Home | Amazing | Today | Tags | Publishers | Years | Search 
Contributions to Ubiquitous Computing (Studies in Computational Intelligence)
Contributions to Ubiquitous Computing (Studies in Computational Intelligence)
Mark Weisers vision of computers moving out of our focus of attention and becoming oblivious devices that occur in large numbers and provide smart computing und communication services to individuals as needed is still far from being reality.

This book puts the larger vision of ubiquitous computing in the context of todays mobile and distributed...

Intranets - a guide to their design, implementation and management
Intranets - a guide to their design, implementation and management
This book may appeal to anyone requiring an overview of the technological and cultural implications of adopting information and knowledge management solutions using Internet technologies.

The book examines the tactical issues addressed at a functional or departmental level and their impact upon the organisation as a whole from a
...
iMac For Dummies (Computer/Tech)
iMac For Dummies (Computer/Tech)
Congratulations! When you bought that shiny new anodized aluminum iMac, you made a great choice. Now you want take advantage and control of that baby's awesome speed, high performance, powerful operating system, and fantastic applications, and iMac for Dummies, 5th Edition is here to help you do just that!

This easy-to-use guide...

Google Apps For Dummies (Computer/Tech)
Google Apps For Dummies (Computer/Tech)
Google Apps are Web-based, low-cost (or free!) office productivity tools that do everything those expensive applications do — and you can access them from any computer with an Internet connection. Google Apps For Dummies boosts your "app-titude" by giving you the low-down on choosing, setting up, and using these nifty and...
Technologies and Systems for Access and Transport Networks (Artech House Mobile Communications)
Technologies and Systems for Access and Transport Networks (Artech House Mobile Communications)
Take command of core technologies at the heart of all telecommunications systems with the first book expressly designed to help you apply, reuse, and enhance building-block components from one generation of networks to the next. This unique problem-solver unravels the complexities behind such technologies as synchronization, multiple access,...
The Best of 2600: A Hacker Odyssey
The Best of 2600: A Hacker Odyssey
" … The Best of 2600: A Hacker Odyssey is an important, amazing book that tells the story of these kids and adults as they explore a new frontier."
—John Baichtal (Wired Blog, August, 2008)

"...a testament to a culture which thrived before computers and the internet mattered to most of...

Legitimate Applications of Peer-to-Peer Networks
Legitimate Applications of Peer-to-Peer Networks
Peer-to-peer computing has gained a lot of prominence and publicity in the past years. Several start-up companies offer software packages that can be used for building peer-to-peer overlay networks for applications such as file sharing and music swapping. However, the legal and ethical questions associated with swapping copyrighted material on the...
Wavelets and Their Applications (Digital Signal and Image Processing series)
Wavelets and Their Applications (Digital Signal and Image Processing series)
Showing how wavelets combine signal in image processing, mathematics, physics, and electrical engineering, this introduction to wavelet technology helps engineers master the basic techniques for using wavelets in such applications as image compression, turbulence, human vision, radar, and earthquake prediction. Among the topics covered are the...
Hactivism and Cyberwars: Rebels with a Cause
Hactivism and Cyberwars: Rebels with a Cause
This detailed history of hacktivism's evolution from early hacking culture to its present day status as the radical face of online politics describes the ways in which hacktivism has re-appropriated hacking techniques to create an innovative new form of political protest. The authors provide an explanation of the different strands of hacktivism...
Cyberpower: The Culture and Politics of Cyberspace and the Internet
Cyberpower: The Culture and Politics of Cyberspace and the Internet
Cyberspace now touches all lives. For some it has become as essential as the telephone or the letter. For others it is still a fearful whisper of technological promise. Sometimes we look on bemused, uncertain why all those little addresses that begin ‘http://’ appear in advertisements, and sometimes we are shocked by the possibilities,...
Winning at Internet Poker For Dummies (Computer/Tech)
Winning at Internet Poker For Dummies (Computer/Tech)
Find the right site, set up an account, and play to win!

The fun and easy way® to take poker online and win!

Passionate about poker? This easy-to-follow guide gives you the lowdown on the hottest games around — including Texas Hold 'Em, Omaha, and Seven-Card Stud. Read up on how to find the best sites,...

Video Object Extraction and Representation: Theory and Applications
Video Object Extraction and Representation: Theory and Applications
Video Object Extraction and Representation: Theory and Applications is an essential reference for electrical engineers working in video; computer scientists researching or building multimedia databases; video system designers; students of video processing; video technicians; and designers working in the graphic arts.

In
...
Result Page: 345 344 343 342 341 340 339 338 337 336 335 334 333 332 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy