 |
|
|
|
|
 Crop Circles: Signs of Contact
Credible people telling of incredible
things.
This is the center, the goal, even
the “mission statement” of this book.
And Colin Andrews is in a unique place
as the premier authority on the crop
circle phenomenon.
When one reads Colin’s findings, it is
self-evident that he is such an expert.... |  |  Transactions on Data Hiding and Multimedia Security VI
This issue consists mainly of a Special Section on “Content Protection and
Forensics” with four papers edited by Sabu Emmanuel, Mohan S. Kankanhalli,
Shih-Fu Chang, Regunathan Radhakrishnan, Fulong Ma and Li Zhao. For a detailed
introduction of these four papers, please refer to the Preface written by
the organizers... |  |  Inside Cyber Warfare: Mapping the Cyber Underworld
I was recently invited to participate in a cyber security dinner discussion by a few
members of a well-known Washington, DC, think tank. The idea was that we could
enjoy a fine wine and a delicious meal while allowing our hosts to pick our brains about
this “cyber warfare stuff.” It seems that the new ... |
|
| Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 |