Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Personal Cybersecurity: How to Avoid and Recover from Cybercrime

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.

Personal Cybersecurity addresses the needs of individual users at work and at home. This book...

Handbook of Multibiometrics (International Series on Biometrics)
Handbook of Multibiometrics (International Series on Biometrics)
Reliable human authentication schemes are of paramount importance in our highly networked society.  Advances in  biometrics help address the myriad of problems associated with traditional human recognition methods. The performance and benefits of a biometric system can be significantly enhanced by consolidating the evidence presented...
Machine Learning and Statistical Modeling Approaches to Image Retrieval (The Information Retrieval Series)
Machine Learning and Statistical Modeling Approaches to Image Retrieval (The Information Retrieval Series)

In the early 1990s, the establishment of the Internet brought forth a revolutionary viewpoint of information storage, distribution, and processing: the World-Wide Web is becoming an enormous and expanding distributed digital library. Along with the development of the Web, image indexing and retrieval have grown into research areas...

Image Processing: Principles and Applications
Image Processing: Principles and Applications
Image processing—from basics to advanced applications

Learn how to master image processing and compression with this outstanding state-of-the-art reference. From fundamentals to sophisticated applications, Image Processing: Principles and Applications covers multiple topics and provides a fresh perspective on future directions and...

Biometrics For Dummies (Computer/Tech)
Biometrics For Dummies (Computer/Tech)
Biometric technology is a HOT topic. The most recent (ISC)2 Global Workforce Survey of over 7,500 security professionals from around the world have cited biometrics as the number one security project for organizations in North America, and the number two security project in the world overall.

Most companies aren’t using any form of
...
Biometrics: Theory, Methods, and Applications (IEEE Press Series on Computational Intelligence)
Biometrics: Theory, Methods, and Applications (IEEE Press Series on Computational Intelligence)

An in-depth examination of the cutting edge of biometrics

This book fills a gap in the literature by detailing the recent advances and emerging theories, methods, and applications of biometric systems in a variety of infrastructures. Edited by a panel of experts, it provides comprehensive coverage of:

Advances in Biometrics: Sensors, Algorithms and Systems
Advances in Biometrics: Sensors, Algorithms and Systems

Biometrics technology continues to stride forward with its wider acceptance and its real need in various new security facets of modern society. From simply logging on to a laptop to crossing the border of a country, biometrics is being called upon to meet the growing challenges of identity management.

With contributions from academia and...

Biometric Image Discrimination Technologies (Computational Intelligence and Its Applications Series)
Biometric Image Discrimination Technologies (Computational Intelligence and Its Applications Series)
Personal identification and verification both play a critical role in our society.
Today, more and more business activities and work practices are computerized. Ecommerce
applications, such as e-banking, or security applications, such as building
access, demand fast, real-time and accurate personal identification. Traditional
...
Foundational and Applied Statistics for Biologists Using R
Foundational and Applied Statistics for Biologists Using R

Full of biological applications, exercises, and interactive graphical examples, Foundational and Applied Statistics for Biologists Using R presents comprehensive coverage of both modern analytical methods and statistical foundations. The author harnesses the inherent properties of the R environment to enable students...

Biometric Authentication: First International Conference, ICBA 2004, Hong Kong, China, July 15-17, 2004
Biometric Authentication: First International Conference, ICBA 2004, Hong Kong, China, July 15-17, 2004
The past decade has seen a rapid growth in the demand for biometric-based authentication solutions for a number of applications. With significant advances in biometric technology and an increase in the number of applications incorporating biometrics, it is essential that we bring together researchers from academia and industry as well as...
Biometrics
Biometrics
Several years ago, several biometric industry analysts, an author of this book included, regularly appeared at annual conferences to speak on the future of biometrics and proclaimed:

“1997 is the Year of Biometrics.”

The following year, the pronouncement became:

“1998 is the Year of
...
Security of e-Systems and Computer Networks
Security of e-Systems and Computer Networks
E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of...
unlimited object storage image
Result Page: 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy