Home | Amazing | Today | Tags | Publishers | Years | Search 
Guide to Computer Forensics and Investigations
Guide to Computer Forensics and Investigations

The rapid advance of technology has changed and influenced how we think about gathering digital evidence. Soon after the attacks on the World Trade Center in New York City on September 11, 2001, many young men and women volunteered to serve their country in different ways. For those who did not choose the military, options included...

Computer Algorithms
Computer Algorithms

If wo try to identify those contributions of computer science which will be long lasting, surely one of these will be the refinement of the concept called algorithm. Ever since man invented the idea of a machine which could per form basic mathematical operations, the study of what can be computed and how it can be done well was...

ASP.NET 4.0 in Practice
ASP.NET 4.0 in Practice

This has been a very long journey. We found that writing this book was a challenging task, a much harder one than we had anticipated, but there were also moments of joy and discovery along the way! The idea for the book first came to us 18 months ago, and many days and nights have come and gone between the first sentence we wrote and...

Biomedical Applications of Proteomics
Biomedical Applications of Proteomics

In medicine, as in any other life sciences discipline, research should start by raising a question (hypothesis) to solve a problem. Then the scientist should select the most appropriated method(s) to answer the question and solve the dilemma. The obtained intermediate and final results may answer the question or may raise additional...

An Introduction to Modern Mathematical Computing: With Maple(TM)
An Introduction to Modern Mathematical Computing: With Maple(TM)

Thirty years ago mathematical, as opposed to applied numerical, computation was difficult to perform and so relatively little used. Three threads changed that: the emergence of the personal computer; the discovery of fiber-optics and the consequent development of the modern internet; and the building of the Three “M’s”...

Handbook of Research on Text and Web Mining Technologies
Handbook of Research on Text and Web Mining Technologies

The massive daily overflow of electronic data to information seekers creates the need for better ways to digest and organize this information to make it understandable and useful. Text mining, a variation of data mining, extracts desired information from large, unstructured text collections stored in electronic forms.

The...

Grid Computing: Towards a Global Interconnected Infrastructure (Computer Communications and Networks)
Grid Computing: Towards a Global Interconnected Infrastructure (Computer Communications and Networks)

Grid Computing was a vision of using and sharing computers and data in the early 1990s. The integration, coordination, and sharing of computer resources which are geographically disperse among different physical domains and organizations became an every day reality. This emerging infrastructure aims to provide a mechanism for sharing...

Guide to UNIX Using Linux (Networking)
Guide to UNIX Using Linux (Networking)

Guide to UNIX Using Linux, Fourth Edition is updated to include new UNIX/Linux distributions, networking utilities, new UNIX/Linux capabilities, and coverage of both the GNOME and KDE desktops.The large array of commands, utilities, file systems, and other information you learn here applies to any Linux system and most UNIX...

Computability In Context: Computation and Logic in the Real World
Computability In Context: Computation and Logic in the Real World

Computability has played a crucial role in mathematics and computer science – leading to the discovery, understanding and classification of decidable/ undecidable problems, paving the way to the modern computer era and affecting deeply our view of the world. Recent new paradigms of computation, based on biological and physical...

Data Mining and Machine Learning in Cybersecurity
Data Mining and Machine Learning in Cybersecurity

In the emerging era of Web 3.0, securing cyberspace has gradually evolved into a critical organizational and national research agenda inviting interest from a multidisciplinary scientific workforce. There are many avenues into this area, and, in recent research, machine-learning and data-mining techniques have been applied to design,...

Handbook of Educational Data Mining (CRC Data Mining and Knowledge Discovery Series)
Handbook of Educational Data Mining (CRC Data Mining and Knowledge Discovery Series)

The goal of this book is to provide an overview of the current state of knowledge of educational data mining (EDM). The primary goal of EDM is to use large-scale educational data sets to better understand learning and to provide information about the learning process. Although researchers have been studying human learning for over a...

The SIM Guide to Enterprise Architecture
The SIM Guide to Enterprise Architecture

It is amusing that the first part of this book to be read is the last part to be written. It provides, however, an opportunity to share with you a little about how writing and editing this book has changed my thinking not just about enterprise architecture (EA), or about the role of information technology (IT) and IT professionals in...

Result Page: 62 61 60 59 58 57 56 55 54 53 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy