This book examines Aristotle's method in ethics from the vantage point of his broader conception of philosophy. Joseph Karbowski challenges longstanding dialectical orthodoxy and argues instead that, in his ethical treatises, Aristotle is seeking the first principles of a demonstrative ethical science, a science of human goodness, using an...
The CEH certification shows knowledge of network penetration testing skills. The CEH exam takes three hours and 125 questions, requiring a broad and deep knowledge of network security issues. The CEH Exam Prep is the perfect solution for this challenge, giving you the solid, in-depth coverage...
Design and deploy Cisco WAN optimization and application acceleration solutions for the enterprise WAN
Today, IT organizations are increasingly squeezed by competing demands. They must support more distributed users who demand greater availability and performance. They must protect their digital assets...
Learner-Centered Theory and Practice in Distance Education: Cases From Higher Education brings the voice of the learning sciences to the study and design of distance learning. The contributors examine critical issues in the design of theoretically and pedagogically based distance education programs.
"This book should undoubtedly be of great interest to students and researchers of morphology, syntax, computational linguistics, and natural language processing. The book provides an excellent systematics overivew of the current state-of-the-art of the field. The book includes extensive descriptions of the formal characterization of...
Information is widely regarded as the lifeblood of modern business, but organizations are facing a flood of threats to such “intellectual capital” from hackers, viruses, and online fraud. Directors must respond to increasingly complex and competing...
Error Control Coding: From Theory to Practice provides a concise introduction to basic coding techniques and their application. The fundamental concepts of coding theory are explained using simple examples with minimum use of complex mathematical tools. The selection of appropriate codes and the design of decoders are discussed.
Anarchist politics are at the heart of today’s most vibrant and radical social movements. From squatted social centres and community gardens to acts of sabotage and raucous summit blockades, anarchist groups and networks are spreading an ethos of direct action, non-hierarchical organizing and self-liberation that has redefined...
“Finally! A book that lays out a thorough yet workable path to collaborative innovation! With a highly readable style and using great examples, Frederich and Andrews describe the process by which IBM makes collaborative innovation work from a process, company, and customer standpoint. By following the guidelines...
The increasing use of computer technology in many areas of economic, scientific, and social life is resulting in large collections of digital data. The amount of data which is created on and stored in computers is growing from day to day. Electronic database facilities are common everywhere and can now be considered a standard technology....
XML (Extensible Markup Language) is the lingua franca in contemporary networked
environments. It is intended to support communication between software modules,
particularly on the Web, as well as communication between people involved in
developing new XML-based solutions. Developing the new solutions for a specifi c
domain or...
It was 1999 when Extreme Programming Explained was first published, making this
year’s event arguably the fifth anniversary of the birth of the XP/Agile movement in
software development. Our fourth conference reflected the evolution and the learning
that have occurred in these exciting five years as agile practices have become...