Home | Amazing | Today | Tags | Publishers | Years | Search 
Geekonomics: The Real Cost of Insecure Software
Geekonomics: The Real Cost of Insecure Software
You may or may not have an inkling of what insecure software is, how it impacts your life, or why you should be concerned. That is OK. This book attempts to introduce you to the full scope and consequence of software's impact on modern society without baffling the reader with jargon only experts understand or minutia only experts care about. The...
Developing Cultural Adaptability: How to Work Across Differences (Center for Creative Leadership)
Developing Cultural Adaptability: How to Work Across Differences (Center for Creative Leadership)

Being able to communicate effectively across cultural differences, understanding how to negotiate complex social situations, and being familiar with the customs and norms of many cultures are important skills in organizations today. Perhaps even more important than possessing those essential pieces of cultural knowledge is the skill of cultural...

Information Operations Planning
Information Operations Planning
Information operations involve the use of military information and how it is gathered, manipulated, and fused. It includes such critical functions asintelligence, surveillance, reconnaissance, command and control, communications, and precision navigation. Separating myth from reality, this authoritative resource provides military professionals with...
Pattern Recognition, Second Edition
Pattern Recognition, Second Edition
Pattern recognition is becoming increasingly important in the age of automation and information handling and retrieval.
This book provides the most comprehensive treatment available of pattern recognition, from an engineering perspective. Developed through more than ten years of teaching experience, Pattern Recognition is appropriate for both
...
QuickTime for the Web: For Windows and Macintosh, Third Edition (QuickTime Developer Series)
QuickTime for the Web: For Windows and Macintosh, Third Edition (QuickTime Developer Series)
QuickTime is the industry standard for developing and distributing multimedia content on the Web and CD-ROM, for both Windows and Macintosh computers. Its powerful, extensible software architecture lets you deliver state-of-the-art digital content over the Web or on CD-ROM.

This third edition of the best-selling and award-winning
...
Web.Studies: Rewiring Media Studies for the Digital Age
Web.Studies: Rewiring Media Studies for the Digital Age
'Web.Studies sets the agenda for a new period of media research, one that gets to grips with the significance of new communications technologies and the global spaces in which they are so rapidly developing. I believe that this book will help considerably to take media studies in new directions.' - Professor Kevin Robins, Goldsmiths College,...
The Physics of Information Technology
The Physics of Information Technology
"...throughout the text, Gershenfeld retains much of the conversational tone and spontaneity of a lecture. At its best, this makes for enjoyable reading, with interesting tidbits and asides that enliven the discussions....Gershenfeld's book will be valuable for physical scientists looking for an enjoyable introduction to the information...
Access 2002 Programming by Example
Access 2002 Programming by Example
This book addresses an unmet need in this topic area. It is a complete beginner's tutorial resource to tips, troubleshooting, techniques, and program development for Access 2002. The book covers fundamentals such as database normalization, query design, object manipulation, and optimization and custom programming for forms and reports. It makes the...
Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia
Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia
Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at our finger tips, its rapid growth has raised some weighty security concerns with...
X Internet: The Executable and Extendable Internet
X Internet: The Executable and Extendable Internet
Evolving from the current PSTN to Internet Telephony is not an easy task. … The two authors [of this book] are uniquely qualified to explain how this evolution can be architected. … Both authors have used their unique expertise to produce this very first book on the topic.
-From the Foreword by Roch Glitho, Ph.D.,
...
Securing Windows Server 2008: Prevent Attacks from Outside and Inside Your Organization
Securing Windows Server 2008: Prevent Attacks from Outside and Inside Your Organization
With the introduction of new revisions to Microsoft products—for example, Windows, Exchange, and Communications Server—we have seen a trend toward “roles” within each product, as opposed to the various products being an all-in-one type of solution (as with Exchange 2007), or being additional features that work as a snap-in,...
Flash 3D: Animation, Interactivity, and Games
Flash 3D: Animation, Interactivity, and Games
Push your creative ideas to the next level in content delivery.
Use real and simulated 3D space in your Flash games and interactive systems.

3D possibilities offer an untapped creative approach to thinking and designing with Flash. Tap into this medium by:
* Creating reusable templates to reduce costs and cycle time for
...
Result Page: 128 127 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy