If you believe the sky really is the limit when it comes to creating unparalleled user experiences and applications for the Web--then Macromedia Flash MX is sure to be your tool of choice.
Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology demonstrates that digital security is not only worth thinking about, it's also a fascinating topic.
"e;The computer world is like an intellectual Wild West, in which you can shoot anyone you wish with your ideas, if you're willing to risk the consequences.
Fifty years ago, in 1984, George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power.
In the updated edition of this critically acclaimed and bestselling book, Microsoft project veteran Scott Berkun offers a collection of essays on field-tested philosophies and strategies for defining, leading, and managing projects.
The annoyance factor for individual users whose email is crammed with pitches for pornography, absurd moneymaking schemes, and dubious health products is fierce.
If you believe the sky really is the limit when it comes to creating unparalleled user experiences and applications for the Web--then Macromedia Flash MX is sure to be your tool of choice.
The new iPhone 3G is here, and New York Times tech columnist David Pogue is on top of it with a thoroughly updated edition of iPhone: The Missing Manual.
Macromedia Flash is fast becoming the Web's most widely used platform for creating rich media with animation and motion graphics, but mastering Flash isn't easy.
This book explores the impact of technology on Human Resource (HR) practices and how organisations can effectively incorporate progress in technology to improve HR processes.
This book introduces undergraduates and computing industry professionals to basic legal principles and the peculiarities of legal issues in cyberspace.
This book introduces undergraduates and computing industry professionals to basic legal principles and the peculiarities of legal issues in cyberspace.
Future Imperfect describes and discusses technological revolutions that might happen over the next few decades, their implications and how to deal with them.
With the advancements in sensor and computation technologies, connected autonomous vehicle (CAV) services are being tested and deployed on public roads, sharing the road with human- driven vehicles (HVs).
Provides critical information for business professionals who want to understand a ''connected world'', linking businesses, customers, and service providers.
The first guide to tackle security architecture at the software engineering level Computer security has become a critical business concern, and, as such, the responsibility of all IT professionals.
This is the most comprehensive book on computer security on the market, with 23 chapters and 29 Appendices covering virtually all aspects of computer security.
The future of computing-the future of business Rapid technological innovation is moving us towards a world of ubiquitous computing-a world in which we are surrounded by smart machines that are always on, always aware, and always monitoring us.
Social networks enable anyone with a computer and Internet connection to stay in touch with friends and family across the globe, and rediscover old acquaintances.