 |
|
|
|
|
 |  |  |  |  Steal This Computer Book 3: What They Won't Tell You About the InternetThis offbeat, non-technical book looks at what hackers do, how they do it, and how you can protect yourself. This edition also covers rootkits, spyware, web bugs, identity theft, hacktivism, wireless hacking (wardriving), biometrics, and firewalls.
WARNING: This book is not to be used for hacking into government computers, shutting... |
|
 Handbook of Multibiometrics (International Series on Biometrics)Reliable human authentication schemes are of paramount importance in our highly networked society. Advances in biometrics help address the myriad of problems associated with traditional human recognition methods. The performance and benefits of a biometric system can be significantly enhanced by consolidating the evidence presented... |  |  How Personal & Internet Security Works (How It Works)In 2003, fraud and identity theft cost consumers at least $437 million dollars. In 2004, the U.S. Federal Trade Commission received 247,000 consumer complaints in 2004 (up 15% from 2003), from individuals whose identity was stolen, and according to Reuters.com (2/2005), Americans lost $548 million dollars to identity theft... |  |  Statistical Methods for Health Sciences, Second Edition…although the book is apparently intended for non-statisticians, it covers material well beyond an introductory course. Biometrics, Vol. 56, No. 2, June 2000
Building upon material presented in the first edition, Statistical Methods for Health Sciences, Second Edition continues to address the analytical issues... |
|
 Meta-Algorithmics: Patterns for Robust, Low Cost, High Quality Systems
The confluence of cloud computing, parallelism and advanced machine intelligence approaches has created a world in which the optimum knowledge system will usually be architected from the combination of two or more knowledge-generating systems. There is a need, then, to provide a reusable, broadly-applicable set of design patterns to empower... |  |  Unconstrained Face Recognition (International Series on Biometrics)Face recognition has been actively studied over the past decade and continues to be a big research challenge. Just recently, researchers have begun to investigate face recognition under unconstrained conditions. Unconstrained Face Recognition provides a comprehensive review of this biometric, especially face recognition from video, assembling a... |  |  Biometrics: Identity Verification in a Networked WorldAn in-depth look at biometrics, focused on critical issues such as accuracy, privacy, technology capabilities, and cost-effective deployment
No longer a science fiction solution, biometric technologies are being deployed by thousands of companies and public agencies to increase security, protect personal information, and reduce... |
|
|
Result Page: 8 7 6 5 4 3 2 1 |