Middle age, for many, marks a key period for a radical reappraisal of one's life and way of living. The sense of time running out, both from the perspective that one's life has ground to a halt, and from the point of view of the greater closeness of death, and the sense of loneliness engendered by the compromised and wasteful nature...
The Handbook of Mobile Middleware provides an exhaustive overview of recent developments in the various fields related to how software supports mobile computing. This advanced reference authored by internationally recognized experts integrates the valuable insight gained from actual deployments into a full compendium. It begins by presenting...
This book is written for Java developers familiar with web frameworks. Its main purpose is for Java developers to learn Spring and evaluate it against other frameworks. One of my hopes is to compare Spring to other web frameworks, or at least show how it can be integrated with other frameworks (i.e. Struts, WebWork, maybe even Tapestry down the...
OpenGL is a powerful software interface used to produce high-quality, computergenerated images and interactive applications using 2D and 3D objects, bitmaps, and color images.
"Disappearing Cryptography is a witty and entertaining look at the world of information hiding. Peter Wayner provides an intuitive perspective of the many techniques, applications, and research directions in the area of steganography. The sheer breadth of topics is outstanding and makes this book truly unique. A must read for...
The first look at the philosophy behind Stephenie Meyer's bestselling Twilight series
Bella and Edward, and their family and friends, have faced countless dangers and philosophical dilemmas in Stephenie Meyer's Twilight novels. This book is the first to explore them, drawing on the wisdom of philosophical heavyweights to...
Thank you for picking up this book! We believe that if you are reading this page, you are an individual seeking to gain a greater degree of familiarity with cybercrime and espionage, and more likely than not, believe that the realities outweigh the fear, uncertainty, and doubt associated with these two topics. Our desire in writing this...
This book is exclusively dedicated to WiMAX. The focus of the book is
on the applications of WiMAX networks, with delivery of multimedia
content to wireless and mobile devices being the area of greatest attention.
WiMAX has crossed a number of major milestones in the recent
past. These include setting standards, adopting...
Service-Oriented Applications and Architectures (SOAs) have captured the interest of industry as a way to support business-to-business interaction, and the SOA market grew by $4.9 billion in 2005. SOAs and in particular service-oriented computing (SOC) represent a promising approach in the development of adaptive distributed systems. With...
Why do countries celebrate defining religious moments or significant events in their history, and how and why do their leaders select certain events for commemoration and not others? This book is the first systematic study of the role of celebrations and public holidays in the Arab Middle East from the fall of the Ottoman Empire to the...
A classic in the area of organic synthesis, Strategies and Tactics in Organic Synthesis provides a forum for investigators to discuss their approach to the science and art of organic synthesis. Rather than a simple presentation of data or a secondhand analysis, we are given stories that vividly demonstrate the power of the human...
Large investments have been made by various governments for the deployment of broadband within their respective nations; however, the citizens of such countries have demonstrated a slow adoption of this technology.
The Handbook of Research on Global Diffusion of Broadband Data Transmission explores broadband adoption and the...