 |
|
|
 |  |  Start with Why: How Great Leaders Inspire Everyone to Take Action
This book is about a naturally occurring pattern, a way of thinking,
acting and communicating that gives some leaders the ability to
inspire those around them. Although these "natural-born leaders"
may have come into the world with a predisposition to inspire, the
ability is not reserved for them exclusively. We can... |  |  Physical-Layer Security: From Information Theory to Security Engineering
This book is the result of more than five years of intensive research in collaboration with a
large number of people. Since the beginning, our goal has been to understand at a deeper
level how information-theoretic security ideas can help build more secure networks and
communication systems. Back in 2008, the actual planwas to... |
|
 |  |  Writing for Digital Media
In the digital age, we are all consumers and producers, readers and publishers
alike. The Internet has made it possible for anyone to publish his or her writing
online almost instantaneously for all the world to read.
The evolution of digital media has introduced both unprecedented challenges
and opportunities for... |  |  |
|
 Learning iPad Programming: A Hands-on Guide to Building iPad Apps with iOS 5
Learning iPad Programming walks you through the process of building PhotoWheel (free on the App Store), a photo management and sharing app that leverages every aspect of iOS 5. With PhotoWheel, you can organize your favorite photos into albums, share photos with family and friends, view them on your TV using AirPlay and... |  |  New Literacies: Everyday Practices and Social Learning
“Like a compass guiding you to what’s important and why in this rapidly evolving field, this new edition is utterly stimulating but also thoughtful and measured.”
Daniel Cassany, Literacy Researcher and Teacher, Universitat Pompeu Fabra, Barcelona, Spain
"Essential reading for those... |  |  The History of Information Security: A Comprehensive Handbook
Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties.
... |
|
Result Page: 25 24 23 22 21 20 19 18 17 16 |