Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Crypto Anarchy, Cyberstates, and Pirate Utopias
Crypto Anarchy, Cyberstates, and Pirate Utopias

In Crypto Anarchy, Cyberstates, and Pirate Utopias, Peter Ludlow extends the approach he used so successfully in High Noon on the Electronic Frontier, offering a collection of writings that reflects the eclectic nature of the online world, as well as its tremendous energy and creativity. This time the subject is the emergence...

Mastering Sublime Text
Mastering Sublime Text

When it comes to cross-platform text and source code editing, Sublime Text has few rivals. This book will teach you all its great features and help you develop and publish plugins. A brilliantly inclusive guide.

Overview

  • Discover efficient, keyboard-driven text editing
  • Recognize the latest...
The Search for Life Continued: Planets Around Other Stars
The Search for Life Continued: Planets Around Other Stars

Barrie Jones addresses the question "are we alone?", which is one of the most frequently asked questions by scientists and non-scientists alike. In The Search for Life Continued, this question is addressed scientifically, and the author is not afraid to include speculation. Indeed, the author believes beyond reasonable...

Where Men Hide
Where Men Hide
"If you ask men if they spend any time hiding, they usually look at you as if you're nuts. 'What, me hide?' But if you ask women whether men hide, they immediately know what you mean." -- from Where Men Hide

Where Men Hide is a spirited tour of the dark and often dirty places men go to find comfort, camaraderie,...

Text Mining: Classification, Clustering, and Applications
Text Mining: Classification, Clustering, and Applications
This book is a worthy contribution to the field of text mining. By focusing on classification (rather than exhaustively covering extraction, summarization, and other tasks), it achieves the right balance of coherence and comprehensiveness. It collects papers by the leading authors in the field, who employ and explain a variety of...
Automatic Quantum Computer Programming: A Genetic Programming Approach
Automatic Quantum Computer Programming: A Genetic Programming Approach
This is a book about the frontiers of computer science that have recently
been opened by work in quantum mechanics, but it is also a book
about the use of recently developed automatic programming technologies
to explore those frontiers. The automatic programming technologies
themselves issue from another interdisciplinary
...
Handbook on Data Envelopment Analysis (International Series in Operations Research & Management Science)
Handbook on Data Envelopment Analysis (International Series in Operations Research & Management Science)

This handbook covers DEA topics that are extensively used and solidly based. The purpose of the handbook is to (1) describe and elucidate the state of the field and (2), where appropriate, extend the frontier of DEA research. It defines the state-of-the-art of DEA methodology and its uses. This handbook is intended to represent a milestone in...

The Best of 2600: A Hacker Odyssey
The Best of 2600: A Hacker Odyssey
" … The Best of 2600: A Hacker Odyssey is an important, amazing book that tells the story of these kids and adults as they explore a new frontier."
—John Baichtal (Wired Blog, August, 2008)

"...a testament to a culture which thrived before computers and the internet mattered to most of...

Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design
Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design

Sometimes you have to do good engineering to straighten out twisted politics. The Electronic Frontier Foundation, a nonprofit organization that was founded to ensure that the principles embodied in the Constitution and Bill of Rights are protected as new communications technologies emerge, and O"Reilly, the premier publisher of computer...

Quantum Information And Computing (Quantum Probability and White Noise Analysis)
Quantum Information And Computing (Quantum Probability and White Noise Analysis)
This volume constitutes the proceedings of the international conference on "Quantum Information 2003" held in Tokyo University of Science/Tokyo (Japan) from 1 to 3 November 2003, in International Institute for Advanced Studies/Kyoto (Japan) from 5 to 7 November 2003, in University of Waseda/Tokyo (Japan) from 29 to 31 October 2003, in...
Why Does E=mc2?: (And Why Should We Care?)
Why Does E=mc2?: (And Why Should We Care?)

The most accessible, entertaining, and enlightening explanation of the best-known physics equation in the world, as rendered by two of today’s leading scientists.

Professor Brian Cox and Professor Jeff Forshaw go on a journey to the frontier of 21st century science to consider the real meaning behind the iconic sequence of...

Code: Version 2.0
Code: Version 2.0
The "alarming and impassioned"* book on how the Internet is redefining constitutional law, now reissued as the first popular book revised online by its readers (*New York Times)

There's a common belief that cyberspace cannot be regulated-that it is, in its very essence, immune from the government's (or anyone else's)...

unlimited object storage image
Result Page: 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy