Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced Techniques in Knowledge Discovery and Data Mining
Advanced Techniques in Knowledge Discovery and Data Mining
Data mining and knowledge discovery (DMKD) is a rapidly expanding field in computer science. It has become very important because of an increased demand for methodologies and tools that can help the analysis and understanding of huge amounts of data generated on a daily basis by institutions like hospitals, research laboratories, banks, insurance...
TestGoal: Result-Driven Testing
TestGoal: Result-Driven Testing
Software testing is traditionally seen as a difficult and time consuming activity that is hard to embed in the software development process. This book provides a different view. It explains to stakeholders how testing can add value to software development and doing business, and provides the tester with practical information.

TestGoal is not...

The Network Security Test Lab: A Step-by-Step Guide
The Network Security Test Lab: A Step-by-Step Guide

The ultimate hands-on guide to IT security and proactivedefense

The Network Security Test Lab is a hands-on, step-by-stepguide to ultimate IT security implementation. Covering the fullcomplement of malware, viruses, and other attack technologies, thisessential guide walks you through the security assessment...

Windows Security Monitoring: Scenarios and Patterns
Windows Security Monitoring: Scenarios and Patterns

Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security

Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...

Web Mobile-Based Applications for Healthcare Management
Web Mobile-Based Applications for Healthcare Management
In recent years, there has been a veritable literary frenzy on the theme of healthcare and the Internet. In these works, however, there has not been adequate attention paid to the role that potential users of the site (patients, general practitioners, healthcare personnel, students, private doctors, other healthcare organizations, etc.) could and...
Computational Studies of Human Motion: Part 1, Tracking and Motion Synthesis
Computational Studies of Human Motion: Part 1, Tracking and Motion Synthesis
Computational Studies of Human Motion: Part 1, Tracking and Motion Synthesis reviews methods for kinematic tracking of the human body in video. The review confines itself to the earlier stages of motion, focusing on tracking and motion synthesis. There is an extensive discussion of open issues. The authors identify some puzzling phenomena...
The Complete Guide to Software Testing
The Complete Guide to Software Testing

The Complete Guide to Software Testing Bill Hetzel Gain a new perspective to software testing as a life cycle activity, not merely as something that happens at the end of coding. This edition is completely revised and contains new chapters on testing methodologies including ANSI standard-based testing—a survey of testing practices. Dr....

iPhoto '11: The Missing Manual (Missing Manuals) (English and English Edition)
iPhoto '11: The Missing Manual (Missing Manuals) (English and English Edition)

In case you haven’t heard, the digital camera market is exploding. At this point, a staggering 98 percent of cameras sold are digital cameras. It’s taken a few decades—the underlying technology used in most digital cameras was invented in 1969—but film photography has been reduced to a niche activity.

...

Reviews in Computational Chemistry, Reviews in Computational Chemistry, Volume 18
Reviews in Computational Chemistry, Reviews in Computational Chemistry, Volume 18

This volume, like those prior to it, features chapters by experts in various fields of computational chemistry. Topics covered in Volume 18 include molecular modeling, computer-assisted molecular design (camd), quantum chemistry, molecular mechanics and dynamics, and quantitative structure-activity relationships (qsar).

After our
...
Intrusion Detection and Correlation: Challenges and Solutions
Intrusion Detection and Correlation: Challenges and Solutions

Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the problem of managing and correlating the alerts produced. This volume discusses the role of intrusion detection in the realm of network security with comparisons to traditional methods such as firewalls and...

Beyond the Desktop Metaphor: Designing Integrated Digital Work Environments
Beyond the Desktop Metaphor: Designing Integrated Digital Work Environments
The computer's metaphorical desktop, with its onscreen windows and hierarchy of folders, is the only digital work environment most users and designers have ever known. Yet empirical studies show that the traditional desktop design does not provide sufficient support for today's real-life tasks involving collaboration, multitasking, multiple roles,...
Service Level Management Best Practice Handbook: Building, Running and Managing Effective Service Level Management SLAs - Ready to Use Supporting Documents Bringing ITIL Theory into Practice
Service Level Management Best Practice Handbook: Building, Running and Managing Effective Service Level Management SLAs - Ready to Use Supporting Documents Bringing ITIL Theory into Practice
Many organizations are looking to implement Service Level Management as a way to improve the structure and quality of the business.

This document describes the contents of the Service Level Management Guide. The information found within the book is based on the ITIL Version 2 framework, specifically the Service
...
unlimited object storage image
Result Page: 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy