Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Guide to Computer Forensics and Investigations
Guide to Computer Forensics and Investigations

The rapid advance of technology has changed and influenced how we think about gathering digital evidence. Soon after the attacks on the World Trade Center in New York City on September 11, 2001, many young men and women volunteered to serve their country in different ways. For those who did not choose the military, options included...

MCSE Training Kit (Exam 70-228): Microsoft® SQL Server™ 2000 System Administration
MCSE Training Kit (Exam 70-228): Microsoft® SQL Server™ 2000 System Administration

Official Microsoft study guide for the skills you need on the job—and on the exam.

Learn how to deliver exceptional performance and scalability to your business information systems—and prepare for the Microsoft® Certified Professional (MCP) exam—with this official Microsoft study guide. Work at your...

Bayesian Time Series Models
Bayesian Time Series Models

'What's going to happen next?' Time series data hold the answers, and Bayesian methods represent the cutting edge in learning what they have to say. This ambitious book is the first unified treatment of the emerging knowledge-base in Bayesian time series techniques. Exploiting the unifying framework of probabilistic graphical...

Integrated Model of Distributed Systems (Studies in Computational Intelligence)
Integrated Model of Distributed Systems (Studies in Computational Intelligence)
In modern distributed systems, such as the Internet of Things or cloud computing, verifying their correctness is an essential aspect. This requires modeling approaches that reflect the natural characteristics of such systems: the locality of their components, autonomy of their decisions, and their asynchronous communication. However, most of the...
Controlled Self-Organisation Using Learning Classifier Systems
Controlled Self-Organisation Using Learning Classifier Systems

The complexity of technical systems increases continuously. Breakdowns and fatal errors occur quite often, respectively. Therefore, the mission of organic computing is to tame these challenges in technical systems by providing appropriate degrees of freedom for self-organised behaviour. Technical systems should adapt to changing requirements...

Google, Amazon, and Beyond: Creating and Consuming Web Services
Google, Amazon, and Beyond: Creating and Consuming Web Services

What Is This Book About?

This is a book about Web Services. Wei than a mature technology. The moven mated Web that can support long chai agents. There are three important con ity: a service can have clients (agents) is autonomy: an agent can discover th descriptions that include both whati\ interfaces of available actions).
...

Synthetic Messenger RNA and Cell Metabolism Modulation: Methods and Protocols
Synthetic Messenger RNA and Cell Metabolism Modulation: Methods and Protocols

Synthetic mRNA is an attractive tool for mammalian cell reprogramming that  can be used in basic research, as well as in clinical applications. Present mRNA in vitro synthesis is a rather simple procedure, which delivers a high yield of quality product. Various modifications may be introduced into the mRNA by changing  the sequence...

Adversarial Reasoning: Computational Approaches to Reading the Opponent's Mind
Adversarial Reasoning: Computational Approaches to Reading the Opponent's Mind
The rising tide of threats, from financial cybercrime to asymmetric military conflicts, demands greater sophistication in tools and techniques of law enforcement, commercial and domestic security professionals, and terrorism prevention. Concentrating on computational solutions to determine or anticipate an adversary's intent, Adversarial Reasoning:...
SAP Workflow Interview Questions, Answers, And Explanations
SAP Workflow Interview Questions, Answers, And Explanations
The Ultimate Reference & Learning Guide for Workflow Consultants SAP Workflow Interview Questions, Answers, and Explanations! It' s clear that Workflow is one of the most challenging areas in SAP -- and finding answers can be difficult. SAP WF Interview Questions, Answers, and Explanations guides you through your learning process. From helping...
Handbook of Ambient Intelligence and Smart Environments
Handbook of Ambient Intelligence and Smart Environments

Ambient Intelligence (AmI) has recently been adopted as a term referring to a multidisciplinary subject which embraces a variety of pre-existing fields of computer science and engineering. Given the diversity of potential applications this relationship naturally extends to other areas of science, such as education, health and social care,...

Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS
Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS

This book constitutes the refereed proceedings of the 5th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, held in St. Petersburg, Russia in September 2010. The 16 revised full papers and 6 revised short papers presented together with 5 invited papers were carefully...

Transactions on Computational Collective Intelligence XXXII (Lecture Notes in Computer Science (11370))
Transactions on Computational Collective Intelligence XXXII (Lecture Notes in Computer Science (11370))
These transactions publish research in computer-based methods of computational collective intelligence (CCI) and their applications in a wide range of fields such as the semantic web, social networks, and multi-agent systems. TCCI strives to cover new methodological, theoretical and practical aspects of CCI understood as the form of intelligence...
unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy