 |
|
 Wirelessness: Radical Empiricism in Network Cultures
Motion, to take a good example, is originally a turbid sensation, of which the native
shape is perhaps best preserved in the phenomenon of vertigo. (James 1996a, 62)
Between 1999 and 2009, a “ turbid ” or disordered sensation of change was
felt as wireless connections expanded and eroded the edges of the Internet... |  |  Problem Solving and Programming Concepts (9th Edition)
Knowledge of problem solving and programming concepts is necessary for those who
develop applications for users. Unfortunately, many students have greater difficulty
with problem solving than they do with the syntax of computer languages. The art of
programming is learning multiple techniques and applying those techniques to specific... |  |  Elements of Data Compression
The data compression field has always been an important part of computer science,
and it is becoming increasingly popular and important today. Although computers
become faster and data storage becomes less expensive and more efficient, the in
creased importance of sound and video necessitates the use of at least a small mea
sure of... |
|
 Model-Based Development: Applications
A Proven Development Methodology That Delivers On the Promise of Model-Based Approaches
Software continues to become more and more complex, while software consumers’ expectations for performance, reliability, functionality, and speed-to-market are also growing exponentially. H. S. Lahman shows how... |  |  Visual Complex Analysis
This radical first course on complex analysis brings a beautiful and powerful subject to life by consistently using geometry (not calculation) as the means of explanation. Aimed at undergraduate students in mathematics, physics, and engineering, the book's intuitive explanations, lack of advanced prerequisites, and consciously... |  |  Cyber Security Essentials
The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and... |
|
|
|
| Result Page: 60 59 58 57 56 55 54 53 52 51 50 49 48 |