Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Gabinetes de comunicación universitarios y redes sociales
  • Language: es
  • Pages: 621

Gabinetes de comunicación universitarios y redes sociales

Hasta hace muy pocos años, las Universidades se comunicaban con la sociedad de su entorno básicamente a través de los medios de comunicación tradicionales. Los Gabinetes de Comunicación hacían de intermediarios entre la institución y la prensa. Esto ha cambiado en los últimos años. Con la aparición de las Redes Sociales, la comunicación de la Universidad con la sociedad de su entorno, no requiere el utilizar los medios de comunicación tradicionales, con sus habituales "filtros" informativos. La comunicación es directa con sus "públicos" y sin intermediarios y es bidireccional. Con esta tesis doctoral se pretende analizar el uso que las Universidades públicas andaluzas hacen de...

Miradas al pasado reciente: de la II República a la Transición
  • Language: es
  • Pages: 451

Miradas al pasado reciente: de la II República a la Transición

Este volumen recoge una serie de trabajos elaborados por investigadores del Grupo "Estudios del Tiempo Presente" (PAI HUM-756), en el marco de las actividades desarrolladas en el Centro I+D "Comunicación y Sociedad" (CySOC) de la Universidad de Almería. Así, los 24 capítulos que componen el libro tratan de distintos aspectos de la Historia del siglo XX en España y están organizados en tres bloques: las etapas de la II República y la guerra civil, los años de la dictadura franquista y el período de la Transición. En sus páginas, el lector podrá encontrar estudios de historia política, análisis de aspectos sociales o investigaciones en el ámbito cultural, con textos dedicados a ...

Artificial Intelligence and Games
  • Language: en
  • Pages: 350

Artificial Intelligence and Games

  • Type: Book
  • -
  • Published: 2018-02-17
  • -
  • Publisher: Springer

This is the first textbook dedicated to explaining how artificial intelligence (AI) techniques can be used in and for games. After introductory chapters that explain the background and key techniques in AI and games, the authors explain how to use AI to play games, to generate content for games and to model players. The book will be suitable for undergraduate and graduate courses in games, artificial intelligence, design, human-computer interaction, and computational intelligence, and also for self-study by industrial game developers and practitioners. The authors have developed a website (http://www.gameaibook.org) that complements the material covered in the book with up-to-date exercises, lecture slides and reading.

Audience Evolution
  • Language: en
  • Pages: 266

Audience Evolution

Annotation Napoli examines the ongoing redefinition of the industry-audience relationship by technologies that have moved the audience marketplace beyond traditional metrics.

Who's who in Science in Europe
  • Language: en
  • Pages: 808

Who's who in Science in Europe

None

Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks
  • Language: en
  • Pages: 161

Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks

  • Type: Book
  • -
  • Published: 2008-05-07
  • -
  • Publisher: Springer

With the rapid development of information technologies and the transition to next-generation networks, computer systems and in particular embedded s- tems are becoming more and more mobile and ubiquitous. They also strongly interact with the physical world. Ensuring the security of these complex and resource-constrained systems is a really challenging research topic. Therefore this Workshop in Information Security Theory and Practices was organized to bring together researchers and practitioners in related areas, and to encourage cooperation between the research and the industrial communities. This was the second edition of WISTP, after the ?rst event in Heraklion, Greece, in 2007. This year...

Security and Privacy in Dynamic Environments
  • Language: en
  • Pages: 510

Security and Privacy in Dynamic Environments

  • Type: Book
  • -
  • Published: 2006-07-25
  • -
  • Publisher: Springer

This book contains the Proceedings of the 21st IFIP TC-11 International Information Security Conference (IFIP/SEC 2006) on "Security and Privacy in Dynamic Environments". The papers presented here place a special emphasis on Privacy and Privacy Enhancing Technologies. Further topics addressed include security in mobile and ad hoc networks, access control for dynamic environments, new forms of attacks, security awareness, intrusion detection, and network forensics.

Practical Pain Management
  • Language: en
  • Pages: 860

Practical Pain Management

Thoroughly revised to reflect contemporary diagnostics and treatment, this Third Edition is a comprehensive and practical reference on the assessment and management of acute and chronic pain. This edition features 14 new chapters and is filled with new information on invasive procedures...pharmacologic interventions...neuraxial pharmacotherapy...physical and occupational therapies...diagnostic techniques...pain in terminally ill patients...cancer pain...visceral pain...rheumatologic disorders...managed care...and medicolegal issues. Reorganized with two new sections focusing on diagnostics and cancer pain. A Brandon-Hill recommended title.

Security in Computing and Communications
  • Language: en
  • Pages: 485

Security in Computing and Communications

  • Type: Book
  • -
  • Published: 2016-09-16
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 4th International Symposium on Security in Computing and Communications, SSCC 2016, held in Jaipur, India, in September 2016. The 23 revised full papers presented together with 16 short papers and an invited paper were carefully reviewed and selected from 136 submissions. The papers are organized in topical sections on cryptosystems, algorithms, primitives; security and privacy in networked systems; system and network security; steganography, visual cryptography, image forensics; applications security.