Home | Amazing | Today | Tags | Publishers | Years | Search 
Computational Intelligence in Reliability Engineering (Studies in Computational Intelligence)
Computational Intelligence in Reliability Engineering (Studies in Computational Intelligence)
This two-volume book covers the recent applications of computational intelligence techniques in reliability engineering. Research in the area of computational intelligence is growing rapidly due to the many successful applications of these new techniques in very diverse problems. “Computational Intelligence” covers many fields such as...
Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase
Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase
"Today, databases house our 'information crown jewels', but database security is one of the weakest areas of most information security programs. With this excellent book, Ben-Natan empowers you to close this database security gap and raise your database security bar!" Bruce W. Moulton. CISO/VP, Fidelity Investments (1995 - 2001)...
Fighting Terror in Cyberspace (Series in Machine Perception & Artifical Intelligence)
Fighting Terror in Cyberspace (Series in Machine Perception & Artifical Intelligence)
The Internet, or the ARPANET in its original name, was a remarkable idea. The Net was designed in the late 60's by US ARPA (Advanced Research Projects Agency) to connect distant computers to each other. This was a critical need at a time when each computer was a precious resource of computing power, which, if connected, could be shared among...
Excel 2007: Beyond the Manual
Excel 2007: Beyond the Manual
Many experienced users may initially find Excel 2007 rather disorientating. But Excel 2007: Beyond the Manual will introduce those who are already familiar with Excel basics to more advanced features, like consolidation, what-if analysis, PivotTables, sorting and filtering, and some commonly used functions.

You'll learn how to maximize...

Optical Switching / Networking and Computing for Multimedia Systems (Optical Engineering)
Optical Switching / Networking and Computing for Multimedia Systems (Optical Engineering)
We have witnessed the rapid growth in the popularity of the Internet technology over the past few years. The current network technologies provide ubiquitous access to a vast amount of information on a huge variety of topics, but limited bandwidth has constrained the impact and growth of broadband multimedia applications. To allow new broadband...
Interactive TV: A Shared Experience: 5th European Conference, EuroITV 2007, Amsterdam, the Netherlands, May 24-25, 2007
Interactive TV: A Shared Experience: 5th European Conference, EuroITV 2007, Amsterdam, the Netherlands, May 24-25, 2007
This book constitutes the refereed proceedings of the 5th European Conference on Interactive Television, EuroITV 2007, held in Amsterdam, The Netherlands in May 2007.

The 24 revised full papers were carefully reviewed and selected from 80 submissions. The volume combines papers from academia and industry covering a wide range of areas such as...

Secure Messaging with Microsoft Exchange Server 2000
Secure Messaging with Microsoft Exchange Server 2000

Computer security was once thought to be the exclusive province of somber men in dark suits and nerdy, whey-faced hackers. While both of these archetypes are still well-represented in the computing industry, the last two years have witnessed an explosive growth in the number of organizations that are seeking to boost the...

MCSA/MCSE Self-Paced Training Kit (Exam 70-290): Managing and Maintaining a Microsoft Windows Server 2003 Environment, Second Edition
MCSA/MCSE Self-Paced Training Kit (Exam 70-290): Managing and Maintaining a Microsoft Windows Server 2003 Environment, Second Edition
Announcing an all-new MCSA/MCSE Training Kit designed to help maximize your performance on Exam 70-290, a core exam for the new Windows Server 2003 certification. This kit packs the tools and features that exam candidates want mostincluding in-depth, self-paced training based on final exam content; rigorous, objective-by-objective review; exam tips...
Synchronizing Internet Protocol Security (SIPSec) (Advances in Information Security)
Synchronizing Internet Protocol Security (SIPSec) (Advances in Information Security)
The open design of the internet has not only opened many new opportunities for communications, but it has also opened many new avenues for attacks against organizational network and computing resources. Information security has become a major concern in recent times, as more and more computers are being connected to the global internet. With so...
An Introduction to Knowledge Engineering
An Introduction to Knowledge Engineering
An Introduction to Knowledge Engineering presents a simple but detailed exploration of current and established work in the field of knowledge-based systems and related technologies. Its treatment of the increasing variety of such systems is designed to provide the reader with a substantial grounding in such technologies as expert systems, neural...
Graphics of Large Datasets: Visualizing a Million (Statistics and Computing)
Graphics of Large Datasets: Visualizing a Million (Statistics and Computing)
Graphics are great for exploring data, but how can they be used for looking at the large datasets that are commonplace to-day? This book shows how to look at ways of visualizing large datasets, whether large in numbers of cases or large in numbers of variables or large in both. Data visualization is useful for data cleaning, exploring data,...
Practical Ruby for System Administration (Expert's Voice in Open Source)
Practical Ruby for System Administration (Expert's Voice in Open Source)
Ruby has set the world on fire, proving itself a serious challenger to Perl and Python in all spheres. In particular, more and more people are discovering that Ruby's flexibility, superb feature set, and gentle learning curve make it a natural choice for system administration tasks, from the humblest server to the largest enterprise deployment....
Result Page: 222 221 220 219 218 217 216 215 214 213 212 211 210 209 208 207 206 205 204 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy