Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Propaganda in the Information Age
Propaganda in the Information Age

Propaganda in the Information Age is a collaborative volume which updates Herman and Chomsky’s propaganda model for the twenty-first-century media landscape and makes the case for the continuing relevance of their original ideas. It includes an exclusive interview with Noam Chomsky himself.

2018 marks 30...

Practical Microservices Architectural Patterns: Event-Based Java Microservices with Spring Boot and Spring Cloud
Practical Microservices Architectural Patterns: Event-Based Java Microservices with Spring Boot and Spring Cloud
Take your distributed applications to the next level and see what the reference architectures associated with microservices can do for you. This book begins by showing you the distributed computing architecture landscape and provides an in-depth view of microservices architecture. Following this, you will work with CQRS, an essential...
The Existential Leader
The Existential Leader

The Existential Leader: An Authentic Leader For Our Uncertain Times invites us to reconsider our preconceptions about leadership, introducing a new model more in line with our uncertain times: existential leadership.

Monica Hanaway presents an illuminating overview of existential thinking and describes how an...

Smart Grid Control: Overview and Research Opportunities (Power Electronics and Power Systems)
Smart Grid Control: Overview and Research Opportunities (Power Electronics and Power Systems)
This book focuses on the role of systems and control. Focusing on the current and future development of smart grids in the generation and transmission of energy, it provides an overview of the smart grid control landscape, and the potential impact of the various investigations presented has for technical aspects of power generation and...
Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and Institutions
Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and Institutions
Understand critical cybersecurity and risk perspectives, insights, and tools for the leaders of complex financial systems and markets. This book offers guidance for decision makers and helps establish a framework for communication between cyber leaders and front-line professionals. Information is provided to help in the analysis of...
Mobile and Wireless Communications
Mobile and Wireless Communications
One of the very first books published on the social impact of the mobile phone was Timo Kopomaa’s The City in Your Pocket: Birth of the Mobile Information Society. The book, published in 2000, was based on research that Kopomaa had undertaken for Nokia and Sonera as part of his doctoral studies in the Centre for Urban and Regional Studies at...
HTML5 Canvas
HTML5 Canvas
In the past two years, since the release of this book, usage of the HTML5 Canvas has grown by leaps and bounds. The original edition of this book was one of the first publications dedicated to the Canvas. While we were proud to get out of the gate fast, it also meant that we had to do a lot of research and exploration...
The Routledge Companion to Twenty-First Century Literary Fiction (Routledge Literature Companions)
The Routledge Companion to Twenty-First Century Literary Fiction (Routledge Literature Companions)

The study of contemporary fiction is a fascinating yet challenging one. Contemporary fiction has immediate relevance to popular culture, the news, scholarly organizations, and education – where it is found on the syllabus in schools and universities – but it also offers challenges. What is ‘contemporary’? How...

Republic of Lies: American Conspiracy Theorists and Their Surprising Rise to Power
Republic of Lies: American Conspiracy Theorists and Their Surprising Rise to Power

A riveting tour through the landscape and meaning of modern conspiracy theories, exploring the causes and tenacity of this American malady, from Birthers to Pizzagate and beyond.

American society has always been fertile ground for conspiracy theories, but with the election of Donald Trump, previously
...

Python Interviews: Discussions with Python Experts
Python Interviews: Discussions with Python Experts

Mike Driscoll takes you on a journey talking to a hall-of-fame list of truly remarkable Python experts. You'll be inspired every time by their passion for the Python language, as they share with you their experiences, contributions, and careers in Python.

Key Features

  • Hear from these...
The Definitive Guide to AWS Infrastructure Automation: Craft Infrastructure-as-Code Solutions
The Definitive Guide to AWS Infrastructure Automation: Craft Infrastructure-as-Code Solutions

Discover the pillars of AWS infrastructure automation, starting with API-driven infrastructure concepts and its immediate benefits such as increased agility, automation of the infrastructure life cycle, and flexibility in experimenting with new architectures. With this base established, the book discusses infrastructure-as-code...

The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)

Actionable guidance and expert perspective for real-world cybersecurity

The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world...

Result Page: 38 37 36 35 34 33 32 31 30 29 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy