Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet
Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet

WHEN I FIRST MET BARRETT LYON in 2004, I was covering Internet security for the Los Angeles Times from an office in San Francisco. His story was so good—and met a journalistic need so deep—that I had a hard time believing it was true.

For more than a year, I had been grappling with an onslaught of urgent but...

Logics in Artificial Intelligence: 9th European Conference, JELIA 2004, Lisbon, Portugal, September 27-30, 2004
Logics in Artificial Intelligence: 9th European Conference, JELIA 2004, Lisbon, Portugal, September 27-30, 2004
This book constitutes the refereed proceedings of the 9th European Conference on Logics in Artificial Intelligence, JELIA 2004, held in Lisbon, Portugal, in September 2004.

The 52 revised full papers and 15 revised systems presentation papers presented together with the abstracts of 3 invited talks were carefully reviewed and selected from a...

Agent-Mediated Electronic Commerce. Automated Negotiation and Strategy Design for Electronic Markets
Agent-Mediated Electronic Commerce. Automated Negotiation and Strategy Design for Electronic Markets
This book constitutes the thoroughly refereed post-proceedings of the joint International Workshops on Trading Agent Design and Analysis, TADA 2006, and on Agent Mediated Electronic Commerce, AMEC VIII 2006, held in Hakodate, Japan, in May 2006 as an associated event of AAMAS 2006, the 5th International Joint Conference on Autonomous Agents and...
Applications of Graph Transformations with Industrial Relevance: Second International Workshop, AGTIVE 2003, Charlottesville
Applications of Graph Transformations with Industrial Relevance: Second International Workshop, AGTIVE 2003, Charlottesville
This book constitutes the thoroughly refereed post-proceedings of the Second International Workshop on Applications of Graph Transformations with Industrial Relevance, AGTIVE 2003, held in Charlotesville, Virginia, USA in September/October 2003.

The 27 revised full papers and 11 revised demo papers presented together with 2 invited papers and 5...

The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition
The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition
This book presents a total systems approach to the all the topics needed for the infosec professional, beginning with defining the position of the information systems security officer (ISSO), to establishing and managing an infosec program.

* Six new chapters present the latest information and resources to counter information security
...
Network Query Language with CDROM
Network Query Language with CDROM
Learn about an exciting new technology that is revolutionizing network and Internet content delivery

As the first pure language of the content engineering era, Network Query Language (NQL) is the ultimate tool for rapid and simple development of intelligent agents, bots, spiders, middleware, and scalable business-to-business content aggregation...

Twisted Network Programming Essentials
Twisted Network Programming Essentials

Get started with Twisted, the event-driven networking framework written in Python. With this introductory guide, you’ll learn the key concepts and design patterns to build event-driven client and server applications for many popular networking protocols. You’ll also learn the tools to build new protocols using...

Agent-oriented Methodologies
Agent-oriented Methodologies
Building software to solve contemporary business problems is no easy task.
Over the last decade there has been an increasing focus on object-oriented
notations and modelling languages, perhaps at the expense of a full methodological
approach to solving the problem and giving software developers the
tools they need to
...
Constructing Intelligent Agents With Java: A Programmer's Guide to Smarter Applications
Constructing Intelligent Agents With Java: A Programmer's Guide to Smarter Applications
Add Artificial Intelligence to your Java applications Learn to design and implement agent-based reasoning, modeling, and learning Build your own personal assistants, Web agents, e-commerce agents, and multiagent systems.

Learn how to create intelligent agents that can automate, mediate, and administer basic business functions.

Java...

Forensic Pathology of Trauma (Forensic Science and Medicine)
Forensic Pathology of Trauma (Forensic Science and Medicine)
The practice of forensic pathology includes the collection and analysis of evidence in relation to a corpse in order to establish the cause of death. Knowledge of the cause of death contributes to the determination of the manner of death by medical examiners and coroners, who are occasionally assisted by law enforcement officers. In...
The Lady Is a Spy: Virginia Hall, World War II Hero of the French Resistance (Scholastic Focus)
The Lady Is a Spy: Virginia Hall, World War II Hero of the French Resistance (Scholastic Focus)
The Lady Is a Spy is the audacious and riveting true story of Virginia Hall, America's greatest spy and unsung hero, brought to vivid life by acclaimed author Don Mitchell.

When Hitler invaded Poland, Virginia Hall was traveling in Europe. Which was dangerous enough, but as fighting erupted,
...
Agent-based Supply Network Event Management
Agent-based Supply Network Event Management
"Supply Chain Event Management (SCEM)" is one of the major topics in application-oriented Supply Chain Management. However, many solutions lack conceptual precision and currently available client-server SCEM-systems are ill-suited for complex supply networks in today's business environment. Agent-based proactive information logistics...
unlimited object storage image
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy