Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Coming Robot Revolution: Expectations and Fears About Emerging Intelligent, Humanlike Machines
The Coming Robot Revolution: Expectations and Fears About Emerging Intelligent, Humanlike Machines

Making a robot that looks and behaves like a human being has been the subject of many popular science fiction movies and books. Although the development of such a robot faces many challenges, the making of a virtual human has long been potentially possible. With recent advances in various key technologies related to hardware and...

Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

Thank you for picking up this book! We believe that if you are reading this page, you are an individual seeking to gain a greater degree of familiarity with cybercrime and espionage, and more likely than not, believe that the realities outweigh the fear, uncertainty, and doubt associated with these two topics. Our desire in writing this...

Artificial Intelligence and Literary Creativity: Inside the Mind of Brutus, A Storytelling Machine
Artificial Intelligence and Literary Creativity: Inside the Mind of Brutus, A Storytelling Machine

Now that IBM's Deep Blue computer beat the world's greatest human chess player, Gary Kasparov, this book will see if a story can be written better by a human or a machine.

This book marks the marriage of logic and creativity.

While it may be true that incompatible humans often wed, there are doubtless unions of a less palpable...

Global Warming - Myth or Reality?: The Erring Ways of Climatology (Springer Praxis Books / Environmental Sciences)
Global Warming - Myth or Reality?: The Erring Ways of Climatology (Springer Praxis Books / Environmental Sciences)
In the global-warming debate, definitive answers to questions about ultimate causes and effects remain elusive. In Global Warming: Myth or Reality?, Marcel Leroux seeks to separate fact from fiction in this critical debate from a climatological perspective. Beginning with a review of the dire hypotheses for climate trends, the author describes the...
Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD
Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD

"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else: it...

Test Driving Linux: From Windows to Linux in 60 Seconds
Test Driving Linux: From Windows to Linux in 60 Seconds
For years, computer users have put up with the bugs, security holes, and viruses on Windows because they had no choice. Until recently, there has never been a good alternative to Windows. But now, Windows users can switch to Linux, the reliable, secure, and spyware free operating system. Linux is easy to use, runs on almost any PC, and enables you...
Network programming in .NET : C# & Visual Basic .NET
Network programming in .NET : C# & Visual Basic .NET
This book will help you develop network applications with .NET, using
either the C# or VB.NET programming language.

It covers everything you need to know about network programming in
.NET, from basic get-started information, to a huge selection of advanced
networking technologies that may have seemed like science
...
Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
There exists a 0-day vulnerability in a particular line of SCADA Master products that are widely used in petrochemical facilities. Furthermore, since the telemetry between the Master and the RTUs (the units located at valves, gauges, etc.) is particularly fragile under attack, the attackers are able to take a two-tiered approach to the damage they...
Biometrics for Network Security
Biometrics for Network Security

The complete guide to implementing biometric security solutions for your network

Network security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate." Newspaper headlines are routinely peppered with incidents of hackers thwarting the security put forth by...

American History Through Literature 1870-1920
American History Through Literature 1870-1920
This A-Z, cross-referenced and illustrated title provides a unique overview of the period following the Civil War through the emergence of the United States as a world power at the end of World War I. The set features more than 250 survey entries. Subjects include: political topics (Reform, Women's Suffrage); ideas in context (Scientific...
Secrets of RSS (Visual QuickStart Guide)
Secrets of RSS (Visual QuickStart Guide)

The great advantage of RSS is that you can select your sources of information if you're the reader, and you can publicize selected information if you're the publisher. RSS is the next step in the information revolution and it's transforming the Internet and the world.

RSS...

Longman Student Grammar of Spoken and Written English
Longman Student Grammar of Spoken and Written English

* Examines patterns of use in the news, fiction and academic English

* Takes grammar and vocabulary together and looks at how they interact

* Is based on the analysis of 40-million words of British and American, written and spoken corpus text

* Uses over 3000 examples of real, corpus English to illustrate the...

Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy