Home | Amazing | Today | Tags | Publishers | Years | Search 
Enchanting Robots: Intimacy, Magic, and Technology (Social and Cultural Studies of Robots and AI)
Enchanting Robots: Intimacy, Magic, and Technology (Social and Cultural Studies of Robots and AI)
This book argues that robots are enchanting humans (as potential intimate partners), because humans are enchanting robots (by performing magical thinking), and that these processes are a part of a significant re-enchantment of the “modern” world. As a foundation, the author examines arguments for and against intimate relationships...
Digital Storytelling, First Edition : A Creator's Guide to Interactive Entertainment
Digital Storytelling, First Edition : A Creator's Guide to Interactive Entertainment
This book is about storytelling—a new form of storytelling, to be sure, but part of
a tradition that stretches back to preliterate times. Storytelling is a magical and
powerful craft. Not only can it transport the audience on a thrilling journey into
an imaginary world, but it can also reveal dark secrets of human nature or
...
Wireless Hacks : 100 Industrial-Strength Tips & Tools
Wireless Hacks : 100 Industrial-Strength Tips & Tools
Written for the intermediate to advanced wireless user, Wireless Hacks is full of direct, practical, ingenious solutions to real-world networking problems. Whether your wireless network needs to extend to the edge of your office or to the other end of town, this collection of non-obvious, "from the field"...
The Definitive Guide to Apache mod_rewrite
The Definitive Guide to Apache mod_rewrite
mod_rewrite, frequently called the “Swiss Army Knife” of URL manipulation, is one
of the most popular—and least understood—modules in the Apache Web Server’s bag of
tricks. In this chapter we’ll discuss what it is, why it’s necessary, and the basics of using it.
For many people, mod_rewrite
...
Encyclopedia of Folk Heroes
Encyclopedia of Folk Heroes
Seal (of the Curtin University of Technology in Perth, Australia) has put together an interesting if sporadic collection of folk heroes. He refers to it as a "representative collection of legendary, historical, and magical heroes from many of the world's extensive folklores." South and Central America receive very little coverage....
Making IT Governance Work in a Sarbanes-Oxley World
Making IT Governance Work in a Sarbanes-Oxley World
It may not be readily apparent, but IT is undergoing what may be its
most significant revolution ever—a revolution driven by rapidly
emerging new business models, the power of the customer, global
operations, and radical new technologies at the edge of the Net. And
this revolution is having as much impact on how technology
...
Cyber Adversary Characterization: Auditing the Hacker Mind
Cyber Adversary Characterization: Auditing the Hacker Mind
A book about hacking is a book about everything.
First, the meaning of hacker.

The word “hacker” emerged in an engineering context and became popular
at The Massachusetts Institute of Technology (MIT), among other places, as a
way to talk about any ingenious, creative, or unconventional use of a machine...
Encyclopaedia Arcane: Battle Magic - The Eldritch Storm
Encyclopaedia Arcane: Battle Magic - The Eldritch Storm
Encyclopaedia Arcane: Battle Magic Continuing the Encyclopaedia Arcane series. Battle Magic introduces the greatest force of sorcery into the d20 System. Battle Mages of incredible power are able to blast entire hordes of enemies apart with fire and lightning - now, for the very first time, players too can access this awesome destructive force....
Runic Amulets and Magic Objects
Runic Amulets and Magic Objects

The runic alphabet, in use for well over a thousand years, was employed by various Germanic groups in a variety of ways, including, inevitably, for superstitious and magical rites. Formulaic runic words were inscribed onto small items that could be carried for good luck; runic charms were carved on metal or wooden amulets to ensure peace or...

Securing & Optimizing Linux: A Hands on Guide for Linux Professionals
Securing & Optimizing Linux: A Hands on Guide for Linux Professionals
This book is intended for a technical audience and system administrators who manage Linux servers, but it also includes material for home users and others. It discusses how to install and setup a Red Hat Linux Server with all the necessary security and optimization for a high performance Linux specific machine. Since we speak of optimization and...
Circuit-Bending: Build Your Own Alien Instruments (ExtremeTech)
Circuit-Bending: Build Your Own Alien Instruments (ExtremeTech)
Fans will get bent out of shape if they miss the first book to cover circuit-bending-""bending,"" for short-the method by which an electronic toy or a device such as a keyboard is short-circuited and modified to create an entirely different sound Written by the inventor of the technology, this book covers the tools of the...
Statistics in a Nutshell: A Desktop Quick Reference
Statistics in a Nutshell: A Desktop Quick Reference
One thing I (Sarah) have learned over the last 20 or so years is that a sure way to derail a promising conversation at a party is to tell people what I do for a living. And rest assured that I’m neither a tax auditor nor captain of a sludge barge.No, I’m merely a biostatistician and statistics instructor, a revelation which invariably...
Result Page: 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy