21 Recipes for Mining Twitter

21 Recipes for Mining TwitterMillions of public Twitter streams harbor a wealth of data, and once you mine them, you can gain some valuable insights. This short and concise book offers a collection of recipes to help you extract nuggets of Twitter information using easy-to-learn Python tools. Each recipe offers a discussion of how and why the solution works, so you can quickly adapt it to fit your particular needs. The recipes include techniques to:

  • Use OAuth to access Twitter data
  • Create and analyze graphs of retweet relationships
  • Use the streaming API to harvest tweets in realtime
  • Harvest and analyze friends and followers
  • Discover friendship cliques
  • Summarize webpages from short URLs

This book is a perfect companion to O’Reilly's Mining the Social Web.

Price: $29.99

Click here to buy from Amazon

USAF Cyberspace Operations Doctrine Document – AFDD 3-12

USAF Cyberspace Operations Doctrine Document - AFDD 3-12AFDD 3-12 is the US Air Force’s foundational doctrine publication for Air Force operations in, through, and from the cyberspace domain. It defines Cyberspace Superiority and speaks to US Air Force support of maintaining Cyberspace Superiority, a common military function.

“Today, we live in a globally-networked society that is increasingly dependent upon cyberspace access and security. Our ability to gain and maintain superiority in cyberspace has become essential to our ability to deliver global reach, power, and vigilance. As an integral member of the joint warfighting team, the Air Force is committed to growing, sustaining, and presenting highly skilled and well-equipped forces to joint force commanders who can deliver decisive effects in, from, and through cyberspace, while assuring our mission against an asymmetric cyber threat.

Freedom of action in the cyberspace domain enables our command, control, communication, computers, intelligence, surveillance, and reconnaissance capabilities. Our modern defenses, industrial base, and global commerce, as well as that of our nation’s enemies, depend on free use of land, sea, air, space, and cyberspace. Leverage in cyberspace affords influence and control across all other domains. This leverage increases our forces’ access, speed, reach, stealth, and precision.

Controlling the portions of cyberspace integral to our mission is a fundamental prerequisite to effective operations across the range of military operations. While we appreciate the power that cyber-enabled capabilities add, we also maintain a healthy respect for the asymmetric power that cyberspace affords our adversaries. We must maintain a constant commitment to educate, train, and equip our Airman to prevail in the contested domain of cyberspace.

In the past decade, technological advances have provided the means to generate decisive and magnified effects in domains that traditionally could only be achieved via kinetic means. We must continually adapt our operating concepts to leverage emerging cyberspace capabilities to ensure the Air Force maintains the decisive advantage over our adversaries.”

MAURICE H. FORSYTH
Major General, USAF
Commander, LeMay Center for Doctrine
Development and Education

Download AFDD 3-12

 

The Net Delusion: The Dark Side of Internet Freedom

The Net Delusion: The Dark Side of Internet Freedom“The revolution will be Twittered!” declared journalist Andrew Sullivan after protests erupted in Iran in June 2009. Yet for all the talk about the democratizing power of the Internet, regimes in Iran and China are as stable and repressive as ever. In fact, authoritarian governments are effectively using the Internet to suppress free speech, hone their surveillance techniques, disseminate cutting-edge propaganda, and pacify their populations with digital entertainment. Could the recent Western obsession with promoting democracy by digital means backfire?

In this spirited book, journalist and social commentator Evgeny Morozov shows that by falling for the supposedly democratizing nature of the Internet, Western do-gooders may have missed how it also entrenches dictators, threatens dissidents, and makes it harder—not easier—to promote democracy. Buzzwords like “21st-century statecraft” sound good in PowerPoint presentations, but the reality is that “digital diplomacy” requires just as much oversight and consideration as any other kind of diplomacy.
 
Marshaling compelling evidence, Morozov shows why we must stop thinking of the Internet and social media as inherently liberating and why ambitious and seemingly noble initiatives like the promotion of “Internet freedom” might have disastrous implications for the future of democracy as a whole. 

Price: $27.95

Click here to buy from Amazon

Mining the Social Web: Data Mining Facebook, Twitter, LinkedIn, Google+, GitHub, and More

Rating: 
Amazon Price: $44.99 $36.19 You save: $8.80 (20%). (as of June 23, 2017 01:50 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

How can you tap into the wealth of social web data to discover who’s making connections with whom, what they’re talking about, and where they’re located? With this expanded and thoroughly revised edition, you’ll learn how to acquire, analyze, and summarize data from all corners of the social web, including Facebook, Twitter, LinkedIn, Google+, GitHub, email, websites, and blogs.
Employ the Natural Language Toolkit, NetworkX, and other scientific computing tools to mine popular social web sites Apply advanced text-mining techniques, such as clustering and TF-IDF, to extract meaning from human language data Bootstrap interest graphs from GitHub by discovering affinities among people, programming languages, and coding projects Build interactive visualizations with D3.js, an extraordinarily flexible HTML5 and JavaScript toolkit Take advantage of more than two-dozen Twitter recipes, presented in O’Reilly’s popular "problem/solution/discussion" cookbook format
The example code for this unique data science book is maintained in a public GitHub repository. It’s designed to be easily accessible through a turnkey virtual machine that facilitates interactive learning with an easy-to-use collection of IPython Notebooks.