 |
|
 Access to Knowledge in the Age of Intellectual Property
At the end of the twentieth century, intellectual property rights collided with everyday life. Expansive copyright laws and digital rights management technologies sought to shut down new forms of copying and remixing made possible by the Internet. International laws expanding patent rights threatened the lives of millions of people around the... |  |  JavaScript Bible
The bestselling JavaScript reference, now updated to reflect changes in technology and best practices
As the most comprehensive book on the market, the JavaScript Bible is a classic bestseller that keeps you up to date on the latest changes in JavaScript, the leading technology for incorporating interactivity into Web... |  |  Construction Databook: Construction Materials and Equipment
The Construction DataBook, Second Edition, provides the project manager, construction superintendent, design consultants, facility managers and owners with a one-source guide for the most commonly encountered construction materials and equipment.
Composed of eleven sections ranging, in topics, from excavation and sitework to... |
|
 Controlled Self-Organisation Using Learning Classifier Systems
The complexity of technical systems increases continuously. Breakdowns and fatal errors occur quite often, respectively. Therefore, the mission of organic computing is to tame these challenges in technical systems by providing appropriate degrees of freedom for self-organised behaviour. Technical systems should adapt to changing requirements... |  |  Constraint Satisfaction Techniques for Agent-Based Reasoning
An important aspect of multi agent systems are agent reasoning techniques for problem solving, either at the level of a single agent or at the level of distributed collaboration amongst multiple agents.
Constraint Satisfaction Problems (CSP) prove to be a generic framework which can be applied for modeling and solving a wide range... |  |  A Guide to Kernel Exploitation: Attacking the Core
The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop... |
|
|
|
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 |