Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security in an IPv6 Environment
Security in an IPv6 Environment
As the number of intelligent systems that require direct access expands to the multiple billions, Internet Protocol Version 6 (IPv6) becomes an institutional imperative. However, questions are being raised about security aspects and subtending apparatuses of IPv6. This book provides a practical and accessible primer on this emerging technology. The...
Human-Computer Interaction Fundamentals (Human Factors and Ergonomics)
Human-Computer Interaction Fundamentals (Human Factors and Ergonomics)
Hailed on first publication as a compendium of foundational principles and cutting-edge research, The Human-Computer Interaction Handbook has become the gold standard reference in this field. Derived from select chapters of this groundbreaking and authoritative resource, Human-Computer Interaction Fundamentals emphasizes...
Marine Robot Autonomy
Marine Robot Autonomy

Autonomy for Marine Robots provides a timely and insightful overview of intelligent autonomy in marine robots. A brief history of this emerging field is provided, along with a discussion of the challenges unique to the underwater environment and their impact on the level of intelligent autonomy required.  Topics covered at length...

Textbook of Drug Design and Discovery, Fourth Edition
Textbook of Drug Design and Discovery, Fourth Edition

The molecular biological revolution and the mapping of the human genome continue to provide new challenges and opportunities for drug research and design. Future medicinal chemists and drug designers must have a firm background in a number of related scientific disciplines in order to understand the conversion of new insight into lead...

Economics of Grids, Clouds, Systems, and Services: 15th International Conference, GECON 2018, Pisa, Italy, September 18–20, 2018, Proceedings (Lecture Notes in Computer Science (11113))
Economics of Grids, Clouds, Systems, and Services: 15th International Conference, GECON 2018, Pisa, Italy, September 18–20, 2018, Proceedings (Lecture Notes in Computer Science (11113))
This volume constitutes the proceedings of the 15th International Conference on the Economics of Grids, Clouds, Systems, and Services (GECON 2018). GECON is a long-held conference that annually brings together economics and computer science researchers, with the ultimate aim of building a strong...
Negation and Speculation Detection (Natural Language Processing)
Negation and Speculation Detection (Natural Language Processing)
Negation and speculation detection is an emerging topic that has attracted the attention of many researchers, and there is clearly a lack of relevant textbooks and survey texts. This book aims to define negation and speculation from a natural language processing perspective, to explain the need for processing these phenomena, to summarise...
Peer-to-Peer : Harnessing the Power of Disruptive Technologies
Peer-to-Peer : Harnessing the Power of Disruptive Technologies

The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and...

Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets
Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets
Inside the Minds: Security Matters is an authoritative, insider's perspective on the ins and outs of the security industry and the future of the business, on a global scale. Featuring CEOs, Presidents, and Chief Information Security Officers, all representing some of the nation's top companies, this book provides a broad, yet comprehensive...
Ubiquitous Cardiology: Emerging Wireless Telemedical Applications (Premier Reference Source)
Ubiquitous Cardiology: Emerging Wireless Telemedical Applications (Premier Reference Source)
The Internet and other technological developments are now playing increasing roles in consumer health and the delivery of health services.

Ubiquitous Cardiology: Emerging Wireless Telemedical Applications provides developmental solutions and explanations for cardiovascular diagnostics. Useful to field researchers, academicians,...

Strained Hydrocarbons: Beyond the van't Hoff and Le Bel Hypothesis
Strained Hydrocarbons: Beyond the van't Hoff and Le Bel Hypothesis
In clearly structured chapters, this book covers the fascinating world of hydrocarbons, providing an insight into the fundamental principles of chemistry. The monograph covers modern aspects of the topic, such as carbon nanotubes, molecular flask inclusion, and fullerenes, with new synthetic procedures for the build up of the structural lattice...
Great Events From History: The 20th Century, 1941-1970
Great Events From History: The 20th Century, 1941-1970

This is a unique resource: Nothing is comparable with this much depth or numbers that covers so many 20th century events.??AAGreat Events from History: The Twentieth Century, 1941-1970??AA, is the ninth installment in Salem Press' ongoing ??AAGreat Events from History??AA series. This six-volume set contains 1,112 essays on more than 1,100...

Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace
Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace

Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous "Great...

unlimited object storage image
Result Page: 134 133 132 131 130 129 128 127 126 125 124 123 122 121 120 119 118 117 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy