** Black & White edition ** VMware vSphere 5 Clustering Technical Deepdive zooms in on three key components of every VMware based infrastructure and is by no means a "how to" guide. It covers the basic steps needed to create a vSphere HA and vSphere DRS cluster and to implement vSphere Storage DRS. Even more important, it...
The third edition of this text contains key improvements and changes that continue to
provide instructors and students with the best information technology auditing text
available. This edition has been reorganized and expanded to address the internal control
and audit issues mandated by Sarbanes-Oxley legislation. The third edition...
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are...
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are...
Computer vision is the science and technology of making machines that see.
It is concerned with the theory, design and implementation of algorithms that
can automatically process visual data to recognize objects, track and recover
their shape and spatial layout.
The International Computer Vision Summer School - ICVSS was...
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are...
The Microsoft XNA Framework provides a powerful set of tools to allow development teams
of any size, from the individual developer to larger independent teams, to rapidly develop
high-performance quality games for multiple Microsoft-related platforms.
This book will present a series of video games, utilizing Visual Basic and...
We describe in this book, hybrid intelligent systems using type-2 fuzzy logic and
modular neural networks for pattern recognition applications. Hybrid intelligent
systems combine several intelligent computing paradigms, including fuzzy logic,
neural networks, and bio-inspired optimization algorithms, which can be used to
produce...
This book is generally about software intellectual property and specifically
about the field of software forensics. While you may never testify in a courtroom,
attempt to deduce the true owner of a valuable program, or measure the
intellectual property (IP) value of software source code, if you are at all involved
with software you...
Polymericmaterials, both “inert” and degradable, constantly interact with the
surroundings. Because of this interaction changes take place in the polymer
matrix and small molecules are released to the environment. Reliable methods
for testing biodegradability and environmental interaction of renewable
resources and...
Event-based distributed systems are playing an ever increasing role in
areas such as enterprise management, information dissemination, finance,
environmental monitoring and geo-spatial systems. Event-based processing
originated with the introduction of Event-Condition-Action (ECA) rules to
database systems in the 1980s. Since then,...