Home | Amazing | Today | Tags | Publishers | Years | Search 
Why We Fight: One Man's Search for Meaning Inside the Ring
Why We Fight: One Man's Search for Meaning Inside the Ring

A physical and philosophical mediation on why we are drawn to fight each other for sport, what happens to our bodies and brains when we do, and what it all means

Anyone with guts or madness in him can get hit by someone who knows how; it takes a different kind of madness, a more persistent
...

Info We Trust: How to Inspire the World with Data
Info We Trust: How to Inspire the World with Data

How do we create new ways of looking at the world? Join award-winning data storyteller RJ Andrews as he pushes beyond the usual how-to, and takes you on an adventure into the rich art of informing.

Creating Info We Trust is a craft that puts the world into forms that are strong and true.  It begins with maps,...

Security for Software Engineers
Security for Software Engineers

Security for Software Engineers is designed to introduce security concepts to undergraduate software engineering students. The book is divided into four units, each targeting activities that a software engineer will likely be involved in within industry.

The book explores the key areas of attack...

Practical Security: Simple Practices for Defending Your Systems
Practical Security: Simple Practices for Defending Your Systems

Most security professionals don't have the words "security" or "hacker" in their job title. Instead, as a developer or admin you often have to fit in security alongside your official responsibilities - building and maintaining computer systems. Implement the basics of good security now, and...

Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations
Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations

“We are dropping cyber bombs. We have never done that before.”—U.S. Defense Department official

A new era of war fighting is emerging for the U.S. military. Hi-tech weapons have given way to hi tech in a number of instances recently:

A computer virus is unleashed that...

Malicious Attack Propagation and Source Identification (Advances in Information Security)
Malicious Attack Propagation and Source Identification (Advances in Information Security)

This book covers and makes four major contributions:

1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks;

2) proposing a novel approach to identify rumor sources in time-varying networks;

3) developing a fast approach to identify...

Service Life and Durability of Reinforced Concrete Structures: Selected Papers of the 8th International RILEM PhD Workshop held in Marne-la-Vallée, ... September 26-27, 2016 (RILEM Bookseries (17))
Service Life and Durability of Reinforced Concrete Structures: Selected Papers of the 8th International RILEM PhD Workshop held in Marne-la-Vallée, ... September 26-27, 2016 (RILEM Bookseries (17))

This volume contains the proceedings of the 8th International PhD Student Workshop on Service Life and Durability of Reinforced Concrete Structures that was held in Marne-la-Vallée, France, on September the 26th and 27th 2016.

Topics discussed in the book are related to durability performance of reinforced...

Smart Card Research and Advanced Applications: 17th International Conference, CARDIS 2018, Montpellier, France, November 12–14, 2018, Revised Selected ... (Lecture Notes in Computer Science (11389))
Smart Card Research and Advanced Applications: 17th International Conference, CARDIS 2018, Montpellier, France, November 12–14, 2018, Revised Selected ... (Lecture Notes in Computer Science (11389))
These proceedings contain the papers selected for presentation at the 17th Smart Card Research and Advanced Applications Conference (CARDIS 2018), which was held in Montpellier, France, during November 12–14, 2018, and organized by the Montpellier Laboratory of Informatics, Robotics and Microelectronics (LIRMM)....
Upheaval: Turning Points for Nations in Crisis
Upheaval: Turning Points for Nations in Crisis
A "riveting and illuminating" Bill Gates Summer Reading pick about how and why some nations recover from trauma and others don't (Yuval Noah Harari), by the Pulitzer Prize-winning author of the landmark bestseller Guns, Germs, and Steel.

In his international...
Integration of WSNs into Internet of Things: A Security Perspective (Internet of Everything (IoE))
Integration of WSNs into Internet of Things: A Security Perspective (Internet of Everything (IoE))

The Internet has gone from an Internet of people to an Internet of Things (IoT). This has brought forth strong levels of complexity in handling interoperability that involves the integrating of wireless sensor networks (WSNs) into IoT. This book offers insights into the evolution, usage, challenges, and proposed countermeasures...

Why We Are Restless: On the Modern Quest for Contentment (New Forum Books, 65)
Why We Are Restless: On the Modern Quest for Contentment (New Forum Books, 65)

A compelling exploration of how our pursuit of happiness makes us unhappy

We live in an age of unprecedented prosperity, yet everywhere we see signs that our pursuit of happiness has proven fruitless. Dissatisfied, we seek change for the sake of change?even if it means undermining the foundations of our
...

 
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy