Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems

Buy
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading European researchers showing the present state and future directions of computer science research.

"Methods of Artificial Intelligence and Intelligent Agents" contains 13 contributions analyzing such areas of AI as fuzzy set theory, predicate logic, neural networks, clustering, data mining and others. It also presents applications of AI as possible solutions for problems like firm bankruptcy, soil erosion, flight control and others.

"Information Technology Security" covers three important areas of security engineering in information systems: software security, public key infrastructure and the design of new cryptographic protocols and algorithms.

"Biometric Systems" comprises 11 contributions dealing with face picture analysis and recognition systems. This chapter focuses on known methods of biometric problem solution as well as the design of new models.

(HTML tags aren't allowed.)

Creating Web Pages All in One
Creating Web Pages All in One

Did you know that all the tools you need to create GREAT Web pages are free -  they are built right into Windows XP or are free online!

In Sams Teach Yourself to Create Web Pages All in One you will learn the basics on creating a variety of different types of...

Genetic and Evolutionary Computation for Image Processing and Analysis (EURASIP Book Series on Signal Processing and Communications)
Genetic and Evolutionary Computation for Image Processing and Analysis (EURASIP Book Series on Signal Processing and Communications)
Image analysis and processing is steadily gaining relevance within the large number of application fields to which genetic and evolutionary computation (GEC) techniques are applied. Although more and more examples of such applications can be found in literature, they are scattered, apart from a few exceptions, in proceedings and journals dedicated...
Architecting Mobile Solutions for the Enterprise
Architecting Mobile Solutions for the Enterprise
As far back as 1999, some smart guys predicted that mobile would become the primary focus of development in only a few years. Although it has taken a bit more time than expected, the era of mobile software has arrived at last. Why did it take so long? The answer is surprisingly simple: mobile software needed a critical mass of users...

Smashing WordPress: Beyond the Blog
Smashing WordPress: Beyond the Blog

The ultimate guide to WordPress, from the world's most popular resource for web designers and developers

As one of the hottest tools on the web today for creating a blog, WordPress has evolved to be much more that just a blogging platform and has been pushed beyond its original purpose. With this new edition of a...

HTML5 & CSS3 Visual QuickStart Guide (7th Edition)
HTML5 & CSS3 Visual QuickStart Guide (7th Edition)

Want to learn how to build Web sites fast? This best-selling guide’s visual format and step-by-step, task-based instructions will have you up and running with HTML5 and CSS3 in no time. This Seventh Edition is a major revision, with approximately 125 pages added and substantial updates to (or complete rewrites of) nearly every page from...

Stand Back and Deliver: Accelerating Business Agility
Stand Back and Deliver: Accelerating Business Agility

Enhance Fundamental Value and Establish Competitive Advantage with Leadership Agility

 

Whether you’re leading an organization, a team, or a project, Stand Back and Deliver gives you the agile leadership tools...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy