Whether teaching or learning UX Design, activities often sink in deeper than lectures. And game-like activities with a lesson included both engage and instruct. This book contains fun and challenging activities to help participants learn core concepts in user experience, from sketching, to photo saf..
Bitcoin is starting to come into its own as a digital currency, but the blockchain technology behind it could prove to be much more significant. This book takes you beyond the currency ("Blockchain 1.0") and smart contracts ("Blockchain 2.0") to demonstrate how the blockchain is in position to becom..
The author of the breakout hit Here Comes Everybody reveals how new technology is changing us for the better. In his bestselling Here Comes Everybody, Internet guru Clay Shirky provided readers with a much-needed primer for the digital age. Now, with Cognitive Surplus, he reveals how new digital t..
Conozca a fondo su computadora y todo lo que puede hacer con ella Necesita saber usar las computadoras para mejorar su empleo y nivel de vida, pero no sabe por donde empezar? No entiende la terminologia inglesa que se usa en la computacion? Quiere descubrir y aprovechar todo lo que el Internet tien..
Computers for Seniors is a step-by-step guide that will take you all the way from pressing the ``On`` button on your new computer to being a confident user who can send email to family and friends, shop online safely, read the latest news, watch funny YouTube videos, share cute pictures of your gran..
The history of computing could be told as the story of hardware and software, or the story of the Internet, or the story of ``smart`` hand-held devices, with subplots involving IBM, Microsoft, Apple, Facebook, and Twitter. In this concise and accessible account of the invention and development of di..
The Most Complete, Up-to-Date CTS Exam Study System Published with InfoComm International, CTS Certified Technology Specialist Exam Guide, Second Edition provides comprehensive coverage of all objectives on the latest release of the InfoComm Certified Technology Specialist exam--the leading internat..
This updated edition includes the most recent terms relating to constantly expanding computer and internet technology. More than 3,200 terms and definitions deal with: Practical guidance for business software usersComputer security, law, and ethicsComputer programming, with examples in several comp..
Since Don't Make Me Think was first published in 2000, hundreds of thousands of Web designers and developers have relied on usability guru Steve Krug's guide to help them understand the principles of intuitive navigation and information design. Witty, commonsensical, and eminently practical, it's on..
New to Facebook? Then this essential guide will prove to be the perfect introduction to the world's largest social media site. Covering Facebook's key features, including: Setting up an account and posting on Facebook, whilst maintaining your privacy and staying safe. Having fun perfecting and shar..
What's so special about design patterns?At any given moment, someone struggles with the same software design problems you have. And, chances are, someone else has already solved your problem. This edition of Head First Design Patterns--now updated for Java 8--shows you the tried-and-true, road-teste..
What if you told the truth and the whole world heard you? Would you expect to be believed? What if you lived in a country swamped with Internet outrage? What if you were a woman living in a society that hated women? In this, his first full-length novel, Jarett Kobek answers the questions of our mome..
Welcome to logistics in a digital world. From procurement to production and everything in between, see how SAP S/4HANA transforms your SAP Logistics landscape. Examine each supply chain line of business in SAP S/4HANA: sales order management, manufacturing, inventory management, plant maintenance, a..
Microsoft Office Basics is the essential guide for all those who want to get to grips with the basics of Microsoft Office. Written in a clear and accessible way it starts by covering everything from the basics of the traditional features of each of the programs and goes on to give practical tips on ..
New York Times BestsellerDid you know that can you scroll a Web page just by tapping the space bar? How do you recover photos you've deleted by accident? What can you do if your cell phone's battery is dead by dinnertime each day? When it comes to technology, there's no driver's ed class or governme..
A Fully Revised Edition Featuring New Material on Coroutines, Debugging, Testing, Parsing, String Formatting, and More Python 3 is the best version of the language yet: It is more powerful, convenient, consistent, and expressive than ever before. Now, leading Python programmer Mark Summerfield d..
A fascinating, insightful, and wonderfully written exploration of the document. Like Henry Petroski's The Pencil, David Levy's Scrolling Forward takes a common, everyday object, the document, and illuminates what it reveals about us, both in the past and in the digital age. We are surrounded daily b..
We live in a digital age, buy and sell in a digital economy, and consume--oh do we consume--digital media. The digital lies at the heart of our contemporary, information-heavy, media-saturated lives, and although we may talk about the digital as a cultural phenomenon, the thing itself--digitality--i..
Now, Carr expands his argument into the most compelling exploration of the Internet's intellectual and cultural consequences yet published. As he describes how human thought has been shaped through the centuries by "tools of the mind"--from the alphabet to maps, to the printing press, the clock, and..
We are Data explores what identity means in an algorithmic age: how it works, how our lives are controlled by it, and how we can resist it. Algorithms are everywhere, organizing the near limitless data that exists in our world. Derived from our every search, like, click, and purchase, algorithms det..
The Conficker worm infected its first computer in November 2008 and within a month had infiltrated 1.5 million computers in 195 countries. Banks, telecommunications companies, and critical government networks (including the British Parliament and the French and German military) were infected. No one..