Browse Results

Showing 39,701 through 39,725 of 54,480 results

Place and Politics in Latin American Digital Culture: Location and Latin American Net Art (Routledge Studies in New Media and Cyberculture #20)

by Claire Taylor

This volume explores one of the central issues that has been debated in internet studies in recent years: locality, and the extent to which cultural production online can be embedded in a specific place. The particular focus of the book is on the practices of net artists in Latin America, and how their work interrogates some of the central place-based concerns of Latin(o) American identity through their on- and offline cultural practice. Six particular works by artists of different countries in Latin America and within Latina/o communities in the US are studied in detail, with one each from Uruguay, Chile, Argentina, Colombia, the US-Mexico border, and the US. Each chapter explores how each artist represents place in their works, and, in particular how traditional place-based affiliations, or notions of territorial identity, end up reproduced, re-affirmed, or even transformed online. At the same time, the book explores how these net.artists make use of new media technologies to express alternative viewpoints about the locations they represent, and use the internet as a space for the recuperation of cultural memory.

Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine

by Xiaoyu Ruan

Platform Embedded Security Technology Revealed is an in-depth introduction to Intel s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applications secrets and users privacy in a secure, light-weight, and inexpensive way. Besides native built-in features, it allows third-party software vendors to develop applications that take advantage of the security infrastructures offered by the engine. Intel s security and management engine is technologically unique and significant, but is largely unknown to many members of the tech communities who could potentially benefit from it. Platform Embedded Security Technology Revealed reveals technical details of the engine. The engine provides a new way for the computer security industry to resolve critical problems resulting from booming mobile technologies, such as increasing threats against confidentiality and privacy. This book describes how this advanced level of protection is made possible by the engine, how it can improve users security experience, and how third-party vendors can make use of it. It's written for computer security professionals and researchers; embedded system engineers; and software engineers and vendors who are interested in developing new security applications on top of Intel s security and management engine. It s also written for advanced users who are interested in understanding how the security features of Intel s platforms work. What you'll learn The cyber security challenges behind the creation of the embedded security and management engine, and the solutions it presentsThe pros and cons of enforcing security in the embedded engine Basic cryptography and security infrastructure of the engineSecurity-hardening features of the engineHandling dynamically loaded applicationsHow anonymous authentication works with enhanced privacy protectionContent protection at the hardware levelSecure boot with a hardware root of trustFirmware-based TPMIdentity protection with a hardware-based, one-time password Who this book is for Computer security professionals and researchers; embedded system engineers; software engineers and vendors who are interested in developing new security applications on top of Intel s security and management engine; OEM (such as Lenovo, HP, etc. ) marketing and R&D staff. Table of Contents Cyber Security in the Mobile Age Intel s Embedded Solutions: from Management to Security Building Blocks of the Security and Management Engine The Engine: Safeguarding Itself before Safeguarding Others Your Privacy at the Next Level with Intel's Enhanced Privacy Identification (EPID) Technology Boot with Integrity, or Don t Boot Trust Computing, Backed by Intel's Firmware-Based TPMUnleashing Premium Entertainment with Hardware-Based Content Protection Technology Breaking the Boundaries with Dynamically Loaded Applications Intel Identity Protection Technology: the Robust, Convenient, and Cost-Effective Way to Deter Identity TheftLooking Ahead: Tomorrow's Innovations Built on Today's Foundation "

Play for Java

by Nicolas Leroux Sietse de Kaper

SummaryPlay for Java shows you how to build Java-based web applications using the Play 2 framework. The book starts by introducing Play through a comprehensive overview example. Then, you'll look at each facet of a typical Play application, both by exploring simple code snippets and by adding to a larger running example. Along the way, you'll contrast Play and JEE patterns and learn how a stateless web application can fit seamlessly in an enterprise environment.About the BookFor a Java developer, the Play web application framework is a breath of fresh air. With Play you get the power of Scala's strong type system and functional programming model, and a rock-solid Java API that makes it a snap to create stateless, event-driven, browser-based applications ready to deploy against your existing infrastructure.Play for Java teaches you to build Java-based web applications using Play 2. This book starts with an overview example and then explores each facet of a typical application by discussing simple snippets as they are added to a larger example. Along the way, you'll contrast Play and JEE patterns and learn how a stateless web application can fit seamlessly in an enterprise Java environment. You'll also learn how to develop asynchronous and reactive web applications.The book requires a background in Java. No knowledge of Play or of Scala is assumed.Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.What's InsideBuild Play 2 applications using JavaLeverage your JEE skillsWork in an asynchronous waySecure and test your Play applicationAbout the AuthorsNicolas Leroux is a core developer of the Play framework. Sietse de Kaper develops and deploys Java-based Play applications.Table of ContentsPART 1 INTRODUCTION AND FIRST STEPSAn introduction to PlayThe parts of an applicationA basic CRUD applicationPART 2 CORE FUNCTIONALITYAn enterprise app, Play-styleControllers—handling HTTP requestsHandling user inputModels and persistenceProducing output with view templatesPART 3 ADVANCED TOPICSAsynchronous dataSecurityModules and deploymentTesting your application

Play for Scala: Covers Play 2

by Peter Hilton Erik Bakker

SummaryPlay for Scala shows you how to build Scala-based web applications using the Play 2 framework. This book starts by introducing Play through a comprehensive overview example. Then, you'll look at each facet of a typical Play application both by exploring simple code snippets and by adding to a larger running example. Along the way, you'll deepen your knowledge of Scala as a programming language and work with tools like Akka.About this BookPlay is a Scala web framework with built-in advantages: Scala's strong type system helps deliver bug-free code, and the Akka framework helps achieve hassle-free concurrency and peak performance. Play builds on the web's stateless nature for excellent scalability, and because it is event-based and nonblocking, you'll find it to be great for near real-time applications.Play for Scala teaches you to build Scala-based web applications using Play 2. It gets you going with a comprehensive overview example. It then explores each facet of a typical Play application by walking through sample code snippets and adding features to a running example. Along the way, you'll deepen your knowledge of Scala and learn to work with tools like Akka.Written for readers familiar with Scala and web-based application architectures. No knowledge of Play is assumed.Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.What's InsideIntro to Play 2Play's MVC structureMastering Scala templates and formsPersisting data and using web servicesUsing Play's advanced featuresAbout the AuthorsPeter Hiltonv, Erik Bakker, and Francisco Canedo, are engineers at Lunatech, a consultancy with Scala and Play expertise. They are contributors to the Play framework.Table of ContentsPART 1: GETTING STARTED Introduction to PlayYour first Play applicationPART 2: CORE FUNCTIONALITYDeconstructing Play application architectureDefining the application's HTTP interfaceStoring data—the persistence layerBuilding a user interface with view templatesValidating and processing input with the forms APIPART 3: ADVANCED CONCEPTSBuilding a single-page JavaScript application with JSONPlay and moreWeb services, iteratees, and WebSockets

Play Framework Essentials

by Julien Richard-Foy

This book targets Java and Scala developers who already have some experience in web development and who want to master Play framework quickly and efficiently. This book assumes you have a good level of knowledge and understanding of efficient Java and Scala code.

Playful User Interfaces

by Anton Nijholt

The book is about user interfaces to applications that have been designed for social and physical interaction. The interfaces are 'playful', that is, users feel challenged to engage in social and physical interaction because that will be fun. The topics that will be present in this book are interactive playgrounds, urban games using mobiles, sensor-equipped environments for playing, child-computer interaction, tangible game interfaces, interactive tabletop technology and applications, full-body interaction, exertion games, persuasion, engagement, evaluation and user experience. Readers of the book will not only get a survey of state-of-the-art research in these areas, but the chapters in this book will also provide a vision of the future where playful interfaces will be ubiquitous, that is, present and integrated in home, office, recreational, sports and urban environments, emphasizing that in the future in these environments game elements will be integrated and welcomed.

Playful User Interfaces: Interfaces that Invite Social and Physical Interaction (Gaming Media and Social Effects)

by Anton Nijholt

The book is about user interfaces to applications that have been designed for social and physical interaction. The interfaces are ‘playful’, that is, users feel challenged to engage in social and physical interaction because that will be fun. The topics that will be present in this book are interactive playgrounds, urban games using mobiles, sensor-equipped environments for playing, child-computer interaction, tangible game interfaces, interactive tabletop technology and applications, full-body interaction, exertion games, persuasion, engagement, evaluation and user experience. Readers of the book will not only get a survey of state-of-the-art research in these areas, but the chapters in this book will also provide a vision of the future where playful interfaces will be ubiquitous, that is, present and integrated in home, office, recreational, sports and urban environments, emphasizing that in the future in these environments game elements will be integrated and welcomed.

Playing with Religion in Digital Games

by Gregory P. Grieve Heidi A. Campbell

Shaman, paragon, God-mode: modern video games are heavily coded with religious undertones. From the Shinto-inspired Japanese video game Okami to the internationally popular The Legend of Zelda and Halo, many video games rely on religious themes and symbols to drive the narrative and frame the storyline. Playing with Religion in Digital Games explores the increasingly complex relationship between gaming and global religious practices. For example, how does religion help organize the communities in MMORPGs such as World of Warcraft? What role has censorship played in localizing games like Actraiser in the western world? How do evangelical Christians react to violence, gore, and sexuality in some of the most popular games such as Mass Effect or Grand Theft Auto? With contributions by scholars and gamers from all over the world, this collection offers a unique perspective to the intersections of religion and the virtual world.

PMP Exam Challenge!: 600 Mind-bending, Thought-provoking Questions For Pmp Exam Preparation (Esi International Project Management Ser. #15)

by J. LeRoy Ward Ginger Levin

Preparing for and passing the PMP(R) exam is no small feat. Although the number of certified PMP(R)s continues at a phenomenal rate, the exam failure rate remains uncommonly high. PMP(R) Exam Challenge! is designed to help you pass the exam by giving you an easy-to-use, highly portable publication, containing key relevant topics you are certain to

The Pocket Lawyer for Comic Book Creators: A Legal Toolkit for Comic Book Artists and Writers

by Thomas A. Crowell, Esq.

Focal Press' Pocket Lawyer series serves as a legal toolkit for independent producers and artists in the creative industries. The Pocket Lawyer for Comic Book Creators is designed to help emerging artists and veteran professionals in the comic book industry build a solid foundation of business and communication practices that they need to thrive in today's ever-changing, uncertain world of indie comics. Readers will learn to protect their copyrights, negotiate publishing deals, hire artists so everyone wins, and learn the ins and outs of key contracts with this helpful resource.

Poison! (Freestylers: Data Beast #3)

by Andrew Fusek Peters

A short thriller that's high on suspense! This is a perfect page turner if you want to finish a story in one sitting, especially for reluctant and struggling readers. Cool, edgy computer hackers, Kiran and Ros are teens on a mission to fight crime and injustice with the help of a shape-shifting data beast they've created.In Poison!, Kiran and Roz set out to prove that a chemical company is polluting the river near their school and the poisoning the fish that live in it. With the help of the data beast they attempt to bring the murky activities into the light - and the beast goes on a dangerous mission to save the threatened fish.Reading level for this book:-ATOS: 2.6Lexile ® Measure: 360LBook Band: 11 Lime

Policing Digital Crime

by Sarah Bryant Robin Bryant

By its very nature digital crime may present a number of specific detection and investigative challenges. The use of steganography to hide child abuse images for example, can pose the kind of technical and legislative problems inconceivable just two decades ago. The volatile nature of much digital evidence can also pose problems, particularly in terms of the actions of the 'first officer on the scene'. There are also concerns over the depth of understanding that 'generic' police investigators may have concerning the possible value (or even existence) of digitally based evidence. Furthermore, although it is perhaps a cliché to claim that digital crime (and cybercrime in particular) respects no national boundaries, it is certainly the case that a significant proportion of investigations are likely to involve multinational cooperation, with all the complexities that follow from this. This groundbreaking volume offers a theoretical perspective on the policing of digital crime in the western world. Using numerous case-study examples to illustrate the theoretical material introduced this volume examine the organisational context for policing digital crime as well as crime prevention and detection. This work is a must-read for all academics, police practitioners and investigators working in the field of digital crime.

Political Communication Cultures in Europe

by Barbara Pfetsch

This book offers new and compelling insight into the orientations that shape the cultures of political communication in nine Western democracies. It is a truly comparative account of the views of 2500 political elites and media elites between Helsinki and Madrid on their relationship and their exchanges.

Politicians, Personal Image and the Construction of Political Identity: A Comparative Study of the UK and Italy

by Cristina Archetti

Is the media obsession with image leading to a degeneration of politics? Are politicians more concerned with their appearances than with policy substance? Through the evidence provided by over 50 interviews with politicians across the UK and Italy - local councillors, MPs and MEPs - this book provides a very different picture of the world of politics than the one we often cynically imagine. By relying on extensive excerpts from frank and colorful conversations with the interviewees, the analysis develops a new multidisciplinary model to understand the 'mediatization' of politics and the way the personal image of elected representatives is constructed in the age of interconnectedness.

Portrait Pro

by Jeff Smith

Droves of hobbyist photographers make a move to professional photography every year. They read a few books, watch rock star photographers shoot online, make business cards, and forge their path to a new career. When they book clients, work through the session, proof their images, and conduct a sales session, though, they encounter artistic, organizational, and financial problems they had not anticipated, and many stall out.In this book, Jeff Smith focuses on finding an audience and a target demographic, honing your posing and lighting skills, working with clients, and managing business and personnel concerns.Smith begins by taking a close look at the mind-set required for forging ahead as a professional photographer. He shows you how to define and target the clientele you want to work with and teaches you skillful approaches for creating and maintaining a strong photographer-client relationship. He notes that many photographers enter the business to create images that please them and explains that to be successful, photographers must instead learn to gain insight into just what the client wants to see in the final photos in order to maximize profits and keep clients coming back for more.With a clearly defined objective and approach outlines, Smith moves on to tackle common technical issues that new pros find daunting. He provides tips for creating perfect lighting in the studio and outdoors. He also discusses positioning for every part of the body, to create an ideal presentation to the camera. Next, he provides compositional tips-from where to position the subject in the frame, to selecting the best camera angle, to cropping for impact-in order to maximize image impact and present the best-possible image to your client.Finally, with the technical and artistic fields addressed, Smith turns to a discussion on the business side of the profession. He offers advice on acquiring equipment, understanding costs and pricing, creating new business opportunities, identifying an ideal studio location, and even managing your time.

The Positive Case for Negative Campaigning

by Kyle Mattes David P. Redlawsk

Turn on the television or sign in to social media during election season and chances are you’ll see plenty of negative campaigning. For decades, conventional wisdom has held that Americans hate negativity in political advertising, and some have even argued that its pervasiveness in recent seasons has helped to drive down voter turnout. Arguing against this commonly held view, Kyle Mattes and David P. Redlawsk show not only that some negativity is accepted by voters as part of the political process, but that negative advertising is necessary to convey valuable information that would not otherwise be revealed. The most comprehensive treatment of negative campaigning to date, The Positive Case for Negative Campaigning uses models, surveys, and experiments to show that much of the seeming dislike of negative campaigning can be explained by the way survey questions have been worded. By failing to distinguish between baseless and credible attacks, surveys fail to capture differences in voters’ receptivity. Voters’ responses, the authors argue, vary greatly and can be better explained by the content and believability of the ads than by whether the ads are negative. Mattes and Redlawsk continue on to establish how voters make use of negative information and why it is necessary. Many voters are politically naïve and unlikely to make inferences about candidates’ positions or traits, so the ability of candidates to go on the attack and focus explicitly on information that would not otherwise be available is crucial to voter education.

Positive Computing: Technology for Wellbeing and Human Potential

by Rafael A. Calvo Dorian Peters

A case for building a digital environment that can make us happier and healthier, not just more productive, and a theoretical framework for doing so.On the eve of Google's IPO in 2004, Larry Page and Sergey Brin vowed not to be evil. Today, a growing number of technologists would go further, trying to ensure that their work actively improves people's lives. Technology, so pervasive and ubiquitous, has the capacity to increase stress and suffering; but it also has the less-heralded potential to improve the well-being of individuals, society, and the planet. In this book, Rafael Calvo and Dorian Peters investigate what they term “positive computing”—the design and development of technology to support psychological well-being and human potential. Calvo and Peters explain that technologists' growing interest in social good is part of a larger public concern about how our digital experience affects our emotions and our quality of life—which itself reflects an emerging focus on humanistic values in many different disciplines. Synthesizing theory, knowledge, and empirical methodologies from a variety of fields, they offer a rigorous and coherent foundational framework for positive computing. Sidebars by experts from psychology, neuroscience, human–computer interaction, and other disciplines supply essential context. Calvo and Peters examine specific well-being factors, including positive emotions, self-awareness, mindfulness, empathy, and compassion, and explore how technology can support these factors. Finally, they offer suggestions for future research and funding.SidebarsTimothy N. Bickmore, Jeremy Bailenson, danah boyd, Jane Burns, David R. Caruso, Mihaly Csikszentmihalyi, Felicia Huppert, Mary-Helen Immordino-Yang, Adele Krusche and J. Mark G. Williams, Jane McGonigal, Jonathan Nicholas, Don Norman, Yvonne Rogers

Post-Optimal Analysis in Linear Semi-Infinite Optimization

by Miguel A. Goberna Marco A. López

Post-Optimal Analysis in Linear Semi-Infinite Optimization examines the following topics in regards to linear semi-infinite optimization: modeling uncertainty, qualitative stability analysis, quantitative stability analysis and sensitivity analysis. Linear semi-infinite optimization (LSIO) deals with linear optimization problems where the dimension of the decision space or the number of constraints is infinite. The authors compare the post-optimal analysis with alternative approaches to uncertain LSIO problems and provide readers with criteria to choose the best way to model a given uncertain LSIO problem depending on the nature and quality of the data along with the available software. This work also contains open problems which readers will find intriguing a challenging. Post-Optimal Analysis in Linear Semi-Infinite Optimization is aimed toward researchers, graduate and post-graduate students of mathematics interested in optimization, parametric optimization and related topics.

PostGIS Cookbook

by Bborie Park Paolo Corti Stephen Vincent Mather Thomas J. Kraft

An easy-to-use guide, full of hands-on recipes for manipulating spatial data in a PostGIS database. Each topic is explained and placed in context, and for the more inquisitive, there are more details of the concepts used. If you are a web developer or a software architect, especially in location-based companies, and want to expand the range of techniques you are using with PostGIS, then this book is for you. You should have some prior experience with PostgreSQL database and spatial concepts.

PostgreSQL 9 High Availability Cookbook

by Shaun M. Thomas

A comprehensive series of dependable recipes to design, build, and implement a PostgreSQL server architecture free of common pitfalls that can operate for years to come. Each chapter is packed with instructions and examples to simplify even highly complex database operations. If you are a PostgreSQL DBA working on Linux systems who want a database that never gives up, this book is for you. If you've ever experienced a database outage, restored from a backup, spent hours trying to repair a malfunctioning cluster, or simply want to guarantee system stability, this book is definitely for you.

PostgreSQL Administration Essentials

by Hans-Jurgen Schonig

If you are a database administrator who needs to get to grips with PostgreSQL quickly and efficiently, then this book is for you. This book will also be highly beneficial if you are a project leader or a developer who is interested in knowing more about database systems or bottleneck detection, as it will enable you to work more closely and cooperatively with your administrators.

Postsecondary Play: The Role of Games and Social Media in Higher Education (Tech.edu: A Hopkins Series on Education and Technology)

by William G. Tierney, Zoë B. Corwin, Tracy Fullerton and Gisele Ragusa

Games and social media can improve college access, attract and support students, and boost rates of completion.The college application process—which entails multiple forms, essays, test scores, and deadlines—can be intimidating. For students without substantial school and family support, the complexity of this process can become a barrier to access. William G. Tierney, Tracy Fullerton, and their teams at the University of Southern California approach this challenge innovatively. Using the tools of online games and social media, they have developed ways to make applying for college much less intimidating.While the vast majority of college students use social media and gaming in their everyday lives, colleges and universities have been slow to recognize and harness the power of either. Postsecondary Play explores the significance of games and social media in higher education, and particularly how they can be used to attract, retain, educate, and socialize students.Tierney, a past president of the American Educational Research Association, has gathered some of the best research on the emerging role of games and social media in the classroom and how these tools can boost student confidence and increase college access. Scholars writing from a wide variety of disciplines—college access, social media, game studies, and learning sciences—provide concrete examples to illustrate the new and complex ways in which students learn in response to social media and games. Tierney and the contributors find that, although games can be powerful tools for encouraging underserved students, quality game design and mastering the concept of play—the ability to develop skills while engaging in the game—are essential in the effective use of serious games in teaching and learning.Summarizing a decade of research in game design and learning, Postsecondary Play will appeal to higher education scholars and students of learning, online gaming, education, and the media.

Power Query for Power BI and Excel

by Chris Webb

Power Query for Power BI and Excel is a book for people who are tired of copying and pasting data into Excel worksheets. Power Query, part of the Microsoft Power BI suite, is a tool that automates the process of getting data into Excel and will save you hours of dull, repetitive, and error-prone work! Power Query makes it easy to extract data from many different data sources, filter that data, aggregate it, clean it and perform calculations on it, finally loading that data into either your worksheet or directly into the new Excel 2013 Data Model used by Power Pivot. This concise, practical book provides a complete guide to Power Query and how to use it to solve all of your Excel data-loading problems. Power Query for Power BI and Excel goes well beyond the surface of what Power Query can do. The book goes deep into the underlying M language, showing you how to do amazing things that aren't going to be possible from just the GUI interface that is covered in most other books. You'll have full command of the GUI, and you'll be able to drop into the M language to go beyond what the GUI provides. The depth in this book makes it a must-have item for anyone who is pushing Power BI and Excel to their limits in the pursuit of business intelligence from data analysis. Teaches the basics of using Power Query to load data into Excel Helps you solve common, data-related problems with Power Query Shows how to write your own solutions in the powerful M language What you'll learn Import data from sources including relational databases, text files, web pages, and Excel workbooks. Import from more exotic sources such as Facebook, Windows Azure Marketplace, Wikipedia, and OData feeds within and outside your organization. Build repeatable processes to filter, clean, aggregate, and transform your data. Load your data into an Excel table or directly into the Excel 2013 Data Model. Write complex expressions in Power Query's M expression language. Share queries and their data with other users in your organization. Position your data for further analysis using Power View, Power Map, Power Pivot, and the rest of Microsoft's Power BI suite. Who this book is for Power Query for Power BI and Excel is aimed at serious Excel and Power BI users who need to import data into a worksheet. Whether you are an analyst, report writer, business intelligence consultant, or just "that guy" whose job it is to prepare the monthly sales dashboard, you'll learn how Power Query can make your life easier. Power Query for Power BI and Excel is especially important for Excel and BI power users who want to work directly in the M language that underlies all of Power Query's functionality. Table of Contents Power Query and When to Use It Data Sources Transformations Tables and the Excel Data Model Expressions in the M Language Multiple Data Sources Power BI and Sharing Common Problems Solved

PowerFactory Applications for Power System Analysis

by Francisco M. Gonzalez-Longatt José Luis Rueda

This book presents a comprehensive set of guidelines and applications of DIgSILENT PowerFactory, an advanced power system simulation software package, for different types of power systems studies. Written by specialists in the field, it combines expertise and years of experience in the use of DIgSILENT PowerFactory with a deep understanding of power systems analysis. These complementary approaches therefore provide a fresh perspective on how to model, simulate and analyse power systems. It presents methodological approaches for modelling of system components, including both classical and non-conventional devices used in generation, transmission and distribution systems, discussing relevant assumptions and implications on performance assessment. This background is complemented with several guidelines for advanced use of DSL and DPL languages as well as for interfacing with other software packages, which is of great value for creating and performing different types of steady-state and dynamic performance simulation analysis. All employed test case studies are provided as supporting material to the reader to ease recreation of all examples presented in the book as well as to facilitate their use in other cases related to planning and operation studies. Providing an invaluable resource for the formal instruction of power system undergraduate/postgraduate students, this book is also a useful reference for engineers working in power system operation and planning.

PowerShell Troubleshooting Guide

by Michael Shepard

Windows PowerShell provides an amazing platform for administrative scripting and automation. Understanding the PowerShell language will enable you to spend less time troubleshooting and be more effective when debugging is required. PowerShell also includes several avenues to provide feedback from your code that will make your troubleshooting and debugging time more profitable.</p><p>Improved coding practices combined with useful diagnostic information can lead to results quickly. This book starts with background information on the purposes of automation and PowerShell's entrance into Microsoft's automation strategy, and also answers the question of whether scripting (and specifically PowerShell scripting) is essentially different than traditional programming. A brief overview of the main features of the PowerShell language along with examples is provided. Focus is placed on proper script design and use of PowerShell features in an attempt to reduce the need for troubleshooting.

Refine Search

Showing 39,701 through 39,725 of 54,480 results