Home | Amazing | Today | Tags | Publishers | Years | Search 
Disaster Recovery (EC-Council Disaster Recovery Professional)
Disaster Recovery (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Programming in the 1990's: An Introduction to the Calculation of Programmes (Texts and Monographs in Computer Science)
Programming in the 1990's: An Introduction to the Calculation of Programmes (Texts and Monographs in Computer Science)

Programming is a fascinating and challenging subject. Unfortunately, it is rarely presented as such. Most often it is taught by "induction": features of some famous programming languages are given operational meaning (e.g. a loop "goes round and round"), a number of examples are shown, and by induction, we are asked to...

Agile ALM: Lightweight tools and Agile strategies
Agile ALM: Lightweight tools and Agile strategies

Welcome to Agile ALM. This book has three main goals. The first is to describe Agile Application Lifecycle Management (ALM) in practical terms and to provide a plan for rolling out Agile strategies and best-of-breed tools. The second purpose is to explain how to create ALM toolboxes based on standard tools used in advanced, real-world...

Network Safety: Network5 Safety Certification
Network Safety: Network5 Safety Certification

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Ambient Intelligence for Scientific Discovery: Foundations, Theories, and Systems
Ambient Intelligence for Scientific Discovery: Foundations, Theories, and Systems

For half a century, computer scientists have been working on systems for discovering lawful patterns in letters, numbers, words and images. The research has expanded into the computational study of the process of scientific discovery, producing such well-known AI programs as BACON and DENDRAL. However, autonomous discovery systems...

Perception-based Data Mining and Decision Making in Economics and Finance (Studies in Computational Intelligence)
Perception-based Data Mining and Decision Making in Economics and Finance (Studies in Computational Intelligence)

The primary goal of this book is to present to the scientific and management communities a selection of applications using more recent Soft Computing (SC) and Computing with Words and Perceptions (CWP) models and techniques meant to solve the economics and financial problems. The selected examples could also serve as a starting point...

Demand-Driven Associative Classification (SpringerBriefs in Computer Science)
Demand-Driven Associative Classification (SpringerBriefs in Computer Science)

The ultimate goal of computers is to help humans to solve problems. The solutions for such problems are typically programmed by experts, and the computers need only to follow the specified steps to solve the problem. However, the solution of some problems may be too difficult to be explicitly programmed. In such difficult cases,...

The Digital Consumer Technology Handbook: A Comprehensive Guide to Devices, Standards, Future Directions, and Programmable Logic Solutions
The Digital Consumer Technology Handbook: A Comprehensive Guide to Devices, Standards, Future Directions, and Programmable Logic Solutions

Studying the history of consumer electronics is nothing short of fascinating. The landscape is filled with countless stories of product successes and failures— fickle consumer adoptions, clever marketing campaigns that outsmart the best technologies, better packaging winning over better technology, and products that are simply...

Creating a Winning E-Business
Creating a Winning E-Business

Creating a Winning E-Business, Second Edition provides general business students, graduate students, continuing education students, executive education seminar participants, and entrepreneurs with practical ideas on planning and creating an e-business. We assume that readers have no previous e-business knowledge or experience. This book...

Using the HTML5 Filesystem API
Using the HTML5 Filesystem API

Several client-side storage options are available to web applications, but one area that's been lacking until now is file I/O—the ability to organize binary data into a true hierarchy of folders. That has changed with the advent of HTML5. With this book, you'll learn how to provide your applications with a file system...

Penetration Testing: Procedures & Methodologies
Penetration Testing: Procedures & Methodologies

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Virtualization Security (EC-Council Disaster Recovery Professional)
Virtualization Security (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Result Page: 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy