 |
|
 Resistance and PersuasionDo we need to convince you that persuasion is an important topic for the social sciences? Probably not. You know that humans are social beings. Our communication, psychology, social organization, political structures, market choices—in short, everything we do—is interpersonally coordinated. Persuasion is one of the... |  |  Designing with Web Standards (2nd Edition)Best-selling author, designer, and web standards evangelist Jeffrey Zeldman has updated his classic, industry-shaking guidebook. This new edition--now in full color--covers improvements in best practices and advances in the world of browsers since the first edition introduced the world to standards-based design. Written in the same engaging and... |  |  User Interface Design for Mere Mortals(TM)The growth of personal computing in the past two decades of the 20th century put a new emphasis on user interface design. As part of user interface design, companies began to focus on the usability of a product. The term usability has its roots in the 14th century, but as computing technology became prevalent in the 1980s, the definition... |
|
 How to Prepare a Business Plan (Business Enterprise)Starting a new business venture is like going into a tropical forest on a treasure hunt. There are rewards to be won, in both material wealth and in personal satisfaction, but there are dangers lurking and you can easily lose your way.
This book is written not only to help you convince your financial backers that you will succeed and... |  |  Automatic Fingerprint Recognition SystemsAdvances in automatic fingerprint recognition are driven by improved fingerprint sensing and advancements in areas such as computer architecture, pattern recognition, image processing, and computer vision. In addition to the new developments in science and technology, several recent social and political events have increased the level of interest... |  |  Phishing: Cutting the Identity Theft LineHave you been caught yet?
They don't just want to know who you are, they want to BE who you are. By duplicating a legitimate website, phishers can convince you that email asking for your personal information came from your bank, an online retailer, even your ISP. Their high-tech identity theft costs American consumers and businesses billions,... |
|
|
 Is Democracy Possible Here?: Principles for a New Political DebatePolitics in America are polarized and trivialized, perhaps as never before. In Congress, the media, and academic debate, opponents from right and left, the Red and the Blue, struggle against one another as if politics were contact sports played to the shouts of cheerleaders. The result, Ronald Dworkin writes, is a deeply depressing political... |  |  Algorithms and Programming: Problems and Solutions (Modern Birkhäuser Classics)Somebody once said that one may prove the correctness of an algorithm, but not of a program. One of the main goals of this book is to convince the reader that things are not so bad.
A well-known programmer, C.A.R. Hoare, said that the beauty of a program is not an additional benefit but a criterion that separates success from failure.... |  |  Protecting Games: A Security Handbook for Game Developers and PublishersThis book is intended to infect its readers with an interest and concern for game protection. My goal is not to preach to the ”security converted,” but to convince game designers, developers, programmers, managers, marketeers, and artists that they should care about the security of their games and give them confidence that there are... |
|
| Result Page: 6 5 4 3 2 1 |