Home | Amazing | Today | Tags | Publishers | Years | Search 
Handbook of Granular Computing
Handbook of Granular Computing
Although the notion is a relatively recent one, the notions and principles of Granular Computing (GrC) have appeared in a different guise in many related fields including granularity in Artificial Intelligence, interval computing, cluster analysis, quotient space theory and many others. Recent years have witnessed a renewed and expanding interest...
Behavioral Biometrics: A Remote Access Approach
Behavioral Biometrics: A Remote Access Approach

With the advent of the internet as a medium for performing business transactions, the need for a secure communication channel has never been more paramount. The study of behavioral biometrics - the verification and/or identification of individuals based on the way they provide information to an authentication system - originated from the need...

Selected Readings on Telecommunication and Networking (Premier Reference Source)
Selected Readings on Telecommunication and Networking (Premier Reference Source)
Education and research in the field of telecommunications and networking can prove problematic without the proper resources and tools on the most relevant issues, trends, and advancements.

Selected Readings on Telecommunications and Networking supplements course instruction and student research with quality chapters focused...

Pirates of the Digital Millennium: How the Intellectual Property Wars Damage Our Personal Freedoms, Our Jobs, and the World Economy
Pirates of the Digital Millennium: How the Intellectual Property Wars Damage Our Personal Freedoms, Our Jobs, and the World Economy
Digital piracy. It's a global war -- and it's just begun. Pirates of the Digital Millennium chronicles that war. All of it: media conglomerates vs. teenagers, tech companies vs. content providers, artists battling artists, nations vs. nations, law enforcement vs. organized crime. John Gantz and Jack Rochester cover every side and all the...
Handbook of Research on Wireless Multimedia: Quality of Service and Solutions
Handbook of Research on Wireless Multimedia: Quality of Service and Solutions
The recent rapid advances in wireless technologies have created a demand for high quality multimedia applications and services. These advanced multimedia applications give rise to a new set of challenges in providing Quality of Service (QoS) when delivering these services over wireless networks.

The Handbook of Research on Wireless...

Information Technology Control and Audit, Third Edition
Information Technology Control and Audit, Third Edition
The book is very useful for beginners as well as practitioners …well written and presented. ... should provide resiliency to IT security in the emerging cyberworld.
Information Systems Control Journal

Now in its third edition, this book is an excellent introductory
...
Creating Web Sites Bible, Second Edition
Creating Web Sites Bible, Second Edition
Everything you need to build a great Web site ...

Whether you want to start an online store, establish a Web presence for a brick-and-mortar business, or just

show off your family album, this book shows you how. Even if you're fairly new to the Web world, you'll soon learn both the aesthetic and technical aspects of Web design....

Encyclopedia of Information Communication Technology
Encyclopedia of Information Communication Technology
The Encyclopedia of Information Communication Technology (ICT) is a comprehensive resource describing the influence of information communication technology in scientific knowledge construction and spreading, with emphasis on the roles of product technologies, process technologies, and context technologies.

A reference point for studies...

Malware Forensics: Investigating and Analyzing Malicious Code
Malware Forensics: Investigating and Analyzing Malicious Code

Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and...

Wiley IFRS: Practical Implementation Guide and Workbook
Wiley IFRS: Practical Implementation Guide and Workbook
Wiley IFRS Practical Implementation Guide and Workbook Second Edition

A one-stop resource for understanding and applying current International Financial Reporting Standards

The year 2007 proved to be yet another historic year of watershed events for the International Financial Reporting Standards (IFRS) firstly, due to the...

Collective Intelligence in Action
Collective Intelligence in Action
There's a great deal of wisdom in a crowd, but how do you listen to a thousand people talking at once? Identifying the wants, needs, and knowledge of internet users can be like listening to a mob.

In the Web 2.0 era, leveraging the collective power of user contributions, interactions, and feedback is the key to market dominance. A new...

Brands That Rock: What Business Leaders Can Learn from the World of Rock and Roll
Brands That Rock: What Business Leaders Can Learn from the World of Rock and Roll
"Reading Brands That Rock is like attending business school, where classes on customer loyalty, consumer behavior, and branding are taught by Mick Jagger, Elton John, Steven Tyler, and Madonna."

–Tommy Hilfiger, Designer

Cadillac and The Rolling Stones. Victoria’s Secret and Madonna. Wal-Mart and...

Result Page: 69 68 67 66 65 64 63 62 61 60 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy