"Computer systems consisting of many machines will be the norm within a few years. However, making a collection of machines appear as a single, coherent system - in which the location of files, servers, programs, or users is invisible to users who do not wish to know - is a very difficult problem. LOCUS, a distributed version of the popular operating system Unix, provides an excellent solution.…
"Ben Shneiderman's book dramatically raises computer users' expectations of what they should get from technology. He opens their eyes to new possibilities and invites them to think freshly about future technology. He challenges developers to build products that better support human needs and that are usable at any bandwidth. Shneiderman proposes Leonardo da Vinci as an inspirational muse for th…
How Control Exists after DecentralizationIs the Internet a vast arena of unrestricted communication and freely exchanged information or a regulated, highly structured virtual bureaucracy? In Protocol, Alexander Galloway argues that the founding principle of the Net is control, not freedom, and that the controlling power lies in the technical protocols that make network connections (and disconne…
"A Bradford book."OCLC-licensed vendor bibliographic record.
In The Second Self, Sherry Turkle looks at the computer not as a "tool," but as part of our social and psychological lives; she looks beyond how we use computer games and spreadsheets to explore how the computer affects our awareness of ourselves, of one another, and of our relationship with the world. "Technology," she writes, "catalyzes changes not only in what we do but in how we think." Fir…
Title from title screen.Includes index.Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security.As paper-based communication and transaction mechanisms are replaced by automated ones, traditional forms of security such as photographs and handwritten signatures are becoming outdated. Most security experts belie…
Annotation Privacy is the capacity to negotiate social relationships by controlling access to personal information. As laws, policies, and technological design increasingly structure people's relationships with social institutions, individual privacy faces new threats and new opportunities. Over the last several years, the realm of technology and privacy has been transformed, creating a landsca…
This book constitutes the refereed proceedings of the 9th International Conference on Web Reasoning and Rule Systems, RR 2015, held in Berlin, Germany, in August 2015. The 5 full papers, 4 technical communications presented together with 4 invited talks were carefully reviewed and selected from 16 submissions. The scale and the heterogenous nature of web data poses many challenges, and turns ba…
Introductory textbook covering all the main features of the 'web programming' languages PHP and MySQL together with detailed examples that will enable readers (whether students on a taught course or independent learners) to use them to create their own applications or understand existing ones. A particular focus is the use of PHP to generate MySQL commands from a script as it is executed. E…
This two volume set LNCS 9418 and LNCS 9419 constitutes the proceedings of the 16th International Conference on Web Information Systems Engineering, WISE 2015, held in Miami, FL, USA, in November 2015. The 53 full papers, 17 short and 14 special sessions and invited papers, presented in these proceedings were carefully reviewed and selected from 189 submissions. The papers cover the areas of…