 |
|
 IPTV Security: Protecting High-Value Digital ContentsTelevision was one of the inventions that shaped the way society and culture evolved over the second half of the twentieth century. It had the powerful effect of shrinking the world which creating a unified view of how things were. There continues to be an evolution of television and a migration towards a fully interactive and ubiquitous IPTV.... |  |  Introduction to Numerical Analysis: Second EditionWell-known, respected introduction, updated to integrate concepts and procedures associated with computers. Computation, approximation, interpolation, numerical differentiation and integration, smoothing of data, other topics in lucid presentation. Includes 150 additional problems in this edition. Bibliography.
This volume is intended to... |  |  Classical And Quantum Dissipative SystemsThis book discusses issues associated with the quantum mechanical formulation of dissipative systems. It begins with an introductory review of phenomenological damping forces, and the construction of the Lagrangian and Hamiltonian for the damped motion. It is shown, in addition to these methods, that classical dissipative forces can also be derived... |
|
 Absolute Beginner's Guide to Corel WordPerfect 10In recent news, Corel announced that HP, the world's largest PC manufacturer, Dell, the second-largest, and Sony have all agreed to preinstall WordPerfect 10 and Quattro Pro 10 on some of their computer lines. Cost differential between Microsoft's Office and Works Suites, as well as Microsoft's Office licensing terms is helping fuel the trend to... |  |  Multimedia Forensics and SecurityAs information technology is rapidly progressing, an enormous amount of media can be easily exchanged through Internet and other communication networks. Increasing amounts of digital image, video, and music have created numerous information security issues and is now taken as one of the top research and development agendas for researchers,... |  |  |
|
|
 Humane Interfaces (Human Factors in Information Technology)Ever since the first successful International Cognitive Technology (CT) Conference in Hong Kong in August 1995, a growing concern about the dehumanising potential of machines, and the machining potential of the human mind, has pervaded the organisers' thinking. When setting up the agenda for the Second International CT Conference in Aizu, Japan, in... |  |  Installing and Administering Linux, Second EditionAn indispensable working resource for IT professionals moving to Linux-based network systems
More and more companies are now using Linux as their server operating system of choice. That’s because the costs are lower, there’s a greater amount of flexibility, and the code is much more reliable. As a result, there is a bigger demand... |  |  Crypto Anarchy, Cyberstates, and Pirate UtopiasIn Crypto Anarchy, Cyberstates, and Pirate Utopias, Peter Ludlow extends the approach he used so successfully in High Noon on the Electronic Frontier, offering a collection of writings that reflects the eclectic nature of the online world, as well as its tremendous energy and creativity. This time the subject is the emergence... |
|
| Result Page: 303 302 301 300 299 298 297 296 295 294 293 292 291 290 289 288 287 286 285 |