Gamification may be a new term, but the idea of using game-thinking and game
mechanics to solve problems and engage audiences isn’t exactly new. The military
has been using games and simulations for hundreds (if not thousands) of years, and
the U.S. military has been a pioneer in the use of video games across branches. Three...
This is not a book about algorithms . Certainly, it is full of algorithms , but that 's
not what this book is about . This book is about possibilities . Its purpose is to
present you not only with the prerequisite mandatory knowledge of the available
problem-solving techniques , but more importantly to expand your ability to
frame...
It is amusing that the first part of this book to be read is the last part to be written.
It provides, however, an opportunity to share with you a little about how writing
and editing this book has changed my thinking not just about enterprise architecture
(EA), or about the role of information technology (IT) and IT professionals in...
Mathematics and mathematical modelling are of central importance in computer science. For this reason the teaching concepts of mathematics in computer science have to be constantly reconsidered, and the choice of material and the motivation have to be adapted. This applies in particular to mathematical analysis, whose significance has to be...
With knowledge representation we face more or less the same problem as Augustine
(354–430) when thinking about time: if nobody asks what it is, it seems
clear enough, but being asked it proves to be very difficult to provide an answer.
At the beginning of our research we thought that a solution for the problem
of...
Several electronic layers exist in most documents, a fact overlooked
by many writers. Probing these sublayers often reveals information
not intended for release by the author. Documents in electronic formats
create a “palimpsest” that even semiskilled investigators can probe for
sensitive data.
One of the most important things an architect can do is reflection. That is, examine
systems, organizations, people and ask “What alternatives were considered and why
was that particular decision made?” Thinking about the response gives an architect
insight into the motivations and decision processes that others have used...
The role of the Chief Information Security Officer has evolved enormously in recent years in response to security threats and a challenging business environment. Instead of being primarily a master technician, today s CISO has to be a trusted advisor to senior management. Read this pocket guide and ...
This comprehensive guide to the strategic management of information systems within business and public sector organizations integrates the two, often disparate, domains of strategic management and information systems. Focusing on managing information systems within a broader organizational context, it covers key issues...
Maybe you've heard the story—or probably urban legend—about the university that didn't lay any grass or pour any concrete when it first opened, leaving the campus grounds as solid dirt. Then, as students began to traverse the campus from one class to the next, campus planners mapped the common paths they took, and then...
With the first Apple ][ it was very important for me to have a manual that would
lead others to success and learning right from the get-go, even if the user had no
relevant experience. That’s how we learn. We start entering code others wrote to
see how it works and then over time we learn variations.
This book is an introduction to object-oriented programming using the Java programming language. We use the object-first approach where objects are used from the first sample program. Object-oriented thinking is emphasized and promoted from the beginning. Students learn how to use objects first and then learn how to define their own...