 |
|
|
|
 Legitimate Applications of Peer-to-Peer NetworksPeer-to-peer computing has gained a lot of prominence and publicity in the past years. Several start-up companies offer software packages that can be used for building peer-to-peer overlay networks for applications such as file sharing and music swapping. However, the legal and ethical questions associated with swapping copyrighted material on the... |  |  Wavelets and Their Applications (Digital Signal and Image Processing series)Showing how wavelets combine signal in image processing, mathematics, physics, and electrical engineering, this introduction to wavelet technology helps engineers master the basic techniques for using wavelets in such applications as image compression, turbulence, human vision, radar, and earthquake prediction. Among the topics covered are the... |  |  Hactivism and Cyberwars: Rebels with a CauseThis detailed history of hacktivism's evolution from early hacking culture to its present day status as the radical face of online politics describes the ways in which hacktivism has re-appropriated hacking techniques to create an innovative new form of political protest. The authors provide an explanation of the different strands of hacktivism... |
|
|
| Result Page: 345 344 343 342 341 340 339 338 337 336 335 334 333 332 |