 |
|
 Net Locality: Why Location Matters in a Networked World
A man is walking down Michigan Avenue in Chicago. He shares a sidewalk
with crowds of anonymous people. He sees skyscrapers and signage
extending to the horizon. There is a lot going on – people talking, walking,
playing, fighting, screaming, driving, and smiling. He sees a coffee shop
that excites his interest. He pulls... |  |  Beginning Facebook Game Apps Development (Beginning Apress)
Facebook has emerged over the last several years as the dominant social space. Their
astronomical growth has made it the platform for social interaction on the web. Although
there have been some hiccups along the way with privacy concerns, Facebook
continues to grow and provide a space for users worldwide to interact with one... |  |  |
|
 Quantum Cryptography and Secret-Key Distillation
This book aims at giving an introduction to the principles and techniques
of quantum cryptography, including secret-key distillation, as well as some
more advanced topics. As quantum cryptography is now becoming a practical
reality with products available commercially, it is important to focus not
only on the theory of quantum... |  |  |  |  Pharmacoethics: A Problem-Based Approach (Plant Engineering Series)
About 20 years ago, the University of New Mexico School of Medicine (SOM)
established a student-centered problem-based learning (PBL) curriculum
emphasizing ambulatory care practice competencies. It was designed for small
groups of students working together and ran parallel with their more traditional
curriculum. The SOM... |
|
|
 HBase in Action
I got my start with HBase in the fall of 2008. It was a young project then, released only in the preceding year. As early releases go, it was quite capable, although not without its fair share of embarrassing warts. Not bad for an Apache subproject with fewer than 10 active committers to its name! That was the height of the NoSQL... |  |  Handbook of Data Intensive Computing
This handbook is carefully edited book – contributors are worldwide experts in
the field of data intensive computing and their applications. The scope of the
book includes leading edge data intensive computing architectures and systems,
innovative storage, virtualization, and parallel processing technologies applied in... |  |  Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)
This book is an outstanding contribution to the interdisciplinary series on Crime, Media, and Popular Culture from Praeger Publishers. Because of the pervasiveness of media in our lives and the salience of crime and criminal justice issues, we feel it is especially important to provide a home for scholars who are engaged in innovative and... |
|
| Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 |