 |
|
 Face Processing: Advanced Modeling and MethodsAs one of the most important applications of image analysis and understanding, face recognition has recently received significant attention, especially during the past 10 years. There are at least two reasons for this trend: the first is the wide range of commercial and law-enforcement applications, and the second is the availability of feasible... |  |  |  |  The Handbook of Information and Computer EthicsThis handbook provides an accessible overview of the most important issues in information and computer ethics. It covers: foundational issues and methodological frameworks; theoretical issues affecting property, privacy, anonymity, and security; professional issues and the information-related professions; responsibility issues and risk assessment;... |
|
 20,000 Leagues under the Sea: Complete and UnabridgedFounded in 1906 by J.M. Dent, the Everyman Library has always tried to make the best books ever written available to the greatest number of people at the lowest possible price. Unique editorial features that help Everyman Paperback Classics stand out from the crowd include: a leading scholar or literary critic's introduction to the text,... |  |  Hackers: Heroes of the Computer RevolutionSteven Levy's classic book explains why the misuse of the word "hackers" to describe computer criminals does a terrible disservice to many important shapers of the digital revolution. Levy follows members of an MIT model railroad club--a group of brilliant budding electrical engineers and computer innovators--from the late 1950s to... |  |  Wireless Security: Know It AllThe latest technologies - the leading experts - proven real-world design solutions - together in one must-have volume!
The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and... |
|
 |  |  Math You Can't Use: Patents, Copyright, and SoftwareThe field of software is awash in disputes. Market participants and analysts routinely disagree on how computer programs should be produced, marketed, regulated, and sold. On one subject, however, just about everyone can agree: the current intellectual property protection regime for software is a mess. At present, all of the traditional means... |  |  The Culture of Vengeance and the Fate of American JusticeAmerica is driven by vengeance in Terry Aladjem's provocative account - a reactive, public anger that is a threat to democratic justice itself. From the return of the death penalty to the wars on terror and in Iraq, Americans demand retribution and moral certainty; they assert the "rights of victims" and make pronouncements against... |
|
 Beginning OpenOffice 3: From Novice to ProfessionalOffice suites are one of the most popular types of software, and most computer users will, at some point, find themselves staring at the user interface of a word processor, spreadsheet, or presentation package. Traditionally, office suites have been quite expensive packages, but thanks to the generosity of Sun Microsystems and a massive community... |  |  iPhone Forensics: Recovering Evidence, Personal Data, and Corporate Assets"This book is a must for anyone attempting to examine the iPhone. The level of forensic detail is excellent. If only all guides to forensics were written with this clarity!" -Andrew Sheldon, Director of Evidence Talks, computer forensics experts With iPhone use increasing in business networks, IT and security professionals face a serious... |  |  Guide to Computer Network Security (Computer Communications and Networks)Contemporary societies have increasing dependence on computers and computer networks, and the increasing popularity of mobile computing, have given rise to numerous computer security problems. Yet despite a high proliferation of expert remedies, a viable and comprehensive solution to these security issues remains elusive, and society continues to... |
|
Result Page: 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 |