By Hand


Book Description

In a response to the sleek forms and perfect angles of most late twentieth century design objects, many of today's artists and designers are returning to handmade work such as hand lettering, hand drawing, and hand sewing. By Hand features an international collection of the most noteworthy artists and shows their work in detailed photography and insightful texts. From books to pillows to T-shirts to toys, the pieces in this volume define an alternative view of contemporary design. Personal craft is emphasized over perfection and the personality of the artist is put forth as a key element of the finished product. From Kiki Smith's lovingly etched birds to Barb Hunt's knitted land mines to dynamo-ville's one-of-a-kind puppets to Evil Twin's hand-stitched publications, today's art revels in the care and consideration of craft.




Shareware Heroes


Book Description

Shareware Heroes is a comprehensive, meticulously researched exploration of an important and too-long overlooked chapter in video game history Shareware Heroes: Independent Games at the Dawn of the Internet takes readers on a journey, from the beginnings of the shareware model in the early 1980s, the origins of the concept, even the name itself, and the rise of shareware's major players – the likes of id Software, Apogee, and Epic MegaGames – through to the significance of shareware for the ‘forgotten’ systems – the Mac, Atari ST, Amiga – when commercial game publishers turned away from them. This book also charts the emergence of commercial shareware distributors like Educorp and the BBS/newsgroup sharing culture. And it explores how shareware developers plugged gaps in the video gaming market by creating games in niche and neglected genres like vertically-scrolling shoot-'em-ups (e.g. Raptor and Tyrian) or racing games (e.g. Wacky Wheels and Skunny Kart) or RPGs (God of Thunder and Realmz), until finally, as the video game market again grew and shifted, and major publishers took control, how the shareware system faded into the background and fell from memory.




UnBound


Book Description

Find out what happens to Connor, Risa, and Lev now that they've finally destroyed the Proactive Citizenry in this collection of short stories set in the world of the New York Times bestselling Unwind Dystology by Neal Shusterman. Connor Lassiter's fight to bring down Proactive Citizenry and find a suitable alternative to unwinding concluded in UnDivided. Now Connor, Risa, and Lev are free to live in a peaceful future--or are they? Neal Shusterman brings back his beloved Unwind characters for his fans to see what's left for those who were destined to be unwound.




Computing Handbook, Third Edition


Book Description

Computing Handbook, Third Edition: Computer Science and Software Engineering mirrors the modern taxonomy of computer science and software engineering as described by the Association for Computing Machinery (ACM) and the IEEE Computer Society (IEEE-CS). Written by established leading experts and influential young researchers, the first volume of this popular handbook examines the elements involved in designing and implementing software, new areas in which computers are being used, and ways to solve computing problems. The book also explores our current understanding of software engineering and its effect on the practice of software development and the education of software professionals. Like the second volume, this first volume describes what occurs in research laboratories, educational institutions, and public and private organizations to advance the effective development and use of computers and computing in today’s world. Research-level survey articles provide deep insights into the computing discipline, enabling readers to understand the principles and practices that drive computing education, research, and development in the twenty-first century.




Computation and Human Experience


Book Description

By paying close attention to the metaphors of artificial intelligence and their consequences for the field's patterns of success and failure, this text argues for a reorientation of the field away from thought and toward activity. It offers a critical reconstruction of AI research.




Before the Computer


Book Description

Before the Computer fully explores the data processing industry in the United States from its nineteenth-century inception down to the period when the computer became its primary tool. As James Cortada describes what was once called the "office appliance industry," he challenges our view of the digital computer as a revolutionary technology. Cortada interprets reliance on computers as a development within an important segment of the American economy that was earlier represented largely by such instruments as typewriters, tabulating machines, adding machines, and calculators. He also describes how many of the practices of the office appliance industry evolved into those of the computer world. Drawing on previously unavailable industry archives, the author adds to our understanding of IBM's early history and offers short corporate histories of firms that include NCR, Burroughs, and Remington Rand. Focusing on the United States but also including comparative material on Europe and Asia, Before the Computer will be a unique source of knowledge about the companies that built office equipment and their enormous impact on economic life. Originally published in 1993. The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These editions preserve the original texts of these important books while presenting them in durable paperback and hardcover editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.




Logic, Language, and Computation


Book Description

Edited in collaboration with FoLLI, the Association of Logic, Language and Information, this book constitutes the refereed proceedings of the 7th International Tbilisi Symposium on Logic, Language, and Computation, TbiLLC 2007, held in Tbilisi, Georgia, in October 2007. The 22 revised full papers included in the book were carefully reviewed and selected from numerous presentations given at the symposium. The focus of the papers is on the following topics: conceptual modeling of spatial relations, pragmatics and game theory, atypical valency phenomena, lexical typology, formal semantics and experimental evidence, exceptional quantifier scope, Georgian focussing particles, polarity and pragmatics, dynamics of belief, learning theory, inquisitive semantics, modal logic, coalgebras, computational linguistics of Georgian, type-logical grammar and cross-serial dependencies, non-monotonic logic, Japanese quantifiers, intuitionistic logic, semantics of negated nominals, word sense disambiguation, semantics of question-embedding predicates, and reciprocals and computational complexity.




Computer Security Basics


Book Description

This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult. The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics 2nd Edition offers a clear overview of the security concepts you need to know, including access controls, malicious software, security policy, cryptography, biometrics, as well as government regulations and standards. This handbook describes complicated concepts such as trusted systems, encryption, and mandatory access control in simple terms. It tells you what you need to know to understand the basics of computer security, and it will help you persuade your employees to practice safe computing. Topics include: Computer security concepts Security breaches, such as viruses and other malicious programs Access controls Security policy Web attacks Communications and network security Encryption Physical security and biometrics Wireless network security Computer security and requirements of the Orange Book OSI Model and TEMPEST




Computing and Combinatorics


Book Description

The book is aimed at graduate students, researchers, engineers and physicists involved in fluid computations. An up-to-date account is given of the present state of the art of numerical methods employed in computational fluid dynamics. The underlying numerical principles are treated with a fair amount of detail, using elementary methods. Attention is given to the difficulties arising from geometric complexity of the flow domain. Uniform accuracy for singular perturbation problems is studied, pointing the way to accurate computation of flows at high Reynolds number. Unified methods for compressible and incompressible flows are discussed. A treatment of the shallow-water equations is included. A basic introduction is given to efficient iterative solution methods. Many pointers are given to the current literature, facilitating further study.




Forthcoming Books


Book Description