Home | Amazing | Today | Tags | Publishers | Years | Search 
Developmental Psychology in Action (Child Development)
Developmental Psychology in Action (Child Development)
This is the final book in a series of four which form part of the Open University course Child Development. The series provides a detailed and thorough undergraduate-level introduction to the central concepts, theories, current issues and research evidence in developmental psychology.

Developmental Psychology in...

Modelling Urban Development with Geographical Information Systems and Cellular Automata
Modelling Urban Development with Geographical Information Systems and Cellular Automata
Urban development and migration from rural to urban areas are impacting prime agricultural land and natural landscapes, particularly in the less developed countries. These phenomena will persist and require serious study by those monitoring global environmental change. To address this need, various models have been devised to analyze urbanization...
Innovative Cryptography (Programming Series)
Innovative Cryptography (Programming Series)
Innovative Cryptography, Second Edition provides a cutting-edge evaluation and review of current findings in the area of cryptography and explores how to implement these new techniques efficiently. It covers current cryptographic problems and suggests practical solutions. The book also discusses the role of symmetric ciphers and symmetric block...
Stochastic Network Calculus (Computer Communications and Networks)
Stochastic Network Calculus (Computer Communications and Networks)
Network calculus, a theory dealing with queuing systems found in computer networks, focuses on performance guarantees. The development of an information theory for stochastic service-guarantee analysis has been identified as a grand challenge for future networking research. Towards that end, stochastic network calculus, the probabilistic version or...
Investigating Computer Crime
Investigating Computer Crime
Investigating Computer Crime will prove a welcome addition to any security department's library.
-Security Management

Investigating Computer Crime presents practical methods for gathering electronic evidence and dealing with crimes involving computers. Based on material gathered from hundreds of investigators all over the
...
Business Intelligence: Data Mining and Optimization for Decision Making
Business Intelligence: Data Mining and Optimization for Decision Making

Business intelligence is a broad category of applications and technologies for gathering, providing access to, and analyzing data for the purpose of helping enterprise users make better business decisions. The term implies having a comprehensive knowledge of all factors that affect a business, such as customers, competitors, business partners,...

Handbook of Fingerprint Recognition
Handbook of Fingerprint Recognition
From the reviews:

"...a useful reference for all biometric security professionals and researchers. The four coauthors have a distinguished combination of academic and professional experience....Overall, readers will be pleased with the style and substance of this book." -Computing Reviews

"This is a comprehensive reviews...

Interaction Design
Interaction Design

INTERACTION DESIGN: BEYOND HUMAN-COMPUTER INTERACTION is an up-to-date exposition of the design of the current and next generation interactive technologies, such as the Web, mobiles, and wearables. These exciting new technologies bring additional challenges for designers and developers-challenges that require careful thought and...

UMTS Radio Network Planning: Mastering Cell Coupling for Capacity Optimization
UMTS Radio Network Planning: Mastering Cell Coupling for Capacity Optimization
Interference determines the performance of UMTS radio networks. In order to provide good coverage and high capacity, network operators need to control the effects and dynamics of interference coupling among users and cells. This is a major challenge in planning and optimizing UMTS radio networks. Hans-Florian Geerdes establishes a concise system...
MCTS Self-Paced Training Kit (Exam 70-505): Microsoft® .NET Framework 3.5 Windows® Forms Application Development
MCTS Self-Paced Training Kit (Exam 70-505): Microsoft® .NET Framework 3.5 Windows® Forms Application Development
Announcing an all-new SELF-PACED TRAINING KIT designed to help maximize your performance on 70-505, the required exam for the new Microsoft Certified Technology Specialist (MCTS) certification for.NET Framework 3.5 Windows Forms Application Development. This 2-in-1 kit includes the official Microsoft study guide, plus practice tests on CD to help...
The Multiplicities of Internet Addiction
The Multiplicities of Internet Addiction
Overuse of the internet is often characterised as problematic, disruptive, or addictive, with stories frequently claiming that online use interferes with relationships, or that 'excessive' time in front of computer screens is unhealthy. People joke about suffering from withdrawal if they cannot check their emails and some parents worry about their...
Service Oriented Architecture Field Guide for Executives
Service Oriented Architecture Field Guide for Executives
Service Oriented Architecture Field Guide for Executives is a fundamental breakthrough in the business and technology perspectives of service oriented architecture (SOA). A valuable resource to help you understand and realize the benefits of SOA in today's companies, this guide will show you how to plan, implement, and achieve SOA value....
Result Page: 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy