Home | Amazing | Today | Tags | Publishers | Years | Search 
Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion
Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion
Every day, billions of photographs, news stories, songs, X-rays, TV shows, phone calls, and emails are being scattered around the world as sequences of zeroes and ones: bits. We can’t escape this explosion of digital information and few of us want to–the benefits are too seductive. The technology has enabled unprecedented innovation,...
Brain-Computer Interfaces: An international assessment of research and development trends
Brain-Computer Interfaces: An international assessment of research and development trends
Brain-computer interface (BCI) research deals with establishing communication pathways between the brain and external devices where such pathways do not otherwise exist. Throughout the world, such research is surprisingly extensive and expanding. BCI research is rapidly approaching a level of first-generation medical practice for use by individuals...
Nokia Firewall, VPN, and IPSO Configuration Guide
Nokia Firewall, VPN, and IPSO Configuration Guide
The Only Book and Companion Web Site Covering Nokia's Firewall/VPN Appliances, which is the #3 security appliance worldwide.

"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its
...
Mobile Malware Attacks and Defense
Mobile Malware Attacks and Defense
The Only Book for Analyzing and Mitigating Mobile Malicious Code!

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new
...
Silverlight 2 in Action
Silverlight 2 in Action
This book delivers real-world examples and in-depth walkthroughs to help you confidently enhance your web applications using Silverlight 2.

Silverlight 2 in Action devotes extensive coverage to flexible layout components, the extensible control model, the communication framework, and the data-binding features "all cornerstones of software...

Flood Pulsing in Wetlands: Restoring the Natural Hydrological Balance
Flood Pulsing in Wetlands: Restoring the Natural Hydrological Balance

The latest cutting-edge research on flood pulsing and wetland restoration in North America

Presenting the latest research from leaders in the field of restoration ecology, Flood Pulsing in Wetlands reflects the current movement to incorporate flood pulsing into wetland restoration efforts. Emphasizing how integral flood pulsing is...

Triumph Forsaken: The Vietnam War, 1954-1965 (v. 1)
Triumph Forsaken: The Vietnam War, 1954-1965 (v. 1)
Drawing on a wealth of new evidence from all sides, Triumph Forsaken overturns most of the historical orthodoxy on the Vietnam War. Through the analysis of international perceptions and power, it shows that South Vietnam was a vital interest of the United States. The book provides many new insights into the overthrow of Ngo Dinh Diem in 1963 and...
Innovation in Life Cycle Engineering and Sustainable Development
Innovation in Life Cycle Engineering and Sustainable Development
The focus of this book is the consideration of environmental issues in engineering process and product design. It presents a selection of 30 papers ensuing from the 12th CIRP International seminar on Life Cycle Engineering, held at the university of Grenoble, France, in April 2005.

Sustainable development is more and more at the core of...

Sustainability at the Cutting Edge, Second Edition: Emerging Technologies for low energy buildings
Sustainability at the Cutting Edge, Second Edition: Emerging Technologies for low energy buildings
Sustainability at the Cutting Edge is an essential guide to understanding the future direction of sustainable technology. This fully updated new edition deals not only with current best practice and state of the art case studies, but with the very latest emerging technologies which will transform the relationship between buildings and energy....
Computer Forensics: Computer Crime Scene Investigation (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (Networking Series)
The Most Comprehensive, Up-to-Date, Reference on Computer Forensics! Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and the credit card accounts of unsuspecting individuals. This completely updated book/CD package...
Chemical Analysis of Contaminated Land (Sheffield Analytical Chemistry)
Chemical Analysis of Contaminated Land (Sheffield Analytical Chemistry)
This book sets out to provide a description of the chemical analysis of potentially contaminated land for all those involved in risk assessment. It is not intended as a recipe book of analytical methods. Indeed, with the wide range of techniques and options available, it would be impracticable and unnecessary to document all potential methods, and...
Encyclopedia of Civil War Shipwrecks
Encyclopedia of Civil War Shipwrecks
On the evening of February 2, 1864, Confederate Commander John Taylor Wood led 250 sailors in two launches and twelve boats to capture the USS Underwriter, a side-wheel steam gunboat anchored on the Neuse River near New Bern, North Carolina. During the ensuing fifteen-minute battle, nine Union crewmen lost their lives, twenty were wounded,...
Result Page: 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy