High Tech/High Touch: Technology and Our Search for Meaning
The one great megatrend of the new millennium. In this important and timely book encompassing the key trends of our time, John Naisbitt, the world's foremost social forecaster and bestselling author, takes us on a compelling and kaleidoscopic tour of our contemporary 'technology immersion' and our accelerated search for meaning. High... Design Patterns Explained: A New Perspective on Object-Oriented Design
"...I would expect that readers with a basic understanding of object-oriented programming and design would find this book useful, before approaching design patterns completely. Design Patterns Explained complements the existing design patterns texts and may perform a very useful role, fitting between...
Mobile Commerce : Opportunities, Applications, and Technologies of Wireless Business
This book provides the context, architectures, case studies, and intelligent analysis that will help the reader grasp the rapidly evolving subject of mobile commerce. May explains the technological aspects of mobile commerce to business decision makers and the business models to the technologists who design and build these electronic systems. It... Fiber Optic Cabling, Second Edition Essential reading for anyone involved in fiber optic cable applications, from installation engineers to IT professionals.
Fiber Optic Cabling is a practical guide to all aspects of designing, specifying and installing systems for LANs and other data communications applications. The second edition has been completely revised and updated...
The Curve Shortening Problem
Although research in curve shortening flow has been very active for nearly 20 years, the results of those efforts have remained scattered throughout the literature. For the first time, The Curve Shortening Problem collects and illuminates those results in a comprehensive, rigorous, and self-contained account of the fundamental results.
Demystifying the Ipsec Puzzle (Artech House Computer Security Series) Now that the Internet has blossomed into the "Information Superhighway," with its traffic (and drivers) becoming increasingly diverse, security has emerged as a primary concern. This innovative new book offers you a global, integrated approach to providing Internet Security at the network layer. You get a detailed presentation of the... Principles of Data Mining (Adaptive Computation and Machine Learning)
The growing interest in data mining is motivated by a common problem across disciplines: how does one store, access, model, and ultimately describe and understand very large data sets? Historically, different aspects of data mining have been addressed independently by different disciplines. This is the first truly...
Web Design in a Nutshell
Web Design in a Nutshell, 2nd Edition contains the nitty-gritty on everything you need to know to design Web pages. It's an excellent reference for HTML 4.01 tags (including tables, frames, forms, color, and cascading style sheets) with special attention given to browser support, platform idiosyncrasies, and standards. You'll also...
The Archaeology of Athens
The city of Athens has played a leading role in the development of European civilization.
When we look back through time to the origins of so many of the institutions and activities
which thrive or are valued today, we are led to ancient Greece and, most often, to
Athens in the Classical period (480–323 B.C.). Time and again... Mechanical Engineer's Handbook (Engineering) The Mechanical Engineer's Handbook was developed and written specifically to fill a need for mechanical engineers and mechanical engineering students throughout the world. With over 1000 pages, 550 illustrations, and 26 tables the Mechanical Engineer's Handbook is very comprehensive, yet affordable, compact, and... Making, Breaking Codes: Introduction to Cryptology
This book is an introduction to modern ideas in cryptology and how to employ
these ideas. It includes the relevant material on number theory, probability, and
abstract algebra, in addition to descriptions of ideas about algorithms and com
plexity theory. Three somewhat different terms appear in the discussion of secure
|Result Page: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next |