Home | Amazing | Today | Tags | Publishers | Years | Search 
Behavioral Biometrics: A Remote Access Approach
Behavioral Biometrics: A Remote Access Approach

With the advent of the internet as a medium for performing business transactions, the need for a secure communication channel has never been more paramount. The study of behavioral biometrics - the verification and/or identification of individuals based on the way they provide information to an authentication system - originated from the need...

Brain-Computer Interfaces: An international assessment of research and development trends
Brain-Computer Interfaces: An international assessment of research and development trends
Brain-computer interface (BCI) research deals with establishing communication pathways between the brain and external devices where such pathways do not otherwise exist. Throughout the world, such research is surprisingly extensive and expanding. BCI research is rapidly approaching a level of first-generation medical practice for use by individuals...
Introduction to Network Security (Networking Series)
Introduction to Network Security (Networking Series)
In today's online, connected world where computers outsell TVs and e-commerce sales surpass those of "brick-and-mortar" stores, secure network environments are a necessity. Weaknesses within networks have led to the rapid growth of identity theft and computer virus outbreaks, so the demand for skilled and aspiring system administrators...
Hibernate Search in Action
Hibernate Search in Action
I joined an e-commerce company in 2000, nothing unusual I suppose. We were quite annoyed by the quality of Amazon’s search engine results compared to ours. A few years later, we reimplemented our search engine from scratch using Lucene. That’s where I learned that a good search engine is 50% kick-ass technology and 50% deep...
Search Engine Optimization For Dummies (Computer/Tech)
Search Engine Optimization For Dummies (Computer/Tech)
"…cuts through the nonsense, providing a clear, simple and concise explanation of how websites reach top positions in search engines ..." (PC Advisor, September 2006) 

Why do some sites pop to the top when you search? How do you make yours one of them? You create sites that make search
...
Information Warfare: How to Survive Cyber Attacks
Information Warfare: How to Survive Cyber Attacks

"Computers don't attack computers, people do. With Erbschloe's capability taxonomy, we see that there are plenty of new adversaries out there with increasingly powerful cyberweapons and intentions. But most importantly, the greatest threat still comes from "trusted" insiders we so desperately need to, but perhaps shouldn't, trust...

Mastering Statistical Process Control: A Handbook for Performance Improvement Using SPC Cases
Mastering Statistical Process Control: A Handbook for Performance Improvement Using SPC Cases
Mastering Statistical Process Control shows how to understand business or process performance more clearly and more effectively. This practical book is based on a rich and varied selection of case studies from across industry and commerce, including material from the manufacturing, extractive and service sectors. It will enable readers to...
jQuery UI 1.6: The User Interface Library for jQuery
jQuery UI 1.6: The User Interface Library for jQuery

Who this book is written for?

This book is for front-end designers and developers that need to quickly learn how to use the jQuery UI User Interface Library. To get the most out of this book you should have a good working knowledge of HTML, CSS and JavaScript, and will need to be comfortable using jQuery, the...

Next Generation SSH2 Implementation: Securing Data in Motion
Next Generation SSH2 Implementation: Securing Data in Motion
The most up-to-date information on the next generation of SSH and how to incorporate into your organization's security environment.

New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book
...
Encyclopedia of Multimedia Technology and Networking
Encyclopedia of Multimedia Technology and Networking
Multimedia technology and networking are changing at a remarkable rate. Despite the telecoms crash of 2001, innovation in networking applications, technologies, and services has continued unabated. The exponential growth of the Internet, the explosion of mobile communications, the rapid emergence of electronic commerce, the restructuring of...
Digital Photography: 99 Easy Tips To Make You Look Like A Pro!
Digital Photography: 99 Easy Tips To Make You Look Like A Pro!

Get tips and advice for taking better pictures with your digital camera from expert photographer Ken Milburn. Discover all the cool things you can do--like making panoramas, short movies, rapid shot sequences for Web animations, instant greeting cards (both in print and for the Web), restoring and retouching photos--and much more.
...

Encyclopedia of Data Warehousing and Mining, Second Edition
Encyclopedia of Data Warehousing and Mining, Second Edition
The Encyclopedia of Data Warehousing and Mining provides a comprehensive, critical and descriptive examination of concepts, issues, trends, and challenges in this rapidly expanding field of data warehousing and mining (DWM). This encyclopedia consists of more than 350 contributors from 32 countries, 1,800 terms and definitions, and more than 4,400...
Result Page: 69 68 67 66 65 64 63 62 61 60 59 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy