Privacy is one of the most urgent issues associated with information technology and digital media. This book claims that what people really care about when they complain and protest that privacy has been violated is not the act of sharing information itselfâmost people understand that this is crucial to social life âbut the...
The secret weapon for attacking complexity in any project is to break it down into smaller, cohesive, and more easily digestible pieces. With Modular Java, you can easily develop applications that are more flexible, testable, maintainable, and comprehensible.
Modular Java is a pragmatic guide to developing modular...
Themes are among the most powerful features that can be used to customize a web site, especially in Plone. Using custom themes can help you brand your site for a particular corporate image; it ensures standards compliance and creates easily navigable layouts. But most Plone users still continue to use default themes as developing and deploying...
Buildings and infrastructure represent principal assets of any national economy as well as prime sources of environmental degradation. Making them more sustainable represents a key challenge for the construction, planning and design industries and governments at all levels; and the rapid urbanisation of the 21st century has turned this...
New paradigms for communication/networking systems are needed in order to tackle such emerging issues as heterogeneity, complexity and management of evolvable infrastructures, thus requiring approaches that are both task- and knowledge-driven. The networking and seamless integration of concepts, technologies and devices in a dynamically changing...
Become a market leader in under 6 months powered by Google AdWords!
If your concerns are brand awareness and exposure, you and Google AdWords are a match made in heaven. Not only is this innovative advertising system extraordinarily effective, it's suited for any budget and you can launch a campaign in...
This self-study exam preparation guide for the CEH Certified Ethical Hacker certification exam contains everything you need to test yourself and pass the Exam. All Exam topics are covered and insider secrets, complete explanations of all CEH Certified Ethical Hacker subjects, test tricks and tips, numerous highly realistic sample questions, and...
This undergraduate textbook is written for a junior/senior level course on linear optimization. Unlike other texts, the treatment follows the "modified Moore method" approach in which examples and proof opportunities are worked into the text in order to encourage students to develop some of the content through their own experiments and...
This book contributes to behavioral economic research on the central issue of social preferences, focusing on the implications of social fairness norms on the interaction of market participants. The author uses both game-theoretic and experimental methods to analyze the implications of social fairness norms on the outcomes of bilateral...
Jeremy Sutton is one of the world's premier Painter artists (www.JeremySutton.com and www.PaintboxJ.com), and in this brand new edition of his best-selling Painter Creativity: Digital Artist's Handbook, he shows you the methods and techniques he's developed over the years to perfect his art and earn him the title of Corel Painter Master. This...
Ad hoc and sensor networks continue to have a growing impact
on communication. These cost-effective wireless networks provide
location independent computing in environments ranging from
military battlefields to in-home patient monitoring systems. However,
having real-time connectivity to critical information over an open...
There is no single technique for achieving excellence
at work. High performance is attained through a
combination of understanding yourself and your
strengths and limitations; knowing what you want
to achieve; and ensuring you are in an environment
where you enjoy working and have some freedom to
achieve what you want....