Home | Amazing | Today | Tags | Publishers | Years | Search 
Inside Cyber Warfare: Mapping the Cyber Underworld
Inside Cyber Warfare: Mapping the Cyber Underworld
I was recently invited to participate in a cyber security dinner discussion by a few members of a well-known Washington, DC, think tank. The idea was that we could enjoy a fine wine and a delicious meal while allowing our hosts to pick our brains about this “cyber warfare stuff.” It seems that the new...
iPod: The Missing Manual
iPod: The Missing Manual
What a difference a decade makes. When Apple introduced the very first iPod back in October 2001, it was a bulky chunk of white plastic, chrome, and glass that held a mere 5 gigabytes of music. But its concept was simple and enticing: you could carry 1,000 songs around in your pocket. And people did.
 
Media in the Ubiquitous Era: Ambient, Social and Gaming Media (Premier Reference Source)
Media in the Ubiquitous Era: Ambient, Social and Gaming Media (Premier Reference Source)

Media in the ubiquitous area is undergoing a tremendous change. Social media and Web 2.0 are applied in ever more diverse practices both in private and public communities and digital games and play are currently undergoing many transformations. Traditional communication and expression modalities are challenged and totally new practices are...

Unreal Development Kit Game Programming with UnrealScript: Beginner's Guide
Unreal Development Kit Game Programming with UnrealScript: Beginner's Guide

Welcome to Unreal Development Kit Game Programming with UnrealScript! This book teaches you how to program using the UnrealScript language so you can create your own game projects using the UDK. Instead of using dry, hypothetical code you will use the topics learned in each chapter to build an actual working game. By the end of the book, you...

iPad 2: The Missing Manual
iPad 2: The Missing Manual

Apple announced the original iPad on January 27, 2010, and the technology world hasn’t been the same since. Customers rushed to buy the tablet, snapping up more than 300,000 the day it went on sale. Competitors rushed to copy it, with Samsung, Motorola, Amazon, and others creating their own variations on the app-friendly...

Data Mining and Machine Learning in Cybersecurity
Data Mining and Machine Learning in Cybersecurity

In the emerging era of Web 3.0, securing cyberspace has gradually evolved into a critical organizational and national research agenda inviting interest from a multidisciplinary scientific workforce. There are many avenues into this area, and, in recent research, machine-learning and data-mining techniques have been applied to design,...

Handbook of Pattern Recognition & Computer Vision
Handbook of Pattern Recognition & Computer Vision

The area of pattern recognition and computer vision, after over 35 years of continued development, has now reached its maturity. The theories, techniques and algorithms are mostly well developed. There are a number of applications which are still being explored. New approaches motivated by applications and new computer architectures...

Fundamentals of Scientific Computing (Texts in Computational Science and Engineering)
Fundamentals of Scientific Computing (Texts in Computational Science and Engineering)

Computers play an increasingly important role in our society. A breakdown of all computer systems would cause a breakdown of almost all activities of daily life. Furthermore, personal computers are available in almost every home in the industrialized world. But there is one sector where computers have a more strategic role, and that...

Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems: 7th International Conference
Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems: 7th International Conference

Cutting planes (cuts) are very popular in the OR community, where they are used to strengthen the Linear Programming (LP) relaxation of Mixed-Integer Programs (MIPs) in the hope of improving the performance of an exact LPbased solver. In particular, an intense research effort has been devoted to the study of families of general cuts,...

Digital Libraries and Archives: 7th Italian Research Conference, IRCDL 2011, Pisa, Italy,January 20-21, 2011
Digital Libraries and Archives: 7th Italian Research Conference, IRCDL 2011, Pisa, Italy,January 20-21, 2011

IRCDL is a yearly event for Italian researchersworking onDigital Libraries-related topics. This year the focus of IRCDL was on information access and interoperability. In fact Digital Library systems are starting to be mature, but it is time to give a more effective and personalized access to information to users and to improve...

Unity 3.x Game Development Essentials
Unity 3.x Game Development Essentials

When we began creating Unity, we were just three programmers working on a beautiful little game. There weren't any good game engines that one could license without putting down wads of cash, so we created our own. We eventually decided that we enjoyed the challenge of making great tools even more than making games, and after some soul...

Databases in Networked Information Systems: 7th International Workshop, DNIS 2011
Databases in Networked Information Systems: 7th International Workshop, DNIS 2011

Large-scale information systems in public utility services depend on computing infrastructure. Many research efforts are being made in related areas, such as cloud computing, sensor networks, mobile computing, high-level user interfaces and information accesses by Web users. Government agencies in many countries plan to launch...

Result Page: 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy