 |
|
|
|
|
 Cognitive Superiority: Information to Power
In a world of accelerating unending change, perpetual surveillance, and increasing connectivity, conflict has become ever more complex. Wars are no longer limited to the traditional military conflict domains?land, sea, air; even space and cyber space. The new battlefield will be the cognitive domain and the new conflict a larger... |  |  RFID Handbook: Applications, Technology, Security, and PrivacyRadio Frequency Identification (RFID) tagging is now used by the department of defense and many of the worlds largest retailers including Wal-Mart. As RFID continues to infiltrate industries worldwide, organizations must harness a clear understanding of this technology in order to maximize its potential and protect against the potential risks it... |  |  Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace
Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous "Great... |
|
|
 Blog Theory: Feedback and Capture in the Circuits of Drive
The challenge of this book is thinking critically about media practices in a setting where they are fast, fun, and ubiquitous. As an avowedly engaged and political approach to thought, critical theory of any sort encounters challenges. Attempting to analyze and intervene in the present, it nonetheless adopts a backward gaze, an idea G.W.F.... |  |  Real World Microsoft Access Database Protection and SecurityMicrosoft Access is the most popular desktop database in the world today and its very popularity means that its security measures can be easily compromised. Real World Microsoft Access Database Security takes a different approach to all the other Access books in the market in that it focuses from the start on all the issues that... |  |  Wireless Internet Handbook: Technologies, Standards, and ApplicationsWireless applications are definitely the next big thing in communications. Millions of people around the world use the Internet every day—to stay in touch with remote locations, follow the stock market, keep up with the news, check the weather, make travel plans, conduct business, shop, entertain themselves, and learn. The logical next... |
|
|
Result Page: 15 14 13 12 11 10 9 8 7 6 |