The introduction was composed by Jennifer L. Bayuk, the editor of this volume. It
briefly describes the history of the cyberforensics field and places the subsequent
chapters into context. The last section of the introduction, Expert Explanations,
describes the format of the following sections and also how the sections complement...
In the forty years since I started working in the field, and indeed for some years before that (almost since Calvin Mooers coined the term information storage and retrieval in the 1950s), there have been a significant number of books on information retrieval. Even if we ignore the more specialist research monographs and the...
Updated and expanded to cover iOS 5 and Xcode 4.3, iOS Programming: The Big Nerd Ranch Guide leads you through the essential concepts, tools, and techniques for developing iOS applications. After completing this book, you will have the understanding, the know-how, and the confidence you need to tackle iOS projects of your own. ...
Windows Phone 7.5: Building Location-aware Applications, introduces you to the exciting
new world of Windows Phone 7.5. This book focuses on location-based applications,
by introducing the readers to location-based services and the background thereof,
coupled with practical examples for the Windows Phone location services. Another...
The Kinect sensor provides a genuinely new way for a computer to make some sense
of the world around it. The fusion of a camera, a directional microphone system,
and a depth sensor into a single, mass-market device provides an opportunity for
software developers to advance the field of computer interaction in all...
If you'd like to customize Redmine to meet your own precise project management needs, this is the ideal guide to understanding and realizing the full potential of plugins. Full of real-world examples and clear instructions.
Overview
Gain access to powerful and useful features by hooking into...
Visual requirements models are one of the most effective ways to identify software
requirements. They help the analyst to ensure that all stakeholders—including
subject matter experts, business stakeholders, executives, and technical teams—understand
the proposed solution. Visualization keeps...
George W. Bush's infamous remark about the 'Axis of Evil' brought North Korea dramatically back into the international spotlight. During the late 1990s relations between North Korea and the US and its allies were on the mend. However, the election of George W. Bush resulted in renewed crisis. The nuclear accord between the two...
Should you care about search? The answer is “Yes!” However, the reason you should
care constantly changes. Back in 1997 when FAST was founded, most people
viewed search as a mature and commoditized technology. AltaVista was the leader
in web search and Verity had won the enterprise search race. Internet...
The bi-partite approach we took when producing the first edition of Modern Spanish
Grammar has proved popular with students and tutors alike. For the second edition we
went back to the people that use the Grammar and asked what they would like to see
improved.
As s result, we have taken the opportunity to make...
We are proud to publish the sixth edition of Fundamentals of Information Systems. This new
edition builds on the success of the previous editions in meeting the need for a concise
introductory information systems text. We have listened to feedback from the previous edition’s
adopters and manuscript reviewers and incorporated...