 |
|
 Spatial Databases: Technologies, Techniques and TrendsSpatial database systems has been an active area of research over the past 20 years. A large number of research efforts have appeared in literature aimed at effective modelling of spatial data and efficient processing of spatial queries. This book investigates several aspects of a spatial database system, and includes recent research efforts in... |  |  Incident Response and Computer Forensics, Second EditionCompletely Updated with the Latest Techniques--Contains All-New Forensics Content and Real-World Scenarios
"An insider's look at the legal, procedural and technical steps of computer forensics and analysis." --Information Security magazine
"This book is an absolute must-read for anyone who plays a role in... |  |  Privacy, Security and Trust within the Context of Pervasive ComputingPrivacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the second international conference on Pervasive Computing. The workshop was held April18-23, 2004, in Vienna, Austria. The goal of the workshop was not to focus on specific, even novel mechanisms, but rather on the interfaces... |
|
 Web Communities: Analysis and ConstructionThe rapid development of Web technology has made the World Wide Web an important and popular application platform for disseminating and searching information as well as conducting business. However, due to the lack of uniform schema for Web documents, the low precision of most search engines and the information explosion on the World Wide Web, the... |  |  Legal Forms for Starting & Running a Small BusinessThe legal documents you need on any given day!
Like most small business owners, you probably can't afford to hire a lawyer to draft the legal documents you need in the course of your day-to-day business.
Now there's an affordable solution -- Legal Forms for Starting & Running a Small Business, which provides you with over 60 legal... |  |  Network Security Technologies, Second EditionNetwork Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork. The author delivers a unique presentation of major legacy, state-of-the-art, and emerging network security... |
|
|
|
Result Page: 104 103 102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 |