the ethical challenges of data science. Ethical Data Science empowers those striving to create predictive data technologies that benefit more people. As one of the first books on public interest technology, it provides a starting point for anyone who wants human values to counterbalance the institutional incentives that drive computational prediction. It argues that data science prediction embeds administrative preferences that often ignore the disenfranchised. The book introduces the prediction supply chain to highlight moral questions alongside the iTable of ContentsIntroduction: Ethical data science Prologue: Tracking ethics in a prediction supply chain 1: SOURCE - Data are people too 2: MODEL - Dear validity: Advice for wayward algorithms 3: COMPARE - Category hacking 4: OPTIMIZE - Data science reasoning 5: LEARN - For good 6: Show us your work or someone gets hurt 7: Prediction in the public interest References Index
£25.99
OUP Oxford Computers in Chemistry
Book SynopsisThis Primer provides an authoritative and easy to read overview of computers and their use in chemistry. It presents the essential basic ideas required to understand and exploit computers as encountered by chemistry students in their studies and in the laboratory at all stages up to and including research level. It gives its readers an insight into the workings of computers and so helps them to use the facilities more effectively.
£27.99
Clarendon Press TypeTheoretical Grammar 1 Indices
Book SynopsisBL First book to apply type theory to natural language Per Martin Lof first presented constructive type theory in 1970 and it has become intrinsic to the foundations of mathematics and computer science. This book is the first to take an in-depth look at the theory from the point of view of linguistics and the philosophy of language.Trade Review'The formalism introduced by the author allows better understanding of the role of semantics in grammars of natural languages and supplies mechnisms for various levels of linguistic description.' T.Balanescu, Zenrrallblatt fur Mathematik und ihre Grenzgebiete No. 855, 1997Table of Contents1. Preliminary remarks ; 2. Gradual introduction to type theory ; 3. Logical operators in English ; 4. Anaphoric expressions ; 5. Temporal reference ; 6. Text and discourse ; 7. Context and possible worlds ; 8. Higher-level type theory ; 9. Sugaring and parsing ; Appendix ; Sugaring in ALF ; Bibliography ; Index
£77.40
Oxford University Press The Fourth Revolution
Book SynopsisWho are we, and how do we relate to each other? Luciano Floridi, one of the leading figures in contemporary philosophy, argues that the explosive developments in Information and Communication Technologies (ICTs) is changing the answer to these fundamental human questions. As the boundaries between life online and offline break down, and we become seamlessly connected to each other and surrounded by smart, responsive objects, we are all becoming integrated into an infosphere. Personas we adopt in social media, for example, feed into our ''real'' lives so that we begin to live, as Floridi puts in, onlife. Following those led by Copernicus, Darwin, and Freud, this metaphysical shift represents nothing less than a fourth revolution. Onlife defines more and more of our daily activity - the way we shop, work, learn, care for our health, entertain ourselves, conduct our relationships; the way we interact with the worlds of law, finance, and politics; even the way we conduct war. In every department of life, ICTs have become environmental forces which are creating and transforming our realities. How can we ensure that we shall reap their benefits? What are the implicit risks? Are our technologies going to enable and empower us, or constrain us? Floridi argues that we must expand our ecological and ethical approach to cover both natural and man-made realities, putting the ''e'' in an environmentalism that can deal successfully with the new challenges posed by our digital technologies and information society.Table of ContentsPreface ; Acknowledgements ; List of figures ; 1. Hyperhistory ; 2. Space: Infosphere ; 3. Identity: Onlife ; 4. Self-Understanding: The Four Revolutions ; 5. Privacy: Informational Friction ; 6. Intelligence: Inscribing the World ; 7. Agency: Enveloping the World ; 8. Politics: The Rise of the Multi-Agent System ; 9. Environment: The Digital Gambit ; 10. Ethics: E-nvironmentalism ; Further Reading ; References ; Endnotes ; Index
£11.69
Oxford University Press Introduction to Bioinformatics
Book SynopsisActive, accessible, and assuming no prior knowledge: the ideal text for biologists encountering bioinformatics for the first time.A vast amount of biological information about a wide range of species has become available in recent years as technological advances have significantly reduced the time it takes to sequence a genome or determine a novel protein structure. This text describes how bioinformatics can be used as a powerful set of tools for retrieving and analysing this biological data, and how bioinformatics can be applied to a wide range of disciplines such as molecular biology, medicine, biotechnology, forensic science and anthropology.Fully revised and updated, the fifth edition of Introduction to Bioinformatics contains a host of new material including new content on next generation sequencing, function prediction, sequence assembly, epigenomics, the bioinformatics of gene editing, and the effects of single nucleotide variants.Written primarily for a biological audience without a detailed prior knowledge of programming, this book is the perfect introduction to the field of bioinformatics, providing friendly guidance and advice on how to use various methods and techniques. Furthermore, frequent examples, self-test questions, problems, and exercises are incorporated throughout the text to encourage self-directed learning.Trade ReviewThis is an excellent textbook that would appeal to those new to the field as well as those who have prior experience in the subject area. The mixture of narrative and clear diagrammatic representation has been skilfully woven together to produce a rich contextualised resource. * Dr Don Green, London Metropolitan University *It provides an excellent introduction to the subject and balances a historical perspective with recent developments. Although it is easily accessible, in places it doesn't shy away from more complex, but relevant computational analysis. * Dr Colin Sharpe, University of Portsmouth *[It] discusses the key concepts well and in an easy to understand format, with useful exercises and examples of real-world applications. * Dr Dallas Roulston, Middlesex University London *The writing style is appropriate, consistent and very clear. * Dr. Lorena Fernández-Martínez, Edge Hill University *My "go to" introductory text on bioinformatics. Accessible, yet intelligent. * Dr Lee J. Byrne, Canterbury Christ Church University *Table of Contents1: Introduction 2: From genetics to genomes 3: The panorama of life 4: Alignments and phylogenetic trees 5: Structural bioinformatics and drug discovery 6: Scientific publications and archives: media, content, access, and presentation 7: Artificial intelligence and machine learning 8: Introduction to systems biology 9: Metabolic pathways 10: Control of organization and organization of control
£50.34
Oxford University Press Decoding Reality
Book SynopsisFor a physicist, all the world is information. The Universe and its workings are the ebb and flow of information. We are all transient patterns of information, passing on the recipe for our basic forms to future generations using a four-letter digital code called DNA. In this engaging and mind-stretching account, Vlatko Vedral considers some of the deepest questions about the Universe and considers the implications of interpreting it in terms of information. He explains the nature of information, the idea of entropy, and the roots of this thinking in thermodynamics. He describes the bizarre effects of quantum behaviour -- effects such as ''entanglement'', which Einstein called ''spooky action at a distance'', and explores cutting edge work on harnessing quantum effects in hyperfast quantum computers, and how recent evidence suggests that the weirdness of the quantum world, once thought limited to the tiniest scales, may reach into the macro world. Vedral finishes by considering the ansTrade ReviewBy turns irreverent, erudite and funny, Decoding Reality is - by the standard of books that require their readers to know what a logarithm is - a ripping good read...Not since David Deutsch's magestierial 'The Fabric of Reality' has a physicist given us such a wide-ranging and intriguing picture of how quantum mechanics constructs the world. * Seth Lloyd, New Scientist *Well written and engaging, the book provides a constant flow of new ideas. * Science *The author evinces great enthusiasm and curiosity throughout. * Steven Poole, The Guardian *By turns irreverent, erudite and funny, Decoding Reality is...a ripping good read. * Seth Lloyd, New Scientist *A wide-ranging and intriguing picture of how quantum mechanics constructs the world. * Seth Lloyd, New Scientist *Excellent, thought-provoking book. * BBC Focus Magazine, Marcus Chown *An engaging, non-technical exploration of what the new theory of quantum information and computation tells us about life, the universe, and everything. * David Deutsch, author of The Fabric of Reality *Let Vedral guide you skilfully through the wonderland of modern physics - where nothing is as it seems. This is the finest treatment I have read of the weird interplay of quantum reality, information and probability. * Paul Davies, author of The Eerie Silence and The Goldilocks Enigma *Vedral's book goes to dizzying heights in answering the very big question: can one understand all of reality from a scientific point of view? * Sheldon Richmond, Science and Education *Table of ContentsPrologue 1: Creation Ex Nihilo: Something from Nothing 2: Information for all SeasonsPart One 3: Back to Basics: Bits and Pieces 4: Digital Romance: Life is a Four-Letter Word 5: Murphy's Law: I Knew this Would Happen to Me 6: Place Your Bets: In It to Win It 7: Social Informatics: Get Connected or Die Tryin'Part Two 8: Quantum Schmuntum: Lights, Camera, Action! 9: Surfing the Waves: Hyper-Fast Computers 10: Children of the Aimless Chance: Randomness versus DeterminismPart Three 11: Sand Reckoning: Whose Information is It, Anyway? 12: Destruction ab Toto: Nothing from Something Epilogue Notes Index
£11.39
Oxford University Press (UK) The Philosophy of Information
Book SynopsisLuciano Floridi presents a book that will set the agenda for the philosophy of information. PI is the philosophical field concerned with (1) the critical investigation of the conceptual nature and basic principles of information, including its dynamics, utilisation, and sciences, and (2) the elaboration and application of information-theoretic and computational methodologies to philosophical problems. This book lays down, for the first time, the conceptual foundations for this new area of research. It does so systematically, by pursuing three goals. Its metatheoretical goal is to describe what the philosophy of information is, its problems, approaches, and methods. Its introductory goal is to help the reader to gain a better grasp of the complex and multifarious nature of the various concepts and phenomena related to information. Its analytic goal is to answer several key theoretical questions of great philosophical interest, arising from the investigation of semantic information.Trade ReviewThe impressive and exciting project that Floridi undertakes in his book is aimed at establishing the philosophy of information as a mature subdiscipline of philosophy, with its own method and research programme ... Floridi's book not only presents a comprehensive framework for the philosophy of information but also makes a strong case for its legitimacy as a mature subdiscipline of philosophy. The intellectual debates and new research that it has already stimulated testify to its importance as a significant contribution to the literature. * Hilmi Demir, Mind *the non-technical portions are understandable to everyone and provide plenty of food for thought. * Steven Harnad, Times Literary Supplement *This is a monumental work ... Floridi goes through much of contemporary philosophy, as seen through a lens fashioned from the concept of information ... The Philosophy of Information is a lovely source of ideas, and also a wonderful indication of how much there might be to gain for philosophy by looking at contemporary computer science. * Staffan Angere, Theoria *This is an ambitious book ... there is a great deal to admire in this book, including much to admire philosophically. For example, some of the material on epistemology, especially Ch. 13 but also some of his work on the definition of knowledge, is masterful ... this an intriguing, eye-opening work * Frederick Kroon, Journal of Applied Philosophy *Given the breadth and depth of coverage of all its topics, the careful organisation and structuring of concepts, and the relevance of its contents, The Philosophy of Information shall be deemed essential reading for philosophers and computer scientists alike, especially those interested in Artificial Intelligence. * Flavio Soares Correa da Silva, AISB Quarterly *Just around the beginning of the new millennium, Floridi began his important and influential program, and this book brings between two covers much of his previous work, and also augments, updates, and connects these publications ... Floridis book sets an ambitious agenda for the philosophy of information ... there is much of interest and value in this major book. * J. Michael Dunn, Metascience *The Philosophy of Information is clearly a work of great ambition, originality, and value. * Stephen Leach, Metapsychology *Very well written, and clearly presented. ... many authors have written about philosophy and information before, but no-one has set out to deal with it in such a thorough way. This is clearly a very important book, and I think it justifies the author's claim that it describes the first philosophical analysis of information in all its aspects. * David Bawden, Library and Information Research *Table of ContentsPreface ; 1. What is the Philosophy of Information? ; 2. Open Problems in the Philosophy of Information ; 3. The Method of Levels of Abstraction ; 4. Semantic Information and the Veridicality Thesis ; 5. Outline of a Theory of Strongly Semantic Information ; 6. The Symbol Grounding Problem ; 7. Action-Based Semantics ; 8. Semantic Information and the Correctness Theory of Truth ; 9. The Logical Unsolvability of the Gettier Problem ; 10. The Logic of Being Informed ; 11. Understanding Epistemic Relevance ; 12. Semantic Information and the Network Theory of Account ; 13. Consciousness, Agents and the Knowledge Game ; 14. Against Digital Ontology ; 15. A Defence of Informational Structural Realism ; References
£71.10
Oxford University Press The Philosophy of Information
Book SynopsisLuciano Floridi presents a book that will set the agenda for the philosophy of information. PI is the philosophical field concerned with (1) the critical investigation of the conceptual nature and basic principles of information, including its dynamics, utilisation, and sciences, and (2) the elaboration and application of information-theoretic and computational methodologies to philosophical problems. This book lays down, for the first time, the conceptual foundations for this new area of research. It does so systematically, by pursuing three goals. Its metatheoretical goal is to describe what the philosophy of information is, its problems, approaches, and methods. Its introductory goal is to help the reader to gain a better grasp of the complex and multifarious nature of the various concepts and phenomena related to information. Its analytic goal is to answer several key theoretical questions of great philosophical interest, arising from the investigation of semantic information.Trade ReviewThe impressive and exciting project that Floridi undertakes in his book is aimed at establishing the philosophy of information as a mature subdiscipline of philosophy, with its own method and research programme ... Floridi's book not only presents a comprehensive framework for the philosophy of information but also makes a strong case for its legitimacy as a mature subdiscipline of philosophy. The intellectual debates and new research that it has already stimulated testify to its importance as a significant contribution to the literature. * Hilmi Demir, Mind *The non-technical portions are understandable to everyone and provide plenty of food for thought. * Steven Harnad, Times Literary Supplement *This is a monumental work ... Floridi goes through much of contemporary philosophy, as seen through a lens fashioned from the concept of information ... The Philosophy of Information is a lovely source of ideas, and also a wonderful indication of how much there might be to gain for philosophy by looking at contemporary computer science. * Staffan Angere, Theoria *This is an ambitious book ... there is a great deal to admire in this book, including much to admire philosophically. For example, some of the material on epistemology, especially Ch. 13 but also some of his work on the definition of knowledge, is masterful ... this an intriguing, eye-opening work * Frederick Kroon, Journal of Applied Philosophy *Given the breadth and depth of coverage of all its topics, the careful organisation and structuring of concepts, and the relevance of its contents, The Philosophy of Information shall be deemed essential reading for philosophers and computer scientists alike, especially those interested in Artificial Intelligence. * Flavio Soares Correa da Silva, AISB Quarterly *Just around the beginning of the new millennium, Floridi began his important and influential program, and this book brings between two covers much of his previous work, and also augments, updates, and connects these publications ... Floridis book sets an ambitious agenda for the philosophy of information ... there is much of interest and value in this major book. * J. Michael Dunn, Metascience *The Philosophy of Information is clearly a work of great ambition, originality, and value. * Stephen Leach, Metapsychology *Very well written, and clearly presented. ... many authors have written about philosophy and information before, but no-one has set out to deal with it in such a thorough way. This is clearly a very important book, and I think it justifies the author's claim that it describes the first philosophical analysis of information in all its aspects. * David Bawden, Library and Information Research *Table of ContentsPreface ; 1. What is the Philosophy of Information? ; 2. Open Problems in the Philosophy of Information ; 3. The Method of Levels of Abstraction ; 4. Semantic Information and the Veridicality Thesis ; 5. Outline of a Theory of Strongly Semantic Information ; 6. The Symbol Grounding Problem ; 7. Action-Based Semantics ; 8. Semantic Information and the Correctness Theory of Truth ; 9. The Logical Unsolvability of the Gettier Problem ; 10. The Logic of Being Informed ; 11. Understanding Epistemic Relevance ; 12. Semantic Information and the Network Theory of Account ; 13. Consciousness, Agents and the Knowledge Game ; 14. Against Digital Ontology ; 15. A Defence of Informational Structural Realism ; References
£31.49
Oxford University Press Networks
Book SynopsisFrom ecosystems to Facebook, from the Internet to the global financial market, some of the most important and familiar natural systems and social phenomena are based on a networked structure. It is impossible to understand the spread of an epidemic, a computer virus, large-scale blackouts, or massive extinctions without taking into account the network structure that underlies all these phenomena.In this Very Short Introduction, Guido Caldarelli and Michele Catanzaro discuss the nature and variety of networks, using everyday examples from society, technology, nature, and history to explain and understand the science of network theory. They show the ubiquitous role of networks; how networks self-organize; why the rich get richer; and how networks can spontaneously collapse. They conclude by highlighting how the findings of complex network theory have very wide and important applications in genetics, ecology, communications, economics, and sociology. ABOUT THE SERIES: The Very Short Introductions series from Oxford University Press contains hundreds of titles in almost every subject area. These pocket-sized books are the perfect way to get ahead in a new subject quickly. Our expert authors combine facts, analysis, perspective, new ideas, and enthusiasm to make interesting and challenging topics highly readable.Table of Contents1. A network point of view on the world ; 2. A fruitful approach ; 3. A world of networks ; 4. Connected and close ; 5. Superconnectors ; 6. Emergence of networks ; 7. Digging deeper into networks ; 8. Perfect storms on networks ; 9. All the world's a net. Or not? ; Further reading
£9.49
The University of Chicago Press Language and the Rise of the Algorithm
Book SynopsisTrade Review“Binder’s book is excellent and if you have any interest in the topic at all then you should definitely read it. It certainly has the potential to become a classic in the tangled field of the histories of mathematics, language, logic, and computer science. . . . In his journey from al-Khwārizmī to GPT-3 Binder covers an incredible amount of complex material in a comparatively small number of pages. However, his writing is never cluttered or in any way incomprehensible; it is always clear, lucid, and easy to follow . . .” * Renaissance Mathematicus *“This book is a tightly packed, erudite contribution to the growing concern in the Humanities with algorithms.” * LSE Review of Books *"This book offers a historical examination of the development of algorithmic expression. Binder brings together the histories of mathematics, computer science, and linguistics . . . This scholarly work with its extensive bibliography should appeal to a wide range of readers with interests encompassing the respective histories of language and computer science. The book should be in all university libraries." * Choice *“Language and the Rise of the Algorithm is an original and insightful, not to mention magisterial, work. Jeffrey M. Binder’s mastery of startlingly diverse sources—philosophical, mathematical, and literary—spread over four centuries is enormously impressive. His command of scholarly fields ranging from Renaissance theories of language to modern computer science is both broad and deep, and his knowledge of the lives and thought of dozens of characters, some famous, others less so, is nothing less than encyclopedic. Most critically, however, the book’s argument is both timely and compelling. In an age when boundaries between human and machine are tested as never before, Binder offers an insightful analysis of the present moment and a powerful narrative of how we got to this point.” -- Amir Alexander, University of California, Los Angeles“In order to better understand—and perhaps transform—our understanding of algorithms in the present, Jeffrey M. Binder argues persuasively that we need to reopen historical debates on the relationship between language and symbols. Language and the Rise of the Algorithm is a welcome addition to the history of computing that convincingly demonstrates the line between technical algorithms and their social meanings is, itself, socially constructed.” -- Jessica Otis, George Mason University“Jeffrey M. Binder has written a wonderful, thought-provoking book on the relationship between theories of language and symbolism in mathematics. Language and the Rise of the Algorithm has much to offer to the digital humanities and media studies, but this important work will also be read and studied with interest by historians of science and technology.” -- Alma Steingart, Columbia UniversityTable of ContentsIntroduction Chapter One Symbols and Language in the Early Modern Period Chapter Two The Matter Out of Which Thought Is Formed Chapter Three Symbols and the Enlightened Mind Chapter Four Language without Things Chapter Five Mass Produced Software Components Coda The Age of Arbitrariness Acknowledgments Notes Bibliography Index
£34.20
Columbia University Press The Immersive Enclosure
Book SynopsisIs immersion just another name for enclosure? In this groundbreaking analysis of virtual reality in Japan, Paul Roquet uncovers how the technology is reshaping the politics of labor, gender, home, and nation.Trade ReviewThe Immersive Enclosure is timely in the most profound sense: it offers a glimpse of a future that we need to act upon now in order to address its potential pitfalls, which include the wholesale commercial mediation of experience. Paul Roquet does a brilliant job of drawing on the culturally specific case of Japan's uptake of VR to provide insights of universal relevance and urgent importance as we confront the prospect that reality itself is becoming the next frontier of the surveillance economy. -- Mark Andrejevic, author of Automated MediaPaul Roquet’s timely book offers a refreshing new take on VR as a consumer technology. Situating the development of VR within Japan’s robust media networks of anime, manga, visual novels, and video games, he deftly illuminates the ways VR is also seen as a panacea to the country’s shrinking labor force. -- Yuriko Furuhata, author of Climatic Media: Transpacific Experiments in Atmospheric ControlThis book is a must-read for scholars in media studies and general readers alike fascinated by the flawed revolutionary potential of VR. Roquet makes a powerful case for attending to the cultural and aesthetic conditions of possibility necessary for embracing virtual reality. -- James J. Hodge, author of Sensations of History: Animation and New Media ArtImmersive Enclosure tells a startlingly different story about VR. Working expertly across discourses, technologies, and fantasies about virtual reality in Japan, Roquet reveals a homology between the structuring of perceptual space and social space that utterly challenges our understanding of the past and future of VR media. The urgent question emerges with breathtaking clarity: what to make of a collective desire for one-person space? -- Thomas Lamarre, author of The Anime Ecology: A Genealogy of Television, Animation, and Game MediaAn intriguing analysis of virtual reality as a new vessel for a contaminated kind of individualism, the product of people retreating deeper into personal devices instead of the larger, collective world. * Kotaku *[This book] offers a bounty of insights for historians of technology. -- Yulia Frumer * H-Sci-Med-Tech, H-Net Reviews *The Immersive Enclosure offers an antidote to Western-focused, and especially American-focused, studies of VR, while also underscoring the universal promises and perils that VR holds for contemporary, globalized societies everywhere. . . Highly recommended. * Choice Reviews *Roquet successfully demonstrates how virtual reality in Japan emerges from a uniquely cultural and historical perspective, inspiring others to address the local specificity of their virtual reality. The Immersive Enclosure can be their guide. -- Michael Vallance * Japan Review *Readers willing to enclose themselves in the pages of The Immersive Enclosure: Virtual Reality in Japan can expect to perceive with greater clarity the relationship between perception and bias, especially regarding virtual reality (VR) technologies. Paul Roquet’s account of the development of VR helps uncover implications of the media ecological intersections between a medium, its name, its environment, and its relationship to cultural and political biases. -- Natalia Wohar * Explorations in Media Ecology *The Immersive Enclosure sets a high bar for research quality, clarity of writing, and insightful arguments. It is strongly recommended for apprehending the history, development, and significance of a technology in Japan that is poised to shape our collective media future in new and potentially unforeseen ways. -- Ben Whaley * Journal of Japanese Studies *Table of ContentsIntroduction: The Ambient Power Play1. Acoustics of the One-Person Space2. Translating the Virtual Into Japanese3. VR Telework and the Privatization of Presence4. Immersive Anxieties in the VR Isekai5. VR as a Technology of MasculinityConclusionAcknowledgmentsNotesBibliographyIndex
£27.00
MIT Press Ltd Probabilistic Graphical Models
Book Synopsis
£100.80
MIT Press Ltd Principles of Model Checking The MIT Press
Book SynopsisA comprehensive introduction to the foundations of model checking, a fully automated technique for finding flaws in hardware and software; with extensive examples and both practical and theoretical exercises.Our growing dependence on increasingly complex computer and software systems necessitates the development of formalisms, techniques, and tools for assessing functional properties of these systems. One such technique that has emerged in the last twenty years is model checking, which systematically (and automatically) checks whether a model of a given system satisfies a desired property such as deadlock freedom, invariants, and request-response properties. This automated technique for verification and debugging has developed into a mature and widely used approach with many applications. Principles of Model Checking offers a comprehensive introduction to model checking that is not only a text suitable for classroom use but also a valuable reference for researchers and
£141.30
MIT Press Ltd Model Checking
Book Synopsis
£68.40
MIT Press Ltd Culture and Subjective WellBeing Well Being and
Book SynopsisA textbook that uses a hands-on approach to teach principles of programming languages, with Java as the implementation language.This introductory textbook uses a hands-on approach to teach the principles of programming languages. Using Java as the implementation language, Rajan covers a range of emerging topics, including concurrency, Big Data, and event-driven programming. Students will learn to design, implement, analyze, and understand both domain-specific and general-purpose programming languages. Develops basic concepts in languages, including means of computation, means of combination, and means of abstraction.Examines imperative features such as references, concurrency features such as fork, and reactive features such as event handling.Covers language features that express differing perspectives of thinking about computation, including those of logic programming and flow-based programming.Presumes Java programming experi
£54.15
MIT Press Ltd Microprediction Building an Open AI Network
Book SynopsisHow a web-scale network of autonomous micromanagers can challenge the AI revolution and combat the high cost of quantitative business optimization.The artificial intelligence (AI) revolution is leaving behind small businesses and organizations that cannot afford in-house teams of data scientists. In Microprediction, Peter Cotton examines the repeated quantitative tasks that drive business optimization from the perspectives of economics, statistics, decision making under uncertainty, and privacy concerns. He asks what things currently described as AI are not “microprediction,” whether microprediction is an individual or collective activity, and how we can produce and distribute high-quality microprediction at low cost. The world is missing a public utility, he concludes, while companies are missing an important strategic approach that would enable them to benefit—and also give back. In an engaging, colloquial style, Cotton argues that
£20.70
MIT Press Ltd There Are No Facts Attentive Algorithms
Book SynopsisThe entanglements of people and data, code and space, knowledge and power: how data and algorithms shape the world—and shape us within that world.With the emergence of a post-truth world, we have witnessed the dissolution of the common ground on which truth claims were negotiated, individual agency enacted, and public spheres shaped. What happens when, as Nietzsche claimed, there are no facts, but only interpretations? In this book, Mark Shepard examines the entanglements of people and data, code and space, knowledge and power that have produced an uncommon ground—a disaggregated public sphere where the extraction of behavioral data and their subsequent processing and sale have led to the emergence of micropublics of ever-finer granularity. Shepard explores how these new post-truth territories are propagated through machine learning systems and social networks, which shape the public and private spaces of everyday life. He traces the balkanizatio
£22.10
MIT Press Ltd Distributional Reinforcement Learning Adaptive
Book SynopsisThe first comprehensive guide to distributional reinforcement learning, providing a new mathematical formalism for thinking about decisions from a probabilistic perspective.Distributional reinforcement learning is a new mathematical formalism for thinking about decisions. Going beyond the common approach to reinforcement learning and expected values, it focuses on the total reward or return obtained as a consequence of an agent's choices—specifically, how this return behaves from a probabilistic perspective. In this first comprehensive guide to distributional reinforcement learning, Marc G. Bellemare, Will Dabney, and Mark Rowland, who spearheaded development of the field, present its key concepts and review some of its many applications. They demonstrate its power to account for many complex, interesting phenomena that arise from interactions with one's environment.The authors present core ideas from classical reinforcement learning to contextualize distri
£51.30
MIT Press Computing and Technology Ethics
Book Synopsis
£76.00
MIT Press Ltd The City in the City
Book SynopsisAn exploration of the dramatic transformation of London’s financial district after 1945, viewed at four spatial scales: city, street, facade, interior.In The City in the City, Amy Thomas offers the first in-depth architectural and urban history of London’s financial district, the City of London, from the period of rebuilding after World War II to the explosive climax of financial deregulation in the 1980s and its long aftermath. Thomas examines abstract financial ideas, political ideology, and invisible markets as concrete realities; working on four spatial scales—city, street, facade, and interior—the book explores the grand plans, hidden alleys, neo-Georgian elevations, and sweaty dealing floors that have made the financial center work.Moving from politics to sociology, institutions to bodies, development plans to office desks, Thomas unravels the rich entanglements between the structure of the UK’s financial system and the
£26.10
MIT Press Ltd The Developmental Organization of Robot Behavior
Book SynopsisA comprehensive introduction to the mathematical foundations of movement and actuation that apply equally to animals and machines.This textbook offers a computational framework for the sensorimotor stage of development as applied to robotics. Much work in developmental robotics is based on ad hoc examples, without a full computational basis. This book's comprehensive and complete treatment fills the gap, drawing on the principal mechanisms of development in the first year of life to introduce what is essentially an operating system for developing robots. The goal is to apply principles of development to robot systems that not only achieve new levels of performance but also provide evidence for scientific theories of human development.
£81.00
MIT Press Rules of Play Game Design Fundamentals The MIT
Book SynopsisAn impassioned look at games and game design that offers the most ambitious framework for understanding them to date.As pop culture, games are as important as film or television—but game design has yet to develop a theoretical framework or critical vocabulary. In Rules of Play Katie Salen and Eric Zimmerman present a much-needed primer for this emerging field. They offer a unified model for looking at all kinds of games, from board games and sports to computer and video games. As active participants in game culture, the authors have written Rules of Play as a catalyst for innovation, filled with new concepts, strategies, and methodologies for creating and understanding games. Building an aesthetics of interactive systems, Salen and Zimmerman define core concepts like play, design, and interactivity. They look at games through a series of eighteen game design schemas, or conceptual frameworks, including games as systems of emergence and information, as contexts fo
£64.80
MIT Press Ltd Great Principles of Computing
Book Synopsis
£37.43
MIT Press Ltd Programming Models for Parallel Computing
Book SynopsisAn overview of the most prominent contemporary parallel processing programming models, written in a unique tutorial style.With the coming of the parallel computing era, computer scientists have turned their attention to designing programming models that are suited for high-performance parallel computing and supercomputing systems. Programming parallel systems is complicated by the fact that multiple processing units are simultaneously computing and moving data. This book offers an overview of some of the most prominent parallel programming models used in high-performance computing and supercomputing systems today.The chapters describe the programming models in a unique tutorial style rather than using the formal approach taken in the research literature. The aim is to cover a wide range of parallel programming models, enabling the reader to understand what each has to offer. The book begins with a description of the Message Passing Interface (MPI), the most common para
£51.30
MIT Press Ltd Data Science
Book Synopsis
£14.39
MIT Press Computational Thinking The MIT Press Essential
Book SynopsisAn introduction to computational thinking that traces a genealogy beginning centuries before the digital computer.A few decades into the digital era, scientists discovered that thinking in terms of computation made possible an entirely new way of organizing scientific investigation; eventually, every field had a computational branch: computational physics, computational biology, computational sociology. More recently, “computational thinking” has become part of the K-12 curriculum. But what is computational thinking? This volume in the MIT Press Essential Knowledge series offers an accessible overview, tracing a genealogy that begins centuries before digital computers and portraying computational thinking as pioneers of computing have described it. The authors explain that computational thinking (CT) is not a set of concepts for programming; it is a way of thinking that is honed through practice: the mental skills for designing computations to do jobs for u
£14.39
MIT Press Structure and Interpretation of Computer Programs
Book Synopsis
£68.40
MIT Press Ltd Artificial Intelligence
Book Synopsis
£22.46
MIT Press Ltd Cryptographic City
Book Synopsis
£36.10
MIT Press Ltd Privacy Is Hard and Seven Other Myths
Book SynopsisAn expert on computer privacy and security shows how we can build privacy into the design of systems from the start.We are tethered to our devices all day, every day, leaving data trails of our searches, posts, clicks, and communications. Meanwhile, governments and businesses collect our data and use it to monitor us without our knowledge. So we have resigned ourselves to the belief that privacy is hard--choosing to believe that websites do not share our information, for example, and declaring that we have nothing to hide anyway. In this informative and illuminating book, a computer privacy and security expert argues that privacy is not that hard if we build it into the design of systems from the start.Along the way, Jaap-Henk Hoepman debunks eight persistent myths surrounding computer privacy. The website that claims it doesn''t collect personal data, for example; Hoepman explains that most data is personal, capturing location, preferences, and other information
£18.40
MIT Press Ltd Invisible Engines How Software Platforms Drive
Book SynopsisHarnessing the power of software platforms: what executives and entrepreneurs must know about how to use this technology to transform industries and how to develop the strategies that will create value and drive profits.Software platforms are the invisible engines that have created, touched, or transformed nearly every major industry for the past quarter century. They power everything from mobile phones and automobile navigation systems to search engines and web portals. They have been the source of enormous value to consumers and helped some entrepreneurs build great fortunes. And they are likely to drive change that will dwarf the business and technology revolution we have seen to this point. Invisible Engines examines the business dynamics and strategies used by firms that recognize the transformative power unleashed by this new revolution—a revolution that will change both new and old industries.The authors argue that in order to understand the success
£21.85
MIT Press Ltd The Computer Music Tutorial The MIT Press
Book SynopsisA comprehensive text and reference that covers all aspects of computer music, including digital audio, synthesis techniques, signal processing, musical input devices, performance software, editing systems, algorithmic composition, MIDI, synthesizer architecture, system interconnection, and psychoacoustics. The Computer Music Tutorial is a comprehensive text and reference that covers all aspects of computer music, including digital audio, synthesis techniques, signal processing, musical input devices, performance software, editing systems, algorithmic composition, MIDI, synthesizer architecture, system interconnection, and psychoacoustics. A special effort has been made to impart an appreciation for the rich history behind current activities in the field. Profusely illustrated and exhaustively referenced and cross-referenced, The Computer Music Tutorial provides a step-by-step introduction to the entire field of computer music techniques. Written for nontechnical as well as te
£81.00
Pearson Education .NET Patterns
Book Synopsis
£46.99
Elsevier Science Cognitive Intelligence with Neutrosophic
Book SynopsisTable of Contents1. Introduction to Neutrosophic Probability 2. Introduction to Neutrosophic Statistics 3. Applications Applications of Neutrosophic Statistics to Medicine Applications of Neutrosophic Statistics to Cognitive Data Applications of Neutrosophic Statistics to Bioinformatics
£103.50
Open University Press Becoming a Teacher Issues in Secondary Education
Book Synopsisâœ[E]ssential reading for anyone learning to be a teacherâ This book will continue to be a core text on our ITE programmes.âRachele Newman. Director of Initial Teacher Education, University of Southampton, UKâœA comprehensive âmust haveâ for every new teacher entering the profession: a wide variety of short chapters, packed full of key, research-evidenced ideas, brilliantly articulated by a team of expert authorsâ Fantastic!âMark Winterbottom, Professor of Education, University of Cambridge, UKâœThe beauty of the book is that the authors do not attempt to simplify teaching, instead they celebrate and explore the complexities of being a teacher.âStefanie Sullivan, Deputy Head of School, Director of Initial Teacher Education, University of Nottingham, UKThis timely new edition remains the ultimate guide for students in the core areas of teaching policy, assessment and curriculum planning, while also coTable of ContentsPart 1: Becoming a Teacher1.Becoming a Teacher2.On being a teacher3.Teacher identity: Developing a positive professional identity in your teaching career 4.Teachers’ lives, careers and wellbeing: becoming and staying a teacher Part 2: Policy, society and schooling 5.Social justice in schools: engaging with equality 6.Education Policy, Schools and Teachers 7.Policy Shifts in Initial Teacher Education8.Assessment policy, raising standards, league tables 9.International assessments 10.Schools and the Safeguarding Agenda 11.School Leadership and Management Part 3: Teaching, Learning and the Curriculum12.An introduction to learning theories and their application in educational practice 13.Using Data in the Classroom 14.Curriculum planning 15.14-19 Education: education and training in school and beyond 16.Differentiation in theory and practice 17.Classroom Assessment 18.Managing student behaviour and engagement in the classroom 19.Inclusive approaches to Special Educational Needs and Disabilities 20.English as an Additional Language: Challenges of ethnicity, language and subject identity in the contemporary classroom 21.Decolonizing the curriculum 22.Environment, Sustainability and Education 23.Literacy and numeracy across the curriculumPart 4 Beyond the Classroom24.Spaces for learning beyond the classroom25.The pastoral role of the teacher26.The role of the mentor in initial teacher education 27.Approaches to teachers’ continuing professional development28.Final Editorial Chapter
£28.49
Cengage Learning, Inc CompTIA A Core 1 Exam
Book SynopsisMaster the details of IT technical support as best-selling authors Andrews, West and Dark explain how to work effectively with users as well as how to install, maintain and troubleshoot computer hardware and networks in the leading COMPTIA A+ CORE 1 EXAM: GUIDE TO COMPUTING INFRASTRUCTURE, 10E. This step-by-step, highly visual approach uses CompTIA A+ Exam objectives as a framework to prepare you for the 220-1001 certification exam. Each chapter covers core and advanced topics while emphasizing practical applications of the most current technology, techniques and industry standards in IT today. You learn by doing with this edition's expanded coverage of the latest hardware, security, mobile device support, cloud computing and virtualization. Lab Manuals, CourseNotes, online labs and optional MindTap online resources provide additional certification test prep and interactive activities to prepare you for a role as a professional IT support technicianTable of Contents1. Taking a Computer Apart and Putting It Back Together. 2. All About Motherboards. 3. Supporting Processors and Upgrading Memory. 4. Supporting the Power System and Troubleshooting Computers. 5. Supporting Hard Drives and Other Storage Devices. 6. Supporting I/O Devices. 7. Setting Up a Local Network. 8. Network Infrastructure and Troubleshooting. 9. Supporting Mobile Devices. 10. Virtualization, Cloud Computing, and Printers. Appendix A: Safety Procedures and Environmental Concerns. Appendix B: Entry Points for Startup Processes. Appendix C: CompTIA Acronyms.
£73.14
Cengage Learning, Inc Systems Analysis and Design
Book SynopsisDiscover a practical, streamlined approach to information systems development that focuses on the latest developments with Tilley's SYSTEMS ANALYSIS AND DESIGN, 12E and MindTap digital resources. Real examples clearly demonstrate both traditional and emerging approaches to systems analysis and design, including object-oriented and agile methods. You also study cloud computing and mobile applications as this edition presents an easy-to-follow approach to systems analysis and design. Meaningful projects, insightful assignments and both online and printed exercises emphasize the critical thinking and IT skills that are most important in today's dynamic, business-related environment. New MindTap ConceptClip videos and a new online continuing case further demonstrate concepts for success in today's competitive and rapidly changing business world.Table of ContentsPHASE I: SYSTEMS PLANNING. 1. Introduction to Systems Analysis and Design. 2. Analyzing the Business Case. 3. Managing Systems Projects. PHASE II: SYSTEMS ANALYSIS. 4. Requirements Engineering 5. Data and Process Modeling. 6. Object Modeling. 7. Development Strategies. PHASE III: SYSTEMS DESIGN. 8. User Interface Design. 9. Data Design. 10. System Architecture. PHASE IV: SYSTEMS IMPLEMENTATION. 11. Managing Systems Implementation. PHASE V: SYSTEMS SUPPORT AND SECURITY. 12. Managing Systems Support and Security. ONLINE APPENDIX: THE SYSTEMS ANALYST���S TOOLKIT. Toolkit Part A: Communication Tools. Toolkit Part B: CASE Tools. Toolkit Part C: Financial Analysis Tools. Toolkit Part D: Internet Resource Tools.
£74.09
Cengage Learning, Inc Fundamentals of Python
Book SynopsisWhether you are a computer programming student, hobbyist or professional, Lambert's FUNDAMENTALS OF PYTHON: DATA STRUCTURES, 2E offers the perfect introduction to object-oriented design and data structures using the popular Python programming language. The level of instruction is ideal if you've had at least one semester of programming experience in an object-oriented language, such as Java, C++ or Python. Step-by-step explanations and focused exercises clearly explain the design of collection classes with polymorphism and inheritance and multiple implementations of collection interfaces. This edition also addresses the analysis of the space/time tradeoffs of different collection implementations and, specifically, array-based implementations and link-based implementations. You learn to work with collections, including sets, lists, stacks, queues, trees, dictionaries and graphs. Prepare for success with FUNDAMENTALS OF PYTHON: DATA STRUCTURES, 2E.Table of Contents1. Basic Python Programming. 2. An Overview of Collections. 3. Searching, Sorting, and Complexity Analysis. 4. Arrays and Linked Structures. 5. Interfaces, Implementations, and Polymorphism. 6. Inheritance and Abstract Classes. 7. Stacks. 8. Queues. 9. Lists. 10. Trees. 11. Sets and Dictionaries. 12. Graphs.
£205.85
Shelly Cashman Series Microsoft Windows 10
Book SynopsisIntroduce your students to the important new features that the latest version of Microsoft Office has to offer with the focused approach found in MICROSOFT Office 365 & WINDOWS 2019: COMPREHENSIVE. Part of the acclaimed Shelly Cashman Series, this edition continues the series' strong history of innovation with an enhanced learning approach designed to engage students, improve retention and prepare learners for success with Microsoft Windows. A trademark step-by-step, screen-by-screen approach encourages students to expand their understanding of the software through experimentation, critical thought and personalization while also engaging them in real-world scenarios to reinforce critical skills to make them successful in their educational and professional careers. In addition, MindTap and updated SAM (Skills Assessment Manager) online resources are available to guide additional study and ensure successful results.Table of Contents1. Introduction to Windows 10. 2. Working with the Windows 10 Desktop. 3. File and Folder Management. 4. Personalizing Your Work Environment. 5. Advanced Personalization and Customization. 6. Advanced Searching Techniques. 7. Microsoft Edge. 8. Mastering Digital Media. 9. Understanding Security, Networking and Utilities. Index.
£182.00
Cengage Learning, Inc Shelly Cashman Series Microsoft Office 365Â
Book SynopsisTable of ContentsWord 8: Using Collaboration, Integration, and Charts. Word 9: Creating a Reference Document. Word 10: Creating an Online Form. Word 11: Enhancing an Online Form and Using Macros. PPT 8: Creating Photo Albums and Delivering Presentations. Excel 8: Working with Trendlines, Pivot Table Reports, PivotChart Reports, and Slicers. Excel 9: Formula Auditing, Data Validation, and Complex Problem Solving. Excel 10: Data Analysis with Power Tools and Creating Macros. Excel 11: User Interfaces, Visual Basic for Applications (VBA), and Collaboration Features in Excel. Access 8: Macros, Navigation Forms, and Control Layouts. Access 9: Administering a Database System. Access 10: Using SQL. Access 11: Database Design. Index.
£190.88
Cengage Learning, Inc Shelly Cashman Series Microsoft Office 365Â
Book SynopsisIntroduce your students to the important new features that the latest version of Microsoft Office has to offer with the focused approach found in MICROSOFT Office 365 & WINDOWS 2019: COMPREHENSIVE. Part of the acclaimed Shelly Cashman Series, this edition continues the series' strong history of innovation with an enhanced learning approach designed to engage students, improve retention and prepare learners for success with Microsoft Windows. A trademark step-by-step, screen-by-screen approach encourages students to expand their understanding of the software through experimentation, critical thought and personalization while also engaging them in real-world scenarios to reinforce critical skills to make them successful in their educational and professional careers. In addition, MindTap and updated SAM (Skills Assessment Manager) online resources are available to guide additional study and ensure successful results.Table of Contents1. Managing Email Messages with Outlook. 2. Managing Calendars with Outlook. 3. Managing Contacts and Personal Contact Information with Outlook 4. Creating and Managing Tasks with Outlook. 5. Customizing Outlook. Index.
£60.79
Cengage Learning, Inc MIS
Book SynopsisLearn the principles of MIS as you explore the latest developments and industry trends with MIS 10. This practically focused approach helps you master foundational MIS concepts that will guide your career. You examine the latest topics, such as cloud computing, AR/VR, quantum computing and blockchain, with the most current MIS title on the market. Have you ever wondered what you would have done as a company leader in a critical moment? With this edition's MindTap digital experience, you can strengthen your decision-making skills with "YouDecide" -- new interactive case studies that bridge technology and business strategy and position you as the decision maker. You can also examine possible career paths with new career connection videos. Delve deeper into key course concepts with new concept videos and foundational case studies. In addition, MindTap's RSS feeds alert you to the latest advancements and trends for a stronger focus on today's real business world.Table of Contents1. Information Systems in Business. 2. Computers and Their Business Applications. 3. Data and Business Intelligence. 4. Personal, Legal, Ethical, and Organizational Issues. 5. Protecting Information Resources. 6. Data Communication: Delivering Information Anywhere and Anytime. 7. A Connected World. 8. E-Commerce. 9. Global Information Systems. 10. Building Successful Information Systems. 11. Enterprise Systems. 12. Supporting Decisions and Processes. 13. Artificial Intelligence and Automation. 14. Emerging Trends, Technologies, and Applications.
£41.99