Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Information Technology Security: Advice from Experts (IT Solutions)
Information Technology Security: Advice from Experts (IT Solutions)

As the value of the information portfolio has increased, IT security has changed from a product focus to a business management process. Today, IT security is not just about controlling internal access to data and systems but managing a portfolio of services including wireless networks, cyberterrorism protection and business continuity planning...

Human Recognition at a Distance in Video (Advances in Pattern Recognition)
Human Recognition at a Distance in Video (Advances in Pattern Recognition)

Most biometric systems employed for human recognition require physical contact with, or close proximity to, a cooperative subject. Far more challenging is the ability to reliably recognize individuals at a distance, when viewed from an arbitrary angle under real-world environmental conditions. Gait and face data are the two biometrics that...

Arduino and Kinect Projects: Design, Build, Blow Their Minds
Arduino and Kinect Projects: Design, Build, Blow Their Minds
If you've done some Arduino tinkering and wondered how you could incorporate the Kinect in your projects — or the other way around — this book is for you.

If you haven’t actually done any tinkering but you are looking for a good way to get started, this book might also be for you. Even though
...
System Software Reliability (Springer Series in Reliability Engineering)
System Software Reliability (Springer Series in Reliability Engineering)
Computer software reliability has never been more important. Today, computers are employed in areas as diverse as air traffic control, nuclear reactors, aircraft, real-time military, industrial process control, security system control, biometric scan-systems, automotive, mechanical and safety control, and hospital patient monitoring systems. Many...
Economics of Identity Theft: Avoidance, Causes and Possible Cures
Economics of Identity Theft: Avoidance, Causes and Possible Cures
Today, identity is more than anything, economic. The technology used to create, utilize and protect identities is increasingly ill-matched to the economics and uses of identities. Identity theft is the misuse of private authenticating information to steal money. Protecting identity requires privacy. Proving identity requires exposing information....
 
   
   
unlimited object storage image
Result Page: 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy