 |
|
|
 Managed Code Rootkits: Hooking into Runtime Environments
We live in a world in which we can’t trust our computers. For example, how can we
know for sure that our hardware manufacturer did not hide malicious code in the
system’s microchip? Or that our freshly installed operating system does not contain
backdoors created by a rogue developer from the OS development team?
... |  |  iPhone User Interface Cookbook
The incredible growth rates for the iPhone, iPod touch, and iPad have pushed consumers to
a new "App" economy, with developers racing to the platform. Mobile touch-centric interfaces
vary greatly from traditional computing platforms, and programmers as well as designers must
learn to adapt to the new form-factor.
... |  |  Advanced Artificial Intelligence (Series on Intelligence Science)
Artificial Intelligence's long-term goal is to build the human level of artificial
intelligence. AI was born 50 years ago, in the bumpy road has made encouraging
progress, in particular, machine learning, data mining, computer vision, expert
systems, natural language processing, planning, robotics and related applications
have... |
|
|
|
| Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 |