Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cyberspace Textuality: Computer Technology and Literary Theory
Cyberspace Textuality: Computer Technology and Literary Theory
Computers were once thought of as number-crunching machines; but for most of us it is their ability to create worlds and process words that have made them into a nearly indispensable part of life. As Jacques Leslie puts it, if computers are everywhere, it is because they have grown into "poetry machines." The term "cyberspace"...
From Writing to Computers
From Writing to Computers
... the broad and clear analysis of writing and language, and of automata theory, formal logic, and computability theory he uses to reach [his conclusion] is well worth reading.
–H. D. Warner, Western New England College

From Writing to Computers takes as its central theme the issue of a
...
Computer Networks (5th Edition)
Computer Networks (5th Edition)

This book is now in its fifth edition. Each edition has corresponded to a different phase in the way computer networks were used. When the first edition appeared in 1980, networks were an academic curiosity. When the second edition appeared in 1988, networks were used by universities and large businesses. When the third edition appeared in...

The Audio Programming Book
The Audio Programming Book

This comprehensive handbook of mathematical and programming techniques for audio signal processing will be an essential reference for all computer musicians, computer scientists, engineers, and anyone interested in audio. Designed to be used by readers with varying levels of programming expertise, it not only provides the foundations for...

Modelling Computing Systems: Mathematics for Computer Science (Undergraduate Topics in Computer Science)
Modelling Computing Systems: Mathematics for Computer Science (Undergraduate Topics in Computer Science)

This engaging text presents the fundamental mathematics and modelling techniques for computing systems in a novel and light-hearted way, which can be easily followed by students at the very beginning of their university education. Key concepts are taught through a large collection of challenging yet fun mathematical games and logical puzzles...

Macintosh Switcher's Guide (Wordware Macintosh Library)
Macintosh Switcher's Guide (Wordware Macintosh Library)
Maybe you saw the Switcher advertisements on television or the
web. Maybe you were drawn into an Apple Store by the beautiful
machine in the display. Maybe you’ve always thought a little differently,
or wanted something a little different for a change.
Whatever the reason for your switch to Macintosh, here you are....
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
The mightiest fortresses in the world can fail, and when that happens all you can do (you being the person responsible for castle security) is figure out what went wrong, what damage was done, and by whom. If the castle was located in the right kind of kingdom--to take a metaphor too far--you can hope to prosecute the perpetrator. Computer...
Artificial Mind System: Kernel Memory Approach (Studies in Computational Intelligence)
Artificial Mind System: Kernel Memory Approach (Studies in Computational Intelligence)

This book is written from an engineer's perspective of the mind. "Artificial Mind System" exposes the reader to a broad spectrum of interesting areas in general brain science and mind-oriented studies. In this research monograph a picture of the holistic model of an artificial mind system and its behaviour is drawn, as concretely as...

Personal Web Usage in the Workplace: A Guide to Effective Human Resources Management
Personal Web Usage in the Workplace: A Guide to Effective Human Resources Management

An important aspect of managing human capital in the 21st century workplace is managing the interface between humans and information technology, particularly the World Wide Web. The Web has changed not only how and where business is conducted, but also how and where work is done. Personal web usage has created many desirable organizational...

Solaris Application Programming (Solaris Series)
Solaris Application Programming (Solaris Series)
This book is a guide to getting the best performance out of computers running the Solaris operating system. The target audience is developers and software architects who are interested in using the tools that are available, as well as those who are interested in squeezing the last drop of performance out of the system.

The book caters to
...
Computers and the Law: An Introduction to Basic Legal Principles and Their Application in Cyberspace
Computers and the Law: An Introduction to Basic Legal Principles and Their Application in Cyberspace

Computers and the Law provides readers with an introduction to the legal issues associated with computing - particularly in the massively networked context of the Internet. Assuming no previous knowledge of the law or any special knowledge of programming or computer science, this textbook offers undergraduates of all disciplines and...

Syntactic Pattern Recognition: An Introduction (Applied Mathematics and Computation; No. 14)
Syntactic Pattern Recognition: An Introduction (Applied Mathematics and Computation; No. 14)
This book was written to provide students, engineers, and scientists involved in pattern recognition, digital image processing, and artificial intelligence with a comprehensive introduction to the concepts and tech- niques of syntactic pattern recognition.

Syntactic pattern recognition is concerned with the
...
unlimited object storage image
Result Page: 148 147 146 145 144 143 142 141 140 139 138 137 136 135 134 133 132 131 130 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy