Home | Amazing | Today | Tags | Publishers | Years | Search 
Information Technology Ethics: Cultural Perspectives
Information Technology Ethics: Cultural Perspectives
Information Technology Ethics: Cultural Perspectives takes a global approach to the diverse ethical issues created by information and communication technologies and their possible resolutions. Comprehensive chapters describe the problems and possibilities of genuinely global information ethics, which are urgently needed as information and...
How to Lie with Maps
How to Lie with Maps
Originally published to wide acclaim, this lively, cleverly illustrated essay on the use and abuse of maps teaches us how to evaluate maps critically and promotes a healthy skepticism about these easy-to-manipulate models of reality. Monmonier shows that, despite their immense value, maps lie. In fact, they must.

The second
...
The Architecture of the Visible (Technologies: Studies in Culture & Theory Series)
The Architecture of the Visible (Technologies: Studies in Culture & Theory Series)
Soon after the launch of the first Sputnik in 1957, Hannah Arendt observed in The Human Condition that for the first time 'an earth-born object made by m a n . . . moved in the proximity of the heavenly bodies as though it had been admitted tentatively to their sublime company', an event which she described as 'second in importance to no other, not...
Projects in Computing and Information Systems: A Student's Guide
Projects in Computing and Information Systems: A Student's Guide
Undertaking a project is a key component of nearly all computing/information systems degree programmes at both undergraduate and postgraduate levels. Projects in Computing and Information Systems covers the four key aspects of project work (planning, conducting, presenting and taking the project further) in chronological fashion, and...
Beginning C# 2008: From Novice to Professional, Second Edition
Beginning C# 2008: From Novice to Professional, Second Edition
This book is for anyone who wants to write good C# code—even if you have never programmed before. Writing good code can be a challenge—there are so many options, especially in a .NET language like C#. If you want to really get the best from a programming language, you need to know which features work best in which situations and...
The Boundary Element Method with Programming: For Engineers and Scientists
The Boundary Element Method with Programming: For Engineers and Scientists
This is a thorough, yet understandable text about the boundary element method (BEM), an attractive alternative to the finite element method (FEM). It not only explains the theory, but also deals with the implementation into computer code written in FORTRAN 95 (software can be freely downloaded). Applications range from potential problems to static...
NHibernate in Action
NHibernate in Action
In the classic style of Manning's "In Action" series, NHibernate in Action shows .NET developers how to use the NHibernate Object/Relational Mapping tool. This book is a translation from Java to .NET, as well as an expansion, of Manning's bestselling Hibernate in Action. All traces of Java have been carefully replaced by their .NET...
The Complete Idiot's Guide to Managing Your Money
The Complete Idiot's Guide to Managing Your Money
The Complete Idiot's Guide to Managing Your Money shows that any numbskull can master personal finance. In this second edition, a father-and-daughter writing team, Robert K. Heady and Christy Heady, give readers the best advice culled from their many years of experience in consumer rights and money management. The Headys believe that...
Historic Floors: Their History and Conservation (Butterworth - Heinemann Series in Conservation and Museology)
Historic Floors: Their History and Conservation (Butterworth - Heinemann Series in Conservation and Museology)
Leading authorities, archaeologists, architects and archivists consider the latest methods of recording and repairing cathedral floors, including those of cathedrals, country houses, the monumental tiled pavements of the Palace of Westminster and other public buildings. Management policies to protect outstanding floors in over-visited sites are...
Dictionary of Celtic Mythology (Oxford Paperback Reference)
Dictionary of Celtic Mythology (Oxford Paperback Reference)
The Celts were one of the great founding civilizations of Europe and the first North European people to emerge into recorded history, producing a vibrant labyrinth of mythological tales and sagas that have influenced the literary traditions of Europe and the world.

The first A-Z reference of its kind, Dictionary of Celtic Mythology
...
Open Source E-mail Security (Kaleidoscope)
Open Source E-mail Security (Kaleidoscope)
In this book you'll learn the technology underlying secure e-mail systems, from the protocols involved to the open source software packages used to implement e-mail security. This book explains the secure MIME (S/MIME) protocol and how it is used to protect data transmitted across the Internet. It also explains the concepts crucial to stopping...
Open Source for Windows Administrators (Administrator's Advantage Series)
Open Source for Windows Administrators (Administrator's Advantage Series)
The Most Comprehensive Reference on Open Source Apps for Windows Users!

This book introduces Microsoft® Windows® administrators to the world of Open Source applications in order to save time and money. It provides readers with information and techniques for using the appropriate Open Source applications in a variety of situations, such...

Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy