e99 Online Shopping Mall

Geometry.Net - the online learning center Help  
Home  - Basic L - Legal Software & The Internet (Books)

  Back | 61-80 of 89 | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

click price to see details     click image to enlarge     click link to go to the store

61. Running a Safe Online Business:
$1.00
62. The Power Of Many: How The Living
$9.94
63. Director 8 and Lingo Bible (With
$134.90
64. Copyright Law in the Digital Society:
$29.94
65. ISP Liability Survival Guide:
$0.01
66. Hacker Attack
$3.90
67. Web Publishing With Netscape for
$4.99
68. Flash 5 Cartooning (with CD-ROM)
$0.75
69. The Lexis Companion: A Concise
$0.01
70. Simple Computer Security: Disinfect
$171.80
71. Information Communication Technology
$0.01
72. Simple Computer Tune-up: Speed
73. Safety Critical Computer Systems
$4.46
74. Code and Other Laws of Cyberspace
$143.27
75. The Future of Identity in the
$25.94
76. Informatikrecht - Schnell erfasst
77. Distributed Multimedia Database
$31.03
78. Users' Guide to Logic Audio 5
79. Lifehacker: 88 Tech Tricks to
 
80. Computer Triangle (The Getting

61. Running a Safe Online Business: The safety of your business is at stake!
by Jeff Ford
Kindle Edition: Pages (2009-05-24)
list price: US$3.88
Asin: B002BA5VUG
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Don't Wait Another Minute To Find Out Weather Or Not Your Online Business Is Safe!

The Running a Safe Online Business Seven-Day Crash Course will show you proven and effective methods that you can use to protect yourself, your online business and your assets.

You'll Learn Exactly What You Need To Know About Running a Safe Online Business So That You Can Rest Easy Knowing Your Not Going To Lose It All At Anytime!

Inside each lesson, you will receive easy to understand information that you can use to keep your online business up and running, bringing you profits for a long time! You'll learn the basic steps you need to take to protect yourself from financial ruin, expensive penalties and possible conviction.

This course is specifically designed with beginners in mind, so even if you've just started your online businessyou'll be able to quickly take the necessary steps to protect your investment right away!

Inside every lesson of the "Running a Safe Online Business" Crash Course you'll learn valuable information that will show you how to protect yourself, your business and your assets right away!

You learn things like:

* The vital steps that you need to take immediately to ensure the safety of yourself and your online business and why you need to take them as soon as possible!

* Important information about your online business income tax and deductions that you may not even know about. Plus the simple facts about paying your taxes you need to know even if you aren't making big money just yet!

* The different types of legal documentation that you must use on your website and why not using them could leave you and your business open for more trouble than you ever imagined possible!

* Why it's vitally important that you know the products you are selling before you start selling them and how it can hurt you if you don't!

* The importance of giving your customer a refund as soon as they request it and how it will impactyour business if you don't! The risk just isn't worth it!

And that's just the beginning. Once you sign up for the "Running a Safe Online Business" Crash Course you will have access to greatinformation in every lesson that will help you learn how to effectively protect yourself, your business and your assets, so you'll never have to worry about losing everything in the blink of an eye! ... Read more


62. The Power Of Many: How The Living Web Is Transforming Politics, Business, And Everyday Life
by Christian Crumlish
Hardcover: 272 Pages (2004-09-28)
list price: US$29.99 -- used & new: US$1.00
(price subject to change: see help)
Asin: 0782143466
Average Customer Review: 4.5 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
As access to the Internet becomes ubiquitous, new forms of social networking are changing the way we shop, get jobs, meet each other, do business, enrich our lives, and even elect a President. Now you can get a practical inside look at how the web is transforming politics, business, and our everyday lives. The first book to span multiple areas of interest, The Power of Many pulls together common themes about online dating, job searches, activism, and politics. You'll read firsthand interviews from key players and ultimately learn how you can take full advantage of this revolution. ... Read more

Customer Reviews (8)

5-0 out of 5 stars A visionary book
I regret that it took me so long to write this review, since I knew about the book before it came out. But since that time I have witnessed its premise proved true over and over again in the local political process. Something very special--new and not so new--is at work here. Today more than any time I can remember (including the worst of the '60s), responsible, hardworking citizens feel alienated and abandoned by the democratic process. What good can taking action do when such gigantic and powerful players are on the other side of the debate and show no respect for reasoned argument or even the rule of law? But pick a seemingly tiny, local problem--trash pickup or snacks in school vending machines or use of public parks--and here are issues for which my neighbors will go to meetings, pull out their wallets, and even endorse candidates. Cluster those interests in a vertical website, allow some accretion to take place, combine those online credit card micro-donations, and suddenly thousands of like-minded folks find out that they have clout--and lots to talk about not only on trash disposal, snacks, and recreation but also on sewers, land development, zoning, business licensing, taxation, representation, and war and peace.

Hail Crumlish Caesar! Long live the Republic! Blogs are free speech!

5-0 out of 5 stars Buy This Book...
Christian Crumlish's "The Power of Many" changed my life, but more over changed my view on how the living web affects organizations and community organizing.I work for a political organization and everything that Mr. Crumlish discusses in his book, I'm currently examining and seeing how it can be applied in a political context.For the most part, everything we've tried concerning community building and decentralization, has come with much success.

I recommend this book to anyone who wants to move their business, corporation, or organization into the 21st century.The future is now and Christian Crumlish had effectively documented how it can improve social networking and overall interaction with the "living web."

3-0 out of 5 stars Do Numbers Really Count?
Christian Crumlish (wonder ifthat is his real name?) has been involved in web technology for ten years or more, so most of the technical stuff did not pertain to my small amount of knowledge of the Internet.He used too many personal experiences throughout the book and tells how so many people responded to his inqueries and he listed their web sites free of charge and put in a plug for all of his endeavors.He's really into the social scene online, though his To Briggs speaks louder than words.

There is too much about blogs and political sites.All of that is in the past now, and it is time to move on to the next election and spend time developing something for us not so well-developed computer users.He has written THE INTERNET FOR BUSY PEOPLE and THE INTERNET DICTIONARY.In this book, he has a glossary but most of it is Latin to me, and an Index which was helpful.

Now, down to my level, e-mail still 'feels' relatively private, although that is generally an illusion.I know that it is not exactly protected, but who would want to read through a stranger's communications with his friends?That is an invasion of privacy in the worse scenario.E-mail didn't catch on in a big way until there were nice graphical point-and-click interfaces and seamless Internet connections backing everything up.I was trained (8 months of hard work, 5 days a week) in Computers and Word Processing, yet I was not prepared for the actual work I did as a Temp at factories.It was all different and all interesting and was a joy to be able to use a computer for pay.But, I have noticed at the public computers in libraries and free labs are full of homeless people sending e-mail, and some of the not-so-nice men looking at porn.These people have no training even in typing, yet they are able to send and receive messages to people far away.

The fallacy of online communications is that so many use false identities.On Dateline, an NBC reporter used several aliases (Justin Case, that type of foolishness) to film a scam, which seemed to me unethical, but the people who claimed to be wealthy and in need at the same time, needing cash which would be repaid in multiple times were as false as his monikers.It is a shame that the web has come to this and a decent person is not safe.I have a friend who does only email on Yahoo and she keeps having to change her address using initials instead of her real name.That's sad!

The solitary writer of yesterday gives way to 'the power of many' on the Internet.Me, I'm a loner; if I can't be a leader, I will influence politicians and important people one-on-one.

2-0 out of 5 stars Why the Democrats lost the 2004 election
This is an odd little "how to organize" guide aimed at unrepentant flower-children.Each tip for 'using the Internet' is exemplified by a left wing political activity: the Howard Dean presidential campaign, Michael Moore, MoveOn, and various fringe groups.

5-0 out of 5 stars The right place, the right time, the right questions
This book has all the hallmarks of a classic. It's what happens when you drop a witty, cool, and curious observer into the maelstrom of a tsunami social change which is at and through its tipping point. Xian is like a great Sherlock Holmes who probes and interviews for facts and clues, for causes and effects. The decentralization of power, of information, of influence changes... everything. Pluralism is no longer just for politics. It's for the arts, and sciences, and community, and the workplace. Xian manages to find people who surf these waves of change, who're living it or making it happen, and gets you the inside view. And, like Holmes, he connects the dots. When you're done, you have a new way to think about your world, a context for connecting your own dots. ... Read more


63. Director 8 and Lingo Bible (With CD-ROM)
by John R. Nyquist, Robert Martin
Paperback: 1044 Pages (2000-07-27)
list price: US$49.99 -- used & new: US$9.94
(price subject to change: see help)
Asin: 0764534866
Average Customer Review: 5.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Unlike other books on Director, this book serves as a practical guide for all aspects of using the program from start to finish. This book is the ideal start for beginners just learning how to use the program. Intermediate users can also benefit by learning shortcuts, advanced tips and Lingo basics. Advanced users who can take advantage of Director's improved power and speed by with this book's more in-depth guide to Lingo, techniques for better project management, shortcuts for title development, and more advanced techniques for developing titles to play over the Internet quickly and efficiently using Shockwave technology. A 16-page color insert features real projects created by professionals who use the product, with tips from the developer on how they used Director to create the project. Unlike competitive books, the Director 8 and Lingo Bible has balanced coverage of both Mac and Windows versions, as Mac is no longer the default platform for Director. The bonus CD contains real-life working examples and exercises from the book along with utilities and other shareware extras for use with Director 8. ... Read more

Customer Reviews (9)

4-0 out of 5 stars Excellent Resource
This book is a great resource for when you're looking for that specific line of code. Its terrible to read from front to back, but its an excellent way to find exactly what you're looking for. Its so much code, it'll make your eyes bleed.

5-0 out of 5 stars Easing the Learning Curve
Director 8.5 is a monster application with huge range of functionality. Nyquist's "Bible" uses CD-ROM-based tutorials to carry you through the concepts with relative ease. The tutorials are part of one continuous complex project, taking the reader from the basics through media management, interactivity, project management and some pretty sophisticated Lingo programming. It is also organized to allow easy reference for specific issues. Having recently completed an 'Emedia & Design' programme I would have to say that Nyquist's book is probably the most valuable text in my library.

5-0 out of 5 stars Un gran libro para comenzar con Director
Este libro es realmente extraordinario para aprender a usar director, pues se ve desde el uso basico de cada herramienta aplicando los ejemplos que incluye el cd-rom.

Recomiendo este libro a quien nunca haya usado director antes, y para aquellos que habiendo usado, solo han aprendido por su cuenta sin referencias técnicas.

5-0 out of 5 stars I LOVE this book!
There is no better book with which to get involved in Director. I've read nearly all of them; nothing else comes CLOSE! Get IT! ENJOY IT! LOVE IT!

5-0 out of 5 stars Excellent Book
A well written book of the "Bible" series! Great examples and delivered in an understandable "lingo." This book is a must have for all Director developers regardless of your level or experience. There is a ton of useful information for everyone. ... Read more


64. Copyright Law in the Digital Society: The Challenges of Multimedia
by Tanya Aplin
Hardcover: 328 Pages (2005-08-30)
list price: US$142.00 -- used & new: US$134.90
(price subject to change: see help)
Asin: 1841133566
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Multimedia technology is a key component of the Digital Society. This book comprehensively examines the extent to which copyright and database right protect multimedia works. It does so from the perspective of UK law, but with due attention being paid to EU law, international treaties and comparative developments in other jurisdictions, such as Australia and the U.S. The central argument of the book is that the copyright and database right regimes are, for the most part, flexible enough to meet the challenges presented by multimedia. As a result, it is neither necessary nor desirable to introduce separate copyright protection or sui generis protection for multimedia works. This important and original new work will be essential reading for any lawyer engaged in advising on IP matters relating to the new media industries, and scholars and students working in intellectual property and computer law. ... Read more


65. ISP Liability Survival Guide: Strategies for Managing Copyright, Spam, Cache, and Privacy Regulations (Networking Council)
by Timothy D. Casey
Paperback: 288 Pages (2000-05-22)
list price: US$55.00 -- used & new: US$29.94
(price subject to change: see help)
Asin: 0471377481
Average Customer Review: 5.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
It's a jungle out there, (in ISP LiabilityLand) but your capable jungle guide, Tim Casey, takes you safely and firmly into and out of what would otherwise be very complex and potentially dangerous territory. Bring a camera.-Vinton Cerf

Governments around the world are establishing laws and regulations that will have a great impact on the way Internet Service Providers (ISPs) do business. With existing and ongoing efforts to regulate the Internet, ISPs are in desperate need of expert guidance to sort out which laws apply to them. This is precisely what author Timothy Casey offers in his new book. As the preeminent technical legal counsel for MCI WorldCom and one of the framers of the Digital Millennium Copyright Act, Casey shows you how to protect yourself in this volatile market.

This valuable guide gives you:
* Detailed explanations on the varying laws and how their technical features impact running a liability-free ISP
* Critical considerations for adopting effective policies and procedures that enable you to best structure your operations
* Valuable insight on the important issues to consider when contracting with users, vendors, and sales channels to accommodate the laws and maximize your profitability

Networking Council Books put technology into perspective for decision-makers who need an implementation strategy, a vendor and outsourcing strategy, and a product and design strategy. ... Read more

Customer Reviews (3)

5-0 out of 5 stars Rich, Useful Information in a Humorous, Readable Format
Timothy Casey, a senior VP for MCI WorldCom, transmits executive-quality knowledge in "ISP Liability Survival Guide" for a panhandler-level price. Despite the fact that he is what we techies would probably call a "suit," his writing is relaxed, anecdotal, and even humorous. But don't let his conversational writing style fool you; he is a MAJOR player in this industry. As a corporate executive and quasi-ambassador, Casey is a kind of Internet lobbyist. He has been immersed in virtually every state, federal, and international regulatory craze, preventing the regulators from turning the Internet as we know it into one great big cluster... (I hope I'm not the only one who still uses that phrase from Clint Eastwood's 'Heartbreak Ridge.') After reading the book, it kind of amazed me that he would disclose as much useful information as he does for the relatively small cost of this book. Other prominent Internet-lawyers-turned-writers chargeliterally five times as much, and you get less useful stuff and more legal jargon. And even if you enjoy being ripped off, no one has written a book of this type yet! Casey covers every aspect of Internet law that affects ISPs and similarly-situated e-businesses and customers. If anyone has read about the richness vs. reach debate (Evans and Worster, "Blown to Bits"), you will know what I mean when I swear that the info in this book is extremely rich. I love this book, and it still amazes me that in an industry where information is our chief commodity, Casey is giving away so much rich knowledge, practically for peanuts.

5-0 out of 5 stars Important, essential, crucial reference for ISP managers.
Computers and Internet service providers (ISP) are an integral part ofnearly every aspect of modern life and business. In ISP Liability SurvivalGuide, Senior Vice President and Chief Technology Counsel for MCI WorldComTimothy Casey brings to bear his expertise and experience to providedetailed explanations on the varying laws governing networking and theInternet, and how their technical features impact running a liability-freeISP. He offers critical considerations for adopting effective policies andprocedures for effectively structuring an ISP operation. He also givesvaluable insight into contracting with users, vendors, as well as saleschannels to accommodate the laws and maximize ISP profitability. ISPLiability Survival Guide is critically important, crucial, essentialreading for anyone charged with operational responsibilities for providingISP services in today's technologically driven communications marketplace.

5-0 out of 5 stars Will Keep ISP's Operating on the Strait and Narrow!
ISP Liability Survival Guide written by Timothy Casey is an excellent guide for ISP's to follow in order to run an effective service and remain within established industry standards of practice and the law. This bookwill help ISP's to sort through all the existing laws, regulations,policies, and issues and help them to determine which ones apply to themand how applicable ones should be enforced through their services.

This book provides an excellent treatment of handling intellectual propertyissues. Trademark, copyright, patent, and domain name issues are big today.ISP's will receive a mini-course in dealing with them. What is a trademark?What is a copyright? What is fair use? What constitutes infringement? Whatare the implications of the Digital Millennium Copyright Act (DMCA)? Whatis the ISP's liability? How does an ISP respond to a complaint? It's allcovered here. ISP's will appreciate the advice on handling reportedincidents of alleged infringement.

ISP's face a number of otherserious threats to their services. Some of these are caused by the conductof their own clients and sometimes through the efforts of outside partieslooking for ways of expanding their reach. ISP's must keep up on gambling,pornography, spamming, spoofing, cookies, fraud, defamation, libel, andchild privacy issues. This book will educate ISP's about these troublesomeissues and provide them with strict guidelines that will keep themoperating on the strait and narrow.

ISP's receive advice andinstruction on other matters such as planning, establishing, and enforcingpolicies and terms of service. They will also benefit from the number ofactual case studies that reveal how various laws, regulations, policies,and court decisions have clear implications on how they should conducttheir own services. This is must reading for any ISP and company who wantsto do things right! ... Read more


66. Hacker Attack
by Richard Mansfield
Paperback: 320 Pages (2000-09-22)
list price: US$29.99 -- used & new: US$0.01
(price subject to change: see help)
Asin: 0782128300
Average Customer Review: 3.5 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Hacker Attack is the only book about computer securitythat is at once entertaining, understandable, and practical. You'll befascinated as you read about hackers, crackers and whackers--peoplewho spend their time trying to break into your computer, spreadingcomputer viruses, or peeping (and recording what they see!) as yousurf the Internet or send email.

Best of all, this book provides simple but powerful solutions to allthese security needs. It's all on the book's CD. Protect yourselfright now with firewalls, anonymisers, and virus-guards. This iswithout doubt the most readable and interesting book about computersecurity ever written. You'll enjoy reading it, and you'll be safeafter you've followed its advice. ... Read more

Customer Reviews (10)

2-0 out of 5 stars Save your money...
This book is a disjointed collection of information freely available on a number of internet sites. It has little order, logic or useful (correct) information. After reading it, it became clear the author knows absolutely nothing about computer security, and the publisher did not employ a technical editor. The book is poorly organized, the information insufficient and after reading this a novice will be wide open to attack. Misinformation can be more dangerous than complete ignorance, the scary part is that novices reading this book don't know that they are being misinformed and may take the information as gospel. As for the author's statement "It is not my intention that this book offer hackers...specific recipes that show them precisely how, step-by-step, to steal information, break security, or otherwise do damage to others. Therefore, I describe various hacking techniques in general terms but usually do not provide the explicit details of the process itself." There are several books that provide explicit details of hacking techniques, this is necessary and teaches people how to defend themselves against specific attacks. So the idea that the author is trying to keep dangerous information out of criminal hands is ridiculous, the author is most likely trying to avoid explaining a subject that he obviously does not understand himself.
There are a number of books that do a better job of introducing the concepts of security to a beginner, avoid this one.

2-0 out of 5 stars Save your money...
This book is a disjointed collection of information freely available on a number of internet sites. It has little order, logic or useful (correct) information. After reading it, it became clear the author knows absolutely nothing about computer security, and the publisher did not employ a technical editor. The book is poorly organized, the information insufficient and after reading this a novice will be wide open to attack. Misinformation can be more dangerous than complete ignorance, the scary part is that novices reading this book don't know that they are being misinformed and may take the information as gospel. As for the author's statement "It is not my intention that this book offer hackers...specific recipes that show them precisely how, step-by-step, to steal information, break security, or otherwise do damage to others. Therefore, I describe various hacking techniques in general terms but usually do not provide the explicit details of the process itself." There are several books that provide explicit details of hacking techniques, this is necessary and teaches people how to defend themselves against specific attacks. So the idea that the author is trying to keep dangerous information out of criminal hands is ridiculous, the author is most likely trying to avoid explaining a subject that he obviously does not understand himself.
There are a number of books that do a better job of introducing the concepts of security to a beginner, avoid this one.

3-0 out of 5 stars Don't Judge This Book By Its Cover
Tsk,tsk, Sybex!The graphics and title of this book misrepresent the contents inside.

The cover's funky neon design jumps at you shouting, "CAUTION, WARNING -- DANGER, WILL ROBINSON!!!". The subtitle promises to "Shield Your Computer From Internet Crime" -- Hey, they even provide little green men on the cover to stomp on those bad guys.But does it deliver?

On page 24, the author gives you a CLUE as to how much you are going to learn, "It is not my intention that this book offer hackers...specific recipes that show them precisely how, step-by-step, to steal information, break security, or otherwise do damage to others. Therefore, I describe various hacking techniques in general terms but usually do not provide the explicit details of the process itself."

What you end up with is basically a glorified dictionary on computer hacking:Want to know what a hacker is?, a cracker? Here's a bunch of ways you could get attacked.Here's some terminology... a Glorified Dictionary--get the idea!

This book wouldn't have been half bad with a title such as an introduction to...a beginner's guide.... a dummy's/idiot's guide, etc.And as the "Dummy" publishers know, there is amarket for this type of book.But don't get my heart racing thinking I'm going on a date with Raquel only to find out it's gonna be Bertha! (apologies to Berthas everywhere).

So let's assume this is like one of the [above] books, how then does it deliver. Well, on the down side I found no logic in the order the topics were presented (at least in a dictionary you have alphabetical order).On the plus side the author's style of writing was casual and entertaining as well as being clear and easily understandable.And there were a few BASIC things shown to help ward off an attack.

All in all, if someone wants to begin to understand what all this hacking stuff is all about, this is a good place to start. You can either read it all in an evening or spend a few days reading it during the commercials of a hockey game and come away with learning some of the BASIC things Hackers do.

Borrow this book from the Library first, then decide if it offers you enough info about hacking to warrant purchasing it!

3-0 out of 5 stars Don't Judge This Book By Its Cover
Tsk,tsk, Sybex!The graphics and title of this book misrepresent the contents inside.

The cover's funky neon design jumps at you shouting, "CAUTION, WARNING -- DANGER, WILL ROBINSON!!!". The subtitle promises to "Shield Your Computer From Internet Crime" -- Hey, they even provide little green men on the cover to stomp on those bad guys.But does it deliver?

On page 24, the author gives you a CLUE as to how much you are going to learn, "It is not my intention that this book offer hackers...specific recipes that show them precisely how, step-by-step, to steal information, break security, or otherwise do damage to others. Therefore, I describe various hacking techniques in general terms but usually do not provide the explicit details of the process itself."

What you end up with is basically a glorified dictionary on computer hacking:Want to know what a hacker is?, a cracker? Here's a bunch of ways you could get attacked.Here's some terminology... a Glorified Dictionary--get the idea!

This book wouldn't have been half bad with a title such as an introduction to...a beginner's guide.... a dummy's/idiot's guide, etc.And as the "Dummy" publishers know, there is amarket for this type of book.But don't get my heart racing thinking I'm going on a date with Raquel only to find out it's gonna be Bertha! (apologies to Berthas everywhere).

So let's assume this is like one of the Moron books, how then does it deliver. Well, on the down side I found no logic in the order the topics were presented (at least in a dictionary you have alphabetical order).On the plus side the author's style of writing was casual and entertaining as well as being clear and easily understandable.And there were a few BASIC things shown to help ward off an attack.

All in all, if someone wants to begin to understand what all this hacking stuff is all about, this is a good place to start. You can either read it all in an evening or spend a few days reading it during the commercials of a hockey game and come away with learning some of the BASIC things Hackers do.

Borrow this book from the Library first, then decide if it offers you enough info about hacking to warrant purchasing it!

3-0 out of 5 stars Don't Judge This Book By Its Cover
Tsk,tsk, Sybex!The graphics and title of this book misrepresent the contents inside.

The cover's funky neon design jumps at you shouting, "CAUTION, WARNING -- DANGER, WILL ROBINSON!!!". The subtitle promises to "Shield Your Computer From Internet Crime" -- Hey, they even provide little green men on the cover to stomp on those bad guys.But does it deliver?

On page 24, the author gives you a CLUE as to how much you are going to learn, "It is not my intention that this book offer hackers...specific recipes that show them precisely how, step-by-step, to steal information, break security, or otherwise do damage to others. Therefore, I describe various hacking techniques in general terms but usually do not provide the explicit details of the process itself."

What you end up with is basically a glorified dictionary on computer hacking:Want to know what a hacker is?, a cracker? Here's a bunch of ways you could get attacked.Here's some terminology... a Glorified Dictionary--get the idea!

This book wouldn't have been half bad with a title such as an introduction to...a beginner's guide.... a dummy's/idiot's guide, etc.And as the "Dummy" publishers know, there is amarket for this type of book.But don't get my heart racing thinking I'm going on a date with Raquel only to find out it's gonna be Bertha! (apologies to Berthas everywhere).

So let's assume this is like one of the Moron books, how then does it deliver. Well, on the down side I found no logic in the order the topics were presented (at least in a dictionary you have alphabetical order).On the plus side the author's style of writing was casual and entertaining as well as being clear and easily understandable.And there were a few BASIC things shown to help ward off an attack.

All in all, if someone wants to begin to understand what all this hacking stuff is all about, this is a good place to start. You can either read it all in an evening or spend a few days reading it during the commercials of a hockey game and come away with learning some of the BASIC things Hackers do.

... ... Read more


67. Web Publishing With Netscape for Busy People
by Christian Crumlish, Malcolm Humes
Paperback: 279 Pages (1996-10)
list price: US$22.95 -- used & new: US$3.90
(price subject to change: see help)
Asin: 0078821444
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
This is a one-stop guide to creating a presence on the Web. In trademark Busy People style, it offers all the step-by-step instructions, shortcuts, and vital skills that make for easy, fun, and efficient learning. Readers will learn the basics of HTML, as well as how to design, edit, and manage attractive Web pages. Everything from developing a Web page metaphor that attracts customers to trapping and fixing errors, is explained in lively, opinionated Busy People style. ... Read more


68. Flash 5 Cartooning (with CD-ROM)
by Mark Clarkson
Paperback: 231 Pages (2001-03)
list price: US$49.99 -- used & new: US$4.99
(price subject to change: see help)
Asin: 0764535471
Average Customer Review: 4.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Flash 5 Cartooning is a stunning, full color book that reveals scores of tips and techniques for building great cartoons, regardless of your artistic experience. Everything from cartooning fundamentals to advanced Flash techniques like ActionScripting and selling your work online is covered here, in this unique guide to creating exciting Flash cartoons. Author Mark Clarkson dives deep into the key topics cartooners need to know, with an emphasis on things like interactivity, special visual and audio effects, timing (it's critical to a good joke, you know), cartoon physics, and more! A free companion CD-ROM is packed with sample cartoons from the book, additional cartooning material, and product tryouts.Amazon.com Review
Finally someone has written a book on animating in Flash. It's a wonder there aren't more like it. Flash 5 Cartooning covers the cartoon production cycle from a Flash artist's standpoint--drawing, writing, storyboarding, animating, and keyframes. Sounds like a book on traditional animation, doesn't it? But everything is examined from a Flash perspective. When the book talks about drawing, it means drawing with a tablet. When it talks on keyframes and in-betweens, it is within Flash and not on paper that these issues are covered.

The book has two outstanding features: first, it's about making cartoons, not Flash. It just so happens that the tool of choice is Flash and the mode of distribution is the Web. Topics like scripting (writing a cartoon story, not computer scripting), storyboarding, layout, camera moves, and basic animation technique are well covered, as well as the Flash interface, how Flash works, how to compress media for faster downloading, basic HTML, and other Flash- and Web-specific topics.

The second great feature is the CD-ROM, which includes samples and material used in the chapters, but above all contains a digital version of the book. Not a stripped-down, bare-bones text version, but a full-color, searchable version. Having a material like this at one's fingertips on CD-ROM raises its usability rating through the roof.

Written in a clear, concise, and lighthearted voice, the book spans 15 chapters. Every page has a handful of screen shots, and every page is in full color. There were no shortcuts taken in either content or production value.

It's remarkable that there aren't more books like this. Sure, Flash is a great tool for all kinds of dynamic graphics and interactivity, but the Flash cartoon sites get a disproportionately high number of hits. Flash cartoons download fast, are often wonderfully creative, and in most cases carry a strong sense of the artist who created them. This is what Flash and the Web have created--a venue for independent animators. Maybe cartoons still aren't taken seriously and that's why so little has been published on the topic; regardless, Flash 5 Cartooning excels in its class, not because the genre is so nichey, but because it is simply a terrific book. --Mike Caputo ... Read more

Customer Reviews (37)

1-0 out of 5 stars I did not receive this book
I ordered this book, and I waited patiently for two weeks, still nothing arrived at my door. So I sent an email to the seller. They would not say that they mass up my order but blamed for the post office. The good thing was they returned my money, but I will not order any books from this company again.

3-0 out of 5 stars Good book for entry level flash cartoonists
Flash 5 Cartooning is a good book for beginning flash cartoonists.I recommend getting this book from the Amazon.com used book marketplace in order to get more bang for your buck. Once you have a grip on Flash Cartooning, you may want to start creating some flash games.

I also recommend and have the following books:
"How to Cheat in Flash CS3" by Chris Georgenes, "Cartooning: Animation 1 with Preston Blair (HT26)", "The Big Book of Cartooning", "Dreamweaver MX / Fireworks MX Savvy", "Flash MX Savvy", "Flash 5 Bible" and "Macromedia Flash 5 ActionScript for Fun and Games". The "Flash 5 Bible" has a small section on cartoon animation.

5-0 out of 5 stars Great for the amateur flasher!
This book is great for begginners i loved it.I had just gotten flash to play around with for fun and i did some online tutorials but they only taught me the very basics (like drawing and keyframes with motion tweening). It was a start.After reading this book i would consider myself a mediocre flasher.I can make reat movies now.Now that i have learned this i am moving on to actionscripting which is the only thing this book lacks.But all-in-all this is a great book and i still use it every now and then for reference.

5-0 out of 5 stars Great for beginners
Clarkson's book on Flash 5 for animating offers a great foundation for animators who want to learn Flash.Probably not the best book for those interested in other aspects handled by Flash, like Web Design, but the title says it all.Well-paced and easy to digest, his book also goes easy on the tech-speak that loses most casual learners.All in all, a good start.

2-0 out of 5 stars A somewhat helpful book
I'm sorry but I didn't achieve the goal for my cartoon with this book. I get frustrated easliy and this book being a partial culprit. Sure, I learned a little actionscript. But I recommend the The Art of Flash Cartooning over this one. There are also free online sources that will provide some very important instruction on staging and layout which this book covers briefly(Staging is too important to have a brief walkthrough) The CD gave me the urls to some cool sites and some cartoons to watch other than that this book isn't of much use to a flash animators, particularly beginners. In order to do something it is best to do it right the first time or not at all. ... Read more


69. The Lexis Companion: A Concise Guide to Effective Searching
by Jean Sinclair Mcknight
Paperback: 304 Pages (1995-09-11)
list price: US$19.95 -- used & new: US$0.75
(price subject to change: see help)
Asin: 0201483351
Average Customer Review: 1.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
A clear, concise handbook providing step-by-step instructions on how to use Lexis with a minimum of effort, for a maximum return on your time and money. Written in everyday--and occasionally witty-- English, and peppered throughout with time-saving and money-saving tips, this is an on-the-shelf essential for every lawyer, para-legal, law student, or law librarian. ... Read more

Customer Reviews (1)

1-0 out of 5 stars LEXIS Companion, by McNight
It is seven years out of date and the examples in this book are so outdated as to be worthless.The current LEXIS format does not even remotely resemble the examples in this book.It's only use is to help save trees by tossing it into a paper recycle bin rather than a regular garbage can.I suggest you get a current help guide directly from LEXIS/NEXIS and not purchase this waste of paper and money. ... Read more


70. Simple Computer Security: Disinfect Your PC
by Jim Geier
Paperback: 332 Pages (2007-01-23)
list price: US$24.99 -- used & new: US$0.01
(price subject to change: see help)
Asin: 047006854X
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description

  • Hands-on guide to the CA Internet Security Suite, which includes Parental Controls (blocks offensive Web sites, controls program use, and monitors Internet activity); Anti-Spyware (sweeps PCs of malicious software like spyware and adware); Anti-Spam (ensures that computer users get messages from people they know, while redirecting messages from people they don't); Anti-Virus (detects and removes computer viruses); and Personal Firewall (prevents hackers from attacking a PC)
  • CA will include a special version of their $70 suite free with this book, which contains separate applications for Parental Controls, Anti-Spyware, Anti-Spam, Anti-Virus, and a Personal Firewall (good for 6 months)

Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file. ... Read more


71. Information Communication Technology Law, Protection and Access Rights: Global Approaches and Issues (Premier Reference Source)
by Irene Maria Portela
Hardcover: 388 Pages (2010-06-30)
list price: US$180.00 -- used & new: US$171.80
(price subject to change: see help)
Asin: 1615209751
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Information Communication Technology Law, Protection and Access Rights: Global Approaches and Issues identifies key issues in the relationship between ICT and law, ethics, politics and social policy. This comprehensive reference addresses relevant issues from the practical, legal, ethical, political and social policy perspectives, drawing attention to diverse global approaches to the challenges posed by ICT to access rights. ... Read more


72. Simple Computer Tune-up: Speed Up Your PC
by Jim Geier
Paperback: 264 Pages (2007-01-23)
list price: US$24.99 -- used & new: US$0.01
(price subject to change: see help)
Asin: 0470068558
Average Customer Review: 1.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description

  • Forgoing the "techie-talk," CA explains how PC Pitstop Optimize performs four main functions: it removes "junk" files to free up disk space, adjusts Internet settings for better performance, removes invalid registry keys, and adjusts several registry settings that can
    improve overall performance
  • Also shows how PC Pitstop Optimize can revitalize system performance, regain hard drive space, rev up an Internet connection, and fix registry errors
  • CA will include its complete PC Pitstop Optimize, valued at $30.00, free with this book (no renewal needed)

Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file. ... Read more

Customer Reviews (1)

1-0 out of 5 stars The CD is just a scanner disk
The CD with the book is just a scanner CD it doesn't actually do anything to remove the problems.It takes you to their website to pay yet another $24.99 to get a license key to remove all the items that they found.I think that they should put that on the cover of the book. ... Read more


73. Safety Critical Computer Systems
by Neil Storey
Textbook Binding: 453 Pages (1996-08-28)
list price: US$67.00
Isbn: 0201427877
Average Customer Review: 5.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Covers all phases of the life of a safety-critical system from its conception and specification, through to its certification, installation, service and decommissioning. Uses case studies and worked examples from a wide range of industrial sectors. ... Read more

Customer Reviews (2)

5-0 out of 5 stars Should Be Required Reading in CS curriculum
This is an excellent text on the topic of safety critical computer systems. I found the chapters on Hazard Analysis, Risk Analysis, Developing Safety Critical Computer Systems, Foult Tolerance and Safety-Critical Software to be particularly enlightening as well as the chapter on Verification, Validation and Testing.Each chapter comes with a excellent list of refences and problems to work. I believe that a course in safety-critical computer systems and safety-critical software development should be required in every CS curriculum along with courses in real-time software development.I recommend that anyone who is about to enter the world of developing commercial or DoD safety-critical systems with no prior exposure to the material should read this text.If you are interested in learning more about safety-critical systems, this text is worth your time.

George Chastain
Software Consultant/Systems Engineer
Huntsville, Alabama

5-0 out of 5 stars critical system
computer of critical syste ... Read more


74. Code and Other Laws of Cyberspace
by Lawrence Lessig
Hardcover: 297 Pages (1999-12-15)
list price: US$30.00 -- used & new: US$4.46
(price subject to change: see help)
Asin: 046503912X
Average Customer Review: 4.5 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Traces the consequences of code as the law in cyberspace, in a lucid an insightful way. Discusses the paradigm shift that will transform the debate about the architecture of cyberspace.Amazon.com Review
Everyone knows that cyberspace is a wild frontier that can'tbe regulated, right? Everyone is wrong, and that's why we should allread Harvard Law prof (and famous Microsoft trial expert) LawrenceLessig's eye-opening, jaw-dropping book Code, the best guideyet to the future that's heading our way like a frictionless freighttrain. For such an analytical book, it's also anecdote-studded andutterly fun to read.

Lessig leads us through the new controversies in intellectualproperty, privacy, free speech, and national sovereignty. What about acomputer worm that can search every American's PC for top-secret NSAdocuments? It sounds obviously unconstitutional, but the worm codecan't read your letters, bust down your door, scare you, or arrestanyone innocent. If you're not guilty, you won't even know you weresearched. The coded architecture of the Net also enforces certainfreedoms: via the Net, we have now globally exported a more extremeform of free speech than the First Amendment encodes in old-fashionedlaw. The once-important Pentagon Papers case would bemeaningless today: instead of fighting to publish secret governmentdocuments, The New York Times could simply leak them to aUSENET newsgroup. The Constitution is rife with ambiguities theframers couldn't have imagined, and virtual communities such as AOLand LamdaMOO are organizing themselves in ways governed largely bycode--strikingly different ones.

We've got tough choices ahead. Do we want to protect intellectualproperty or privacy? How do we keep cyberporn from kids--by brain-deaddecency laws, censoring filters, or code that identifies kid users? (Lessig advocates code.) Lessig demonstrates that legal structures aretoo slow and politics-averse to regulate cyberspace. "Courts aredisabled, legislatures pathetic, and code untouchable." Code writersare the unacknowledged legislators of the new world, backed by the lawand commerce. Lessig thinks citizens must recognize the need to be thearchitects of their own fate, or they'll find themselves coded into aworld they never made. --Tim Appelo ... Read more

Customer Reviews (30)

5-0 out of 5 stars Lessig's Code - Foundations for Tomorrow
Although Code and Other Laws of Cyberspace was a laborious read to me several years ago, it still deserves your attention today. It is basically a legal treatise that feels like a college course. It even has small print! Lessig's thoughts go far beyond scholarly; it is a magnificent work. And even though its content is extremely important, you may not be very enthusiastic about picking it up at first. In it he has posed several questions of constitutional law and its relevance in cyberspace, vividly described the dark blending of government regulation and control with our growing world of electronic commerce.

But Lessig's words are much more poetic:

"We build liberty...by setting society upon a certain constitution...an architecture...that structures and constrains social and legal power, to the end of protecting fundamental values - principles and ideals that reach beyond the compromises of ordinary politics.... There is no reason to believe that the grounding for liberty in cyberspace will simply emerge."

He examines how the relationships of the technology, which he also refers to as 'architecture' or 'code', along with social norms, markets and laws regulate people's behavior and explains how each of these limit individuals' actions. These forces work directly or in combinations where improvements in technology can dramatically alter the constraints on people's conduct. The competition for control continues today under the banner of 'network neutrality' where Congress is being asked by business to decide about who will control the Internet. Network neutrality would return to communications law and regulation the concept of non-discrimination that was always, until recently, part of communications law since the original 1934 Communications Act [and was partially repealed for high speed services]. Not only does big business wants to control the Internet, with recent interpretations of net neutrality they are trying to improve their grip on copyright issues and control who is allowed to innovate in this country. In some cases they have already hijacked the legal system and are misusing our enforcement systems to control dissent.

Historically, AT&T was the telecommunications industry of this country and the 'Big Three' networks controlled the airways until new technologies and innovative regulatory policies broke the hold that these corporations had held onto for so long. Markets, services and competition grew exponentially and the new giants have struggled fiercely since to regain that power that the Bell System once held. With SBC's purchase of what used to be AT&T Longlines, the cycle has come full circle. As Lessig pointed out, the obvious point that many might miss is that when government steps aside, it's not as if private entities have no interests or have no agendas that they pursue. We can't leave the market to regulate the Internet of the future. Our constitutional values check and limit what the markets do also. If you think that no government involvement is the more appropriate path to take, consider Lessig's warning:

"Unless we interrogate the architecture of cyberspace as we interrogate the code of Congress, the relevance of our constitutional tradition will fade and the importance of our commitment to our fundamental values ... will also fade."

Lessig's seminal work will continue to provide the foundation for the evolution of cyberspace law for years to come. My original summary of this book can be found on his website.

Bob Magnant is the author of The Last Transition... - the ultimate Internet adventure, a fact-based novel.

4-0 out of 5 stars Important ideas on the future in a wired world
As it is, I spend a lot of time thinking about systems and issues like architectures, law, policy, and even individual expectations. My 2001 book Developing Trust looked at how we can deal with the policy and technology issues that make our infrastructure trustworthy. Though I dealt with the Internet and Web specifically and showed specific examples of actual failures, some readers have suggested that the discussion was somewhat theoretical, or at the very least, blazing the way for practice instead of reflecting it. My recently-published Brute Force is very different, dealing specifically with the issue of Internet cryptography.

Looking at the fall of the data encryption standard through the lens offered by Lessig's Code is instructive. Consider the state of the world in 1997, when RSA launched its DES Challenge.

As a matter of policy, the U.S. Government promoted a cryptographic standard that would be secure against exhaustive key-search attacks for a relatively short period of time. As a matter of law (in the form of regulation), the Government also limited the strength of the systems that could be exported outside of the United States. As a matter of architecture, the Internet is open and easy to access, in many cases using topologies that will allow anyone in the middle to observe traffic being routed from one system to another. As a matter of expectation, individual Internet users considered their online purchases secured, such that attackers would not be able to intercept and illicitly to use their credit card numbers. As another matter of expectation, many in Congress imagined that even the limited strength of the systems allowed by Government policy were "secure enough."

The DESCHALL Project (and RSA's 1997 DES Challenge that it answered) used architecture to change expectations of both lawmakers and citizens. When it succeeded, law (in this case, the regulation) changed to allow a much freer use and export of cryptographic products. Policy followed, with the Advanced Encryption Standard (AES) being adopted.

After talking recently with Peter Swire, Esther Dyson, and John Gilmore in Seattle earlier this year at CFP 2005 (with "Panopticon" as its theme), I was reminded of Lessig's Code, in which he argued that it is wrong to imagine as some have that the Internet is inherently impossible to regulate, that it can never be restricted the way that the real world has been.

When I returned from Seattle, I re-read some critical parts of Lessig's book. One part that struck me was its central theme, that four primary forces regulate: law, market, norms, and code.

Limited scope helped to made DESCHALL successful. We didn't seek (directly) to change the law or government policy. The project didn't overreach, attempting to use traditional mechanisms of marketing to affect the expectations (or, in Lessig's words, norms) of individual users. Nor did it preach to the proverbial choir, either in the form of those interested in public policy (law) or those trying to bring their products to international customers who demanded them (market). We were attempting to address an area of architecture (code) that created a vulnerability in the form of an attacker's ability to intercept traffic. While many expected that the issue was addressed through "good enough" cryptography, we used the one tool of our focus (code) to demonstrate that it was out of sync with the demands of the market and the needs to enforce the norms of society.

In the six years since Lessig's book was released, things have changed. Some of the less dramatic changes have come in the form of architecture, the code that implements the global computation and communication infrastructure. Mobile phones and PDAs now have greater utility as gateways to the network and these devices have more tracking capability than in 1999, both in the form of a GPS device to determine the unit's position and in the form of wireless personal area networks such as Bluetooth that have side-effects that can be invasive of privacy.

Norms have not changed significantly; as these deal with the attitudes and expectations of people, norms are always slow to evolve. The market has not changed dramatically for the most part. While a whole dot-com boom and bust took place, the simple fact is that companies that offered good services enabled by the Internet succeeded (eBay and Amazon spring to mind), while those that were using the Internet for its own sake failed-the demand for online haircuts and shoeshines never materialized.

The law is one area where there has been more dramatic change, as local, state, and federal lawmakers strive to update their codes to reflect the world's heavy dependence upon Claude Shannon's binary units. Many laws designed to protect consumers and their digital identities have been passed and now organizations that handle personal information are subjected to civil and criminal penalties for failure to adhere to some norms for protecting information.

Further changes have been ushered in by lawmakers' attempts to show their constituents that they care about the citizenry of this country and are doing all they can to protect them from the threat of terrorist attack. Congress is now debating extension of the Patriot Act and adoption of its successor, Patriot II. In Code, Lessig worries about the impact of law on cyberspace, in particular how regulation will cause infrastructures to be built with new provisions that allow the Government to achive its objective to control its citizenry without being accountable as in a transparent legal system. Given the reaction to the Patriot Act-in particular its provision to search library and bookstore records without a warrant-it would seem that Lessig's concerns have been understood and adopted by a significant number of people working in the area of public policy.

Much of the public debate over digital rights has been in the form of negative reaction to proposed restrictions on personal liberty, privacy, and other rights. Someone proposes that the Patriot Act stay on the books rather then expire (as the Act itself called for as passed in 2001) and people react in the negative. Someone proposes national identification cards for each U.S. citizen and people react in the negative. A cartel proposes a combination of technical and legal standards to limit how consumers can use their products and people react in the negative.

In Code, Lessig argues that society must decide what rights it wants to guarantee, what sort of a society cyberspace is to be, from which implementation in code will follow, shaping both the architecture of the markets and the norms of cyberspace. Despite the passage of six years and the huge number of genuinely bad ideas that have been floated, we have very few good ideas proposed to stave off the flow or influence of the bad. There is very little guidance to show how the Bill of Rights applies in cyberspace. Worse, there is apparently no mechanism by which the government cannot hire private industry to do the work that it, by virtue of the U.S. Constitution, would be forbidden from undertaking. There has been a lot of talking, but remarkably little action, and I suspect that will remain true until there is a clear and concise assertion of what privileges and rights are to be built into cyberspace. As Lessig concludes, if our society fails to take advantage of the opportunity that is now present, liberty will find herself on the losing end of a revolution and it'll be over before any critical mass notices.

5-0 out of 5 stars Regardless of its style and structure, this is a IMPORTANT book.
Lawrence Lessig is not a writer, he is a lawyer. Don't expect his book to be easy nor entertaining. However, it is the more insightful writing of its time on the subject of mass media communication and control. For me the strong points are:
1, the Internet has no nature and if you think that it is a place of total freedom, this book will should you how wrong you are.
2, as a counter effect of point 1, the Internet might well become (if not yet) the most powerful element of control on mass population, leaving television and radio their its poor alpha version.
3, Dr Lessig considers the code used to create the Internet as being the laws of cyberspace, showing us the important distinction between between them: code is not something you can oppose to. It is simply a power you are inclined to accept, or put it differently there are *invisible* rules you are *dictated* to follow. That is the theme of the book.
I recommend this book for my Digital Media and New Media students and anyone using the Internet regurlarly and interested in its politics.

3-0 out of 5 stars Good overview for outsiders - common sense for many
The premise of Code is that the architecture of the internet and not any one country's laws controls what one can do on it.One clear evidence of architecture controlling our lives is our dependence on cars.Most American cities grew large after the car had become common.Hence they have limited transportation.Hence one is expected to own a car to live a normal life.Similarly the architecture of the internet will make certain activities much easier than others.The difference is the internet is currently being formed and we can choose what we want it to be if we act now (or in 1999 anyway).

Lessig identifies four factors that influence what any individual can and will do on or offline: law, architecture (physics in the real world), social norms, market forces (since corporations have so much control over what gets done).This way of looking at things combined with the cute little diagrams may clarify things you already know about the internet.There is also much discussion threaded through the book of legal issues in the past that may prove applicable to cyberspace now.

Basically I tried to read this, but found it a bit dumbed down.I skimmed it and it was good for me to look closer at some of the relationships in play on the development of the internet, or maybe to solidify things in my head.However it didn't tell me much and Lessig keeps repeating himself blah blah blah and then going into rapturous praise of open source code and newsgroups and other old hat thing on the internet.(I realize that this was published in 1999 but I don't feel that it would have been new info for me then either.)

If you are the sort of person who has read the Jargon File, then you are unlikely to get much out of Code (except if you are interested in legal history about privacy, IP etc - but then again the premise of the book is that architecture more than law influences what can and can't be done online).However, for an outsider interested in learning about the subcultures that exist online and more about the sociology type aspects of computing this would be a useful introduction.

5-0 out of 5 stars Great book on Cyberspace and a must read for people in the t
This is another great book that discusses what is going on in cyberspace today (or 1999 when it was written) first by defining cyberspace as a place where we can create personalities and have the ability to speak like we would never do in the real world. The book then goes on to discuss how the internet is regulated or not regulated and what the internet can and should become.

The book starts out by discussing multiple forms of regulation and just because technology makes it easier to monitor or regulate does not mean that it is right or legal. The book also discusses what things should be regulated and how and who should regulate it. The next chapters go into Free Speech, Intellectual Property, Privacy and other freedoms we have and should fight to protect. The book talks about Open Source vrs Closed Source software and how regulation can and is added to each. One of the solutions of the book is to offer transparent regulation that allows user to know what is regulated. This is possible and is happening now in Open Source software but is not happening in closed source software. This is an excellent book that should help call us to action that will help provide the right kind of regulation while ensuring our freedoms or not reduced. This is a great book and I would recommend it.. ... Read more


75. The Future of Identity in the Information Society: 4th IFIP WG 9.2, 9.6, 11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September ... in Information and Communication Technology)
Hardcover: 283 Pages (2009-09-10)
list price: US$164.00 -- used & new: US$143.27
(price subject to change: see help)
Asin: 3642033148
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description

This book constitutes the refereed postconference proceedings of the 4th IFIP WG 9.2, 9.6, 11.6, 11.7/FIDIS International Summer School, held in Brno, Czech Republic, in September 2008.

The 20 revised papers were carefully selected from numerous submissions during two rounds of reviewing. They are grouped in topical sections on information, ethics, identifiers; privacy issues; wireless security and privacy; challenges of emerging technologies; privacy-enhanced and anonymous applications; business and organizational perspectives; privacy awareness and individual control; and anonymity attacks and analysis.

These interdisciplinary contributions target researchers and practitioners interested in the technical, social, ethical or legal perspectives of increasing diversity of information and communication technologies.

... Read more

76. Informatikrecht - Schnell erfasst (German Edition)
by Rainer Koitz
Paperback: 312 Pages (2002-09-26)
list price: US$29.95 -- used & new: US$25.94
(price subject to change: see help)
Asin: 3540652906
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Informatiker und andere an Entwicklung und Nutzung von Informationstechnologien Beteiligte sind täglich mit Rechtsfragen konfrontiert. Sie dabei zu unterstützen, ist primäres Ziel des Buches. Die Darstellung erstreckt sich auf das Software-Recht, Multimedia- und Datenkommunikationsrecht sowie den Datenschutz. Da komplexe gesetzliche Regelungen überwiegend fehlen, werden nicht nur die wichtigsten Normen erläutert, sondern auch Tendenzen der Rechtsprechung und Literatur einschließlich wesentlicher Meinungsverschiedenheiten und offener Fragen nachgezeichnet. ... Read more


77. Distributed Multimedia Database Technologies Supported by MPEG-7 and MPEG-21
by Harald Kosch
Kindle Edition: 280 Pages (2007-03-14)
list price: US$119.95
Asin: B000OI0ZIK
Average Customer Review: 3.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description

Now systems designers and computer engineers have a guide that examines the structure and potential usage of these emerging standards. Distributed Multimedia Database Technologies Supported by MPEG-7 and MPEG-21 describes the technologies, concepts, and tools of distributed, content-based multimedia systems. It focuses on the practical uses of the technologies of MPEG and SQL/MM in these components, and on the interoperability among them (for data exchange, transactions, interaction, etc.). This book visualizes an open distributed multimedia framework that enables these components to cooperate in a working environment, delivering rich multimedia access in an increasingly mobile world.

... Read more

Customer Reviews (1)

3-0 out of 5 stars The only book so far on MPEG and distributed multimedia databases
This book is a very academic one about the technologies, concepts, and tools necessary for the design and use of distributed content-based multimedia systems. SQL/MM is an international standards effort to extend SQL to support multimedia applications, including access and manipulation of geographic data. MPEG-7 and MPEG-21 are, respectively, about the indexing/retrieval and distribution of multimedia objects. This book focuses on combining these standard technologies to produce functional and scalable distributed multimedia databases.
Chapter one introduces and focuses on the principles of multimedia data and metadata. Chapter 2 is dedicated to MPEG-7 supported with high-level examples of its use. Likewise, Chapter 3 introduces MPEG-21 and gives high-level examples of its use. From MPEG-7 comes the description of modern multimedia database management systems in chapter 4. Similarly, from MPEG-21 and multimedia databases come the concept of the distributed multimedia systems dealt with in chapter 5. Chapter 6 concludes the book and gives a final global view of a distribution system using these technologies.
This book discusses these technologies at a very high level, since almost none of the concepts discussed in this book have yet been implemented. Currently, it really is the only published work on the subject of distributed multimedia databases and the MPEG technologies, and it is well-written and clear even if somewhat dry. It has an excellent bibliography and references a multitude of web addresses where more information can be found. I would recommend it if you are doing research on the subject, but not if you are looking for practical solutions and examples, since none yet exist. ... Read more


78. Users' Guide to Logic Audio 5 (Users' Guide To...)
by Stephen Bennett
Paperback: 352 Pages (2002-10-16)
list price: US$29.95 -- used & new: US$31.03
(price subject to change: see help)
Asin: 1929685610
Average Customer Review: 1.5 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Offering a thorough overview of Logic Audio and providing advanced techniques for using the software, this book is a touchstone reference for both beginners and experienced users. This serves as a comprehensive guide to the application, covering aspects of the software's key elements such as setting a tempo, working with samples, recording audio and MIDI, adding effects, and mixing and mastering audio work. Focusing on version 5 of the software, this resource also provides musicians and audio engineers with an introduction to the new Control system built for Logic. ... Read more

Customer Reviews (2)

1-0 out of 5 stars DOESN'T EVEN DESERVE ONE STAR!!!
EXTREMELY Disgusted that I wasted my money and time on this book. Poorly written and terrible attempt to convey information to the reader. Author repeatedly says what can be done but doesn't go into details of how to achieve the desired action. Sort of like buying a "How to build a Motorcycle" book and when you open it up to read it you find these instructions: put an engine in the frame and make sure it has wheels and tires, make sure all the settings are right and it is properly tuned up and start it up. I think anybody could write a "user's guide" to logic audio better than this attempt turned out. I wish I could get my money back.

2-0 out of 5 stars Good for Midi but very little else
I bought this book as a guide to use Logic for audio post & audio production however the entire book with the exception of a few messy pages deals entirely with the midi side of Logic. This book is perfect for keyboard players who want to compose and set up entire midi enviroments but forget the audio side..Not one page on syncing video to audio!! What gives?? The author is obviously a midi nerd who believes Logic has only one function**MIDI**.
The title needs to change to "USING MIDI WITH LOGIC5". I have purchased a lot of books on customer ratings so I feel I should warn any potential Logic user looking for an audio reference DO NOT PURCHASE THIS BOOK....... ... Read more


79. Lifehacker: 88 Tech Tricks to Turbocharge Your Day
by Gina Trapani
Kindle Edition: 336 Pages (2006-12-18)
list price: US$24.99
Asin: B003VWCBW4
Average Customer Review: 4.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Redefine your personal productivity by tweaking, modding, mashing up, and repurposing Web apps, desktop software, and common everyday objects. The 88 "life hacks" -- clever shortcuts and lesser-known, faster ways to complete a task -- in this book are some of the best in Lifehacker.com's online archive. Every chapter describes an overarching lifehacker principle, then segues into several concrete applications. Each hack includes a step-by-step how-to for setting up and using the solution with cross-platform software, detailed screen shots, and sidebars with additional tips. Order your copy today and increase your productivity! ... Read more

Customer Reviews (30)

2-0 out of 5 stars Appropriate for its time, which is has come and gone
The heart of the matter is that this *was* a fantastic book for its time. Unfortunately, that time was 2006. There are references to things like the new Gmail service, Firefox 2, IE7, and Windows Vista. The concepts behind many of these things are sound, but to be useful you have to rejigger it to today's technology. Because, let's face it, most of the hacks here are technology based implementations for Getting Things Done: The Art of Stress-Free Productivity. There was a second version of this book, called Upgrade Your Life: The Lifehacker Guide to Working Smarter, Faster, Better, which updates the technology to 2008 standards and adds some more content. But, frankly, it is easier just to go over to the Lifehacker web site (and subscribe to their RSS feed) and find out newer, easier ways to do the things listed in the book.

4-0 out of 5 stars Great for the Techie... a little dated, but still a good read
Having listened to "This Week in Google" (a great podcast btw) I can really hear Gina's voice as I read through this book. There may be some tips that I won't employ, but it gets the wheels turning. Be warned: Gina is a programmer. You don't really need to know how to code to make this stuff work, but there are some pretty technical tricks. If you constantly tell yourself, "I just want this damn thing to work", this may not be the book for you. If you are of the mind set that taking the time to figure out how to make a system work well will pay dividends in the future, then start reading.

I've adopted much of the spirit of these tips into my work flow, and people are a little amazed at how effortlessly I keep my inbox empty, seem to reply to everyone with careful consideration, generate all of my reports and maintain a calm/stress-free demeanor the whole time. Granted, all of this didn't come from this particular book, but there are some great ideas in here.

Enjoy!

5-0 out of 5 stars quick read, lots of no-nonsense tips.
lots of good tips for turning technology back into enabler instead of disabler.good strategies for keeping information overload in check.

5-0 out of 5 stars If You Read or Type on a Computer, You Need this Book
Lifehacker is an amazing collection of technology and productivity tips that will turbo-charge your life. There are many system tools to help automate repetitive tasks, streamline work-flow, and manage life in today's technological age.

This book is a MUST read for anyone who does anything related to computers or technology. If you read or type on a computer, you qualify for NEEDING this book.

I was a technology nub before this book. In fact, technology was my weakest point, and I even feared it in some ways. Now, I did my entire online marketing, Web 2.0 process on my own, with websites, e-commerce, auto-responders, etc.

You cannot succeed in the technology age without knowing how to use basic technology!

My three favorite time-savers are:

AutoHotkey: Automatically type entire sentences and paragraphs with one touch. It is SO gratifying to write a 1 page custom email in 15 seconds, and to get heart-felt thank you message from your reader (who might also have typed that "custom" email in 15 seconds, haha)

Automatically Back Up Your File: I must have lost over $100,000 worth of information I worked on before I read this book. Now, I never have to worry about losing any data again.

Control Your Email: I used to write 200-300 emails, a DAY, due to the massive amount of networks and businesses I had going on. I would spend 4 hours a day just typing emails. Now, I only check emails 3 hours a week at most, from Tuesday-Thursday. I produce more results, but have much less work.

5-0 out of 5 stars Lifehacker
This book is great for tech learners of just about all levels.I consider myself technically inclined, however, there were still many things in this book that I had either never thought about, or just didn't know exactly how to do.

Lifehacker is a great collection of hacks that will make your life easier and more interesting. I recommend this book to anyone who possesses this desire. ... Read more


80. Computer Triangle (The Getting Started in Series)
by Robert L. Oakman, Babette Kronstadt, David Sachs, Joan Brady Lumpkin, Susan B. Durnbaugh, Jerry Murphy, Nancy B. Stern, Robert A. Stern
 Paperback: 976 Pages (1997-08-29)
list price: US$122.75
Isbn: 0471313939
Canada | United Kingdom | Germany | France | Japan

  Back | 61-80 of 89 | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

Prices listed on this site are subject to change without notice.
Questions on ordering or shipping? click here for help.

site stats