 |
|
 Network Consultant's HandbookA complete resource for assessing, auditing, analyzing, and evaluating any network environment
With Network Consultants Handbook, you will
- Learn from network audit and evaluation guidelines that aid in data gathering and analysis of network environments
- Work with tables and...
|  |  The Art of Computer Game DesignThe central premise of this book is that computer games constitute a new and as yet poorly developed art form that holds great promise for both designers and players.
This premise may seem laughable or flippant. How could anybody classify the likes of SPACE INVADERS and PAC MAN as art? How can TEMPEST or MISSILE COMMAND compare with... |  |  Digital People: From Bionic Humans to AndroidsRobots, androids, and bionic people pervade popular culture, from classics like Frankenstein and R.U.R. to modern tales such as The Six Million Dollar Man, The Terminator, and A.I. Our fascination is obvious – and the technology is quickly moving from books and films to real life.
In a lab at MIT, scientists and technicians have created... |
|
 Concepts of Programming Languages (7th Edition)Concepts of Programming Languages describes the fundamental concepts of programming languages by presenting design issues, examining design choices, and critically comparing design alternatives without being language specific. This book is appropriate for anyone who wants to compare and contrast various programming languages.
... |  |  Financial Analysis with Microsoft ExcelFAME explores the use of Excel as THE calculating tool for finance professionals. As students enter College with basic skills for using Excel and other software packages they need for their business courses, the materials they read must be ramped up. The book as it stands covers the main topics that students would see in a typical corporate finance... |  |  Information Systems Development: Advances in Theory, Practice, and EducationThis volume is comprised of the proceedings of the 13th International Conference on Information Systems Development held August 26th-28th, 2004, at Vilnius Gediminas Technical University, Vilnius, Lithuania. The aim of this volume is to provide a forum for the research and practices addressing current issues associated with Information Systems... |
|
 Code: Version 2.0The "alarming and impassioned"* book on how the Internet is redefining constitutional law, now reissued as the first popular book revised online by its readers (*New York Times)
There's a common belief that cyberspace cannot be regulated-that it is, in its very essence, immune from the government's (or anyone else's)... |  |  Techniques and Applications of Digital Watermarking and Content ProtectionWhether you need to quickly come up to speed on the state of the art in digital watermarking or want to explore the latest research in this area, such as 3-D geometry watermarking, this timely reference gives you the hands-on knowledge you need for your work. This book covers the full range of media -- still images, audio data, video, 3-D geometry... |  |  Digital Watermarking for Digital MediaDigital media, like audio, video, images, and other multimedia documents, can be protected against copyright infringements with invisible, integrated patterns. Such methods are based on steganography and digital watermarking techniques. Most watermarks are inserted as a plain-bit or adjusted digital signal using a key-based embedding algorithm. The... |
|
|
Result Page: 638 637 636 635 634 633 632 631 630 629 628 627 626 625 624 623 622 621 620 |