Home | Amazing | Today | Tags | Publishers | Years | Search 
Information: A Very Short Introduction
Information: A Very Short Introduction

We live in a society that is awash with information, but few of us really understand what information is. In this Very Short Introduction, one of the world's leading authorities on the philosophy of information and on information ethics, Luciano Floridi, offers an illuminating exploration of information as it relates to both...

Computers Under Attack: Intruders, Worms and Viruses
Computers Under Attack: Intruders, Worms and Viruses

This book is broken down into 6 parts. The first describes the emergence of a worldwide network of computers, here called Worldnet, and the practices that people have engaged in as a result. The second part describes the problem of electronic breakins. The third part deals with the phenomenon of worms. The fourth part deals with viruses. The...

The Art of War in the Network Age: Back to the Future (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)
The Art of War in the Network Age: Back to the Future (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)

Previous studies have looked at the contribution of information technology and network theory to the art of warfare as understood in the broader sense. This book, however, focuses on an area particularly important in understanding the significance of the information revolution; its impact on strategic theory. The purpose of the book is to...

Principles of Distributed Database Systems
Principles of Distributed Database Systems
This third edition of a classic textbook can be used to teach at the senior undergraduate and graduate levels. The material concentrates on fundamental theories as well as techniques and algorithms. The advent of the Internet and the World Wide Web, and, more recently, the emergence of cloud computing and streaming data applications, has forced...
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software

Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate your own IAM stack.

The most common culprit of...

EU Influence Beyond Conditionality: Turkey Plus/Minus the EU
EU Influence Beyond Conditionality: Turkey Plus/Minus the EU
This book presents an in-depth analysis of the role played by the EU accession process in Turkey’s democratic evolution and in the empowerment of the Justice and Development Party (AKP) in the early 2000s. Often moving against the grain of consolidated analytical positions, the author finds that the accession process can have a critical...
Location-Based Gaming: Play in Public Space
Location-Based Gaming: Play in Public Space
Location-based games emerged in the early 2000s following the commercialisation of GPS and artistic experimentation with ‘locative media’ technologies. Location-based games are played in everyday public spaces using GPS and networked, mobile technologies to track their players’ location. This book traces the...
Transforming Japanese Business: Rising to the Digital Challenge (Future of Business and Finance)
Transforming Japanese Business: Rising to the Digital Challenge (Future of Business and Finance)

This book explores how the business transformation taking place in Japan is influenced by the digital revolution. Its chapters present approaches and examples from sectors commonly understood to be visible arenas of digital transformation?3D printing and mobility, for instance?as well as some from not-so-obvious sectors, such as...

The Family Business Group Phenomenon: Emergence and Complexities
The Family Business Group Phenomenon: Emergence and Complexities

This edited collection analyses the unexplored concept of the family business group, evaluating the opportunities and advantages that it creates for entrepreneurs. Raising a number of important questions, the authors construct a new research agenda for the complex topic of the family business group, which will ultimately assess its...

Persistent Creativity: Making the Case for Art, Culture and the Creative Industries (Sociology of the Arts)
Persistent Creativity: Making the Case for Art, Culture and the Creative Industries (Sociology of the Arts)

Recent years have seen the increasing valuation and promotion of ‘creativity’. Future success, we are often assured, will rest on the creativity of our endeavours, often aligned specifically with ‘cultural’ activity. This book considers the emergence and persistence of this pattern, particularly with regards...

Manufacturing Advantage: War, the State, and the Origins of American Industry, 1776–1848 (Studies in Early American Economy and Society from the Library Company of Philadelphia)
Manufacturing Advantage: War, the State, and the Origins of American Industry, 1776–1848 (Studies in Early American Economy and Society from the Library Company of Philadelphia)

How manufacturing textiles and guns transformed the United States from colonial dependent to military power.

In 1783, the Revolutionary War drew to a close, but America was still threatened by enemies at home and abroad. The emerging nation faced tax rebellions, Indian warfare, and hostilities with France and...

Looking Through Philosophy in Black: Memoirs (Global Critical Caribbean Thought)
Looking Through Philosophy in Black: Memoirs (Global Critical Caribbean Thought)
This autobiography is a series of interrelated true-life events and decisions taken by a black philosopher that highlight the human drama unfolding in the inferno of the South African apartheid system. Mabogo More details what it means to be a black philosopher in an anti-black apartheid academic world. More’s life story...
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy