Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic Documents
Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic Documents

The gradual disappearance of paper and its familiar evidential qualities affects almost every dimension of contemporary life. From health records to ballots, almost all documents are now digitized at some point of their life cycle, easily copied, altered, and distributed. In Burdens of Proof, Jean-François Blanchette examines...

Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions
Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions
Develop, validate, and deploy powerful decentralized applications using blockchain 


Get the most out of cutting-edge blockchain technology using the hands-on information contained in this comprehensive resource. Written by a team of technology and legal experts, Blockchain:...
The Open Source Alternative: Understanding Risks and Leveraging Opportunities
The Open Source Alternative: Understanding Risks and Leveraging Opportunities
In the late 1990s, working as a lawyer in a technology licensing practice, I found more and more of my clients using software provided under a very unusual license. My colleagues at the time advised clients to avoid this kind of software, because although this software was free of charge, it was likely to infringe intellectual property rights and...
The Democratic Sublime: On Aesthetics and Popular Assembly
The Democratic Sublime: On Aesthetics and Popular Assembly
The transition from royal to popular sovereignty during the age of democratic revolutions--from 1776 to 1848--entailed not only the reorganization of institutions of governance and norms of political legitimacy, but also a dramatic transformation in the iconography and symbolism of political
power. The personal and external rule of
...
Digital Watermarking for Digital Media
Digital Watermarking for Digital Media
Digital media, like audio, video, images, and other multimedia documents, can be protected against copyright infringements with invisible, integrated patterns. Such methods are based on steganography and digital watermarking techniques. Most watermarks are inserted as a plain-bit or adjusted digital signal using a key-based embedding algorithm. The...
My War Criminal: Personal Encounters with an Architect of Genocide
My War Criminal: Personal Encounters with an Architect of Genocide

An investigation into the nature of violence, terror, and trauma through conversations with a notorious war criminal by Jessica Stern, one of the world's foremost experts on terrorism.

Between October 2014 and November 2016, global terrorism expert Jessica Stern held a series of conversations in a...

Sexual Murder: Catathymic and Compulsive Homicide
Sexual Murder: Catathymic and Compulsive Homicide
During graduate school, I had planned on a career in professional psychology with an emphasis on evaluating and treating children and adolescents. After a 2-year traineeship at a state hospital, I was ready to begin my clinical internship at the New Jersey Neuropsychiatric Institute in Princeton. Due to an administrative snafu, however, I was...
Managing Intellectual Assets in the Digital Age
Managing Intellectual Assets in the Digital Age
This book examines challenges and opportunities associated with the development, distribution, and use of intellectual property and knowledge assets. For purposes of this book, intellectual property consists of the creative works that are governed by the principles of traditional intellectual property law: copyrights, patents, and trademarks....
CISSP: Certified Information Systems Security Professional Study Guide
CISSP: Certified Information Systems Security Professional Study Guide

CISSP Certified Information Systems Security Professional Study Guide Here's the book you need to prepare for the challenging CISSP exam from (ISC This third edition was developed to meet the exacting requirements of today's security certification candidates, and has been thoroughly updated to cover recent technological advances in...

Credibility Assessment: Scientific Research and Applications
Credibility Assessment: Scientific Research and Applications

In 2001, the late Murray Kleiner and an array of experts contributed to the Handbook of Polygraph Testing, published by Elsevier, which examined the fundamental principles behind polygraph tests and reviewed the key tests and methods used at that time. In the intervening thirteen years, the field has moved beyond traditional polygraph...

Professional Pen Testing for Web Applications (Programmer to Programmer)
Professional Pen Testing for Web Applications (Programmer to Programmer)
There is no such thing as "perfect security" when it comes to keeping all systems intact and functioning properly. Good penetration (pen) testing creates a balance that allows a system to be secure while simultaneously being fully functional. With this book, you'll learn how to become an effective penetrator (i.e., a white hat or ethical...
Recursive Methods in Economic Dynamics
Recursive Methods in Economic Dynamics
A magnificent work that is bound to have immense influence on the ways economists think about dynamic systems for many years to come. My own guess is that this book will eventually acquire the stature, say, of Hicks's Value and Capital or Samuelson's Foundations.
--Thomas J. Sargent, Hoover Institution

The
...
unlimited object storage image
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy