Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Copy, Rip, Burn: The Politics of Copyleft and Open Source
Copy, Rip, Burn: The Politics of Copyleft and Open Source
From downloading music and movies to accessing free software, digital media is forcing us to rethink the very idea of intellectual property.

While big companies complain about lost profits, the individual has never enjoyed such freedom and autonomy.

Berry explores this debate in a concise way, offering an ideal
...
What is EPUB 3
What is EPUB 3
Publishing has always been driven by content and the ephemeral “reading experience.” Until recently, the industry has struggled to adapt this experience to the demands of consumers used to getting what they want, when they want, and how they want in the now decade-old digital millennium. A new breed of reading devices has...
Smart Products, Smarter Services: Strategies for Embedded Control
Smart Products, Smarter Services: Strategies for Embedded Control

Billions of smart connected products are changing the competitive landscape for business and the daily lives of consumers. This book analyzes the evolution of embedded product intelligence and the impact of smart products on the automotive, wireless, energy, residential and health industries. It considers the transformation of consumer...

Using Technology to Sell: Tactics to Ratchet Up Results
Using Technology to Sell: Tactics to Ratchet Up Results

"Using Technology to Sell is filled with practical, effective techniques to sell more by leveraging the plethora of tools and information in today’s world. By applying these principles, you'll open more doors, increase your productivity, speed up decisions, and close more deals."

...

Mechanics of User Identification and Authentication: Fundamentals of Identity Management
Mechanics of User Identification and Authentication: Fundamentals of Identity Management
User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems at work or at home every day. Yet do users understand how and why they are actually being authenticated, the security level of the authentication mechanism that they are using, and the potential impacts...
 
   
   
unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy