Results 71 to 80 of 92   |   « previous | next »
    
      - All-in-one basic to advanced guide to genealogy & ancestry history research / by Berry, Kimberly L.,author.(CARDINAL)417710; 
- Includes bibliographical references and index.Introduction: why do ancestry research? -- Keep an open mind -- Start with yourself -- Consulting with family -- Family records -- Family photo albums -- Tree building resources -- Death records -- Marriage records -- Birth, baptism & christening records -- City directories & school records -- Social Security & railroad records -- Census records -- Military records (i.e. draft, enlistment, discharge, prisoner rolls, etc.) -- Sons & Daughters of the American Revolution applications -- DNA testing -- Third party DNA projects -- Immigration records, passenger lists, passports & naturalization records -- Tax, property & land records -- Prison records -- Historical & genealogy societies -- Libraries & book stores -- State and national archives -- Historical newspapers -- General Internet searches -- African American research -- American Indian research -- Latin American research -- The proverbial brick wall -- Hiring a professional -- Research ethics -- The end (or beginning) of the tunnel."In this debut nonfiction work, Berry...addresses alternative methods of locating people and information not found through standard search methods. The lists of resources are incredibly thorough, with thousands of databases, including URLs for those available online...She organizes the information logically and presents it coherently, making her book a specialized but extremely useful tool"--Kirkus Reviews.
- Subjects: Handbooks and manuals.; Genealogy.; 
      - Strauss's handbook of business information : a guide for librarians, students, and researchers / by Moss, Rita W.(CARDINAL)462055; Strauss, Diane Wheeler.Handbook of business information.; 
- Includes bibliographical references and indexes.Basic business reference sources -- Directories -- Periodicals and newspapers -- Looseleaf services -- Government information and services -- Statistics -- Consolidated electronic business information -- Marketing -- Accounting and taxation -- Money, credit, and banking -- Investments : an introduction -- Stocks -- Bonds and other fixed-income securities -- Mutual funds and investment companies -- Futures and options -- Insurance -- Real estate -- Appendix A. Business acronyms and abbreviations -- Appendix B. Federal government departments agencies relevant to business -- Appendix C. Federal government corporations and independent agencies relevant to business -- Appendix D. Representative types of business information published by state government agencies -- Appendix E. Key economic indicators -- Appendix F. Representative web sites for business information.
- Subjects: Handbooks and manuals.; Bibliographies.; Databases.; Business; Business information services; Government publications; Business; Business; 
      - Android for absolute beginners : getting started with mobile apps development using the Android Java SDK / by Allen, Grant,author.; 
- Part I - Get Android, Get Started -- 1. Introducing Android -- 2. Introducing Android Studio -- 3. Your First Android App, Already! -- 4. Exploring Your First Project -- 5. Android Studio In Depth -- 6. Mastering Your Entire Development Ecosystem -- Part II - Get The Android Development Know-how -- 7. Introducing Java for Android Development -- 8. Introducing XML for Android Development -- 9. Exploring Android Concepts - Core UI Widgets -- 10. Exploring Android UI Concepts - Layouts and More -- 11. Understanding Activities -- 12. Introducing Fragments -- Part III - Get Sophisticated.-13. Working with Sound, Audio and Music for Android -- 14. Working with Video and Movies for Android -- 15. Introducing Notifications -- 16. Exploring Device Capabilities with Calls -- Part IV - Get Together.-17. Understanding Intents, Events, and Receivers -- 18. Introducing Android Services -- 19. Working with Files in Android -- 20. Working with Databases in Android.Get started as a mobile app developer and learn the art and science of Android app development. With no assumed knowledge about programming languages or Android required, you will gain the key skills for constructing fully functional Android apps for smartphones, tablets, and other devices. You will also build a solid foundation in the Java programming language and the business of creating and releasing software for Android. Along the way you'll get comfortable with Android Studio - the best way to write modern Android apps - before diving into your first Android code. The author spends plenty of time explaining how to build a robust UI with widgets, menus, layouts and more. These components will be the basis of your Android apps and so are covered in depth. Having grasped the basics, you'll move onto what will make your app stand out: sound, music, images, animations, and notifications. Taking these elements and combining them with phone features like calling and sensors, will take your apps to the next level. The final part of the book covers services, events, intents, receivers, files and databases, essential sources of information and functionality for users and your app. In addition, you'll see how to protect your users and their data with permissions and security in examples throughout the book You will: Get started with Android and build your first apps with it Install and use the Android Studio IDE Set up and manage the app development life cycle Master the basics of Java and XML required to create Android apps Discover the strengths and features of the Android APIs and device capabilities.
- Subjects: Handbooks and manuals.; Android (Electronic resource); Application software; 
      - Bitcoin pizza : the no-bullshit guide to blockchain / by Radocchia, Samantha,author.(CARDINAL)827816; 
- When you hear the word blockchain, what's your reaction? Do you think it's a fad that's been overhyped but will soon be forgotten? Or maybe you have a vague understanding of how the technology works, but you're unsure of how it will impact your life. Neither reaction is wrong. Blockchain and cryptocurrencies like Bitcoin are still in their infancy--but they will soon fuel a worldwide cultural and technological paradigm shift that will disrupt every major industry: finance, supply chain, film and arts distribution, digital rights, automotive, social media, data security, real estate, and more. In Bitcoin Pizza, Sam Radocchia offers an eye-opening exploration of what blockchain is and how it will radically change our world. Whether you're an executive looking to prepare your business for a decentralized future or a newcomer curious about the blockchain hype, this fun and relatable guide will give you the confidence to explore this technology in more detail by first showing you the big picture. Instead of looking at blockchain with trepidation, you'll come away thrilled by the possibilities.
- Subjects: Blockchains (Databases); Digital currency.; Bitcoin.; Data encryption (Computer science); Electronic commerce.; 
      - Privacy rights in the Digital Age / by Kirtley, Jane E.,editor.(CARDINAL)202631; Shally-Jensen, Michael,editor.(CARDINAL)682936; 
- Includes bibliographical references (pages 705-737) and index.Customer proprietary network information (CPNI) -- The Cyber Intelligence Sharing and Protection Act (CISPA) H.R. 3523 (112th Congress), H.R. 624 (113th Congress), H.R. 234 (114th Congress) -- Cybersecurity -- Dark web -- Data Breach Notification Laws -- Data breaches -- Data brokers -- Data harvesting -- Data protection regimes -- Data science -- Debt collection -- Defence and Security Media Advisory Committee (DSMA Committee) -- Descartes, Rene -- DNA databases -- Do-not-track legislation -- Douglas, William Orville -- Doxing -- Driver's Privacy Protection Act of 1994 (DDPA), 18 U.S.C. 2271-2725 -- Drones -- Drug and alcohol testing -- Economic arguments for privacy rights -- Education Data Exchange Network (EDEN) -- Educational setting, privacy in an -- Electoral interference and privacy -- Electronic Communications Privacy Act (ECPA), 18 U.S.C. 2510 et seq -- Electronic Frontier Foundation -- Electronic Privacy Information Center (EPIC) -- Electronic surveillance -- Email -- Employment eligibility verification systems -- End-of-life care -- The Enlightenment -- Espionage Act -- Facebook -- Facial recognition technology -- Fair Credit Reporting Act -- Fair information practice principles -- Family Educational Rights and Privacy Act -- Federal Communications Commission -- Federal Communications Commission v. AT&T Inc., 562 U.S. 397 (2011) -- Federal Trade Commission -- Financial information, privacy rights in -- First Amendment to the U.S. Constitution -- Florida Star v. B.J.F., 491 U.S. 524 (1989) -- Foreign Intelligence Surveillance Act of 1978 -- Foreign Intelligence Surveillance Court -- Fourth Amendment to the U.S. Constitution -- Freedom of Information Act --Genome sequencing -- General Data Protection Regulation -- Global positioning system (GPS) tracking -- Godkin, Edwin Lawrence (1831-1902) -- Gonzaga University v. Doe, 536 U.S. 273 (2002) -- Google -- Government Communications Headquarters (GCHQ) -- Gramm-Leach-Bliley Act -- Greenwald, Glenn (1967-) -- Griswold v. State of Connecticut 381 U.S. 479 (1965) -- Hacking, computer -- Harassment -- Health care information -- Health Insurance Portability and Accountability Act -- HIV testing -- Home, privacy of the -- Homeland Security, U.S. Department of -- Homeless people, right to privacy of -- Hustler Magazine v. Falwell, 485 U.S. 46 (1988) -- Identity theft -- In re iPhone Application Litigation, 844 F.Supp.2d 1040 (E.D. Cal. 2012) -- Information Awareness Office (IAO) -- Informative asymmetries -- Instagram -- Integrated Automated Fingerprint Identification System (IAFIS) -- Intellectual property -- International Center for Information Ethics (ICIE) -- Internet cafes -- Internet Service Providers and privacy -- Interrogations -- Invasion of privacy -- Journalism and the protection of sources -- Katz v. United States, 389 U.S. 347 (1967) -- Kyllo v. United States, 533 U.S. 27 (2001) -- Law enforcement -- Lawrence v. Texas, 539 U.S. 558 (2003) -- Legal evolution of privacy rights in the United States -- License plate reader system -- Locke, John (1632-1704) -- Magic Lantern -- Malware -- Manning, Chelsea Elizabeth -- Mapp v. Ohio, 367 U.S. 495 (1961) -- Marketing -- Mass media -- Medical confidentiality, privacy right to -- Metadata -- Meyer v. Nebraska, 262 U.S. 390 (1923) -- Migrants and refugees in the United States, privacy rights of -- Mobile devices -- Model legislation on privacy -- National Archives and Records Aministration v. Favish, 541 U.S. 157 (2004) -- National Instant Criminal Background Check System (NICS) -- National Security Agency (NSA) -- New Jersey v. TLO, 469 U.S. 325 (1985) -- New York Times Co. v. Sullivan, Abernathy, et. al., 376 U.S. 254 (1964) -- New leaks -- Next Generation Identification (NGI) --Obscenity -- Official Secrets Act -- Olmstead v. United States, 277 U.S. 438 (1928) -- Online privacy and protection -- Open data movement -- Open source -- Patient Safety and Quality Improvement Act of 2005 (PSQIA) -- Personal autonomy -- Philosophical basis of privacy -- The Plame Affair -- Poitras, Laura -- Pornography -- PRISM -- Privacy Act of 1974 -- Privacy and Civil Liberties Oversight Board (PCLOB) -- Privacy laws, federal -- Privacy laws, state -- Privacy Protection Act, 42 U.S.C. section aa et seq --Privacy settings -- Privacy torts -- Privacy sphere -- Prosser, William Lloyd (1898-1972) -- Protect America Act of 2007 -- Public morality -- Public records -- Publicity, right of -- Reno v. Condon, 528 U.S. 141 (2000) --  Repository for Individuals of Special Concern (RICS) -- Right to be forgotten -- Right to be let alone -- Riley v. California, 134 S. Ct. 2473 (2014) -- Safe Harbor -- Scientific and medical data sharing -- Search engines -- Search warrants -- Security flaws, computers -- September 11 -- Sexting -- Sexual orientation -- Smart moves -- Smartphones -- Snapchat -- Snooper's Charter -- Snowden, Edward Joseph -- Social media -- Social media profiling -- Social networking technologies -- Social Security numbers -- (SSNs) -- Sorrell v. IMS Health, 131 S. Ct. 2653 (2011) -- Spam -- Spyware -- Stalking -- Stanley v. Georgia, 394 U.S. 557 (1969) -- Stop and frisk policy -- Stored Communications Act (SCA) -- Subpoenas -- Supreme Court of the United States -- Surveillance cameras -- Telephones -- Tempora -- Terrorism and privacy -- Text messaging --- Theoretical basis for privacy -- Time, Inc. v. Hill, 385 U.S. 374 (1967) -- Twitter --Publisher's Note -- Contributors -- Editor's Introduction -- Cross-Cultural Perspectives on Privacy -- Abortion -- Administrative searches -- Airport security systems -- Amazon -- American Civil Liberties Union (ACLU) -- Anonymity and anonymizers -- Anti-Forensics -- APEC Cross Border Privacy Rules System -- Apple, Inc -- Apps -- Assange, Julian -- Automated teller machines (ATMs) -- Background checks -- Bartnicki et ano v. Vopper, et al., 532 U.S. 514 (2001) -- Beliefs, privacy of -- Big data -- Bioethics -- Biometric Center of Excellence -- Biometric Optical Surveillance System -- Biometrics -- Blockchain technologies -- Body, privacy of the -- Border Security, Immigration Reform, and Privacy -- Bots -- Boundless Informant -- Brain-computer interfacing (BCI) -- Brandeis, Louis Dembitz -- Caller ID -- Cantrell v. Forest City Publishing Company, 419 U.S. 245 (1974) -- Cellphones -- Center for Democracy and Technology (CDT) -- Central Security Service -- Children's Online Privacy Protection Act, 15 U.S.C. 6501-6508 -- Children's right to privacy -- City of Ontario, Cal. v. Quon, 506 U.S. 746 (2010) -- City of Sherman v. Otis Henry, 928 S.W.2d 464 (1996) -- Cloud computing -- Computer Fraud and Abuse Act (CFAA) -- Computer harvesting -- Computers and privacy -- Confidential informants -- Confidential Information Protection and Statistical Efficiency Act of 2002 -- Consent -- Constitutional law -- Consumer privacy -- Cookies -- Cox Broadcasting Corporation v. Cohn, 420 U.S. 469 (1975) -- Credit and debit cards -- Credit reporting agencies (CRAs) -- Criminal justice (criminal procedure) -- Cruzan v. Director, Missouri Department of Health, 497 U.S. 261 (1990) --U.S. Department of Justice v. Reporters Committee for Freedom of the Press, 489 U.S. 749 (1989) -- U.S. Department of Justice v. Reporters Committee for Freedom of the Press, 489 U.S. 749 (1989) -- Unenumerated constitutional right, privacy as an -- United States v. Jones, 132 S. Ct. 945 (2012) -- USA FREEDOM Act, Pub. L No. 114-23 -- USA PATRIOT Act, Pub. L. No. 107-52 -- Video Privacy Protection Act (18 USCA section 2710) -- Voting and privacy rights -- Warren, Earl -- Washington v. Glucksberg, 521 U.S. 702 (1997) -- "We are watching you" Act -- Wearable technology -- Whistleblowers -- WikiLeaks -- Wikipedia -- Wilson v. Layne, 526 U.S. 603 (1999) -- Wiretapping -- Workplace, privacy in the -- Zacchini v. Scripps-Howard Broadcasting Co., 433 U.S. 562 (1977).Discusses the practical, political, psychological, and philosophical challenges of technological advances have changed the landscape of traditional notions of privacy.
- Subjects: Encyclopedias.; Privacy, Right of; Electronic surveillance; Computer security; Data protection; Electronic government information; 
      - 
        The top 100.
      
- Subjects: Young adult literature.; Handbooks and manuals.; Young adult literature.; Occupations; Vocational guidance.; Vocational guidance; 
      - Zero day [sound recording] / by Russinovich, Mark,author.; Heller, Johnny,narrator.(CARDINAL)532837; Macmillan Audio (Firm).(CARDINAL)344799; Recorded Books, Inc.(CARDINAL)340508; 
- Narrated by Johnny Heller.A technothriller for the malware and Stuxnet era- An airliner's controls abruptly fail mid-flight over the Atlantic. An oil tanker runs aground in Japan when its navigational system suddenly stops dead. Hospitals everywhere have to abandon their computer databases when patients die after being administered incorrect dosages of their medicine. In the Midwest, a nuclear power plant nearly becomes the next Chernobyl when its cooling systems malfunction. At first, these random computer failures seem like unrelated events. But Jeff Aiken, a former government analyst who quit in disgust after witnessing the gross errors that led up to 9/11, thinks otherwise. Jeff fears a more serious cyberterrorism attack targeting the United States computer infrastructure is already under way. And as other menacing computer malfunctions pop up around the world, some with deadly results, he realizes that there isn't much time if he hopes to prevent an international catastrophe. Written by a global authority on cyber security, Zero Day presents a chilling what if  scenario that, in a world completely reliant on technology, is more than possible today---it's a cataclysmic disaster just waiting to happen.
- Subjects: Audiobooks.; Suspense fiction.; Cyberterrorism; 
      - Mastering online genealogy / by Quillen, W. Daniel,author.(CARDINAL)303356; 
- Explains how to use online and software resources to perform genealogical research, and provides coverage of genealogy databases, free and subscription websites, and important pitfalls to avoid.
- Subjects: Handbooks and manuals.; Family histories.; Genealogy.; Genealogy; 
      - Token supremacy : the art of finance, the finance of art, and the Great Crypto Crash of 2022 / by Small, Zachary,author.(CARDINAL)888734; 
- Includes bibliographical references (pages 299-316) and index.The new king of crypto -- Art in the tokenized economy -- Cray cray crap -- A gilded void -- Generation moonshot -- The rug pull -- Clown frowns -- Transcendental squiggle meditations -- We're all gonna die -- The escape plan -- Information-processing error -- A sleepless night.A New York Times investigative reporter wades into the murky, pixelated waters of the multibillion-dollar NFT market, a virtual casino of speculation and volatility that tests the nature of value itself. In 2021, when the gavel fell at Christie's on the sale of Mike Winkelmann's Everydays series-a compilation of 5,000 digital artworks-it made a thunderous announcement: Non-fungible tokens had arrived. The ludicrous world of CryptoKitties and Bored Apes had just produced a piece of art worth $69.3 million (at least according to the highest bidder). On that day, the traditional art market-the largest unregulated market in the world-put its stamp of approval on a very new and carnivalesque digital reality. But what did it mean for these two worlds to collide? Was it all just a money laundering scheme? And come on, what was that piece of digital flotsam really worth anyway? In Token Supremacy, Zachary Small works through these and other fascinating questions, tracing the crypto economy back to its origins in the 2008 financial crisis and the lineage of NFTs back to the first photographic negatives. Small describes jaw-dropping tales of heists, publicity stunts, and rug pulls, before zeroing in on the role of "security tokens" in the FTX scandal. Detours through art history provide insight into the myth-making tactics that drive stratospheric auction sales and help the wealthy launder their finances (and reputations) through art. And we cast an eye toward the future of NFTs-in mortgages, restaurants, securities, and loans-that could outlive cryptocurrencies, becoming a new and dangerous shadow-banking system in its own right. A wild and spellbinding tour through a world that strains belief.
- Subjects: NFTs (Tokens); Art; Art; Cryptocurrencies.; Blockchains (Databases); 
      - In defense of public debt / by Eichengreen, Barry J.,author.(CARDINAL)159650; El-Ganainy, Asmaa,author.; Esteves, Rui,author.; Mitchener, Kris James,author.; 
- Includes bibliographical references (pages 267-289) and index.Debt in service of the state -- States and the limits of borrowing -- Democratization and globalization -- Caveat emptor -- Managing problem debts -- Successful consolidation -- Warfare to welfare -- Cycles of debt -- Oil and water -- Missed opportunities -- Debt to the rescue -- COVID-19."Public debts have exploded to levels unprecedented in recent history as governments responded to the COVID-19 pandemic. Their rise prompted apocalyptic warnings about the dangers of heavy debts - about the drag they will place on economic growth and for future generations. This book adds the other side of the equation: drawing on history, it provides a defence of public debt. It shows that the ability of governments to borrow has played a critical role in meeting emergencies, from wars and pandemics to economic and financial crises, as well as in funding essential public goods and services such as transportation, education and healthcare. In these ways, the capacity to issue debt has been integral to state building. Transactions in public debt securities have also contributed to the development of private financial markets and, through this channel, to modern economic growth. None of this is to deny that debt problems, debt crises and debt defaults occur. But these dramatic events, which attract much attention, are not the entire story. In Defence of Public Debt redresses the balance. It develops its arguments historically, recounting two millennia of public debt experience. It deploys a comprehensive database to identify the factors behind rising public debts and the circumstances under which high debts are successfully brought down. Finally, it brings the story up to date, describing the role of public debt in managing the Covid-19 pandemic and suggesting a way forward once governments, now more heavily indebted than before, finally emerge from the crisis"--
- Subjects: Debts, Public.; 
    
Results 71 to 80 of 92   |   « previous | next »