Home | Amazing | Today | Tags | Publishers | Years | Search 
Inside Cyber Warfare: Mapping the Cyber Underworld
Inside Cyber Warfare: Mapping the Cyber Underworld
I was recently invited to participate in a cyber security dinner discussion by a few members of a well-known Washington, DC, think tank. The idea was that we could enjoy a fine wine and a delicious meal while allowing our hosts to pick our brains about this “cyber warfare stuff.” It seems that the new...
Acid Dreams: The Complete Social History of LSD: The CIA, the Sixties, and Beyond
Acid Dreams: The Complete Social History of LSD: The CIA, the Sixties, and Beyond
Few events have had a more profound impact on the social and cultural upheavals of the Sixties than the psychedelic revolution spawned by the spread of LSD. This book for the first time tells the full and astounding story—part of it hidden till now in secret Government files—of the role the mind-altering drug played in our recent...
The Routledge Companion to Aesthetics (Routledge Philosophy Companions)
The Routledge Companion to Aesthetics (Routledge Philosophy Companions)

The third edition of the acclaimed Routledge Companion to Aesthetics contains over sixty chapters written by leading international scholars covering all aspects of aesthetics.

This companion opens with an historical overview of aesthetics including entries on Plato, Aristotle, Kant, Nietzsche, Heidegger, Adorno, Benjamin,...

Family Business Models: Practical Solutions for the Family Business
Family Business Models: Practical Solutions for the Family Business
In the early 20th century, American sociologist W. I. Thomas won fame with the statement: ‘If men define situations as real, they are real in their consequences.’ This fundamental observation on human behavior, now known as the Thomas theorem, became a cornerstone of contemporary sociology. The idea that our...
The Mikado Method
The Mikado Method

Summary

The Mikado Method is a book written by the creators of this process. It describes a pragmatic, straightforward, and empirical method to plan and perform non-trivial technical improvements on an existing software system. The method has simple rules, but the applicability is vast. As you read,...

Explaining Algorithms Using Metaphors (SpringerBriefs in Computer Science)
Explaining Algorithms Using Metaphors (SpringerBriefs in Computer Science)

There is a significant difference between designing a new algorithm, proving its correctness, and teaching it to an audience. When teaching algorithms, the teacher's main goal should be to convey the underlying ideas and to help the students form correct mental models related to the algorithm. This process can often be facilitated by...

Crash Cultures: Modernity, Mediation and the Material
Crash Cultures: Modernity, Mediation and the Material

Since Princess Diana's car crash in August 1997, media interest in the crash as an event needing explanation has proliferated. A glut of documentaries on television have investigated the social and scientific history of our responses to the car crash, as well as showing the personal impact of the crash on individual lives. In trying to...

An Introduction to MultiAgent Systems
An Introduction to MultiAgent Systems

Multiagent systems are systems composed of multiple interacting computing elements, known as agents. Agents are computer systems with two important capabilities. First, they are at least to some extent capable of autonomous action - of deciding for themselves what they need to do in order to satisfy their design objectives. Second, they are...

Communicating Biological Sciences
Communicating Biological Sciences

Recent scandals in the biosciences have highlighted the perils of communicating science. Many observers have therefore begun to ask questions about the pressures on scientists and the media to hype-up claims of scientific breakthroughs. Journalists, science writers and scientists themselves have to report complex and rapidly-developing...

Technology-Supported Environments for Personalized Learning: Methods and Case Studies (Premier Reference Source)
Technology-Supported Environments for Personalized Learning: Methods and Case Studies (Premier Reference Source)

Responding to the specific needs of each student, personalized learning has the potential to refocus education on the individual rather than the institution. Technology-Supported Environments for Personalized Learning: Methods and Case Studies explores the metaphor of anytime and anywhere individual education as well as the idea of...

Multidimensional Databases: Problems and Solutions
Multidimensional Databases: Problems and Solutions

The term "multidimensional data" generally refers to data in which a given fact is quantified by a set of measures, obtained by applying one more or less complex aggregative function (from count or sum to average or percent, and so on) to raw data. Such measures are...

Alchemy and Psychotherapy: Post-Jungian Perspectives
Alchemy and Psychotherapy: Post-Jungian Perspectives

Alchemical symbols are part of popular culture, most recently popularised in the Harry Potter books. Alchemy intrigued Carl Jung, the founder of analytical psychology. It inspired him as he wrote ‘the Red Book’ - the journal of his voyage of internal discovery. He devoted much of his life to it, using alchemical symbols as...

Result Page: 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy