 |
|
 Devices of the Soul: Battling for Our Selves in an Age of Machines"Self-forgetfulness is the reigning temptation of the technological era. This is why we so readily give our assent to the absurd proposition that a computer can add two plus two, despite the obvious fact that it can do nothing of the sort--not if we have in mind anything remotely resembling what we do when we add numbers. In the computer's... |  |  Code: Version 2.0The "alarming and impassioned"* book on how the Internet is redefining constitutional law, now reissued as the first popular book revised online by its readers (*New York Times)
There's a common belief that cyberspace cannot be regulated-that it is, in its very essence, immune from the government's (or anyone else's)... |  |  Digital Watermarking for Digital MediaDigital media, like audio, video, images, and other multimedia documents, can be protected against copyright infringements with invisible, integrated patterns. Such methods are based on steganography and digital watermarking techniques. Most watermarks are inserted as a plain-bit or adjusted digital signal using a key-based embedding algorithm. The... |
|
 The Definitive Guide to symfonyDeveloping a new web application should not mean reinventing the wheel. Thats why a framework is an essential item in your development toolbox. It helps you respect coding standards; write bulletproof, maintainable code; and focus on business rules rather than waste time on repetitive tasks. This book introduces you to symfony, the leading... |  |  IP LocationIn today's vast world of global commerce with users that are more nomadic than ever, the need for reliable, secure, and efficient access technologies is rapidly increasing. IP Location provides you with a guided tour of location determination, tackling this new technology head on and addressing all aspects of location management,... |  |  Computer Security and CryptographyGain the skills and knowledge needed to create effective data security systems
This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect... |
|
 |  |  Cryptography for Internet & Database ApplicationsCryptography is the gold standard for security. It is used to protect the transmission and storage of data between two parties by encrypting it into an unreadable format. Cryptography has enabled the first wave of secure transmissions, which has helped fuel the growth of transactions like shopping, banking, and finance over the world's biggest... |  |  Use Case Driven Object Modeling with UML: Theory and PracticeUse Case Driven Object Modeling with UML&emdash;Theory and Practice shows how to drive an object-oriented software design from use case all the way through coding and testing, based on the minimalist, UML-based ICONIX process. In addition to a comprehensive explanation of the foundations of the approach, the book makes extensive use of... |
|
 |  |  S60 Programming: A Tutorial Guide (Symbian Press)Based on the authors' experiences in developing and teaching Symbian OS, this practical guide is perfect for programmers and provides a series of example-based scenarios that show how to develop Symbian applications.
- Exercises walk the reader through the initial development of a console-based card game engine to a graphical user
... |  |  Web Analytics For Dummies (Computers)Performing your first Web site analysis just got a whole lot easier. Web Analytics For Dummies offers everything you need to know to nail down and pump up the ROI on your Web presence. It explains how to get the stats you need, then helps you analyze and apply that information to improve traffic and click-through rate on your Web... |
|
| Result Page: 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 |