Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Best of 2016 Recommended by Editor Recommended by Reviewer Recommended by Reader
Search
Reviewers have found these items notable and have self-selected them for review.
 
Options:
 
  1-10 of 7537 results Date Reviewed  
  Phishing and communication channels: a guide to identifying and mitigating phishing attacks
Sonowal G., Apress, New York, NY, 2021. 240 pp.  Type: Book (978-1-484277-43-0)

It is not far-fetched to say that most (if not all) CR readers have been subjected to some sort of phishing attack--and even more likely if we consider the wide taxonomy of activities that Sonowal’s book covers. Can we as individ...

Jan 12 2023  
  Learn enough developer tools to be dangerous: command line, text editor, and Git version control essentials
Hartl M., Pearson, Hoboken, NJ, 2022. 368 pp.  Type: Book (978-0-137843-45-9)

The command-line interface (CLI) scares many newcomers to the computing field. It is, however, a most powerful way to interact with the computer, allowing the user a command composition richness that cannot be matched via graphical interfaces. As ...

Jan 10 2023  
  Machine learning: the basics
Jung A., Springer International Publishing, Cham, Switzerland, 2022. 229 pp.  Type: Book (978-9-811681-92-9)

As the old saying goes, “don’t judge a book by its cover.” This review will affirm that statement. The book covers the many aspects of machine learning, but it does so in a very terse manner. This is a large area of research and ...

Dec 19 2022  
  Mining the semantic web
Rettinger A., Lösch U., Tresp V., D’Amato C., Fanizzi N. Data Mining and Knowledge Discovery 24(3): 613-662, 2020.  Type: Article

The semantic version of the World Wide Web (WWW), the semantic web, allows for formal reasoning and querying. It has two components: formal ontologies, which provide domain-specific knowledge, and annotations of web resources, which can be read ...

Nov 25 2022  
  Survey on mining subjective data on the web
Tsytsarau M., Palpanas T. Data Mining and Knowledge Discovery 24(3): 478-514, 2012.  Type: Article

When accessing information on the web, users not only consume the information but also comment on and actively annotate the content, which then generates new content and can also provide ratings. People express themselves on the web through blogs,...

Nov 16 2022  
  Functional interfaces in Java: fundamentals and examples
Lecessi R., Apress, New York, NY, 2019. 428 pp.  Type: Book (978-1-484242-77-3)

Functional programming is a programming paradigm that emphasizes the use of functions to break down a problem into subtasks. Everything is done with functions, and the building blocks are just functions. This is in contrast to other paradigms, suc...

Sep 27 2022  
   Clean craftsmanship: disciplines, standards, and ethics
Martin R., Pearson, Columbus, OH, 2021. 416 pp.  Type: Book (978-0-136915-71-3), Reviews: (2 of 2)

At first, computer programming was reserved for highly skilled people. Over the decades, programming languages have become more and more user friendly, making them accessible to more people. Nowadays, several countries around the world are general...

Sep 21 2022  
   Big data 2.0 processing systems
Sakr S., Springer International Publishing, New York, NY, 2020. 164 pp.  Type: Book (978-3-030441-86-9)

This is a slightly expanded new edition of Sakr’s 2016 book. The first edition correctly assessed the trajectory of big data systems, including their initial success and future limits. This second edition adds a chapter on larg...

Aug 12 2022  
  Beginning C++20: from novice to professional
Horton I., Van Weert P., Apress, New York, NY, 2020. 853 pp.  Type: Book (978-1-484258-83-5)

With more pages than there are words in this review, it would be excessive to list all the concepts, techniques, and lessons taught in Beginning C++ 20. This is a beginner text for the programming language. It does not assume an...

Aug 9 2022  
   A survey on end-edge-cloud orchestrated network computing paradigms: transparent computing, mobile edge computing, fog computing, and cloudlet
Ren J., Zhang D., He S., Zhang Y., Li T. ACM Computing Surveys 52(6): 1-36, 2019.  Type: Article

Recognizing the limits of (distant) cloud computing, modern Internet of things (IoT) architectures recognize the so-called edge continuum between cloud applications and IoT devices and machines. “Continuum” implies ...

Jun 17 2022  
 
 
 
Display per page
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2023 ThinkLoud®
Terms of Use
| Privacy Policy