Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing
World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing

"Richard Hunter has seen the future, and its really scary. If you ever plan to do anything wrong, you need to read this book. If you suspect that someone will ever try to do anything wrong to you, you also need to read it. I believe that covers pretty much all of us." —Thomas H. Davenport, Director, Accenture Institute for...

Mobile and Wireless Communications
Mobile and Wireless Communications
One of the very first books published on the social impact of the mobile phone was Timo Kopomaa’s The City in Your Pocket: Birth of the Mobile Information Society. The book, published in 2000, was based on research that Kopomaa had undertaken for Nokia and Sonera as part of his doctoral studies in the Centre for Urban and Regional Studies at...
Digital Business: First International ICST Conference, DigiBiz 2009, London, UK, June 17-19, 2009, Revised Selected Papers
Digital Business: First International ICST Conference, DigiBiz 2009, London, UK, June 17-19, 2009, Revised Selected Papers

This book constitutes the proceedings of the First International ICST Conference, DigiBiz 2009, held in London, UK, in June 2009.

The 19 contributions published in this volume were carefully selected from over 60 submitted works in a rigorous peer-reviewed process.

The papers dealt with subjects like virtual business alliances,...

A Subject Guide to Quality Web Sites
A Subject Guide to Quality Web Sites

The Web is always moving, always changing. As some Web sites come, others go, but the most effective sites have been well established. A Subject Guide to Quality Web Sites provides a list of key web sites in various disciplines that will assist researchers with a solid starting point for their queries. The sites included in this collection...

Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Nanotechnology and Human Health
Nanotechnology and Human Health

Addressing medium- and long-term expectations for human health, this book reviews current scientific and technical developments in nanotechnology for biomedical, agrofood, and environmental applications. This collection of perspectives on the ethical, legal, and societal implications of bionanotechnology provides unique insight into...

Samsung Galaxy Tabs For Dummies
Samsung Galaxy Tabs For Dummies

A colorful, entertaining, and informative guide to the Samsung Galaxy family of tablets

Samsung's bestselling Galaxy Tabs may come in multiple sizes, but they all share the wildly popular Android operating system and are packed with tons of top-notch tablet features. This full-color book shows you how...

Work (The Art of Living Series)
Work (The Art of Living Series)

Work is one of the most universal features of human life; virtually everybody spends some part of their life at work. It is often associated with tedium and boredom; in conflict with the things we would otherwise love to do. Thinking of work primarily as a burden - an activity we would rather be without - is a thought that was shared by the...

Socially Responsible IT Management
Socially Responsible IT Management
"A recommended read for all IT professionals and a must read for those in management."Tom Molnar, business systems analyst

"The combination of practicality, ease of implementation, and positive return on investment is what makes this book work so well. The easy-to-implement action steps makes dealing with these ten social
...
Technological Turf Wars: A Case Study of the Computer Antivirus Industry
Technological Turf Wars: A Case Study of the Computer Antivirus Industry
Computer security is a technical and social problem. It is just as much about social relationships as it is about computers as tools. Internet security professionals are as concerned with how people use information as they are with how machines manipulate and process that information. This book is a case study of how the knowledge systems...
Building OpenSocial Apps: A Field Guide to Working with the MySpace Platform
Building OpenSocial Apps: A Field Guide to Working with the MySpace Platform

The authors did a great job covering the various ins and outs of OpenSocial, and especially the specific MySpace quirks. If you are a new social networking application developer or even someone who just wants to write better OpenSocial Apps, then this book has what you are looking for

Public Speaking and Presentations Demystified
Public Speaking and Presentations Demystified

Take the mystery out of effective, fear-free public speaking

This latest book in the Demystified series takes the confusion out of preparing for and delivering speeches and presentations. Public Speaking and Presentations Demystified walks you step-by-step through the fundamentals of the subject and provides you...

unlimited object storage image
Result Page: 209 208 207 206 205 204 203 202 201 200 199 198 197 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy