 |
|
|
 Bionics for the Evil GeniusThe best-selling Evil Genius format provides hobbyists with a fun and inexpensive way to learn bionics via 25 complete projects. Once the focus of popular 70's TV, bionics (integrating mechanical and electronic materials with living matter) are being used more than ever to replace or repair physiological or anatomical functions or disorders.... |  |  On the Way to the Web: The Secret History of the Internet and Its FoundersOn the Way to the Web: The Secret History of the Internet and Its Founders is an absorbing chronicle of the inventive, individualistic, and often cantankerous individuals who set the Internet free. Michael A. Banks describes how the online population created a new culture and turned a new frontier into their vision of the... |  |  40 Best Machine Code Routines for the ZX SpectrumThe aim of this volume is to provide both the beginner and the experienced computer user with a ready source of reference on a number of useful, interesting or entertaining machine code routines for the ZX Spectrum. To this end the book is divided into two sections. The Section A describes the features of the Spectrum which are of interest to the... |
|
 |  |  SAS Stat Studio 3.1: User's GuideDescribes how to use the Stat Studio GUI to conduct exploratory data analysis and standard statistical analyses.
The following release notes pertain to SAS Stat Studio 3.1.
• Stat Studio requires SAS 9.2.
• The phase 1 release of SAS 9.2 does not support running SAS as a remote workspace server.... |  |  |
|
 Pairing-Based Cryptography Pairing 2008: Second International Conference, Egham, UK, September 1-3, 2008, Proceedings (Lecture Notes in Computer Science)This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, Pairing 2008, held in London, UK, in September 2008.
The 20 full papers, presented together with the contributions resulting from 3 invited talks, were carefully reviewed and selected from 50 submissions. The contents... |  |  How to Lie with MapsOriginally published to wide acclaim, this lively, cleverly illustrated essay on the use and abuse of maps teaches us how to evaluate maps critically and promotes a healthy skepticism about these easy-to-manipulate models of reality. Monmonier shows that, despite their immense value, maps lie. In fact, they must.
|  |  Hacker Debugging Uncovered (Uncovered series)Hacking is a natural need of many sentient beings. They pass along the thorny path of understanding the true essence of surrounding things, bent on destruction. Just look around: Atomic scientists split atoms, analysts split long molecules into lots of smaller ones, and mathematicians actively use decomposition. And not one of... |
|
Result Page: 669 668 667 666 665 664 663 662 661 660 659 658 657 656 655 654 653 |