Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Info We Trust: How to Inspire the World with Data
Info We Trust: How to Inspire the World with Data

How do we create new ways of looking at the world? Join award-winning data storyteller RJ Andrews as he pushes beyond the usual how-to, and takes you on an adventure into the rich art of informing.

Creating Info We Trust is a craft that puts the world into forms that are strong and true.  It begins with maps,...

The Craft of System Security
The Craft of System Security

"I believe The Craft of System Security is one of the best software security books on the market today. It has not only breadth, but depth, covering topics ranging from cryptography, networking, and operating systems--to the Web, computer-human interaction, and how...

Frommer's New Orleans 2011 (Frommer's Complete Guides)
Frommer's New Orleans 2011 (Frommer's Complete Guides)
New Orleans should come with a warning label. No, no, not about hurricanes. Forget that. That’s like solely identifying San Francisco and Los Angeles with earthquakes. No, this is about the city itself. See, there’s this group of residents whom locals call the “never lefts.” They are the people who...
Border and Rule: Global Migration, Capitalism, and the Rise of Racist Nationalism
Border and Rule: Global Migration, Capitalism, and the Rise of Racist Nationalism

In Border and Rule, one of North America’s foremost thinkers and immigrant rights organizers delivers an unflinching examination of migration as a pillar of global governance and gendered racial class formation.

Harsha Walia disrupts easy explanations for the migrant and refugee
...

Artificial General Intelligence: 4th International Conference, AGI 2011, Mountain View
Artificial General Intelligence: 4th International Conference, AGI 2011, Mountain View

The original goal of the AI field was the construction of “thinking machines” – that is, computer systems with human-like general intelligence. Due to the difficulty of this task, for the last few decades the majority of AI researchers have focused on what has been called “narrow AI” – the production...

Domain Architectures : Models and Architectures for UML Applications
Domain Architectures : Models and Architectures for UML Applications
The last two decennia have witnessed many advances in the area of software
development. The advent of object-oriented programming languages and modelling
languages such as Unified Modeling Language (UML) has increased our ability
as developers to design and realize large and enterprise-wide software systems.
However, software
...
Data-Driven Services with Silverlight 2
Data-Driven Services with Silverlight 2
This comprehensive book teaches you how to build data-rich business applications with Silverlight 2 that draw on multiple sources of data. Packed with reusable examples, Data-Driven Services with Silverlight 2 covers all of the data access and web service tools you need, including data binding, the LINQ data querying component, RESTful and...
A Primer on Scientific Programming with Python (Texts in Computational Science and Engineering)
A Primer on Scientific Programming with Python (Texts in Computational Science and Engineering)

The aim of this book is to teach computer programming using examples from mathematics and the natural sciences. We have chosen to use the Python programming language because it combines remarkable power with very clean, simple, and compact syntax. Python is easy to learn and very well suited for an introduction to computer programming. Python...

Material Girls: Why Reality Matters for Feminism
Material Girls: Why Reality Matters for Feminism

'A clear, concise, easy-to-read account of the issues between sex, gender and feminism . . . an important book' Evening Standard

'A call for cool heads at a time of great heat and a vital reminder that revolutions don't always end well' Sunday Times

...

Hacking For Dummies (Computer/Tech)
Hacking For Dummies (Computer/Tech)
Welcome to Hacking For Dummies, 2nd Edition. This book outlines — in plain English — computer hacker tricks and techniques that you can use to assess the security of your own information systems, find security vulnerabilities, and fix the weaknesses before criminal hackers and rogue insiders have an opportunity to take advantage of...
The Multilingual Internet: Language, Culture, and Communication Online
The Multilingual Internet: Language, Culture, and Communication Online
This book marks the culmination of the second stage of a two-stage project initiated in 2002. In that year, we co-edited a special issue of the Journal of Computer-Mediated Communication about multilingualism on the Internet (published in 2003). Our call for papers, distributed online, yielded far more proposals than we had expected, and many of...
Why Women Should Rule the World
Why Women Should Rule the World
What would happen if women ruled the world?

Everything could change, according to former White House press secretary Dee Dee Myers. Politics would be more collegial. Businesses would be more productive. And communities would be healthier. Empowering women would make the world a better place—not because women are the same as men, but...

unlimited object storage image
Result Page: 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy