Home | Amazing | Today | Tags | Publishers | Years | Search 
Chinese Lexicography: A History from 1046 BC to AD 1911
Chinese Lexicography: A History from 1046 BC to AD 1911

This comprehensive account of the history of Chinese lexicography is the first book on the subject to be published in English. It traces the development of Chinese lexicography over three millennia, from the Zhou Dynasty (1046 BC-256 BC) to the Qing Dynasty (1616-1911). Revealing how the emergence of lexicographical culture in ancient China...

Creating a Website: The Missing Manual
Creating a Website: The Missing Manual

These days, it’s all but impossible to find someone who hasn’t heard of the Internet. Companies create websites before they make business plans. Political activists skip the debates and trash-talk their opponents online. Even formerly technophobic grandmothers spend hours emailing old friends (and selling the odd family...

Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives
Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives

Often computers are viewed as machines that run algorithms. This view of computers covers a vast range of devices, from simple computers that perform limited and specific computations (for example, a computer found in a wristwatch) to supercomputers, which are groups of computers linked together in homogeneous and heterogeneous clusters and...

Using CiviCRM
Using CiviCRM

Donald Lobo, Michal Mach, and I started CiviCRM almost six years ago. Back then, open source software had gained traction in the operating system arena, but the idea of an open source application designed from the ground up to meet the needs of non-profits and other civic sector organizations was pretty radical. We were convinced that there...

Encyclopedia of Cryptology
Encyclopedia of Cryptology

Secret writing for the transmission of messages has been practiced for nearly 4,000 years. According to David Kahn, the great historian of cryptology, the first example of an intentionally altered message can be traced to a tomb in ancient Egypt dated about 1900 b.c. In the 40 centuries since that...

Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition
Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition

There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter.

If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the...

Methods for Mining and Summarizing Text Conversations (Synthesis Lecture on Data Management)
Methods for Mining and Summarizing Text Conversations (Synthesis Lecture on Data Management)

Before the invention of the Internet and the creation of the Web, the vast majority of human conversations were in spoken form, with the only notable, but extremely limited, exception being epistolary exchanges. Some important spoken conversations, such as criminal trials and political debates (e.g., Hansard, the transcripts of...

Embedded and Ubiquitous Computing: International Conference EUC 2004, Aizu-Wakamatsu City, Japan, August 25-27, 2004, Proceedings
Embedded and Ubiquitous Computing: International Conference EUC 2004, Aizu-Wakamatsu City, Japan, August 25-27, 2004, Proceedings

Welcome to the proceedings of the 2004 International Conference on Embedded and Ubiquitous Computing (EUC 2004) which was held in Aizu-Wakamatsu City, Japan, 25–27 August 2004.

Embedded and ubiquitous computing are emerging rapidly as exciting new paradigms and disciplines to provide computing and communication services...

Digital Video Broadcasting: Technology, Standards, and Regulations
Digital Video Broadcasting: Technology, Standards, and Regulations
Many books and articles on the transition of television from analog to digital transmission have been published in recent years. This transition is still in its infancy, but it will inevitably take place in the years to come. Due to digitization, the existing barriers between audio, video, and data generation and transmission...
The Twitter Book
The Twitter Book
In March 2006, a little communications service called Twttr debuted. It began as a side project at a San Francisco podcasting company, but it wasn’t long before the side project had become the main event.

Today, just over five years later, Twitter is booming. In September 2011, the service announced that it had 100
...
America's Secret Establishment: An Introduction to the Order of Skull & Bones
America's Secret Establishment: An Introduction to the Order of Skull & Bones
The book began with an anonymous donation to the author of an 8-inch package of documents in the early 1980s. Nothing less than the membership list and supporting documents for a truly secret society the Yale Skull and Bones.

The late Johnny Johnson, of Phoenix Arizona was the spark that moved me to write first a
...
Energy Supply and Renewable Resources
Energy Supply and Renewable Resources
One has only to read a newspaper or magazine to realize the importance of energy at this early juncture of the 21st century. It will surely become more critical as world demand for oil continues to increase and its supply peaks and begins to fall.

Industrialized nations have become addicted to an ever-increasing
...
Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy