Listing 1 - 10 of 13 | << page >> |
Sort by
|
Choose an application
'Mapping Texts' provides an introduction to computational text analysis that simultaneously blends conceptual treatments with practical, hands-on examples that walk the reader through how to conduct text analysis projects with real data. The book shows how to conduct text analysis in the R statistical computing environment - a popular programming language in data science.
Text data mining. --- Computers and IT. --- Graphical & digital media applications.
Choose an application
This is a fun, illustrated guide to learning Haskell, a functional programming language that's growing in popularity. It introduces programmers familiar with imperative languages to the unique aspects of functional programming.
Choose an application
'Feminist AI' brings together leading feminist thinkers from across the disciplines to explore the impact of artificial intelligence (AI) and related data-driven technologies on human society.
Artificial intelligence --- Philosophy. --- Technology --- Computers and IT. --- Graphical & digital media applications. --- Social aspects
Choose an application
Drawing insights across ethics, philosophy, and policy, Automating Empathy offers a critical exploration of technologies that sense human emotions and argues for a pluralistic reconceptualization of empathic technologies to better reflect the intimate dimensions of human life.
Technology --- Moral and ethical aspects. --- Affect (Psychology) --- Computer simulation. --- Computers and IT. --- Graphical & digital media applications.
Choose an application
'Critical Perspectives on Cybersecurity' offers a new approach to understanding cybersecurity in international relations. As a counterpoint to existing work, which focuses largely on the security of states, private actors, and infrastructure, chapter authors examine how women and communities across the Global South understand 'cybersecurity,' including what threats and forms of resistance are most important to them. Bringing together contributions from a globally diverse range of authors, Anwar Mhajne and Alexis Henshaw provide a human security perspective on cybersecurity that pays attention to the interplay of race, ethnicity, gender, class, and other social hierarchies, especially regarding cybersecurity in the Global South.
Women and human security. --- Computer security. --- National security. --- Computers and IT. --- Sociology & anthropology.
Choose an application
Amidst a growing movement to use science for positive change, 'Ethical Data Science' offers a solution-oriented approach to the ethical challenges of data science. As one of the first books on public interest technology, it provides a starting point for anyone who wants human values to counterbalance the institutional incentives that drive computational prediction.
Data mining. --- Public interest. --- Data mining --- Predictive analytics --- Computers and IT. --- Graphical & digital media applications. --- Moral and ethical aspects.
Choose an application
Eleventh Hour CISSP provides you with a study guide keyed directly to the most current version of the CISSP exam. This book is streamlined to include only core certification information and is presented for ease of last minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. The CISSP certification is the most prestigious, globally recognized, vendor neutral exam for information security professionals. Over 67,000 professionals are certified worldwide with many more joining their ranks. This new Second Edition is aligned to cover all
Computer networks --- Computer security --- Telecommunications engineers --- Security measures --- Examinations --- Certification. --- Information Technology --- General and Others --- Electronic data processing personnel --- Computers and IT.--ukslc.
Choose an application
The Web has been with us now for almost 25 years. An integral part of our social, cultural and political lives, 'new media' is simply not that new anymore. Despite the rapidly expanding archives of information at our disposal, and the recent growth of interest in web history as a field of research, the information available to us still far outstrips our understanding of how to interpret it. The SAGE Handbook of Web History marks the first comprehensive review of this subject to date. Its editors emphasise two main different forms of study: the use of the web as an historical resource, and the web as an object of study in its own right. Bringing together all the existing knowledge of the field, with an interdisciplinary focus and an international scope, this is an incomparable resource for researchers and students alike.
World Wide Web --- History. --- Computers and IT. --- World Wide Web. --- Information retrieval --- Computer architecture. Operating systems --- History as a science --- Archivistics
Choose an application
'Imagining AI' draws attention to the range and variety of visions of a future with intelligent machines and their potential significance for the research, regulation, and implementation of AI.
Choose an application
This new edition has been fully revised and updated to include extensive information on the ARM Cortex-M4 processor, providing a complete up-to-date guide to both Cortex-M3 and Cortex-M4 processors, and which enables migration from various processor architectures to the exciting world of the Cortex-M3 and M4. Key Features include: Two new chapters on DSP features and CMSIS-DSP software libraries, covering DSP fundamentals and how to write DSP software for the Cortex-M4 processor, including examples of using the CMSIS-DSP library, as well as useful information
Embedded computer systems. --- Microprocessors. --- Embedded systems (Computer systems) --- Minicomputers --- Computer systems --- Architecture Analysis and Design Language --- RISC microprocessors --- RISC microprocessors ‡v Handbooks, manuals, etc. --- Microprocessors --- Reduced instruction set computers --- Computers and IT. --- Embedded systems.
Listing 1 - 10 of 13 | << page >> |
Sort by
|