Henderson, Harry

Compare Name: 
hendersonharry

Internet predators

2005
Presents a resource guide to information on Internet predators, providing an overview of the topic, including chronology of events, glossary of terms, biographical listings, and index.

The Internet

1998
Surveys the development of the Internet and includes an explanation of what it is, how it can be used, and what it means for the future.

Career opportunities in computers and cyberspace

2004
Provides descriptions of over eighty jobs in the fields of computers and cyberspace, with information on salaries, requirements, prospects, and related associations.

Terrorist challenge to America

2003
A guide to the terrorist challenge in America that provides an overview of the topic, chronology of important events, glossary of terms, biographical listing, and complete index.

Capital punishment

2000
Examines the the debate over legal execution in the U.S., looking at various arguments for and against the practice; and includes a chronology, a list of key people in the history of capital punishment, a glossary, a guide to further research, and a selection of resource information.

The digital age

2013
Discusses the computer and its ability to create online networks that has profoundly transformed science, industry, business, and society itself.

Twentieth-century science

1997
Provides an overview of scientific developments that have had significant impact on our world, including atomic physics, genetic engineering, and computer technology.

Encyclopedia of computer science and technology

2003
More than four hundred cross-referenced entries provide information on the history and development of computer science and technology.

Modern robotics

building versatile machines
2006
Profiles eleven notable scientists in the field of robotics, discussing their research, accomplishments, ethical and professional obstacles, and contributions. Includes photographs, illustrations, chronology of notable events, and a list of resources.

Computer viruses

2006
Examines how hackers are able to infect computer systems with damaging viruses, how those viruses spread, their effects upon businesses, and how to protect computers from viruses.

Pages

Subscribe to RSS - Henderson, Harry