 |
|
 |  |  Digital Privacy: Theory, Technologies, and PracticesDuring recent years, a continuously increasing amount of personal data has been made available through different websites around the world. Although the availability of personal information has created several advantages, it can be easily misused and may lead to violations of privacy. With growing interest in this area, Digital Privacy:... |  |  E-Business@Print: Internet-Based Services and Processes (X.media.publishing)The Internet has created new business areas for the graphic arts industry: Information is formatted to be published both on paper and on-line and new forms of cooperation with customers and co-producers develop. The author gives a broad review of new services and processes, the Internet has made possible. The reader gains insight into the existing... |
|
 Enterprise Architecture at Work: Modelling, Communication and AnalysisMany stakeholders within and outside the company can be identified, ranging from top-level management to software engineers. Each stakeholder requires specific information presented in an accessible way, to deal with the impact of such wide-ranging developments. To predict the effects of such developments and modifications of an... |  |  3D Modeling and Animation: : Synthesis and Analysis Techniques for the Human BodyThe emergence of virtual reality applications and human-like interfaces has given rise to the necessity of producing realistic models of the human body. Building and animating a synthetic, cartoon-like, model of the human body has been practiced for many years in the gaming industry and advances in the game platforms have led to more realistic... |  |  Fundamentals of Computer Organization and DesignThis advanced textbook provides a comprehensive survey of hardware and software architectural principles and methods of computer systems organization and design. It covers both CISC and RISC processors in detail, presenting Pentium, PowerPC, MIPS, SPARC and Itanium. In addition, assembly language programming for both CISC (Pentium) and RISC... |
|
 Building Trustworthy Semantic WebsSemantic Webs promise to revolutionize the way computers find and integrate data over the internet. They will allow Web agents to share and reuse data across applications, enterprises, and community boundaries. However, this improved accessibility poses a greater threat of unauthorized access, which could lead to the malicious corruption of... |  |  |  |  |
|
|
Result Page: 2340 2339 2338 2337 2336 2335 2334 2333 2332 2331 2330 2329 2328 2327 2326 2325 2324 2323 2322 |