|
|
|
|
The Best of 2600: A Hacker OdysseyThe hacker subculture — shrouded in mystery, spiced with a hint of glamour, and thoroughly misunderstood by those who don't belong — was revealed in the original edition of The Best of 2600: A Hacker Odyssey. The book became an instant bestseller. If you're a 2600 subscriber, a member of the hacker community, a geek freak, or simply a... | | | | Trusted Computing Platforms: Design and ApplicationsMany scenarios in modern computing give rise to a common problem: why should Alice trust computation that’s occurring at Bob’s machine? (The computer security field likes to talk about “Alice” and “Bob” and protection against an “adversary” with certain abilities.) What if Bob, or... |
|
Chemistry: An Industry-Based Laboratory Manual
Have you ever sat down and had an open discussion over coffee with an industrial chemist
or chemical technician about his or her work? Have you ever “shadowed” a chemist or a
chemical technician for a day as he or she went about the daily routine in an industrial
or government laboratory? If you have done these things,... | | Practical Code Generation in .NET: Covering Visual Studio 2005, 2008, and 2010
The story of software engineering has been the story of increasing the
level of abstraction at which we as programmers work, from logic encoded
in hardware to toggle switches representing binary digits, through machine
code, assembly language, low-level languages, and high-level languages
both procedural and functional. More recently,... | | Droid Companion
Congratulations on your new Droid smartphone! You’re going to be amazed when you discover all the ways it enables you to connect with your contacts and stay in touch with the world. You can communicate via talk, text, email, social networking, and chatting with instant messaging, and on some newer Droid phones, you may even be able to... |
|
Raspberry Pi for Secret Agents
Turn your Raspberry Pi into your very own secret agent toolbox with this set of exciting projects!
Overview
-
Detect an intruder on camera and set off an alarm
-
Listen in or record conversations from a distance
-
Find out what the other computers on your network are up to
... | | | | The Theory of Everything: The Origin and Fate of the Universe
In this series of lectures I shall try to give an outline of what we think is the history of the universe from the big bang to black holes. In the first lecture I shall briefly review past ideas about the universe and how we got to our present picture. One might call this the history of the history of the universe.
In the second... |
|
|
|
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |