|
|
|
|
|
Stealing the Network: How to Own an IdentityThe first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.
In this third installment, the all-star cast of authors tackle one of the... | | Artificial Cognition SystemsThe central questions confronting artificial intelligence and cognitive science revolve around the nature of meaning and of mind. Minds are presumed to be the processors of mental content, where that content has the capacity to influence our speech and other behavior. The hard part is figuring out how that is done. Mental states must exercise... | | Information Brokering Across Heterogeneous Digital Data: A Metadata-based ApproachInformation intermediation is the foundation stone of some of the most successful Internet companies, and is perhaps second only to the Internet Infrastructure companies. On the heels of information integration and interoperability, this book on information brokering discusses the next step in information interoperability and integration. The... |
|
|
|
|
Result Page: 156 155 154 153 152 151 150 149 148 147 146 145 144 |