Home | Amazing | Today | Tags | Publishers | Years | Search 
X-Men and Philosophy: Astonishing Insight and Uncanny Argument in the Mutant X-Verse
X-Men and Philosophy: Astonishing Insight and Uncanny Argument in the Mutant X-Verse

Is mind reading an invasion of privacy?

What's wrong with genetic experimentation?

How many identities can one person have?

Are the X-Men advocates of civil rightsand social change?

Do mutants have "human" rights?

X-Men is one of the most popular comic-book franchises...

Advances in Digital Government (Advances in Database Systems)
Advances in Digital Government (Advances in Database Systems)
Book Series: THE KLUWER INTERNATIONAL SERIES ON ADVANCES IN DATABASE SYSTEMS : Volume 26

Advances In Digital Government presents a collection of in-depth articles that addresses a representative cross-section of the matrix of issues involved in implementing digital government systems. These articles constitute a survey of both the technical and...

Mashup Patterns: Designs and Examples for the Modern Enterprise
Mashup Patterns: Designs and Examples for the Modern Enterprise
Using new mashup tools and technologies, enterprise developers can impose their own APIs on everything from Web sites and RSS feeds to Excel and PDF files–transforming a world of content into their own customized informationsource. In Mashup Patterns, Michael Ogrinz applies the concept of software development...
Microsoft Windows 7 Unleashed
Microsoft Windows 7 Unleashed

Covers Release Candidate of Windows 7. 

With purchase of this book you will get a free online edition written on final product. See product registration ad in back of book for details.

 

Microsoft® Windows 7 Unleashed...

Class, Culture and Suburban Anxieties in the Victorian Era (Routledge Studies in Nineteenth Century Literature)
Class, Culture and Suburban Anxieties in the Victorian Era (Routledge Studies in Nineteenth Century Literature)

This book demonstrates how representations of the Victorian suburb in mid- to late-nineteenth century British writing occasioned a literary sub-genre unique to this period, one that attempted to reassure readers that the suburb was a place where outsiders could be controlled and where middle-class values could be enforced. Whelan explores the...

Mobile IPv6: Protocols and Implementation
Mobile IPv6: Protocols and Implementation

Mobile IPv6 has become the key enabling technology for mobile data and multimedia services and devices worldwide (i.e., cellular systems, VoIP handovers over LAN, multi-access network handovers, location privacy, enterprise mobile networking, etc.). 

This book covers the IPv6 host mobility protocol known as "mobile IPv6"...

802.11 Security
802.11 Security

802.11 Security covers the entire process of building secure 802.11-based wireless networks, in particular, the 802.11b ("Wi-Fi") specification. The authors provide detailed coverage of security issues unique to wireless networking, such as Wireless Access Points (WAP), bandwidth stealing, and the problematic Wired Equivalent...

Location-Based Services Handbook: Applications, Technologies, and Security
Location-Based Services Handbook: Applications, Technologies, and Security

Location-Based Services Handbook: Applications, Technologies, and Security is a comprehensive reference containing all aspects of essential technical information on location-based services (LBS) technology. With broad coverage ranging from basic concepts to research-grade material, it presents a much-needed overview of...

How to Do Everything MacBook
How to Do Everything MacBook

Easy-to-follow coverage of portable Macs, including the MacBook, MacBook Pro, and MacBook Air

How to Do Everything: MacBook strongly emphasizes the portability and other unique features of the laptop versions of the Mac, examining ports and jacks, discussing user accounts and privacy, managing multiple network connections,...

Network Security: A Decision and Game-Theoretic Approach
Network Security: A Decision and Game-Theoretic Approach

Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems. It provides the reader with a system-level theoretical understanding of...

Facebook for Grown-Ups
Facebook for Grown-Ups

Facebook started out as a social network for high school and college kids. But now grown-ups like you are getting connected, too–even if you use Facebook much differently than your kids do. If you’re a grown-up looking to join the Facebook bandwagon, Facebook for Grown-Ups is just the guide you...

Cloud Security: A Comprehensive Guide to Secure Cloud Computing
Cloud Security: A Comprehensive Guide to Secure Cloud Computing

Well-known security experts decipher the most challenging aspect of cloud computing-security

Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access...

Result Page: 40 39 38 37 36 35 34 33 32 31 30 29 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy