Browse All Reviews
Computer Systems Organization (C)
Computer-Communication Networks (C.2)
Network Architecture And Design (C.2.1)
> Internet (C.2.1...)
All Media Types
1-10 of 154 Reviews about "
Integrating serverless architecture: using Azure Functions, Cosmos DB, and SignalR Service
Vemula R., Apress, New York, NY, 2019. 456 pp. Type: Book (978-1-484244-88-3)
Integrating serverless architecture
covers how to build the Twitter bot application from scratch via a step-by-step method, including the basic installation software needed to achieve fundamental serverless computing. As the term “ser...
Aug 2 2021
How the Internet really works: an illustrated guide to protocols, privacy, censorship, and governance
ARTICLE 19 ., No Starch Press, San Francisco, CA, 2021. 120 pp. Type: Book (978-1-718500-29-7)
The authors have backgrounds in privacy, online anonymity, Internet freedom, human rights, and Internet governance, and this book is intended as “supplementary to a practice, such as in a workshop or a course, or for Internet policy practiti...
Mar 4 2021
Designing an Internet
Clark D., The MIT Press, Cambridge, MA, 2018. 432 pp. Type: Book (978-0-262038-60-7)
This comprehensive view of the development and growth of the Internet includes the author’s review and critique of the proposed changes and improvements since its inception. It has 15 chapters, an appendix, a list of acknowledgements, a glos...
Jan 28 2020
The code: Silicon Valley and the remaking of America
O’Mara M., Penguin Press, New York, NY, 2019. 512 pp. Type: Book (978-0-399562-18-1)
Whenever the word “technology” is mentioned, Silicon Valley comes to mind. This was not the case a few decades ago. So, what happened? Why Silicon Valley? This is the main topic of the book....
Jan 3 2020
The changing face of problematic Internet use: an interpersonal approach
Caplan S., Peter Lang International Academic Publishers, New York, NY, 2018. 250 pp. Type: Book (978-1-433130-50-2)
In this age of explosion with regards to Internet use and the derived social networks, as well as online media access, voices start to identify drawbacks and risks, as with any groundbreaking technology. These risks include breaches in privacy, di...
Oct 8 2019
World Internet development report 2017: translated by Peng Ping
Chinese Academy of Cyberspace Studies ., Springer International Publishing, New York, NY, 2019. 267 pp. Type: Book (978-3-662575-23-9)
That the Internet has caused the third biggest revolution in recent civilization is not unknown. However, what’s of importance is the fact that different nations of the world have progressed differently and that many are still catching up. T...
Aug 22 2019
How the Internet happened: from Netscape to the iPhone
McCullough B., W W Norton&Co Ltd, New York, NY, 2018. 400 pp. Type: Book (978-0-316435-37-6)
“You’ve come a long way, baby!” For those readers old enough to remember the Virginia Slims advertising campaign, which started in 1969, this phrase refers to the early days of the women’s liberation movement, highlighting ...
Jul 5 2019
Social interactions in virtual worlds: an interdisciplinary perspective
Lakkaraju K., Sukthankar G., Wigand R., Cambridge University Press, New York, NY, 2018. 452 pp. Type: Book (978-1-107128-82-8)
As the title implies, this book is a compilation of studies on how virtual worlds may have applications to the real world. The editors claim that readers will find data on how individuals and pairs behave within a game; what patterns of behavior e...
Mar 15 2019
Internet infrastructure: networking, web services, and cloud computing
Fox R., Hao W., CRC Press, Inc., Boca Raton, FL, 2018. 632 pp. Type: Book (978-1-138039-91-9)
Textbooks on computer networking theory abound, as do practitioner guides to the setup and administration of web servers and other Internet services. However, books that combine the two are less common. This text is an attempt to fill that niche. ...
Feb 8 2019
Where did I leave my keys?: Lessons from the Juniper dual EC incident
Checkoway S., Maskiewicz J., Garman C., Fried J., Cohney S., Green M., Heninger N., Weinmann R., Rescorla E., Shacham H. Communications of the ACM 61(11): 148-155, 2018. Type: Article
Safe networks require reliable operating systems free from security vulnerabilities. Trustworthy routers ought to use dependable cryptographic algorithms to protect data transmitted over insecure networks. But how should effective guidelines be de...
Dec 27 2018
Reproduction in whole or in part without permission is prohibited. Copyright © 2000-2021 ThinkLoud, Inc.