O'Reilly spreads the knowledge of innovators through technology books, online services, and tech conferences. Find the technology resources you need at ...
Computer Science Textbooks can be expensive, but not at AbeBooks.com. Students, professors, and parents all know that the best place to buy Computer Science ...
www.abebooks.com/used-textbooks/Computer Science Textbooks
Digerati Home | Third Culture | Digerati | Reality Club Featured This Week Who are the digerati and why are they the cyber elite They are the doers, thinkers, and writers who have tremendous influence on the emerging communication revolution. They are not on the frontier, they are the frontier. The digerati evangelize, connect people, adapt quickly. They like to talk with their peers because ...
www.edge.org/digerati/index.html
Visit rheingold.com for a more recent and web-ized version of this book The Virtual Community: Table of Contents By Howard Rheingold Note to readers: I can see that thousands of people are reading or at least looking at each chapter of this book every month. Excellent! I put these words out here for the Net without charge because I want to get as much good information distributed as possible ...
www.well.com/user/hlr/vcbook/index.html
ONLINE BOOK Open Sources: Voices from the Open Source Revolution 1st Edition January 1999 1-56592-582-3, Order Number: 5823 280 pages, $24.95 Table of Contents Copyright/CIP Data Acknowledgments Introduction Chris DiBona, Sam Ockman, and Mark Stone A Brief History of Hackerdom Eric S. Raymond Twenty Years of Berkeley Unix: From AT&T-Owned to Freely Redistributable Marshall Kirk McKusick The ...
www.oreilly.com/catalog/opensources/book/toc.html
Computer crime news -- What's new at this site Updated Thursday, June 06 `If I was a betting man, I'd bet that many of our key infrastructure systems already have been penetrated.'' Presidential Technology Advisor Richard C. Clark, testifying before a Senate Judiciary subcommittee hearing on cyberterrorism. Cyberwar is here, now. What role will you play Defender Criminal/terrorist Bystander ...
E-Volve-or-Die.com helps the reader figure out how to transition their company or suffer the same death of the dinasaur. With 12 forewords, and 45 of the worlds top ECM experts, Levy can help your company with the biggest industrial transition the business world has faced in the last 100 years.
Fireworks Splice HTML ...
This book is the first comprehensive introduction to Support Vector Machines (SVMs), a new generation learning system based on recent advances in statistical learning theory. It also describes kernel methods, or kernel machines.
HAL's Legacy: Contents ...
mitpress.mit.edu/e-books/Hal/index.html
The Famous Hacker Crackdown by Bruce Sterling is a book about cops, and wild teenage whiz-kids, and lawyers, and hairy-eyed anarchists, and industrial technicians, and hippies, and high-tech millionaires, and game hobbyists, and computer security experts, and Secret Service agents, and grifters, and thieves. This book is about the electronic frontier of the 1990s. It concerns activities that ...
www.lysator.liu.se/etexts/hacker
This book is *not* for people who study C as their first programming language ( those would be better served with a pair of books - a first course in ...
www.amazon.com/Programming-Language-2nd-Brian-Kernighan/dp/0131103628
Computer Language Company, Computer Desktop Encyclopedia. The award-winning source of computer terms, concepts, important products and interesting stuff!
Oracle books, Oracle Manuals, Oracle news, Oracle information, Oracle related materials, OCP ...
Book Shopping This book is about people and culture, not about computers and markets. It is about a set of beliefs well known inside high-tech, but little known outside it. It is not a getrichkwik guide nor about the ways scary hackers are going to get your momma. Contact the author Leave A Comment ...
The network is the soul of Java. Most of what is new and exciting about Java centers around the potential for new kinds of dynamic networked applications. Java Network Programming teaches you to work with Sockets, write network clients and servers, and...
www.oreilly.com/catalog/javanetwk
Computer Security & Privacy. O'Reilly Ebooks - Your bookshelf on your devices! When you buy ebooks through oreilly.com, you get lifetime access to the book, ...
www.oreilly.com/pub/topic/security
Flash Deconstruction is the companion site for the book Flash deconstruction the process, Design, and ActionScript of Juxt Interactive by Todd Purgason, Phil Scott, Brian Drake and Bonnie Blake. ...
www.juxtinteractive.com/deconstruction
Ada: The Enchantress of Numbers by Betty Alexandra Toole, Ed.D. Read an interview with the author, from The Gate The books | Ada's life | Misinformation and Information Beyond stereotypes. --Wired Excellent and thoughtful. --Annals of the History of Computing Toole lets Ada speak for herself through letters to colleagues, family and friends which bring Ada to life with an intimacy a biography ...
www.well.com/user/adatoole
The Advantage Series for Computer Education, written by authors Sarah Hutchinson and Glen Coulthard of Irwin/McGraw-Hill, provides software tutorials for Microsoft Windows and Office applications.
This book describes the standard Java interfaces that make portable object-oriented access to relational databases possible and offers a robust model for writing applications that are easy to maintain. It introduces the JDBC and RMI packages and includes...
www.oreilly.com/catalog/javadata
Dense with previously undocumented information, this bible for PalmPilot users contains hundreds of timesaving tips and surprising tricks, plus a CD-ROM containing over 900 PalmPilot programs that runs on Windows 9x, NT, and the Macintosh. The book covers...
www.oreilly.com/catalog/palmpilot
Writing Testbenches: Function Verification of HDL Models. A book on verifying VHDL and Verilog models by Janick Bergeron.
Securitybooks.org has a wide selection of essential books on Computer and Networking Security. For computer security professionals, ...
The Primary Key specializes in discounted books, software and education materials pertaining to the Oracle RDBMS, general database, and internet topics. Owned and operated by database professionals, The Primary Key offer s knowledgeable advice to customers who seek books on specific topics.
E-DHQ Bimonthly E-mail Newsletter . . . Find a Dorset House Title . . . Adaptive Software Development Amplifying Your Effectiveness Communication Gaps and How to Close Them Complete Systems Analysis Creating a Software Engineering Culture Data Model Patterns The Deadline: A Novel ... Designing Quality Databases ... Exploring Requirements Fundamentals of O.-O. Design in UML An Introduction to ...
www.dorsethouse.com/books/psy.html
SATAN performs security audits, scanning host computers for security vulnerabilities. This book describes how to install and use SATAN, and how to adapt it to local requirements and increase its knowledge of specific security vulnerabilities.
www.oreilly.com/catalog/satan
Words and Pictures, publishers of books on business forms design, Web site design and graphics design.
Introduction This website supplements the book Authorware: An Introduction to Multimedia Design by Simon Hooper. The book is a guide for beginners who are learning to use Authorware to develop multimedia instruction. The text includes information, step-by-step instructions, and development exercises to guide you through the learning process. The text also includes a cross-platform CD ROM ...
www.prenhall.com/divisions/ESM/app/hooper
The Implementation of the Icon Programming Language This book describes the implementation of Icon in detail. Highlights include: Icon's virtual machine the interpreter for the virtual machine generators and goal-directed evaluation data representation string manipulation structures memory management Contents Chapters Introduction Icon Language Overview Organization of the Implementation Values ...
www.cs.arizona.edu/icon/ibsale.htm
NEW* qualum.com *NEW* You are visitor number 76089 ! We apologise for the prolonged absence of our website. We are currently engaged in other projects but hope to re-establish our presence here before the end of the year. Thanks for your patience... ...
Publications of BARRY B. BREY enter keywords... I answer my email on a daily basis so please send any email comments to bbrey@ee.net Note: If you are experiencing trouble with my menu, update to at least IE 5. If you are using Netscape the menu will be slow because Netscape does not handle multiple threads very well. Copyright (c) 1995-2002 by Barry B. Brey ...
Highly-rated publications about Oracle, SQL Server, Java, Visual Basic, UNIX, and C ...
www.learningtechsoftware.com
The Complete Guide to PC-File, Version 5.01 Do you still use PC-File, the classic DOS-based flat-file database program PC-File was one of the first programs available for the PC, created in 1981 by Jim Button, an IBM employee, in his spare time. Jim distributed PC-File as shareware, asking for a small donation from anyone who used it. The program because so popular that Jim eventually left IBM ...
www.gurus.com/margy/pc-file.htm
Positive Support Review (PSR) is a Los Angeles-based management consulting firm that focuses on Management Information Systems and internet consulting.
www.psrinc.com/policy.htm
Amazon.com: Operating System Concepts (Windows Xp Update) (9780471250609): Abraham Silberschatz, Greg Gagne, Peter Baer Galvin: Books.
www.amazon.com/Operating-System-Concepts-Windows-Update/dp/0471250600
Thorough in its coverage, the book starts with a discussion of the history of cryptography, including a description of the basic encryption systems and many ...
www.amazon.com/Computer-Security-Cryptography-Alan-Konheim/dp/0471947830
Computer Organization and Design, Third Edition: The Hardware/Software Interface, Third Edition (The Morgan Kaufmann Series in Computer Architecture and ...
www.amazon.com/Essential-Computer-Science-Textbooks/lm/1EEHY6IJTFPQO