Paying with mobile devices such as mobile phones or smart phones will expand worldwide in the coming years. This development provides opportunities for various industries (banking, telecommunications, credit card business, manufacturers, suppliers, retail) and for consumers.
The book comprehensively describes current status, trends...
Branded Customer Service : The New Competitive Edge
By applying the concepts in this book, organizations can use customer service as a powerful tool for establishing and maintaining a distinct brand identity.
Branding is an integral part of modern business strategy. But while there are dozens of books on branding products and marketing campaigns, nobody has applied the...
Smalltalk, Objects, and Design This reference and text treats the Smalltalk programming system and the web of object-oriented ideas within and around it. Thus it is more than a guide to the language; it also examines Smalltalk in its technical and historical setting, and along the way addresses the questions that every Smalltalk developer sooner or later naturally wonders about.... Psychological Aspects of Cyberspace: Theory, Research, Applications
Hundreds of millions of people across the world use the Internet every day. Its functions vary, from shopping and banking to chatting and dating. From a psychological perspective, the Internet has become a major vehicle for interpersonal communication that can significantly affect people's decisions, behaviors, attitudes and emotions....
Java 9 Programming Blueprints
See some of the new features of Java 9 and be introduced to parts of the Java SDK
This book provides a set of diverse, interesting projects that range in complexity from fairly simple to advanced and cover HTTP 2.0
Take advantage of Java's new modularity features to write
Mobile Malware Attacks and Defense The Only Book for Analyzing and Mitigating Mobile Malicious Code!
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new...
Neural networks represent a powerful data processing technique that has reached maturity and broad application. When clearly understood and appropriately used, they are a mandatory component in the toolbox of any engineer who wants make the best use of the available data, in order to build models, make predictions, mine data, recognize shapes...
How to Cheat at Configuring Open Source Security Tools The Perfect Reference for the Multitasked SysAdmin
This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and...
Network Safety: Network5 Safety Certification
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
|Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |