<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Lindell Library New Items &#187; Dept:  Computer Science</title>
	<atom:link href="http://castor.augsburg.edu/newbooks/?cat=28&#038;feed=rss2" rel="self" type="application/rss+xml" />
	<link>http://castor.augsburg.edu/newbooks</link>
	<description>New books, videos, sound recordings, etc. at Augsburg&#039;s Lindell Library</description>
	<lastBuildDate>Tue, 31 May 2016 18:45:00 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.1</generator>
	<item>
		<title>Making computers accessible : disability rights and digital technology / Elizabeth R. Petrick.</title>
		<link>http://castor.augsburg.edu/newbooks/?p=20840</link>
		<comments>http://castor.augsburg.edu/newbooks/?p=20840#comments</comments>
		<pubDate>Thu, 25 Feb 2016 09:49:00 +0000</pubDate>
		<dc:creator><![CDATA[Mike]]></dc:creator>
				<category><![CDATA[Dept:  Computer Science]]></category>
		<category><![CDATA[HV - Social Pathology. Social and Public Welfare. Criminology]]></category>

		<guid isPermaLink="false">http://castor.augsburg.edu/newbooks/?p=20840</guid>
		<description><![CDATA[Petrick, Elizabeth, 1978- author. Baltimore : Johns Hopkins University Press, [2015];©2015 Added to CLICnet on 02/25/2016 Check CLICnet for availability Part of the series History of technology Notes: In &#8216;Making computers accessible,&#8217; Elizabeth R. Petrick tells the compelling story of &#8230; <a href="http://castor.augsburg.edu/newbooks/?p=20840">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p><a href="http://clicnet.clic.edu/search/aPetrick, Elizabeth, 1978- author.">Petrick, Elizabeth, 1978- author.</a><br />
Baltimore : Johns Hopkins University Press, [2015];©2015<br />
Added to CLICnet on 02/25/2016</p>
<p><span id="more-20840"></span><br />
<a href="http://clicnet.clic.edu/record=b5391289">Check CLICnet for availability</a><br />
Part of the series <a href="http://clicnet.clic.edu/search/sHistory of technology">History of technology</a><br />
Notes:</p>
<ul>
<li> In &#8216;Making computers accessible,&#8217; Elizabeth R. Petrick tells the compelling story of how computer engineers and corporations gradually became aware of the need to make computers accessible for all people. Motivated by user feedback and prompted by legislation such as the Americans with Disabilities Act, which offered the promise of equal rights via technological accommodation, companies developed sophisticated computerized devices and software to bridge the accessibility gap. People with disabilities, Petrick argues, are paradigmatic computer users, demonstrating the personal computer&#8217;s potential to augment human abilities and provide for new forms of social, professional, and political participation. Bridging the history of technology, science and technology studies, and disability studies, this book traces the psychological, cultural, and economic evolution of a consumer culture aimed at individuals with disabilities, who increasingly rely on personal computers to make their lives richer and more interconnected. &#8212; Publisher&#8217;s web site.</li>
<li>Includes bibliographical references and index.</li>
<li>Introduction: the development of accessible personal computer technologies &#8212; Disability rights and technology before the personal computer &#8212; Early personal computer accessibility, 1980-1987 &#8212; Building the network: corporate philanthropy and the National Special Education Alliance &#8212; The growth of disability rights and accessible computer technologies &#8212; Accessibility and software applications in the 1990s &#8212; Conclusion: the promises of personal computers.</li>
</ul>
<p>Subjects:</p>
<ul>
<li><a href="http://clicnet.clic.edu/search/dComputers and people with disabilities -- United States.">Computers and people with disabilities &#8212; United States.</a></li>
<li><a href="http://clicnet.clic.edu/search/dAssistive computer technology -- United States.">Assistive computer technology &#8212; United States.</a></li>
<li><a href="http://clicnet.clic.edu/search/dMicrocomputers -- Social aspects -- United States.">Microcomputers &#8212; Social aspects &#8212; United States.</a></li>
<li><a href="http://clicnet.clic.edu/search/dUnited States. fast (OCoLC)fst01204155">United States. fast (OCoLC)fst01204155</a></li>
</ul>
<p>Requested by Bloomberg, M.</p>
]]></content:encoded>
			<wfw:commentRss>http://castor.augsburg.edu/newbooks/?feed=rss2&#038;p=20840</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Managing chaos : digital governance by design / Lisa Welchman.</title>
		<link>http://castor.augsburg.edu/newbooks/?p=20647</link>
		<comments>http://castor.augsburg.edu/newbooks/?p=20647#comments</comments>
		<pubDate>Fri, 22 Jan 2016 12:54:00 +0000</pubDate>
		<dc:creator><![CDATA[Mike]]></dc:creator>
				<category><![CDATA[Dept:  Computer Science]]></category>
		<category><![CDATA[HD - Economic History and Conditions]]></category>

		<guid isPermaLink="false">http://castor.augsburg.edu/newbooks/?p=20647</guid>
		<description><![CDATA[Welchman, Lisa, author. Brooklyn, New York Rosenfeld Media (O&#8217;Reilly), [2015];©2015 Added to CLICnet on 01/22/2016 Check CLICnet for availability Notes: Includes index. Few organizations realize a return on their digital investment. They&#8217;re distracted by political infighting and technology-first solutions. To &#8230; <a href="http://castor.augsburg.edu/newbooks/?p=20647">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p><a href="http://clicnet.clic.edu/search/aWelchman, Lisa, author.">Welchman, Lisa, author.</a><br />
Brooklyn, New York Rosenfeld Media (O&#8217;Reilly), [2015];©2015<br />
Added to CLICnet on 01/22/2016</p>
<p><span id="more-20647"></span><br />
<a href="http://clicnet.clic.edu/record=b5378710">Check CLICnet for availability</a><br />
Notes:</p>
<ul>
<li>Includes index.</li>
<li>Few organizations realize a return on their digital investment. They&#8217;re distracted by political infighting and technology-first solutions. To reach the next level, organizations must realign their assets&#8211;people, content, and technology&#8211;by practicing the discipline of digital governance. Managing Chaos inspires new and necessary conversations about digital governance and its transformative power to support creativity, real collaboration, digital quality, and online growth.</li>
</ul>
<p>Subjects:</p>
<ul>
<li><a href="http://clicnet.clic.edu/search/dBusiness enterprises -- Computer networks -- Management.">Business enterprises &#8212; Computer networks &#8212; Management.</a></li>
</ul>
<p>Requested by Kurpiers, R.</p>
]]></content:encoded>
			<wfw:commentRss>http://castor.augsburg.edu/newbooks/?feed=rss2&#038;p=20647</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Fire in the valley : the birth and death of the personal computer / Michael Swaine, Paul Freiberger.</title>
		<link>http://castor.augsburg.edu/newbooks/?p=20378</link>
		<comments>http://castor.augsburg.edu/newbooks/?p=20378#comments</comments>
		<pubDate>Mon, 02 Nov 2015 07:35:00 +0000</pubDate>
		<dc:creator><![CDATA[Mike]]></dc:creator>
				<category><![CDATA[Dept:  Computer Science]]></category>
		<category><![CDATA[QA - Mathematics]]></category>

		<guid isPermaLink="false">http://castor.augsburg.edu/newbooks/?p=20378</guid>
		<description><![CDATA[Swaine, Michael, 1945- author. Dallas, Texas : The Pragmatic Bookshelf, [2014];©2014 Added to CLICnet on 11/02/2015 Check CLICnet for availability Part of the series Pragmatic programmers;Pragmatic programmers. Notes: Previous edition: New York: McGraw-Hill, 2000. Includes index. Your own computer &#8212; &#8230; <a href="http://castor.augsburg.edu/newbooks/?p=20378">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p><a href="http://clicnet.clic.edu/search/aSwaine, Michael, 1945- author.">Swaine, Michael, 1945- author.</a><br />
Dallas, Texas : The Pragmatic Bookshelf, [2014];©2014<br />
Added to CLICnet on 11/02/2015</p>
<p><span id="more-20378"></span><br />
<a href="http://clicnet.clic.edu/record=b5303965">Check CLICnet for availability</a><br />
Part of the series <a href="http://clicnet.clic.edu/search/sPragmatic programmers;Pragmatic programmers.">Pragmatic programmers;Pragmatic programmers.</a><br />
Notes:</p>
<ul>
<li>Previous edition: New York: McGraw-Hill, 2000.</li>
<li>Includes index.</li>
<li>Your own computer &#8212; Tinder for the fire. Steam   The breakthrough   Critical mass   Breakout   Hackers &#8212; The voyage to Altair. Uncle Sol&#8217;s boys   Going for broke   All hell breaks loose   Putting it together   The competition   The fall &#8212; The miracle makers. After Altair   Amateurs and professionals   Building one and building two   Miracles and mistakes   est and entrepreneur&#8217;s disease   Death and rebirth &#8212; Homebrew. Power to the people   The Homebrew Computer Club   Wildfire in Silicon Valley   Nostalgia for the future   Sixers and seventy-sixers   Home rule   Homebrew legacy &#8212; The genie in the box. The Altair&#8217;s first recital   Pleasure before business   The first operating system   Getting down to BASIC   The other BASIC    Electric pencil   The rise of general software companies   The bottom line   Software empires &#8212; Retailing the revolution. Spreading the word : the magazines   Word of mouth : the clubs and shows   Hand-holding : the first retailers   The big players &#8212; Apple. Jobs and Woz   Starting Apple   Magic times   Trouble in paradise   Shooting for the moon &#8212; The gate comes down. The luggable computer   The HP way and the Xerox worm   IBM &#8212; The PC industry. Losing their religion   Clones   Consolidation   Commoditization   Cyberspace   Apple without Jobs &#8212; The post-PC era. The big turnaround   Getting really personal   Into the cloud   Leaving the stage   Looking back.</li>
<li>Overview:  In the 1970s, while their contemporaries were protesting the computer as a tool of dehumanization and oppression, a motley collection of college dropouts, hippies, and electronics fanatics were engaged in something much more subversive.  Obsessed with the idea of getting computer power into their own hands, they launched from their garages a hobbyist movement that grew into an industry, and ultimately a social and technological revolution.  What they did was invent the personal computer:  not just a new device, but a watershed in the relationship between man and machine.  This is their story.  Fire in the Valley is the definitive history of the personal computer, drawn from interviews with the people who made it happen, written by two veteran computer writers who were there from the start.  Working at InfoWorld in the early 1980s, Swaine and Freiberger daily rubbed elbows with people like Steve Jobs and Bill Gates when they were creating the personal computer revolution.  A rich story of colorful individuals, Fire in the Valley profiles these unlikely revolutionaries and entrepreneurs, such as Ed Roberts of MITS, Lee Felsenstein at Processor Technology, and Jack Tramiel of Commodore, as well as Jobs and Gates in all the innocence of their formative years.  This completely revised and expanded third edition brings the story to its completion, chronicling the end of the personal computer revolution and the beginning of the post-PC era. It covers the departure from the stage of major players with the deaths of Steve Jobs and Douglas Engelbart and the retirements of Bill Gates and Steve Ballmer  the shift away from the PC to the cloud and portable devices  and what the end of the PC era means for issues such as personal freedom and power, and open source vs. proprietary software.</li>
</ul>
<p>Subjects:</p>
<ul>
<li><a href="http://clicnet.clic.edu/search/dMicrocomputers -- United States -- History.">Microcomputers &#8212; United States &#8212; History.</a></li>
<li><a href="http://clicnet.clic.edu/search/dUnited States. fast (OCoLC)fst01204155">United States. fast (OCoLC)fst01204155</a></li>
<li><a href="http://clicnet.clic.edu/search/dHistory. fast (OCoLC)fst01411628">History. fast (OCoLC)fst01411628</a></li>
</ul>
<p>Requested by Bloomberg, M.</p>
]]></content:encoded>
			<wfw:commentRss>http://castor.augsburg.edu/newbooks/?feed=rss2&#038;p=20378</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Coding freedom : the ethics and aesthetics of hacking / E. Gabriella Coleman.</title>
		<link>http://castor.augsburg.edu/newbooks/?p=18909</link>
		<comments>http://castor.augsburg.edu/newbooks/?p=18909#comments</comments>
		<pubDate>Tue, 19 May 2015 12:10:00 +0000</pubDate>
		<dc:creator><![CDATA[Mike]]></dc:creator>
				<category><![CDATA[Dept:  Computer Science]]></category>
		<category><![CDATA[HD - Economic History and Conditions]]></category>

		<guid isPermaLink="false">http://castor.augsburg.edu/newbooks/?p=18909</guid>
		<description><![CDATA[Coleman, E. Gabriella, 1973- Princeton : Princeton University Press, c2013. Added to CLICnet on 05/19/2015 Check CLICnet for availability Notes: Includes bibliographical references (p. [225]-247) and index. Subjects: Computer hackers. Computer programmers. Computer programming &#8212; Moral and ethical aspects. Computer &#8230; <a href="http://castor.augsburg.edu/newbooks/?p=18909">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p><a href="http://clicnet.clic.edu/search/aColeman, E. Gabriella, 1973-">Coleman, E. Gabriella, 1973-</a><br />
Princeton : Princeton University Press, c2013.<br />
Added to CLICnet on 05/19/2015</p>
<p><span id="more-18909"></span><br />
<a href="http://clicnet.clic.edu/record=b4253887">Check CLICnet for availability</a><br />
Notes:</p>
<ul>
<li>Includes bibliographical references (p. [225]-247) and index.</li>
</ul>
<p>Subjects:</p>
<ul>
<li><a href="http://clicnet.clic.edu/search/dComputer hackers.">Computer hackers.</a></li>
<li><a href="http://clicnet.clic.edu/search/dComputer programmers.">Computer programmers.</a></li>
<li><a href="http://clicnet.clic.edu/search/dComputer programming -- Moral and ethical aspects.">Computer programming &#8212; Moral and ethical aspects.</a></li>
<li><a href="http://clicnet.clic.edu/search/dComputer programming -- Social aspects.">Computer programming &#8212; Social aspects.</a></li>
<li><a href="http://clicnet.clic.edu/search/dIntellectual freedom.">Intellectual freedom.</a></li>
</ul>
<p>Requested by Kurpiers, R</p>
]]></content:encoded>
			<wfw:commentRss>http://castor.augsburg.edu/newbooks/?feed=rss2&#038;p=18909</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Introduction to software quality / Gerard O&#8217;Regan.</title>
		<link>http://castor.augsburg.edu/newbooks/?p=18844</link>
		<comments>http://castor.augsburg.edu/newbooks/?p=18844#comments</comments>
		<pubDate>Fri, 08 May 2015 10:45:00 +0000</pubDate>
		<dc:creator><![CDATA[Mike]]></dc:creator>
				<category><![CDATA[Dept:  Computer Science]]></category>
		<category><![CDATA[QA - Mathematics]]></category>

		<guid isPermaLink="false">http://castor.augsburg.edu/newbooks/?p=18844</guid>
		<description><![CDATA[O&#8217;Regan, Gerard, author. Cham : Springer, 2014. Added to CLICnet on 05/08/2015 Check CLICnet for availability Part of the series Undergraduate Topics in Computer Science, 1863-7310;Undergraduate topics in computer science, 1863-7310 Notes: Includes bibliographical references and index. Introduction &#8212; Software &#8230; <a href="http://castor.augsburg.edu/newbooks/?p=18844">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p><a href="http://clicnet.clic.edu/search/aO'Regan, Gerard, author.">O&#8217;Regan, Gerard, author.</a><br />
Cham : Springer, 2014.<br />
Added to CLICnet on 05/08/2015</p>
<p><span id="more-18844"></span><br />
<a href="http://clicnet.clic.edu/record=b4853288">Check CLICnet for availability</a><br />
Part of the series <a href="http://clicnet.clic.edu/search/sUndergraduate Topics in Computer Science, 1863-7310;Undergraduate topics in computer science, 1863-7310">Undergraduate Topics in Computer Science, 1863-7310;Undergraduate topics in computer science, 1863-7310</a><br />
Notes:</p>
<ul>
<li>Includes bibliographical references and index.</li>
<li>Introduction &#8212; Software Engineering &#8212; Project Management &#8212; Requirements, Design and Development &#8212; Configuration Management &#8212; Software Inspections &#8212; Software Testing &#8212; Supplier Selection and Management &#8212; Software Quality Assurance &#8212; Software Metrics &#8212; ISO 9000 &#8212; Software Process Improvement &#8212; Capability Maturity Model Integration &#8212; Setting up a CMMI Initiative &#8212; SCAMPI Appraisals &#8212; Software Engineering Tools &#8212; Formal Methods &#8212; Z Formal Specification Language &#8212; Unified Modelling Language &#8212; Epilogue.</li>
<li>In order to maintain strong levels customer satisfaction and loyalty, software developers face considerable pressure to meet expectations for high-quality software products that are consistently delivered on time. Introduction to Software Quality describes the approaches used by software engineers to build quality into their software. The fundamental principles of software quality management and software process improvement are discussed in detail, with a particular focus on the capability maturity model integration (CMMI) framework. Topics and features: Includes review questions at the end of each chapter Covers both theory and practice, in addition to providing guidance on applying the theory in an industrial environment Examines all aspects of the software development process, including project planning and tracking, software lifecycles, software inspections and testing, configuration management, and software quality assurance Provides detailed coverage of software metrics and problem solving Describes SCAMPI appraisals and how they form part of the continuous improvement cycle Presents an introduction to formal methods and the Z specification language, which are important in the safety critical field Discusses UML, which is used to describe the architecture of the system Reviews the history of the field of software quality, highlighting the pioneers who made key contributions to this area This clearly written and easy-to-follow textbook will be invaluable to students of computer science who wish to learn how to build high-quality and reliable software on time and on budget. Software engineers, quality professionals and software managers in industry will also find the book to be a useful tool for self-study.</li>
</ul>
<p>Subjects:</p>
<ul>
<li><a href="http://clicnet.clic.edu/search/dComputer software -- Quality control.">Computer software &#8212; Quality control.</a></li>
<li><a href="http://clicnet.clic.edu/search/dSoftware engineering.">Software engineering.</a></li>
</ul>
<p>Requested by Bloomberg, M</p>
]]></content:encoded>
			<wfw:commentRss>http://castor.augsburg.edu/newbooks/?feed=rss2&#038;p=18844</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Hacking the future : privacy, identity, and anonymity on the Web / Cole Stryker.</title>
		<link>http://castor.augsburg.edu/newbooks/?p=18747</link>
		<comments>http://castor.augsburg.edu/newbooks/?p=18747#comments</comments>
		<pubDate>Thu, 23 Apr 2015 08:48:00 +0000</pubDate>
		<dc:creator><![CDATA[Mike]]></dc:creator>
				<category><![CDATA[Dept:  Computer Science]]></category>
		<category><![CDATA[QA - Mathematics]]></category>

		<guid isPermaLink="false">http://castor.augsburg.edu/newbooks/?p=18747</guid>
		<description><![CDATA[Stryker, Cole. New York : Overlook Duckworth, 2012. Added to CLICnet on 04/23/2015 Check CLICnet for availability Notes: Includes bibliographical references (p. 241-248) and index. A brief history of anonymity &#8212; Anonymous rises &#8212; Anonymous goes political &#8212; Anonymity wired &#8230; <a href="http://castor.augsburg.edu/newbooks/?p=18747">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p><a href="http://clicnet.clic.edu/search/aStryker, Cole.">Stryker, Cole.</a><br />
New York : Overlook Duckworth, 2012.<br />
Added to CLICnet on 04/23/2015</p>
<p><span id="more-18747"></span><br />
<a href="http://clicnet.clic.edu/record=b4552966">Check CLICnet for availability</a><br />
Notes:</p>
<ul>
<li>Includes bibliographical references (p. 241-248) and index.</li>
<li>A brief history of anonymity &#8212; Anonymous rises &#8212; Anonymous goes political &#8212; Anonymity wired &#8212; The age of the anonymous web &#8212; The year of the hacktivist &#8212; Nym wars &#8212; Is total anonymity even possible? &#8212; Is total transparency even possible? &#8212; Faces of anonymity &#8212; The case for anonymity.</li>
<li>A broad analysis of how issues in anonymity and privacy are influencing politics, activism, religion, and art in America and the world poses strong arguments about free speech, Internet identity, and online piracy while profiling some of the tools and organizations that have evolved on both sides of the debate.</li>
</ul>
<p>Subjects:</p>
<ul>
<li><a href="http://clicnet.clic.edu/search/dComputer programming -- Moral and ethical aspects.">Computer programming &#8212; Moral and ethical aspects.</a></li>
<li><a href="http://clicnet.clic.edu/search/dComputer hackers.">Computer hackers.</a></li>
<li><a href="http://clicnet.clic.edu/search/dHacktivism.">Hacktivism.</a></li>
<li><a href="http://clicnet.clic.edu/search/dInternet -- Security measures.">Internet &#8212; Security measures.</a></li>
<li><a href="http://clicnet.clic.edu/search/dOnline identities.">Online identities.</a></li>
<li><a href="http://clicnet.clic.edu/search/dComputer security.">Computer security.</a></li>
<li><a href="http://clicnet.clic.edu/search/dInternet.">Internet.</a></li>
<li><a href="http://clicnet.clic.edu/search/dPrivacy.">Privacy.</a></li>
<li><a href="http://clicnet.clic.edu/search/dIdentity (Psychology)">Identity (Psychology)</a></li>
</ul>
<p>Requested by Kurpiers, R</p>
]]></content:encoded>
			<wfw:commentRss>http://castor.augsburg.edu/newbooks/?feed=rss2&#038;p=18747</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Type on screen : a guide for designers, developers, writers, and students / Ellen Lupton, editor.</title>
		<link>http://castor.augsburg.edu/newbooks/?p=18605</link>
		<comments>http://castor.augsburg.edu/newbooks/?p=18605#comments</comments>
		<pubDate>Tue, 14 Apr 2015 12:42:00 +0000</pubDate>
		<dc:creator><![CDATA[Mike]]></dc:creator>
				<category><![CDATA[Dept:  Computer Science]]></category>
		<category><![CDATA[Z - Books (General)]]></category>

		<guid isPermaLink="false">http://castor.augsburg.edu/newbooks/?p=18605</guid>
		<description><![CDATA[New York, New York : Princeton Architectural Press, ℗2014.;©2014 Added to CLICnet on 04/14/2015 Check CLICnet for availability Part of the series Design briefs-essential texts on design;Design briefs. Notes: Includes index. Fonts on screen / Christopher Clark : Web fonts: &#8230; <a href="http://castor.augsburg.edu/newbooks/?p=18605">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p><a href="http://clicnet.clic.edu/search/a"></a><br />
New York, New York : Princeton Architectural Press, ℗2014.;©2014<br />
Added to CLICnet on 04/14/2015</p>
<p><span id="more-18605"></span><br />
<a href="http://clicnet.clic.edu/record=b4871018">Check CLICnet for availability</a><br />
Part of the series <a href="http://clicnet.clic.edu/search/sDesign briefs-essential texts on design;Design briefs.">Design briefs-essential texts on design;Design briefs.</a><br />
Notes:</p>
<ul>
<li>Includes index.</li>
<li>Fonts on screen / Christopher Clark : Web fonts: a short history   Rendering type on screen   Type anatomy and taxonomy   Heads and bodies   A brief survey of web fonts   Google fonts   Case study: A-sans   Mutable typefaces   Case study: Alphabeta   Case study: History + hipster = hipstory   Case study: ZXX: disruptive typography   In the classroom: Typeface design &#8212; Text on screen / Young Sun Compton : Choosing a screen size   The grid   Vertical and horizontal fields   Responsive typography    Type size   Paragraph blocks   Column alignment   Space between lines   Space between characters   Hierarchy   Typographic HTML tags   Special characters   In the classroom: The HTML posters &#8212; Digital publishing / Young Sun Compton : Linear reading   Selective reading   The flow of content   Orbital content   Case study: Works that work   Write about it   In the classroom: Experimental readers   In the classroom: The mutant library &#8212; Type and interface / Javier Lopez, Alice Hom : Wireframes   Interaction elements   Menus   Type as navigation   Expanding the vocabulary   Drop shadows and gradients   Hide and reveal   Typography and data display   Designing data tables   Data tables: do&#8217;s and don&#8217;ts   Case study: Travel interfaces   In the classroom: Weather apps &#8212; Icons and logotypes / Noel Cunningham, Abe Garcia, Brian Pelsoh : Writing with pictures   Case study: Noun project   Wayfinding for screen   Icons as typography   Tutorial: Creating an app icon   Scalability   Case study: Imaginary apps   Icons for interaction   Case study: Not to distant relatives   Case study: Logo, meet navigation   Tutorial: Drawing interface icons   Logotypes   Working with color   Animated logotypes   Flexible logotypes   Generative logotypes   Scalable vector graphics   Case study: MFA branding   Case study: Branding a metropolis   In the classroom : Icons &#8212; Animation and code / Brian Pelsoh, Jinhwan Kim, Nicki Dlugash, Cameron Zotter : Basic animation   Animated GIFs   In the classroom: Animated GIFs   Storyboarding   Narrative tec</li>
<li>The definitive guide to using classic typographic concepts of form and structure to make dynamic compositions for screen-based applications. Covering a broad range of technologies &#8212; from electronic publications and websites to videos and mobile devices &#8212; this hands-on primer presents the latest information available to help designers make critical creative decisions, including how to choose typefaces for the screen, how to style beautiful, functional text and navigation, how to apply principles of animation to text, and how to generate new forms and experiences with code-based operations. Type on Screen is an essential design tool for anyone seeking clear and focused guidance about typography for the digital age.</li>
</ul>
<p>Subjects:</p>
<ul>
<li><a href="http://clicnet.clic.edu/search/dGraphic design (Typography)">Graphic design (Typography)</a></li>
<li><a href="http://clicnet.clic.edu/search/dDigital media.">Digital media.</a></li>
</ul>
<p>Requested by Kurpiers, R</p>
]]></content:encoded>
			<wfw:commentRss>http://castor.augsburg.edu/newbooks/?feed=rss2&#038;p=18605</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Introduction to computer and network security : navigating shades of gray / Richard R. Brooks, Clemson University, South Carolina, USA.</title>
		<link>http://castor.augsburg.edu/newbooks/?p=18469</link>
		<comments>http://castor.augsburg.edu/newbooks/?p=18469#comments</comments>
		<pubDate>Tue, 10 Mar 2015 09:56:00 +0000</pubDate>
		<dc:creator><![CDATA[Mike]]></dc:creator>
				<category><![CDATA[Dept:  Computer Science]]></category>
		<category><![CDATA[QA - Mathematics]]></category>

		<guid isPermaLink="false">http://castor.augsburg.edu/newbooks/?p=18469</guid>
		<description><![CDATA[Brooks, R. R. (Richard R.) Boca Raton London : CRC Press, Taylor &#038; Francis Group, 2014. Added to CLICnet on 03/10/2015 Check CLICnet for availability Notes: Includes bibliographical references (pages 255- 288) and index. Brief history of computers, communications, and &#8230; <a href="http://castor.augsburg.edu/newbooks/?p=18469">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p><a href="http://clicnet.clic.edu/search/aBrooks, R. R. (Richard R.)">Brooks, R. R. (Richard R.)</a><br />
Boca Raton   London : CRC Press, Taylor &#038; Francis Group, 2014.<br />
Added to CLICnet on 03/10/2015</p>
<p><span id="more-18469"></span><br />
<a href="http://clicnet.clic.edu/record=b4853421">Check CLICnet for availability</a><br />
Notes:</p>
<ul>
<li>Includes bibliographical references (pages 255- 288) and index.</li>
<li>Brief history of computers, communications, and security &#8212; Security and privacy overview &#8212; Cryptography primer &#8212; SSL/TLS case study project &#8212; Securing networks &#8212; Virtual private network case study project &#8212; Insertion attacks &#8212; Buffer overflow case study project &#8212; Polymorphic virus advanced case study project &#8212; Web security &#8212; Privacy and anonymity &#8212; Side-channel attacks &#8212; Digital rights management and copyright &#8212; Security economics.</li>
<li> This text provides a classroom-tested, practical introduction to software design and implementation, cryptographic tools, and networking issues while addressing social, economic, and political implications. It covers cutting-edge topics, such as wireless security and attacks on websites, privacy and digital rights management, and recent work on security and economics. The text includes hands-on projects to help students better understand how computers and networks function. It also contains a number of case studies and discussion points &#8212; Provided by publisher.</li>
</ul>
<p>Subjects:</p>
<ul>
<li><a href="http://clicnet.clic.edu/search/dComputer security.">Computer security.</a></li>
<li><a href="http://clicnet.clic.edu/search/dComputer networks -- Security measures.">Computer networks &#8212; Security measures.</a></li>
<li><a href="http://clicnet.clic.edu/search/dData protection.">Data protection.</a></li>
<li><a href="http://clicnet.clic.edu/search/dData encryption (Computer science)">Data encryption (Computer science)</a></li>
</ul>
<p>Requested by Bloomberg, M</p>
]]></content:encoded>
			<wfw:commentRss>http://castor.augsburg.edu/newbooks/?feed=rss2&#038;p=18469</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Logic in games / Johan van Benthem.</title>
		<link>http://castor.augsburg.edu/newbooks/?p=18340</link>
		<comments>http://castor.augsburg.edu/newbooks/?p=18340#comments</comments>
		<pubDate>Fri, 20 Feb 2015 08:27:00 +0000</pubDate>
		<dc:creator><![CDATA[Mike]]></dc:creator>
				<category><![CDATA[Dept:  Computer Science]]></category>
		<category><![CDATA[QA - Mathematics]]></category>

		<guid isPermaLink="false">http://castor.augsburg.edu/newbooks/?p=18340</guid>
		<description><![CDATA[Benthem, Johan van, 1949- Cambridge, MA London, England : The MIT Press, [2014];©2014 Added to CLICnet on 02/20/2015 Check CLICnet for availability Notes: Includes bibliographical references (pages 518-542) and index. Subjects: Game theory. Logic. Requested by Bloomberg, M and Steinetz, &#8230; <a href="http://castor.augsburg.edu/newbooks/?p=18340">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p><a href="http://clicnet.clic.edu/search/aBenthem, Johan van, 1949-">Benthem, Johan van, 1949-</a><br />
Cambridge, MA   London, England : The MIT Press, [2014];©2014<br />
Added to CLICnet on 02/20/2015</p>
<p><span id="more-18340"></span><br />
<a href="http://clicnet.clic.edu/record=b4840336">Check CLICnet for availability</a><br />
Notes:</p>
<ul>
<li>Includes bibliographical references (pages 518-542) and index.</li>
</ul>
<p>Subjects:</p>
<ul>
<li><a href="http://clicnet.clic.edu/search/dGame theory.">Game theory.</a></li>
<li><a href="http://clicnet.clic.edu/search/dLogic.">Logic.</a></li>
</ul>
<p>Requested by Bloomberg, M and Steinetz, E</p>
]]></content:encoded>
			<wfw:commentRss>http://castor.augsburg.edu/newbooks/?feed=rss2&#038;p=18340</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Mobile robotics : mathematics, models and methods / Alonzo Kelly, Carnegie Mellon University.</title>
		<link>http://castor.augsburg.edu/newbooks/?p=18313</link>
		<comments>http://castor.augsburg.edu/newbooks/?p=18313#comments</comments>
		<pubDate>Wed, 18 Feb 2015 07:50:00 +0000</pubDate>
		<dc:creator><![CDATA[Mike]]></dc:creator>
				<category><![CDATA[Dept:  Computer Science]]></category>
		<category><![CDATA[TJ - Mechanical Engineering and Machinery]]></category>

		<guid isPermaLink="false">http://castor.augsburg.edu/newbooks/?p=18313</guid>
		<description><![CDATA[Kelly, Alonzo. New York, NY, USA : Cambridge University Press, 2013. Added to CLICnet on 02/18/2015 Check CLICnet for availability Notes: Mobile Robotics offers comprehensive coverage of the essentials of the field suitable for both students and practitioners. Adapted from &#8230; <a href="http://castor.augsburg.edu/newbooks/?p=18313">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p><a href="http://clicnet.clic.edu/search/aKelly, Alonzo.">Kelly, Alonzo.</a><br />
New York, NY, USA : Cambridge University Press, 2013.<br />
Added to CLICnet on 02/18/2015</p>
<p><span id="more-18313"></span><br />
<a href="http://clicnet.clic.edu/record=b4840335">Check CLICnet for availability</a><br />
Notes:</p>
<ul>
<li> Mobile Robotics offers comprehensive coverage of the essentials of the field suitable for both students and practitioners. Adapted from Alonzo Kelly&#8217;s graduate and undergraduate courses, the content of the book reflects current approaches to developing effective mobile robots. Professor Kelly adapts principles and techniques from the fields of mathematics, physics and numerical methods to present a consistent framework in a notation that facilitates learning and highlights relationships between topics. This text was developed specifically to be accessible to senior level undergraduates in engineering and computer science, and includes supporting exercises to reinforce the lessons of each section. Practitioners will value Kelly&#8217;s perspectives on practical applications of these principles. Complex subjects are reduced to implementable algorithms extracted from real systems wherever possible, to enhance the real-world relevance of the text &#8212; Provided by publisher.</li>
<li>Includes bibliographical references and index.</li>
<li>Introduction &#8212; Math fundamentals &#8212; Numerical methods &#8212; Dynamics &#8212; Optimal estimation &#8212; State estimation &#8212; Control &#8212; Perception &#8212; Localization and mapping &#8212; Motion planning.</li>
</ul>
<p>Subjects:</p>
<ul>
<li><a href="http://clicnet.clic.edu/search/dMobile robots -- Textbooks.">Mobile robots &#8212; Textbooks.</a></li>
<li><a href="http://clicnet.clic.edu/search/dTextbooks. fast (OCoLC)fst01423863">Textbooks. fast (OCoLC)fst01423863</a></li>
</ul>
<p>Requested by Bloomberg, M and Steinetz, E</p>
]]></content:encoded>
			<wfw:commentRss>http://castor.augsburg.edu/newbooks/?feed=rss2&#038;p=18313</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
