Information Technology Security: Advice from Experts (IT Solutions)As the value of the information portfolio has increased, IT security has changed from a product focus to a business management process. Today, IT security is not just about controlling internal access to data and systems but managing a portfolio of services including wireless networks, cyberterrorism protection and business continuity planning... | | Human Recognition at a Distance in Video (Advances in Pattern Recognition)
Most biometric systems employed for human recognition require physical contact with, or close proximity to, a cooperative subject. Far more challenging is the ability to reliably recognize individuals at a distance, when viewed from an arbitrary angle under real-world environmental conditions. Gait and face data are the two biometrics that... | | Arduino and Kinect Projects: Design, Build, Blow Their Minds
If you've done some Arduino tinkering and wondered how you could incorporate the Kinect in your
projects — or the other way around — this book is for you.
If you haven’t actually done any tinkering but you are looking for a good way to get started, this
book might also be for you. Even though... |