|
|
|
|
| | | | The Open Source Alternative: Understanding Risks and Leveraging OpportunitiesIn the late 1990s, working as a lawyer in a technology licensing practice, I found more and more of my clients using software provided under a very unusual license. My colleagues at the time advised clients to avoid this kind of software, because although this software was free of charge, it was likely to infringe intellectual property rights and... |
|
The Democratic Sublime: On Aesthetics and Popular Assembly
The transition from royal to popular sovereignty during the age of democratic revolutions--from 1776 to 1848--entailed not only the reorganization of institutions of governance and norms of political legitimacy, but also a dramatic transformation in the iconography and symbolism of political
power. The personal and external rule of ... | | Digital Watermarking for Digital MediaDigital media, like audio, video, images, and other multimedia documents, can be protected against copyright infringements with invisible, integrated patterns. Such methods are based on steganography and digital watermarking techniques. Most watermarks are inserted as a plain-bit or adjusted digital signal using a key-based embedding algorithm. The... | | My War Criminal: Personal Encounters with an Architect of Genocide
An investigation into the nature of violence, terror, and trauma through conversations with a notorious war criminal by Jessica Stern, one of the world's foremost experts on terrorism.
Between October 2014 and November 2016, global terrorism expert Jessica Stern held a series of conversations in a... |
|
Sexual Murder: Catathymic and Compulsive HomicideDuring graduate school, I had planned on a career in professional psychology with an emphasis on evaluating and treating children and adolescents. After a 2-year traineeship at a state hospital, I was ready to begin my clinical internship at the New Jersey Neuropsychiatric Institute in Princeton. Due to an administrative snafu, however, I was... | | Managing Intellectual Assets in the Digital AgeThis book examines challenges and opportunities associated with the development, distribution, and use of intellectual property and knowledge assets. For purposes of this book, intellectual property consists of the creative works that are governed by the principles of traditional intellectual property law: copyrights, patents, and trademarks.... | | CISSP: Certified Information Systems Security Professional Study Guide
CISSP Certified Information Systems Security Professional Study Guide Here's the book you need to prepare for the challenging CISSP exam from (ISC This third edition was developed to meet the exacting requirements of today's security certification candidates, and has been thoroughly updated to cover recent technological advances in... |
|
|
|
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 |