Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Technological Turf Wars: A Case Study of the Computer Antivirus Industry
Technological Turf Wars: A Case Study of the Computer Antivirus Industry
Computer security is a technical and social problem. It is just as much about social relationships as it is about computers as tools. Internet security professionals are as concerned with how people use information as they are with how machines manipulate and process that information. This book is a case study of how the knowledge systems...
Embodied Conceptualization or Neural Realization: A Corpus-Driven Study of Mandarin Synaesthetic Adjectives (Frontiers in Chinese Linguistics)
Embodied Conceptualization or Neural Realization: A Corpus-Driven Study of Mandarin Synaesthetic Adjectives (Frontiers in Chinese Linguistics)
This book focuses on linguistic synaesthesia in a hitherto less-studied language – Mandarin Chinese – and adopts a corpus-driven approach to support the analysis and argumentation. The study identifies directional tendencies and underlying mechanisms for Mandarin synaesthetic adjectives. By doing so, it not only provides an...
Information Warfare: corporate attack and defence in a digital world (Computer Weekly Professional)
Information Warfare: corporate attack and defence in a digital world (Computer Weekly Professional)
The idea for this book came out of a need to find a text for a unit in Information Warfare given to Doctor of Business Administration students. Most of the existing texts had a military flavour and so did not suit our task. Others concentrated on security aspects and assumed some level of knowledge in this area. What we wanted was a text that...
Your Leadership Story: Use Your Story to Energize, Inspire, and Motivate
Your Leadership Story: Use Your Story to Energize, Inspire, and Motivate

Stories have power. They move people in a way that facts and figures can't. Many leaders use stories as a tool, but leadership development expert Tim Tobin says most have no idea what tale their own leadership is telling. He shows how, by thinking of your career as a narrative—with a plot, characters, and an...

eBay Hacks, 2nd Edition: Tips & Tools for Bidding, Buying, and Selling
eBay Hacks, 2nd Edition: Tips & Tools for Bidding, Buying, and Selling
Whatever you call it--an online auction house, the world's largest flea market, or a vast social experiment--no metaphor completely describes the huge trading community that is eBay. Underneath it all, eBay is also a computer program and a complex socio-economic system, requiring experience, finesse, and the right tools to master.

...
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
The mightiest fortresses in the world can fail, and when that happens all you can do (you being the person responsible for castle security) is figure out what went wrong, what damage was done, and by whom. If the castle was located in the right kind of kingdom--to take a metaphor too far--you can hope to prosecute the perpetrator. Computer...
Technology-Supported Environments for Personalized Learning: Methods and Case Studies (Premier Reference Source)
Technology-Supported Environments for Personalized Learning: Methods and Case Studies (Premier Reference Source)

Responding to the specific needs of each student, personalized learning has the potential to refocus education on the individual rather than the institution. Technology-Supported Environments for Personalized Learning: Methods and Case Studies explores the metaphor of anytime and anywhere individual education as well as the idea of...

BIRT: A Field Guide to Reporting (The Eclipse Series)
BIRT: A Field Guide to Reporting (The Eclipse Series)

The first in a two-book series about Business Intelligence and Reporting Technology, BIRT: A Field Guide to Reporting introduces reporting to a broad base of users. Built on the Eclipse platform, this exciting technology makes it possible for programmers and non-programmers to build and deploy complex reports with...

Artificial Intelligence and Literary Creativity: Inside the Mind of Brutus, A Storytelling Machine
Artificial Intelligence and Literary Creativity: Inside the Mind of Brutus, A Storytelling Machine

Now that IBM's Deep Blue computer beat the world's greatest human chess player, Gary Kasparov, this book will see if a story can be written better by a human or a machine.

This book marks the marriage of logic and creativity.

While it may be true that incompatible humans often wed, there are doubtless unions of a less palpable...

The Mikado Method
The Mikado Method

Summary

The Mikado Method is a book written by the creators of this process. It describes a pragmatic, straightforward, and empirical method to plan and perform non-trivial technical improvements on an existing software system. The method has simple rules, but the applicability is vast. As you read,...

Metaphors For God's Time in Science and Religion
Metaphors For God's Time in Science and Religion
Metaphors for God's Time in Science and Religion examines the exploratory work of metaphors for time in astrophysical cosmology, chaos theory, evolutionary biology and neuroscience. Stephen Happel claims that the Christian God is intimately involved at every level of physical and biological science. He compares how scientists and...
Swarm Intelligence: From Natural to Artificial Systems (Santa Fe Institute Studies on the Sciences of Complexity)
Swarm Intelligence: From Natural to Artificial Systems (Santa Fe Institute Studies on the Sciences of Complexity)
Social insects--ants, bees, termites, and wasps--can be viewed as powerful problem-solving systems with sophisticated collective intelligence. Composed of simple interacting agents, this intelligence lies in the networks of interactions among individuals and between individuals and the environment. A fascinating subject, social insects are also a...
unlimited object storage image
Result Page: 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy