|
|
The Exploit: A Theory of Networks (Electronic Mediations)It is our intention in this book to avoid the limits of academic writing in favor of a more experimental, speculative approach. To that end, we adopt a two - tier format. Throughout Part I, “Nodes,” you will find a number of condensed, italicized headers that are glued together with more standard prose. For quick immersion, we suggest... | | Building a Web Site For Dummies (Computer/Tech)Whether you’re in the preliminary stages of planning a site or you’re looking to improve the look of an existing site, this reference book covers it all. Now updated with the latest site tools, design techniques, and commerce options, this new edition of the bestseller offers a solid framework for building a Web site from scratch.... | | Teach Yourself VISUALLY Flash CS3 Professional (Tech)Clear, step-by-step screen shots arranged in two-page lessons show you how to tackle more than 140 Flash CS3 Professional tasks. No long-winded explanations, just easy, visual directions for performing such necessary operations as creating objects, symbols, and instances; controlling playback with the Timeline; adding interactivity with buttons;... |
|
|
|
Secret Societies: Their Mysteries Revealed
They were among the most frightening of early secret societies, a furtive group both feared and hated by citizens of the Roman Empire. Many suggested killing every man, woman and child who were members. Others proposed caution, having heard tales of bloody vengeance taken against enemies of the group. Some grew worried that their own... | | Home Security Handbook, The: How to Keep Your Home and Family Safe from Crime
We all know that society is less than perfect and that crime could easily touch us all. If yon talk to friends and neighbours you will usually find that most of them have cither been the victim of crime or know somebody who has. People tear crime, they feel helpless because they think that there is nothing they can do to protect themselves,... | | Document Security: Protecting Physical and Electronic Content
Several electronic layers exist in most documents, a fact overlooked
by many writers. Probing these sublayers often reveals information
not intended for release by the author. Documents in electronic formats
create a “palimpsest” that even semiskilled investigators can probe for
sensitive data.
Palimpsest seems... |
|
Result Page: Previous 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 Next |