Home | Amazing | Today | Tags | Publishers | Years | Search 
Information Foraging Theory: Adaptive Interaction with Information (Oxford Series in Human-Technology Interaction)
Information Foraging Theory: Adaptive Interaction with Information (Oxford Series in Human-Technology Interaction)
Although much of the hubris and hyperbole surrounding the 1990's Internet has softened to a reasonable level, the inexorable momentum of information growth continues unabated. This wealth of information provides resources for adapting to the problems posed by our increasingly complex world, but the simple availability of more information does not...
Crypto Anarchy, Cyberstates, and Pirate Utopias
Crypto Anarchy, Cyberstates, and Pirate Utopias

In Crypto Anarchy, Cyberstates, and Pirate Utopias, Peter Ludlow extends the approach he used so successfully in High Noon on the Electronic Frontier, offering a collection of writings that reflects the eclectic nature of the online world, as well as its tremendous energy and creativity. This time the subject is the emergence...

Parallel Computing: Fundamentals, Applications and New Directions (Advances in Parallel Computing)
Parallel Computing: Fundamentals, Applications and New Directions (Advances in Parallel Computing)
This volume gives an overview of the state-of-the-art with respect to the development of all types of parallel computers and their application to a wide range of problem areas.

The international conference on parallel computing ParCo97 (Parallel Computing 97) was held in Bonn, Germany from 19 to 22 September 1997. The first conference in this...

Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace
Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace

Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous "Great...

Guide to Computer Network Security (Computer Communications and Networks)
Guide to Computer Network Security (Computer Communications and Networks)
Contemporary societies have increasing dependence on computers and computer networks, and the increasing popularity of mobile computing, have given rise to numerous computer security problems. Yet despite a high proliferation of expert remedies, a viable and comprehensive solution to these security issues remains elusive, and society continues to...
Power and Security in the Information Age: Investigating the Role of the State in Cyberspace
Power and Security in the Information Age: Investigating the Role of the State in Cyberspace
The marriage of computers and telecommunications, the integration of these technologies into a multimedia system of communication that has global reach, and the fact that they are available worldwide at low cost seems to be bringing about a fundamental transformation in the way humans communicate and interact. But however much consensus there may...
Computer Security Handbook
Computer Security Handbook

The definitive formula for computer security, from power outages to theft and sabotage

Whether you are in charge of many computers, or even one important one, there are immediate steps you can take to safeguard your company’s computer system and its contents. The Computer Security Handbook provides a readable and...

Intelligent Image Processing
Intelligent Image Processing
Intelligent Image Processing describes the EyeTap technology that allows non-invasive tapping into the human eye through devices built into eyeglass frames. This isn't merely about a computer screen inside eyeglasses, but rather the ability to have a shared telepathic experience among viewers. Written by the developer of the EyeTap principle, this...
Cybercrime and Society
Cybercrime and Society
Criminology has been rather slow to recognise the importance of cyberspace in changing the nature and scope of offending and victimisation, and a comprehensive introductory textbook on cybercrime and its social implications is long overdue. One of the many strengths of Majid Yar's book is that it avoids 'techy' jargon and unites criminological and...
Computer Fraud Casebook: The Bytes that Bite
Computer Fraud Casebook: The Bytes that Bite
In 1995, computer fraud took down England's oldest bank. In 1996, Omega Engineering Company lost over $10 million to one disgruntled employee's computer fraud. In 2001, two Cisco Systems employees stole $8 million in computer stock option refunds through computer fraud. And technology experts and professional crime fighters predict that computer...
eBoot Camp: Proven Internet Marketing Techniques to Grow Your Business
eBoot Camp: Proven Internet Marketing Techniques to Grow Your Business
In this Web 2.0 era, small business owners are at a severe disadvantage because they have minimal, if any, knowledge, about Internet marketing. They also lack the budget to hire a top-notch web marketer. As a result, the thrust of their Internet marketing program is usually a poorly performing website that attracts few visitors. e Boot Camp is the...
Mastering Web 2.0: Transform Your Business Using Key Website and Social Media Tools
Mastering Web 2.0: Transform Your Business Using Key Website and Social Media Tools
When this book comes out, it will be 2009. Google will have just turned 10. Amazon is a blockbuster site. YouTube is a phenomenon. Facebook is the favourite daily companion of thousands of people.

But for the handful of success stories out there, there are millions and millions of companies, websites and internet experiments that are
...
Result Page: 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy