Home | Amazing | Today | Tags | Publishers | Years | Search 
Multimedia Interaction and Intelligent User Interfaces: Principles, Methods and Applications
Multimedia Interaction and Intelligent User Interfaces: Principles, Methods and Applications

Consumer electronics (CE) devices, providing multimedia entertainment and enabling communication, have become ubiquitous in daily life. However, consumer interaction with such equipment currently requires the use of devices such as remote controls and keyboards, which are often inconvenient, ambiguous and non-interactive. An important...

The Complete Guide to Software Testing
The Complete Guide to Software Testing

The Complete Guide to Software Testing Bill Hetzel Gain a new perspective to software testing as a life cycle activity, not merely as something that happens at the end of coding. This edition is completely revised and contains new chapters on testing methodologies including ANSI standard-based testing—a survey of testing practices. Dr....

Internet Crimes, Torts and Scams: Investigation and Remedies
Internet Crimes, Torts and Scams: Investigation and Remedies

Internet Crimes, Torts and Scams: Investigation and Remedies helps attorneys understand the increasing range of illegal and malicious internet activity and a similarly expanding number of response or enforcement options. Reflecting a "real-world" dynamic, the book is problem-oriented and cuts across many practice areas including...

Cyber Terrorism: A Guide for Facility Managers
Cyber Terrorism: A Guide for Facility Managers

In the current climate of terrorism, the facility manager is in a more critical position than ever before. Protecting the organization's infrastructure from cyber-based attacks that are designed to disrupt and/or destroy business operations is becoming increasingly important for facility managers.This book will address cyberterrorism and...

Information Security Fundamentals
Information Security Fundamentals

The purpose of information security is to protect an organization’s valuable resources, such as information, computer hardware, and software. Through the selection and application of appropriate safeguards, security helps the organization’s mission by protecting its physical and financial resources, reputation, legal position,...

Modern Robotics: Building Versatile Machines (Milestones in Discovery and Invention)
Modern Robotics: Building Versatile Machines (Milestones in Discovery and Invention)

The Milestones in Science and Discovery set is based on a simple but powerful idea—that science and technology are not separate from people’s daily lives. Rather, they are part of seeking to understand and reshape the world, an activity that virtually defines being human.

More than a million years ago, the ancestors of...

Scene of the Cybercrime: Computer Forensics Handbook
Scene of the Cybercrime: Computer Forensics Handbook

"Cybercrime and cyber-terrorism represent a serious challenge to society as a whole." - Hans Christian Krüger, Deputy Secretary General of the Council of Europe
Crime has been with us as long as laws have existed, and modern technology has given us a new type of criminal activity: cybercrime. Computer and
...

An Experimental Approach to CDMA and Interference Mitigation: From System Architecture to Hardware Testing through VLSI Design
An Experimental Approach to CDMA and Interference Mitigation: From System Architecture to Hardware Testing through VLSI Design

The key of a successful approach to the complex issue of designing wireless terminals for present and future communication systems (usually addressed to as '3rd Generation and beyond') lies in a single 'magic' word: multidisciplinarity. This was actually the philosophy which inspired and drove a fruitful teamwork performed at...

The Pyramid Builders of Ancient Egypt: A Modern Investigation of Pharaoh's Workforce
The Pyramid Builders of Ancient Egypt: A Modern Investigation of Pharaoh's Workforce

In this engrossing detective story, Rosalie David uncovers a fascinating picture of Kahun, a pyramid workmens' town excavated in 1887. In David's hands, the Egyptian builders of the pyramids are revealed as simple people, leading ordinary lives while they are engaged in building the great tomb for a Pharaoh. They worry about their...

Getting Started with Oracle BPM Suite 11gR1 - A Hands-On Tutorial
Getting Started with Oracle BPM Suite 11gR1 - A Hands-On Tutorial

This fully illustrated step-by-step tutorial is based on proven training content that has been highly praised by hundreds of developers in product training courses given as part of the BPM Suite 11g rollout. You will learn how to build a business process application project iteratively with each chapter introducing new technology components...

Oracle Fusion Middleware Patterns
Oracle Fusion Middleware Patterns

Enterprise Architecture is seldom simplistic enough to be built on a single technology - it generally encompasses a wide array of technologies, including SOA, Identity Management, Business Intelligence, Performance Management, Web 2.0, Content Management, BPM, Distributed caching, Data Integration, and Application Server.

What are...

Oracle SOA Suite 11g Handbook (Osborne ORACLE Press Series)
Oracle SOA Suite 11g Handbook (Osborne ORACLE Press Series)

Master Oracle SOA Suite 11g

Design and implement an agile service-oriented enterprise computing infrastructure using the detailed information in this Oracle Press guide. Written by an Oracle ACE director, Oracle SOA Suite 11g Handbook uses a hands-on case study to illustrate each programming, management, and...

Result Page: 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy