Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Perimeter Security
Perimeter Security
Perimeter Security has taken on a new level of importance since 9/11. Whether insuring the safety of government buildings, hospitals, residences, or bio-research labs, the safety of workers and materials can only be ensured by outfitting all points of entry with the appropriate alarm and surveillance equipment. This comprehensive hands-on resource...
Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation
Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation
A scientific approach to the new field of critical infrastructure protection

This book offers a unique scientific approach to the new field of critical infrastructure protection: it uses network theory, optimization theory, and simulation software to analyze and understand how infrastructure sectors evolve,...

Managing IT in Government, Business & Communities
Managing IT in Government, Business & Communities
This guide presents the most current research and findings about the challenges governments around the world are now placing on small business IT entrepreneurs and how they are providing increased resources to support this emphasis. Described are how organizations and society rely heavily on virtual technologies for communication and how...
Besieged: An Encyclopedia of Great Sieges From Ancient Times To The Present
Besieged: An Encyclopedia of Great Sieges From Ancient Times To The Present
Civilization began with the creation of cities, the congregation of people for mutual support. By their very decision to assemble and collect resources, cities became targets for raiding populations that found taking someone else’s possessions easier than producing their own. The need for defense meant that the towns soon built walls around...
Handbook of Natural Language Processing and Machine Translation: DARPA Global Autonomous Language Exploitation
Handbook of Natural Language Processing and Machine Translation: DARPA Global Autonomous Language Exploitation

This comprehensive handbook, written by leading experts in the field, details the groundbreaking research conducted under the breakthrough GALE program--The Global Autonomous Language Exploitation within the Defense Advanced Research Projects Agency (DARPA), while placing it in the context of previous research in the fields of natural...

Technology Due Diligence: Best Practices for Chief Information Officers, Venture Capitalists, and Technology Vendors
Technology Due Diligence: Best Practices for Chief Information Officers, Venture Capitalists, and Technology Vendors
Due diligence conducted around technology decisions is complex. Done correctly, it has the power to enable outstanding positive outcomes; done poorly, it can wreak havoc on organizations, corporate cultures, and markets.

Technology Due Diligence: Best Practices for Chief Information Officers, Venture Capitalists, and Technology Vendors...

LDAP Metadirectory Provisioning Methodology: a step by step method to implementing LDAP based metadirectory provisioning
LDAP Metadirectory Provisioning Methodology: a step by step method to implementing LDAP based metadirectory provisioning

This work provides system architects a methodology for the implementation of x.500 and LDAP based metadirectory provisioning systems. In addition this work assists in the business process analysis that accompanies any deployment. DOC Safe Harbor & European Commission’s Directive on Data Protection (Directive 95/46/EC) issues are also...

GNSS Markets and Applications (GNSS Technology and Applications)
GNSS Markets and Applications (GNSS Technology and Applications)

After being shrouded in esoterica for a long time, Global Navigation Satellite Systems (GNSS) have become part of everyday life, especially the Global Positioning System (GPS). Having spent 40 years involved with the subject, it became clear to me that it would be useful to have a book about the business aspects of these systems. This...

Handbook of Vitamins, 3rd Edition (Clinical Nutrition in Health and Disease, No. 3)
Handbook of Vitamins, 3rd Edition (Clinical Nutrition in Health and Disease, No. 3)

Features a comprehensive summary of the chemical, physiological, and nutritional relationships of all recognized vitamins!

Maintaining the standards of excellence set forth in the previous editions, the Handbook of Vitamins, Third Edition presents a thorough examination of the fundamental characteristics, functions, and roles
...

SPSS For Dummies (Computer/Tech)
SPSS For Dummies (Computer/Tech)
Program SPSS with Python® and Command Syntax

The fun and easy way® to generate solid decision-making results with SPSS

Stymied by SPSS? This friendly, plain-English guide gets you up and running with the latest version of the software so that you can start performing calculations...

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Communication between people has changed with the invention of the telephone. The ability to communicate across continents in real-time has also helped our society in several dimensions including entertainment, trade, finance, and defense. But this new capability did not come without an investment. Building an international telephony...

Intelligent Complex Adaptive Systems
Intelligent Complex Adaptive Systems
I don’t believe in the existence of a complex systems theory as such and, so far, I’m still referring to complex systems science (CSS) in order to describe my research endeavours. In my view, the latter is constituted, up until now, by a bundle of loosely connected methods and theories aiming to observe— from...
Result Page: 35 34 33 32 31 30 29 28 27 26 25 24 23 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy