 |
|
 Geekonomics: The Real Cost of Insecure SoftwareYou may or may not have an inkling of what insecure software is, how it impacts your life, or why you should be concerned. That is OK. This book attempts to introduce you to the full scope and consequence of software's impact on modern society without baffling the reader with jargon only experts understand or minutia only experts care about. The... |  |  |  |  Information Operations PlanningInformation operations involve the use of military information and how it is gathered, manipulated, and fused. It includes such critical functions asintelligence, surveillance, reconnaissance, command and control, communications, and precision navigation. Separating myth from reality, this authoritative resource provides military professionals with... |
|
 Pattern Recognition, Second EditionPattern recognition is becoming increasingly important in the age of automation and information handling and retrieval. This book provides the most comprehensive treatment available of pattern recognition, from an engineering perspective. Developed through more than ten years of teaching experience, Pattern Recognition is appropriate for both... |  |  |  |  Web.Studies: Rewiring Media Studies for the Digital Age'Web.Studies sets the agenda for a new period of media research, one that gets to grips with the significance of new communications technologies and the global spaces in which they are so rapidly developing. I believe that this book will help considerably to take media studies in new directions.' - Professor Kevin Robins, Goldsmiths College,... |
|
 The Physics of Information Technology"...throughout the text, Gershenfeld retains much of the conversational tone and spontaneity of a lecture. At its best, this makes for enjoyable reading, with interesting tidbits and asides that enliven the discussions....Gershenfeld's book will be valuable for physical scientists looking for an enjoyable introduction to the information... |  |  Access 2002 Programming by ExampleThis book addresses an unmet need in this topic area. It is a complete beginner's tutorial resource to tips, troubleshooting, techniques, and program development for Access 2002. The book covers fundamentals such as database normalization, query design, object manipulation, and optimization and custom programming for forms and reports. It makes the... |  |  Data Hiding Fundamentals and Applications: Content Security in Digital MultimediaMultimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at our finger tips, its rapid growth has raised some weighty security concerns with... |
|
 X Internet: The Executable and Extendable InternetEvolving from the current PSTN to Internet Telephony is not an easy task. … The two authors [of this book] are uniquely qualified to explain how this evolution can be architected. … Both authors have used their unique expertise to produce this very first book on the topic. -From the Foreword by Roch Glitho, Ph.D.,... |  |  |  |  Flash 3D: Animation, Interactivity, and GamesPush your creative ideas to the next level in content delivery. Use real and simulated 3D space in your Flash games and interactive systems.
3D possibilities offer an untapped creative approach to thinking and designing with Flash. Tap into this medium by: * Creating reusable templates to reduce costs and cycle time for... |
|
Result Page: 128 127 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 |