Browse Results

Showing 36,001 through 36,025 of 54,475 results

The SAGE Handbook of Human–Machine Communication

by Andrea L. Guzman Rhonda McEwen Steve Jones

The SAGE Handbook of Human-Machine Communication has been designed to serve as the touchstone text for researchers and scholars engaging in new research in this fast-developing field. Chapters provide a comprehensive grounding of the history, methods, debates and theories that contribute to the study of human-machine communication. Further to this, the Handbook provides a point of departure for theorizing interactions between people and technologies that are functioning in the role of communicators, and for considering the theoretical and methodological implications of machines performing traditionally ‘human’ roles. This makes the Handbook the first of its kind, and a valuable resource for students and scholars across areas such as communication, media and information studies, and computer science, as well as for practitioners, engineers and researchers interested in the foundational elements of this emerging field. Part 1: Histories and Trajectories Part 2: Approaches and Methods Part 3: Concepts and Contexts Part 4: Technologies and Applications

The SAGE Handbook of Human–Machine Communication

by Andrea L. Guzman Rhonda McEwen Steve Jones

The SAGE Handbook of Human-Machine Communication has been designed to serve as the touchstone text for researchers and scholars engaging in new research in this fast-developing field. Chapters provide a comprehensive grounding of the history, methods, debates and theories that contribute to the study of human-machine communication. Further to this, the Handbook provides a point of departure for theorizing interactions between people and technologies that are functioning in the role of communicators, and for considering the theoretical and methodological implications of machines performing traditionally ‘human’ roles. This makes the Handbook the first of its kind, and a valuable resource for students and scholars across areas such as communication, media and information studies, and computer science, as well as for practitioners, engineers and researchers interested in the foundational elements of this emerging field. Part 1: Histories and Trajectories Part 2: Approaches and Methods Part 3: Concepts and Contexts Part 4: Technologies and Applications

IoT Penetration Testing Cookbook

by Aaron Guzman Aditya Gupta

Over 80 recipes to master IoT security techniques. About This Book • Identify vulnerabilities in IoT device architectures and firmware using software and hardware pentesting techniques • Understand radio communication analysis with concepts such as sniffing the air and capturing radio signals • A recipe based guide that will teach you to pentest new and unique set of IoT devices. Who This Book Is For This book targets IoT developers, IoT enthusiasts, pentesters, and security professionals who are interested in learning about IoT security. Prior knowledge of basic pentesting would be beneficial. What You Will Learn • Set up an IoT pentesting lab • Explore various threat modeling concepts • Exhibit the ability to analyze and exploit firmware vulnerabilities • Demonstrate the automation of application binary analysis for iOS and Android using MobSF • Set up a Burp Suite and use it for web app testing • Identify UART and JTAG pinouts, solder headers, and hardware debugging • Get solutions to common wireless protocols • Explore the mobile security and firmware best practices • Master various advanced IoT exploitation techniques and security automation In Detail IoT is an upcoming trend in the IT industry today; there are a lot of IoT devices on the market, but there is a minimal understanding of how to safeguard them. If you are a security enthusiast or pentester, this book will help you understand how to exploit and secure IoT devices. This book follows a recipe-based approach, giving you practical experience in securing upcoming smart devices. It starts with practical recipes on how to analyze IoT device architectures and identify vulnerabilities. Then, it focuses on enhancing your pentesting skill set, teaching you how to exploit a vulnerable IoT device, along with identifying vulnerabilities in IoT device firmware. Next, this book teaches you how to secure embedded devices and exploit smart devices with hardware techniques. Moving forward, this book reveals advanced hardware pentesting techniques, along with software-defined, radio-based IoT pentesting with Zigbee and Z-Wave. Finally, this book also covers how to use new and unique pentesting techniques for different IoT devices, along with smart devices connected to the cloud. By the end of this book, you will have a fair understanding of how to use different pentesting techniques to exploit and secure various IoT devices. Style and approach This recipe-based book will teach you how to use advanced IoT exploitation and security automation.

Procedural Content Generation via Machine Learning: An Overview (Synthesis Lectures on Games and Computational Intelligence)

by Matthew Guzdial Sam Snodgrass Adam J. Summerville

This book surveys current and future approaches to generating video game content with machine learning or Procedural Content Generation via Machine Learning (PCGML). Machine learning is having a major impact on many industries, including the video game industry. PCGML addresses the use of computers to generate new types of content for video games (game levels, quests, characters, etc.) by learning from existing content. The authors illustrate how PCGML is poised to transform the video games industry and provide the first ever beginner-focused guide to PCGML. This book features an accessible introduction to machine learning topics, and readers will gain a broad understanding of currently employed PCGML approaches in academia and industry. The authors provide guidance on how best to set up a PCGML project and identify open problems appropriate for a research project or thesis. This book is written with machine learning and games novices in mind and includes discussions of practical and ethical considerations along with resources and guidance for starting a new PCGML project.

Introduction to Computing and Programming In Python: A Multimedia Approach

by Mark Guzdial Barbara Ericson

This book is a uniquely researched and up-to-date volume that is widely recognized for its successful introduction to the subject of Media Computation. Emphasizing creativity, classroom interaction, and in-class programming examples, the book takes a bold and unique approach to computation that engages students and applies the subject matter to the relevancy of digital media. <p><p> The Fourth Edition teaches students to program in an effort to communicate via social computing outlets, providing a unique approach that serves the interests of a broad range of students. Key Topics: Introduction to Computer Science and Media Computation; Introduction to Programming; Creating and Modifying Text; Modifying Pictures Using Loops; Picture Techniques with Selection; Modifying Pixels by Position; Modifying Sounds Using Loops; Modifying Samples in a Range; Making Sounds by Combining Pieces; Building Bigger Programs; Manipulating Text with Methods and Files; Advanced Text Techniques: Web and Information; Making Text for the Web; Creating and Modifying Movies; Speed; Functional Programming; Object Oriented Programming. <p><p> This book is useful for anyone interested in learning computer programming.

Cause Effect Pairs in Machine Learning (The Springer Series on Challenges in Machine Learning)

by Isabelle Guyon Alexander Statnikov Berna Bakir Batu

This book presents ground-breaking advances in the domain of causal structure learning. The problem of distinguishing cause from effect (“Does altitude cause a change in atmospheric pressure, or vice versa?”) is here cast as a binary classification problem, to be tackled by machine learning algorithms. Based on the results of the ChaLearn Cause-Effect Pairs Challenge, this book reveals that the joint distribution of two variables can be scrutinized by machine learning algorithms to reveal the possible existence of a “causal mechanism”, in the sense that the values of one variable may have been generated from the values of the other. This book provides both tutorial material on the state-of-the-art on cause-effect pairs and exposes the reader to more advanced material, with a collection of selected papers. Supplemental material includes videos, slides, and code which can be found on the workshop website.Discovering causal relationships from observational data will become increasingly important in data science with the increasing amount of available data, as a means of detecting potential triggers in epidemiology, social sciences, economy, biology, medicine, and other sciences.

Discrete Dynamical Systems and Chaotic Machines: Theory and Applications (Chapman & Hall/CRC Numerical Analysis and Scientific Computing Series #20)

by Christophe Guyeux Jacques Bahi

Until the authors' recent research, the practical implementation of the mathematical theory of chaos on finite machines raised several issues. This self-contained book shows how to make finite machines, such as computers, neural networks, and wireless sensor networks, work chaotically as defined in a rigorous mathematical framework. Taking into account that these machines must interact in the real world, the authors share their research results on the behaviors of discrete dynamical systems and their use in computer science.

Advanced Analytics and Learning on Temporal Data: 7th ECML PKDD Workshop, AALTD 2022, Grenoble, France, September 19–23, 2022, Revised Selected Papers (Lecture Notes in Computer Science #13812)

by Thomas Guyet Georgiana Ifrim Simon Malinowski Anthony Bagnall Patrick Shafer Vincent Lemaire

This book constitutes the refereed proceedings of the 7th ECML PKDD Workshop, AALTD 2022, held in Grenoble, France, during September 19–23, 2022.The 12 full papers included in this book were carefully reviewed and selected from 21 submissions. They were organized in topical sections as follows: Oral presentation and poster presentation.

Chronicles: Formalization of a Temporal Model (SpringerBriefs in Computer Science)

by Thomas Guyet Philippe Besnard

This book is intended as an introduction to a versatile model for temporal data. It exhibits an original lattice structure on the space of chronicles and proposes new counting approach for multiple occurrences of chronicle occurrences. This book also proposes a new approach for frequent temporal pattern mining using pattern structures. This book was initiated by the work of Ch. Dousson in the 1990’s. At that time, the prominent format was Temporal Constraint Networks for which the article by Richter, Meiri and Pearl is seminal. Chronicles do not conflict with temporal constraint networks, they are closely related. Not only do they share a similar graphical representation, they also have in common a notion of constraints in the timed succession of events. However, chronicles are definitely oriented towards fairly specific tasks in handling temporal data, by making explicit certain aspects of temporal data such as repetitions of an event. The notion of chronicle has been applied both for situation recognition and temporal sequence abstraction. The first challenge benefits from the simple but expressive formalism to specify temporal behavior to match in a temporal sequence. The second challenge aims to abstract a collection of sequences by chronicles with the objective to extract characteristic behaviors. This book targets researchers and students in computer science (from logic to data science). Engineers who would like to develop algorithms based on temporal models will also find this book useful.

Decision Making: Uncertainty, Imperfection, Deliberation and Scalability

by Tatiana V. Guy Miroslav Kárný David H. Wolpert

This volume focuses on uncovering the fundamental forces underlying dynamic decision making among multiple interacting, imperfect and selsh decision makers. The chapters are written by leading experts from different disciplines, all considering the many sources of imperfection in decision making, and always with an eye to decreasing the myriad discrepancies between theory and real world human decision making. Topics addressed include uncertainty, deliberation cost and the complexity arising from the inherent large computational scale of decision making in these systems. In particular, analyses and experiments are presented which concern: * task allocation to maximize "the wisdom of the crowd"; * design of a society of "edutainment" robots who account for one anothers' emotional states; * recognizing and counteracting seemingly non-rational human decision making; * coping with extreme scale when learning causality in networks; * efciently incorporating expert knowledge in personalized medicine; * the effects of personality on risky decision making. The volume is a valuable source for researchers, graduate students and practitioners in machine learning, stochastic control, robotics, and economics, among other elds.

The Lens

by Nk Guy

Which lens should I buy for my camera? It's such a simple question, but choosing the right lens or lenses is actually one of the most important photographic decisions you can make. Nothing affects the quality of a photo more than the lens. It's no longer just about the megapixels-it's the glass that makes all the difference! Many first-time buyers of DSLRs don't venture past the basic lens included in the box. While some are reluctant to spend more money, others are confused by all the buzzwords or are overwhelmed by all the choices out there. It's really a shame, because interchangeable lenses give you amazing scope for quality photography. Take in vast sweeping scenes with a wide angle lens. Capture faraway birds with a telephoto lens. Examine the tiniest detail of a flower with a macro lens. Record the perfect portrait with a prime lens. Anything is possible when you choose the right lens for the job! This book isn't a simple catalogue of available lenses. New products are coming out all the time, and comparing specific lenses can be difficult. Instead, author N.K. Guy gives you all the information you need to make smart buying decisions. Optical technology is demystified, arcane terminology is decoded, and practical tips are provided. The Lens will help you build the perfect lens collection to suit your needs-now and in the future.

Hands-On Data Warehousing with Azure Data Factory: ETL techniques to load and transform data from various sources, both on-premises and on cloud

by Michelle Kamrat Gutzait Giuseppe Ciaburro Christian Coté

Leverage the power of Microsoft Azure Data Factory v2 to build hybrid data solutionsKey FeaturesCombine the power of Azure Data Factory v2 and SQL Server Integration ServicesDesign and enhance performance and scalability of a modern ETL hybrid solutionInteract with the loaded data in data warehouse and data lake using Power BIBook DescriptionETL is one of the essential techniques in data processing. Given data is everywhere, ETL will always be the vital process to handle data from different sources.Hands-On Data Warehousing with Azure Data Factory starts with the basic concepts of data warehousing and ETL process. You will learn how Azure Data Factory and SSIS can be used to understand the key components of an ETL solution. You will go through different services offered by Azure that can be used by ADF and SSIS, such as Azure Data Lake Analytics, Machine Learning and Databrick’s Spark with the help of practical examples. You will explore how to design and implement ETL hybrid solutions using different integration services with a step-by-step approach. Once you get to grips with all this, you will use Power BI to interact with data coming from different sources in order to reveal valuable insights.By the end of this book, you will not only learn how to build your own ETL solutions but also address the key challenges that are faced while building them.What you will learnUnderstand the key components of an ETL solution using Azure Data Factory and Integration ServicesDesign the architecture of a modern ETL hybrid solutionImplement ETL solutions for both on-premises and Azure dataImprove the performance and scalability of your ETL solutionGain thorough knowledge of new capabilities and features added to Azure Data Factory and Integration ServicesWho this book is forThis book is for you if you are a software professional who develops and implements ETL solutions using Microsoft SQL Server or Azure cloud. It will be an added advantage if you are a software engineer, DW/ETL architect, or ETL developer, and know how to create a new ETL implementation or enhance an existing one with ADF or SSIS.

Reforming European Data Protection Law

by Serge Gutwirth Ronald Leenes Paul De Hert

This book on privacy and data protection offers readers conceptual analysis as well as thoughtful discussion of issues, practices, and solutions. It features results of the seventh annual International Conference on Computers, Privacy, and Data Protection, CPDP 2014, held in Brussels January 2014. The book first examines profiling, a persistent core issue of data protection and privacy. It covers the emergence of profiling technologies, on-line behavioral tracking, and the impact of profiling on fundamental rights and values. Next, the book looks at preventing privacy risks and harms through impact assessments. It contains discussions on the tools and methodologies for impact assessments as well as case studies. The book then goes on to cover the purported trade-off between privacy and security, ways to support privacy and data protection, and the controversial right to be forgotten, which offers individuals a means to oppose the often persistent digital memory of the web. Written during the process of the fundamental revision of the current EU data protection law by the Data Protection Package proposed by the European Commission, this interdisciplinary book presents both daring and prospective approaches. It will serve as an insightful resource for readers with an interest in privacy and data protection.

Reloading Data Protection

by Serge Gutwirth Ronald Leenes Paul De Hert

This volume brings together papers that offer conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy and data protection. The first section of the book provides an overview of developments in data protection in different parts of the world. The second section focuses on one of the most captivating innovations of the data protection package: how to forget, and the right to be forgotten in a digital world. The third section presents studies on a recurring, and still important and much disputed, theme of the Computers, Privacy and Data Protection (CPDP) conferences : the surveillance, control and steering of individuals and groups of people and the increasing number of performing tools (data mining, profiling, convergence) to achieve those objectives. This part is illustrated by examples from the domain of law enforcement and smart surveillance. The book concludes with five chapters that advance our understanding of the changing nature of privacy (concerns) and data protection.

Data Protection on the Move: Current Developments in ICT and Privacy/Data Protection (Law, Governance and Technology Series #24)

by Serge Gutwirth Ronald Leenes Paul Hert

This volume brings together papers that offer methodologies, conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy and data protection. It is one of the results of the eight annual International Conference on Computers, Privacy, and Data Protection, CPDP 2015, held in Brussels in January 2015. The book explores core concepts, rights and values in (upcoming) data protection regulation and their (in)adequacy in view of developments such as Big and Open Data, including the right to be forgotten, metadata, and anonymity. It discusses privacy promoting methods and tools such as a formal systems modeling methodology, privacy by design in various forms (robotics, anonymous payment), the opportunities and burdens of privacy self management, the differentiating role privacy can play in innovation. The book also discusses EU policies with respect to Big and Open Data and provides advice to policy makers regarding these topics. Also attention is being paid to regulation and its effects, for instance in case of the so-called 'EU-cookie law' and groundbreaking cases, such as Europe v. Facebook. This interdisciplinary book was written during what may turn out to be the final stages of the process of the fundamental revision of the current EU data protection law by the Data Protection Package proposed by the European Commission. It discusses open issues and daring and prospective approaches. It will serve as an insightful resource for readers with an interest in privacy and data protection.

Lab Manual for MCSE Guide to Planning a Microsoft® Windows® Server 2003 Network

by Jennifer Guttormson Kelly Reid Byron Wright

The objective of this lab manual is to assist you in preparing for the Microsoft Certification Exam 70-293: Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure by applying the objectives to relevant lab activities. This text is designed to be used in conjunction with MCSE Guide to Planning a Microsoft Windows Server 2003 Network (0-619-12025-8).

Foundations of Security, Protocols, and Equational Reasoning: Essays Dedicated to Catherine A. Meadows (Lecture Notes in Computer Science #11565)

by Joshua D. Guttman Carl E. Landwehr José Meseguer Dusko Pavlovic

This Festschrift volume is published in honor of Catherine A. Meadows and contains essays presented at the Catherine Meadows Festschrift Symposium held in Fredericksburg, VA, USA, in May 2019.Catherine A. Meadows has been a pioneer in developing symbolic formal verification methods and tools. Her NRL Protocol Analyzer, a tool and methodology that embodies symbolic model checking techniques, has been fruitfully applied to the analysis of many protocols and protocol standards and has had an enormous influence in the field. She also developed a new temporal logic to specify protocol properties, as well as new methods for analyzing various kinds of properties beyond secrecy such as authentication and resilience under Denial of Service (DoS) attacks and has made important contributions in other areas such as wireless protocol security, intrusion detection, and the relationship between computational and symbolic approaches to cryptography. This volume contains 14 contributions authored by researchers from Europe and North America. They reflect on the long-term evolution and future prospects of research in cryptographic protocol specification and verification.

Introduction to Computation and Programming Using Python

by John V. Guttag

This book introduces students with little or no prior programming experience to the art of computational problem solving using Python and various Python libraries, including PyLab. It provides students with skills that will enable them to make productive use of computational techniques, including some of the tools and techniques of "data science" for using computation to model and interpret data. The book is based on an MIT course (which became the most popular course offered through MIT's OpenCourseWare) and was developed for use not only in a conventional classroom but in a massive open online course (or MOOC) offered by the pioneering MIT-Harvard collaboration edX.Students are introduced to Python and the basics of programming in the context of such computational concepts and techniques as exhaustive enumeration, bisection search, and efficient approximation algorithms. The book does not require knowledge of mathematics beyond high school algebra, but does assume that readers are comfortable with rigorous thinking and not intimidated by mathematical concepts. Although it covers such traditional topics as computational complexity and simple algorithms, the book focuses on a wide range of topics not found in most introductory texts, including information visualization, simulations to model randomness, computational techniques to understand data, and statistical techniques that inform (and misinform) as well as two related but relatively advanced topics: optimization problems and dynamic programming. Introduction to Computation and Programming Using Python can serve as a stepping-stone to more advanced computer science courses, or as a basic grounding in computational problem solving for students in other disciplines.

Introduction to Computation and Programming Using Python: With Application to Understanding Data

by John V. Guttag

This book introduces students with little or no prior programming experience to the art of computational problem solving using Python and various Python libraries, including PyLab. It provides students with skills that will enable them to make productive use of computational techniques, including some of the tools and techniques of data science for using computation to model and interpret data. The book is based on an MIT course (which became the most popular course offered through MIT's OpenCourseWare) and was developed for use not only in a conventional classroom but in in a massive open online course (MOOC). This new edition has been updated for Python 3, reorganized to make it easier to use for courses that cover only a subset of the material, and offers additional material including five new chapters.Students are introduced to Python and the basics of programming in the context of such computational concepts and techniques as exhaustive enumeration, bisection search, and efficient approximation algorithms. Although it covers such traditional topics as computational complexity and simple algorithms, the book focuses on a wide range of topics not found in most introductory texts, including information visualization, simulations to model randomness, computational techniques to understand data, and statistical techniques that inform (and misinform) as well as two related but relatively advanced topics: optimization problems and dynamic programming. This edition offers expanded material on statistics and machine learning and new chapters on Frequentist and Bayesian statistics.

Introduction to Computation and Programming Using Python

by John V. Guttag

This book introduces students with little or no prior programming experience to the art of computational problem solving using Python and various Python libraries, including PyLab. It provides students with skills that will enable them to make productive use of computational techniques, including some of the tools and techniques of "data science" for using computation to model and interpret data. The book is based on an MIT course (which became the most popular course offered through MITs OpenCourseWare) and was developed for use not only in a conventional classroom but in in a massive open online course (or MOOC) offered by the pioneering MIT--Harvard collaboration edX. Students are introduced to Python and the basics of programming in the context of such computational concepts and techniques as exhaustive enumeration, bisection search, and efficient approximation algorithms. The book does not require knowledge of mathematics beyond high school algebra, but does assume that readers are comfortable with rigorous thinking and not intimidated by mathematical concepts. Although it covers such traditional topics as computational complexity and simple algorithms, the book focuses on a wide range of topics not found in most introductory texts, including information visualization, simulations to model randomness, computational techniques to understand data, and statistical techniques that inform (and misinform) as well as two related but relatively advanced topics: optimization problems and dynamic programming. "Introduction to Computation and Programming Using Python" can serve as a stepping-stone to more advanced computer science courses, or as a basic grounding in computational problem solving for students in other disciplines.

Introduction to Computation and Programming Using Python, revised and expanded edition: With Application To Understanding Data

by John V. Guttag

An introductory text that teaches students the art of computational problem solving, covering topics that range from simple algorithms to information visualization.This book introduces students with little or no prior programming experience to the art of computational problem solving using Python and various Python libraries, including PyLab. It provides students with skills that will enable them to make productive use of computational techniques, including some of the tools and techniques of “data science” for using computation to model and interpret data. The book is based on an MIT course (which became the most popular course offered through MIT's OpenCourseWare) and was developed for use not only in a conventional classroom but in a massive open online course (or MOOC) offered by the pioneering MIT-Harvard collaboration edX.Students are introduced to Python and the basics of programming in the context of such computational concepts and techniques as exhaustive enumeration, bisection search, and efficient approximation algorithms. The book does not require knowledge of mathematics beyond high school algebra, but does assume that readers are comfortable with rigorous thinking and not intimidated by mathematical concepts. Although it covers such traditional topics as computational complexity and simple algorithms, the book focuses on a wide range of topics not found in most introductory texts, including information visualization, simulations to model randomness, computational techniques to understand data, and statistical techniques that inform (and misinform) as well as two related but relatively advanced topics: optimization problems and dynamic programming.Introduction to Computation and Programming Using Python can serve as a stepping-stone to more advanced computer science courses, or as a basic grounding in computational problem solving for students in other disciplines.

Introduction to Computation and Programming Using Python, second edition: With Application to Understanding Data (The\mit Press Ser.)

by John V. Guttag

The new edition of an introductory text that teaches students the art of computational problem solving, covering topics ranging from simple algorithms to information visualization.This book introduces students with little or no prior programming experience to the art of computational problem solving using Python and various Python libraries, including PyLab. It provides students with skills that will enable them to make productive use of computational techniques, including some of the tools and techniques of data science for using computation to model and interpret data. The book is based on an MIT course (which became the most popular course offered through MIT's OpenCourseWare) and was developed for use not only in a conventional classroom but in in a massive open online course (MOOC). This new edition has been updated for Python 3, reorganized to make it easier to use for courses that cover only a subset of the material, and offers additional material including five new chapters.Students are introduced to Python and the basics of programming in the context of such computational concepts and techniques as exhaustive enumeration, bisection search, and efficient approximation algorithms. Although it covers such traditional topics as computational complexity and simple algorithms, the book focuses on a wide range of topics not found in most introductory texts, including information visualization, simulations to model randomness, computational techniques to understand data, and statistical techniques that inform (and misinform) as well as two related but relatively advanced topics: optimization problems and dynamic programming. This edition offers expanded material on statistics and machine learning and new chapters on Frequentist and Bayesian statistics.

Introduction to Computation and Programming Using Python, third edition: With Application to Computational Modeling and Understanding Data

by John V. Guttag

The new edition of an introduction to the art of computational problem solving using Python.This book introduces students with little or no prior programming experience to the art of computational problem solving using Python and various Python libraries, including numpy, matplotlib, random, pandas, and sklearn. It provides students with skills that will enable them to make productive use of computational techniques, including some of the tools and techniques of data science for using computation to model and interpret data as well as substantial material on machine learning. All of the code in the book and an errata sheet are available on the book&’s web page on the MIT Press website.

The Trump Presidency, Journalism, and Democracy (Routledge Research in Journalism)

by Robert E. Gutsche Jr.

This book examines the disruptive nature of Trump news – both the news his administration makes and the coverage of it – related to dominant paradigms and ideologies of U.S. journalism. By relying on conceptualizations of media memory and "othering" through news coverage that enhances socio-conservative positions on issues such as immigration, the book positions this moment in a time of contestation. Contributors ranging from scholars, professionals, and media critics operate in unison to analyze today’s interconnected challenges to traditional practices within media spheres posed by Trump news. The outcomes should resonate with citizens who rely on journalism for civic engagement and who are active in social change

Customizing ASP.NET Core 5.0: Turn the right screws in ASP.NET Core to get the most out of the framework

by Jurgen Gutsch Damien Bowden

A guide to discovering the hidden behaviors of ASP.NET Core that can be customized to optimize your .NET 5 applicationsKey FeaturesCustomize the default behavior of ASP.NET Core to get the most out of the frameworkEnhance the app configuration, change the default dependency injection, and build your own tag helpersDiscover best practices for configuring ASP.NET Core, from user interface design to hosting it on platformsBook DescriptionASP.NET Core is the most powerful Microsoft web framework. Although it's full of rich features, sometimes the default configurations can be a bottleneck and need to be customized to suit the nature and scale of your app. If you're an intermediate-level .NET developer who wants to extend .NET Core to multiple use cases, it's important to customize these features so that the framework works for you effectively. Customizing ASP.NET Core 5.0 covers core features that can be customized for developing optimized apps. The customization techniques are also updated to work with the latest .NET 5 framework. You'll learn essential concepts relating to optimizing the framework such as configuration, dependency injection, routing, action filters, and more. As you progress, you'll be able to create custom solutions that meet the needs of your use case with ASP.NET Core. Later chapters will cover expert techniques and best practices for using the framework for your app development needs, from UI design to hosting. Finally, you'll focus on the new endpoint routing in ASP.NET Core to build custom endpoints and add third-party endpoints to your web apps for processing requests faster. By the end of this application development book, you'll have the skills you need to be able to customize ASP.NET Core to develop robust optimized apps.What you will learnExplore various application configurations and providers in ASP.NET Core 5Understand dependency injection in .NET and learn how to add third-party DI containersDiscover the concept of middleware and write your own middleware for ASP.NET Core appsCreate various API output formats in your API-driven projectsGet familiar with different hosting models for your ASP.NET Core appDevelop custom routing endpoints and add third-party endpointsConfigure WebHostBuilder effectively for your web applicationsWho this book is forThis .NET 5 book is for .NET developers who need to change the default behaviors of the framework to help improve the performance of their applications. Intermediate-level knowledge of ASP.NET Core and C# is required before getting started with the book.

Refine Search

Showing 36,001 through 36,025 of 54,475 results