Browse Results

Showing 51,126 through 51,150 of 60,757 results

Second International Conference on Networks and Advances in Computational Technologies: NetACT 19 (Transactions on Computational Science and Computational Intelligence)

by Maurizio Palesi Ljiljana Trajkovic J. Jayakumari John Jose

This book presents the proceedings of the 2nd International Conference on Networks and Advances in Computational Technologies (NetACT19) which took place on July 23-25, 2019 at Mar Baselios College of Engineering and Technology in Thiruvananthapuram, India. The conference was in association with Bowie State University, USA, Gannon University, USA and Malardalen University, Sweden. Papers presented were included in technical programs that were part of five parallel tracks, namely Computer Application, Image Processing, Network Security, Hardware & Network Systems and Machine Learning. The proceedings brings together experts from industry, governments and academia from around the world with vast experiences in design, engineering and research.Presents the proceedings of the 2nd International Conference on Networks and Advances in Computational Technologies (NetACT19);Includes research in Computer Application, Image Processing, Network Security, Hardware & Network Systems and Machine Learning;Provides perspectives from industry, academia and government.

Second International Conference on Sustainable Technologies for Computational Intelligence: Proceedings of ICTSCI 2021 (Advances in Intelligent Systems and Computing #1235)

by Ashish Kumar Luhach Ramesh Chandra Poonia Xiao-Zhi Gao Dharm Singh Jat

This book gathers high-quality papers presented at the Second International Conference on Sustainable Technologies for Computational Intelligence (ICTSCI 2021) held at Graphic Era University, Dehradun, India, during May 22–23, 2021. It covers emerging topics in computational intelligence and effective strategies for its implementation in engineering applications.

Second International Handbook of Science Education

by Campbell J. Mcrobbie Barry J. Fraser Kenneth Tobin

The International Handbook of Science Education is a two volume edition pertaining to the most significant issues in science education. It is a follow-up to the first Handbook, published in 1998, which is seen as the most authoritative resource ever produced in science education. The chapters in this edition are reviews of research in science education and retain the strong international flavor of the project. It covers the diverse theories and methods that have been a foundation for science education and continue to characterize this field. Each section contains a lead chapter that provides an overview and synthesis of the field and related chapters that provide a narrower focus on research and current thinking on the key issues in that field. Leading researchers from around the world have participated as authors and consultants to produce a resource that is comprehensive, detailed and up to date. The chapters provide the most recent and advanced thinking in science education making the Handbook again the most authoritative resource in science education.

Second Life as a Virtual Playground for Language Education: A Practical Guide for Teaching and Research

by Julian Chen

This insightful book offers language teachers and teachers in training the opportunity to delve into 3D virtual worlds and see the benefits they provide for effective language teaching. Based on a decade of experience teaching and researching in Second Life (SL), Chen demystifies the dos and don’ts of SL teaching and research, whilst vividly walking readers through each step of the journey. Written in an accessible, jargon-free, and personalised tone, the book is divided into three parts. Part I builds the foundation in SL research, task-based language teaching (TBLT), and understanding fundamental skills for SL teaching. Part II showcases the author’s SL teaching blog that generously unveils their task-based, SL-enabled lessons, participant observations, critical reflections, and lessons learned from each SL session. Part III is complete with the highlights of the author’s SL research and hands-on resources and tips for readers. Each chapter also features a "Checkpoint" section to gauge reader understanding of chapter content, followed by a "Your Task" section to promote learning by doing in SL. Teachers and curriculum designers will find the well-detailed and guided lesson planning useful when starting their first SL class. Graduate students and novice researchers will also find the systematically recorded data collection helpful for their SL research.

Second Life For Dummies

by Sarah Robbins Mark Bell

You've heard all about Second Life. Maybe you've already jumped with both feet--and gotten stuck. Or maybe you're a Second Life veteran who wants to build something or run a business. Fear not! Second Life For Dummies is hear to hold your hand, pat your back, and cheer you on through this new and enchanting reality.Written by a pair of Second Life old timers, this easy-to-use, flip-and-find guide is packed with expert advice, seasoned insight, and handy tips and tricks to get you moving fast. You'll find out how to set up your account, create an avatar, meet people and socialize, and find your comfort zone and stay in it. But it's a big world out there, so you'll also learn how to make stuff, buy stuff, do stuff, and keep track of all the stuff you're accumulating. Discover how toInstall Second Life get startedCreate and customize your avatarMeet and get to know fascinating peopleStay safe and comfortable as you learn and exploreMake, wear, and sell your own fashionsScript your Second LifeBuy land and build a houseBecome a land baron or a money makerMake real money in Second LifeGet a real-life education--even a degreeComplete with fantastic lists of cool places, answers to big questions, and supplemental software, Second Life For Dummies is your ticket to a great virtual adventure.

The Second Life Herald: The Virtual Tabloid That Witnessed the Dawn of the Metaverse

by Peter Ludlow Mark Wallace

Ludlow and Wallace take us behind the scenes of the Herald as they report on the emergence of a fascinating universe of virtual spaces that will become the next generation of the World Wide Web: a 3-D environment that provides richer, more expressive interactions than the Web we know today.

Second Lives: A Journey Through Virtual Worlds

by Tim Guest

We've always dreamed of perfect places: Eden, heaven, Oz Â- places over the rainbow, beyond death and loss. Now, through computer technology, we can inhabit those worlds together. Each week, between 35 and 50 million people worldwide abandon reality for virtual worlds. In Boston, Massachusetts, a group of nine disabled men and women inhabit one virtual body, which frees them from their lifelong struggle to be seen and heard. The Pentagon has begun to develop virtual worlds to help in real-world battles. In Korea, where one particular game has 8 million residents, virtual violence has spread into the real world. Fortunes have been made, and mafia gangs have emerged to muscle in on the profits. In these new computer-generated places, which at first glance seem free from trouble and sorrow, you can create a new self. With the click of a mouse you can select eye colour, face shape, height, even wings. You can build houses, make and sell works of art, earn real money, get married and divorced. On websites like eBay, people sell virtual clothes and rent virtual property for real cash - for a total of £400 million worth each year. Tim Guest takes us on a revelatory journey through the electronic looking-glass, as he investigates one of the most bizarre phenomena of the 21st century.

The Second Machine Age: Work, Progress, and Prosperity in a Time of Brilliant Technologies

by Erik Brynjolfsson Andrew Mcafee

A revolution is under way.<P> In recent years, Google’s autonomous cars have logged thousands of miles on American highways and IBM’s Watson trounced the best human Jeopardy! players. Digital technologies—with hardware, software, and networks at their core—will in the near future diagnose diseases more accurately than doctors can, apply enormous data sets to transform retailing, and accomplish many tasks once considered uniquely human.<P> In The Second Machine Age MIT’s Erik Brynjolfsson and Andrew McAfee—two thinkers at the forefront of their field—reveal the forces driving the reinvention of our lives and our economy. As the full impact of digital technologies is felt, we will realize immense bounty in the form of dazzling personal technology, advanced infrastructure, and near-boundless access to the cultural items that enrich our lives.<P> Amid this bounty will also be wrenching change. Professions of all kinds—from lawyers to truck drivers—will be forever upended. Companies will be forced to transform or die. Recent economic indicators reflect this shift: fewer people are working, and wages are falling even as productivity and profits soar.<P> Drawing on years of research and up-to-the-minute trends, Brynjolfsson and McAfee identify the best strategies for survival and offer a new path to prosperity. These include revamping education so that it prepares people for the next economy instead of the last one, designing new collaborations that pair brute processing power with human ingenuity, and embracing policies that make sense in a radically transformed landscape.<P> A fundamentally optimistic book, The Second Machine Age will alter how we think about issues of technological, societal, and economic progress.

The Second Quantum Revolution: From Entanglement to Quantum Computing and Other Super-Technologies

by Lars Jaeger

This book tells the story of the second quantum revolution which will shape the 21st century as much as the first quantum revolution shaped the 20th century. It provides unique orientation in today's discussion and the latest progress on the interpretation of quantum physics and its further technological potential. As you read this book the first prototypes of this revolution are being built in laboratories worldwide. Super-technologies such as nanotechnology, quantum computers, quantum information processing, and others will soon shape our daily lives, even if physicists themselves continue to disagree on how to interpret the central theory of modern physics. The book will thus also touch on the profound philosophical questions at the heart of quantum mechanics.

The Second Self, Twentieth Anniversary Edition: Computers and the Human Spirit (The\mit Press Ser.)

by Sherry Turkle

A new edition of the classic primer in the psychology of computation, with a new introduction, a new epilogue, and extensive notes added to the original text.In The Second Self, Sherry Turkle looks at the computer not as a "tool," but as part of our social and psychological lives; she looks beyond how we use computer games and spreadsheets to explore how the computer affects our awareness of ourselves, of one another, and of our relationship with the world. "Technology," she writes, "catalyzes changes not only in what we do but in how we think." First published in 1984, The Second Self is still essential reading as a primer in the psychology of computation. This twentieth anniversary edition allows us to reconsider two decades of computer culture—to (re)experience what was and is most novel in our new media culture and to view our own contemporary relationship with technology with fresh eyes. Turkle frames this classic work with a new introduction, a new epilogue, and extensive notes added to the original text.Turkle talks to children, college students, engineers, AI scientists, hackers, and personal computer owners—people confronting machines that seem to think and at the same time suggest a new way for us to think—about human thought, emotion, memory, and understanding. Her interviews reveal that we experience computers as being on the border between inanimate and animate, as both an extension of the self and part of the external world. Their special place betwixt and between traditional categories is part of what makes them compelling and evocative. (In the introduction to this edition, Turkle quotes a PDA user as saying, "When my Palm crashed, it was like a death. I thought I had lost my mind.") Why we think of the workings of a machine in psychological terms—how this happens, and what it means for all of us—is the ever more timely subject of The Second Self.

Second Time Around: From Art House to DVD

by D. A. Miller

The art houses and cinema clubs of his youth are gone, but the films that D. A. Miller discovered there in the 1960s and ’70s are now at his fingertips. With DVDs and streaming media, technology has turned the old cinematheque’s theatrical offerings into private viewings that anyone can repeat, pause, slow, and otherwise manipulate at will.In Second Time Around, Miller seizes this opportunity; across thirteen essays, he watches digitally restored films by directors from Mizoguchi to Pasolini and from Hitchcock to Honda, looking to find not only what he first saw in them but also what he was then kept from seeing by quick camerawork, normal projection speed, missing frames, or simple censorship. At last he has an unobstructed view of the gay leather scene in Cruising, the expurgated special effects in The H-Man, and the alternative ending to Vertigo. Now he can pursue the finer details of Chabrol’s debt to Hitchcock, Visconti’s mystificatory Marxism, or the unemotive emotion in Godard.Yet this recaptured past is strangely disturbing; the films and the author have changed in too many ways for their reunion to be like old times. The closeness of Miller’s attention clarifies the painful contradictions of youth and decline, damaged prints and flawless restorations.

Secondary Liability of Internet Service Providers

by Graeme B. Dinwoodie

This book analyses the doctrinal structure and content of secondary liability rules that hold internet service providers liable for the conduct of others, including the safe harbours (or immunities) of which they may take advantage, and the range of remedies that can be secured against such providers. Many such claims involve intellectual property infringement, but the treatment extends beyond that field of law. Because there are few formal international standards which govern the question of secondary liability, comprehension of the international landscape requires treatment of a broad range of national approaches. This book thus canvasses numerous jurisdictions across several continents, but presents these comparative studies thematically to highlight evolving commonalities and trans-border commercial practices that exist despite the lack of hard international law. The analysis presented in this book allows exploration not only of contemporary debates about the appropriate policy levers through which to regulate intermediaries, but also about the conceptual character of secondary liability rules.

Secrecy, Covertness and Authentication in Wireless Communications: Physical Layer Security Approach (Wireless Networks)

by Yulong Shen Yuanyu Zhang Xiaohong Jiang

This book introduces the fundamentals of physical layer security (PLS) and demonstrates how a variety of PLS techniques can be applied to improve the security of wireless communication systems. In particular, this book covers three security aspects of wireless communications. It includes secrecy, i.e., preventing eavesdroppers from intercepting information from transmitted wireless signals, covertness, i.e., hiding the transmitted signals themselves from malicious wardens and authentication, i.e., authenticating the identities of communicating entities. When discussing the secrecy of wireless communication systems, this book covers physical layer secure communication in multiple-input multiple-out (MIMO) systems based on beamforming and precoding techniques, in relay systems based on link/relay selection and in large-scale random networks based on cooperative jamming. Regarding the covertness of wireless communication systems, this book introduces physical layer covert communication in relaying systems and MIMO systems. Also, when discussing authentication in wireless communication systems, this book introduces the implementation of physical layer authentication in MIMO systems based on channel features and/or radiometric features of transceivers. In addition, this book presents security-aware routing in wireless networks based on physical layer secure communication techniques.This book targets researchers in the fields of physical layer security and wireless communications security. Advanced-level students in electronic engineering or computer science studying these security topics will also want to purchase this book as a secondary textbook.

Secret Coders: Monsters & Modules (Secret Coders #6)

by Gene Luen Yang

From graphic novel superstar (and former computer programming teacher) and New York Times bestselling author Gene Luen Yang, Secret Coders: Monsters & Modules is the sixth and final volume in a wildly entertaining series that combines logic puzzles and basic coding instruction with a page-turning mystery plot!The Coders always knew their programming skills would take them far, but they never guessed they would take them to another dimension! Or to be accurate, one dimension less—to save humanity, Hopper, Eni, and Josh must travel to Flatland, a dangerous two-dimensional world ruled by polygons. If they can return home safely with a turtle of light, they might just stand a chance in their final showdown with Dr. One-Zero!

Secret Coders: Potions & Parameters (Secret Coders #5)

by Gene Luen Yang

From graphic novel superstar (and former computer programming teacher) and New York Times bestselling author Gene Luen Yang, Secret Coders: Potions & Parameters is the fifth volume in a wildly entertaining series that combines logic puzzles and basic coding instruction with a page-turning mystery plot!Dr. One-Zero won't stop until the whole town—no, the whole world—embraces the "true happiness” found in his poisonous potion, Green Pop. And now that he has the Turtle of Light, he’s virtually unstoppable.There's one weapon that can defeat him: another Turtle of Light. Unfortunately, they can only be found in another dimension! To open a portal to this new world, Hopper, Eni, and Josh's coding skills will be put to the test.

Secret Coders: Robots & Repeats (Secret Coders #4)

by Gene Luen Yang

Dr. One-Zero has added a new class to Stately Academy's curriculum. But in "Advanced Chemistry," they only teach one lesson: how to make Green Pop! While their classmates are manufacturing this dangerous soda, the Coders uncover a clue that may lead them to Hopper's missing dad. Is it time to use Professor Bee's most powerful weapon: the Turtle of Light?From graphic novel superstar (and former computer-programming teacher) Gene Luen Yang, comes Robots & Repeats, the fourth volume of Secret Coders. This wildly entertaining series combines logic puzzles and basic coding instruction with a page-turning mystery plot!

The Secret Guide to Computers

by Russ Walter

Secret History: The Story of Cryptology (Chapman & Hall/CRC Cryptography and Network Security Series #76)

by Craig Bauer

The first edition of this award-winning book attracted a wide audience. This second edition is both a joy to read and a useful classroom tool. Unlike traditional textbooks, it requires no mathematical prerequisites and can be read around the mathematics presented. If used as a textbook, the mathematics can be prioritized, with a book both students and instructors will enjoy reading. Secret History: The Story of Cryptology, Second Edition incorporates new material concerning various eras in the long history of cryptology. Much has happened concerning the political aspects of cryptology since the first edition appeared. The still unfolding story is updated here. The first edition of this book contained chapters devoted to the cracking of German and Japanese systems during World War II. Now the other side of this cipher war is also told, that is, how the United States was able to come up with systems that were never broken. The text is in two parts. Part I presents classic cryptology from ancient times through World War II. Part II examines modern computer cryptology. With numerous real-world examples and extensive references, the author skillfully balances the history with mathematical details, providing readers with a sound foundation in this dynamic field. FEATURES Presents a chronological development of key concepts Includes the Vigenère cipher, the one-time pad, transposition ciphers, Jefferson’s wheel cipher, Playfair cipher, ADFGX, matrix encryption, Enigma, Purple, and other classic methods Looks at the work of Claude Shannon, the origin of the National Security Agency, elliptic curve cryptography, the Data Encryption Standard, the Advanced Encryption Standard, public-key cryptography, and many other topics New chapters detail SIGABA and SIGSALY, successful systems used during World War II for text and speech, respectively Includes quantum cryptography and the impact of quantum computers

Secret History: The Story of Cryptology (Discrete Mathematics and Its Applications)

by Craig P. Bauer

Winner of an Outstanding Academic Title Award from CHOICE MagazineMost available cryptology books primarily focus on either mathematics or history. Breaking this mold, Secret History: The Story of Cryptology gives a thorough yet accessible treatment of both the mathematics and history of cryptology. Requiring minimal mathematical prerequisites, the

Secret Key Cryptography: Ciphers, from simple to unbreakable

by Frank Rubin

Explore the fascinating and rich world of Secret Key cryptography! This book provides practical methods for encrypting messages, an interesting and entertaining historical perspective, and an incredible collection of ciphers and codes—including 30 unbreakable methods.In Secret Key Cryptography: Ciphers, from simple to unbreakable you will: Measure the strength of your ciphers and learn how to guarantee their security Construct and incorporate data-compression codes Generate true random numbers in bulk Construct huge primes and safe primes Add an undetectable backdoor to a cipher Defeat hypothetical ultracomputers that could be developed decades from now Construct 30 unbreakable ciphers Secret Key Cryptography gives you a toolbox of cryptographic techniques and Secret Key methods. The book&’s simple, non-technical language is easy to understand and accessible for any reader, even without the advanced mathematics normally required for cryptography. You&’ll learn how to create and solve ciphers, as well as how to measure their strength. As you go, you&’ll explore both historic ciphers and groundbreaking new approaches—including a never-before-seen way to implement the uncrackable One-Time Pad algorithm. Whoever you are, this book is for you! History buffs will love seeing the evolution of sophisticated cryptographic methods, hobbyists will get a gentle introduction to cryptography, and engineers and computer scientists will learn the principles of constructing secure ciphers. Even professional cryptographers will find a range of new methods and concepts never published before. About the technology From the Roman empire&’s Caesar cipher to the WWII Enigma machine, secret messages have influenced the course of history. Today, Secret Key cryptography is the backbone of all modern computing infrastructure. Properly designed, these algorithms are efficient and practical. Some are actually unbreakable, even using supercomputers or quantum technology! About the book Secret Key Cryptography teaches you how to create Secret Key ciphers, ranging from simple pen-and-paper methods to advanced techniques used in modern computer-based cryptography. It reveals both historic examples and current innovations. You&’ll learn how to efficiently encrypt large files with fast stream ciphers, discover alternatives to AES encryption, and avoid strong-looking but weak ciphers. Simple language and fun-to-solve mini-ciphers make learning serious concepts easy and engaging. What's inside Construct 30 unbreakable ciphers Measure the strength of your ciphers and guarantee their security Add an undetectable backdoor to a cipher Defeat hypothetical ultracomputers of the future About the reader For professional engineers, computer scientists, and cryptography hobbyists. No advanced math knowledge is required. About the author Frank Rubin has been doing cryptography for over 50 years. He holds an MS in Mathematics, and a PhD in Computer Science. Table of Contents 1 Introduction 2 What is cryptography? 3 Preliminary concepts 4 Cryptographer&’s toolbox 5 Substitution ciphers 6 Countermeasures 7 Transposition 8 Jefferson Wheel Cypher 9 Fractionation 10 Variable-length fractionation 11 Block ciphers 12 Principles for secure encryption 13 Stream ciphers 14 One-time pad 15 Matrix methods 16 Three pass protocol 17 Codes 18 Quantum computers

The Secret Life: Three True Stories of the Digital Age

by Andrew O'Hagan

From the award-winning author of The Illuminations, a significant and timely work of non-fiction by one of the most important writers of his generation.Julian Assange, a man who, five years ago, seemed to herald a new, enlightened form of democracy -- until, that is, the apparent heroism of WikiLeaks became compromised by his hubris and paranoia. Satoshi Nakamoto, another man who radically reshaped the business of information and secrecy on a global scale. He is known as the elusive inventor of Bitcoin, but who is the real Satoshi -- a lone wolf or a collective of individuals with the talent to reimagine the financial wheel? And Ronald Pinn, a man who does not exist at all, except in the furthest, darkest reaches of O'Hagan's internet use. Driven by an interest in the ease with which it is possible to create an identity in an online world, O'Hagan journeys into the dark web where everything -- sex, drugs, guns -- is for sale.The Secret Life is about these elusive individuals, written in three individual yet deeply connected essays. It is a dazzling book about the porousness between genius and madness, between fact and fiction. It is about nothing less than modern personality in the digital age.

The Secret Life: Three True Stories of the Digital Age

by Andrew O'Hagan

Award-winning essayist and novelist Andrew O’Hagan presents a trio of reports exploring the idea of identity on the Internet—true, false, and in between—where your virtual self takes on a life of its own outside of reality.A Publishers Weekly Best Book of the Year • One of Publishers Weekly's Top 10 Book of Essays and Literary Criticism • One of Chicago Reader's Books We Can’t Wait to ReadThe Secret Life issues three bulletins from the porous border between cyberspace and IRL.“Ghosting” introduces us to the beguiling and divisive Wikileaks founder Julian Assange, whose autobiography O’Hagan agrees to ghostwrite with unforeseen—and unforgettable—consequences. “The Invention of Ronnie Pinn” finds him using the actual identity of a deceased young man to construct an entirely new one in cyberspace, leading him on a journey deep into the Web’s darkest realms. And “The Satoshi Affair” chronicles the strange case of Craig Wright, the Australian Web developer who may or may not be the mysterious inventor of Bitcoin, Satoshi Nakamoto—and who may or may not be willing, or even able, to reveal the truth.These fascinating pieces take us to the weirder fringes of life in a digital world while also casting light on our shared predicaments. What does it mean when your very sense of self becomes, to borrow a term from the tech world, “disrupted”? The Secret Life shows us that it might take a novelist, an inventor of selves, armed with the tools of a trenchant reporter, to find an answer.

The Secret Life of Data: Navigating Hype and Uncertainty in the Age of Algorithmic Surveillance (The Information Society Series)

by Aram Sinnreich Jesse Gilbert

How data surveillance, digital forensics, and generative AI pose new long-term threats and opportunities—and how we can use them to make better decisions in the face of technological uncertainty.In The Secret Life of Data, Aram Sinnreich and Jesse Gilbert explore the many unpredictable, and often surprising, ways in which data surveillance, AI, and the constant presence of algorithms impact our culture and society in the age of global networks. The authors build on this basic premise: no matter what form data takes, and what purpose we think it&’s being used for, data will always have a secret life. How this data will be used, by other people in other times and places, has profound implications for every aspect of our lives—from our intimate relationships to our professional lives to our political systems.With the secret uses of data in mind, Sinnreich and Gilbert interview dozens of experts to explore a broad range of scenarios and contexts—from the playful to the profound to the problematic. Unlike most books about data and society that focus on the short-term effects of our immense data usage, The Secret Life of Data focuses primarily on the long-term consequences of humanity&’s recent rush toward digitizing, storing, and analyzing every piece of data about ourselves and the world we live in. The authors advocate for &“slow fixes&” regarding our relationship to data, such as creating new laws and regulations, ethics and aesthetics, and models of production for our data-fied society.Cutting through the hype and hopelessness that so often inform discussions of data and society, The Secret Life of Data clearly and straightforwardly demonstrates how readers can play an active part in shaping how digital technology influences their lives and the world at large.

The Secret Life of Programs: Understand Computers -- Craft Better Code

by Jonathan E. Steinhart

A primer on the underlying technologies that allow computer programs to work. Covers topics like computer hardware, combinatorial logic, sequential logic, computer architecture, computer anatomy, and Input/Output.Many coders are unfamiliar with the underlying technologies that make their programs run. But why should you care when your code appears to work? Because you want it to run well and not be riddled with hard-to-find bugs. You don't want to be in the news because your code had a security problem.Lots of technical detail is available online but it's not organized or collected into a convenient place. In The Secret Life of Programs, veteran engineer Jonathan E. Steinhart explores--in depth--the foundational concepts that underlie the machine. Subjects like computer hardware, how software behaves on hardware, as well as how people have solved problems using technology over time.You'll learn:How the real world is converted into a form that computers understand, like bits, logic, numbers, text, and colorsThe fundamental building blocks that make up a computer including logic gates, adders, decoders, registers, and memoryWhy designing programs to match computer hardware, especially memory, improves performanceHow programs are converted into machine language that computers understandHow software building blocks are combined to create programs like web browsersClever tricks for making programs more efficient, like loop invariance, strength reduction, and recursive subdivisionThe fundamentals of computer security and machine intelligenceProject design, documentation, scheduling, portability, maintenance, and other practical programming realities.Learn what really happens when your code runs on the machine and you'll learn to craft better, more efficient code.

The Secret Life of Word

by Robert Delwood

The Secret Life of Word looks at Microsoft Word from the perspective of technical and other professional writers. It gives writers an in-depth look at the hidden capabilities of Word, and shows how to take advantage of those capabilities without being a programmer. The Secret Life of Word will help you master the full gamut of Word mysteries, including AutoCorrect, QuickParts, BuildingBlocks, macros, Smart Tags, program-less VBA programming, and much more. There's something here for everyone who uses Microsoft Word, from new users to experts.Inside the BookPreface Introduction to Word Automation Creating Macros Find and Replace Fields, Form Fields, and Content Controls AutoCorrect and AutoText/Building Blocks Smart Tags Exchanging Data Code Samples Automation Related Topics Glossary, Bibliography, and Index

Refine Search

Showing 51,126 through 51,150 of 60,757 results