Home | Amazing | Today | Tags | Publishers | Years | Search 
Advanced Pattern Recognition Technologies with Applications to Biometrics (Premier Reference Source)
Advanced Pattern Recognition Technologies with Applications to Biometrics (Premier Reference Source)
With the increasing concerns on security breaches and transaction fraud, highly reliable and convenient personal verification and identification technologies are more and more requisite in our social activities and national services. Biometrics, used to recognize the identity of an individual, are gaining ever-growing popularity in an extensive...
Don't Blame the Shorts: Why Short Sellers Are Always Blamed for Market Crashes and How History Is Repeating Itself
Don't Blame the Shorts: Why Short Sellers Are Always Blamed for Market Crashes and How History Is Repeating Itself

"Sloan's easy and informative writing makes for a thoroughly worthwhile update."--BARRON’S

"A useful corrective to the view of short selling as 'unpatriotic' or uniquely anti-social."--John Plender, Financial Times, November 16, 2009

"I liked this...

The Integrity of the Judge (Law, Justice and Power)
The Integrity of the Judge (Law, Justice and Power)

There is no consensus among legal scholars on the meaning of judicial integrity, nor has legal scholarship yet seen a well-articulated discussion about the normative concept of judicial integrity. This book fills this gap by developing a theory of judicial integrity that can be applied to safeguarding mechanisms. Author Jonathan Soeharno makes...

Limited Liability Companies For Dummies
Limited Liability Companies For Dummies

What is a limited liability company? How is an LLC different from a corporation? Should you form an LLC for your business? Limited Liability Companies For Dummies, answers all of your questions about LLCs and demystifies the formation and management of these increasingly popular business entities.

This clear, concise guide...

Ensemble Methods in Data Mining: Improving Accuracy Through Combining Predictions
Ensemble Methods in Data Mining: Improving Accuracy Through Combining Predictions

Ensemble methods have been called the most influential development in Data Mining and Machine Learning in the past decade. They combine multiple models into one usually more accurate than the best of its components. Ensembles can provide a critical boost to industrial challenges -- from investment timing to drug discovery, and fraud detection...

The Audit Committee Handbook
The Audit Committee Handbook

The Audit Committee Handbook,

Fifth Edition

The classic handbook to audit committee responsibilities—completely updated to cover the latest guidance with practical insights on the new functions of the audit committee.

Now containing the newest regulatory guidance impacting audit committees, including new...

Principles of Cybercrime
Principles of Cybercrime

We live in a digital age. The proliferation of digital technology, and the convergence of computing and communication devices, has transformed the way in which we socialise and do business. While overwhelmingly positive, there has also been a dark side to these developments. Proving the maxim that crime follows opportunity, virtually every...

ESP, Psychokinesis, and Psychics
ESP, Psychokinesis, and Psychics

Many people have experienced psi, whether as a sense of having been in a place before (deja vu), hearing a voice in their head that gave them guidance, or following their intuition. For some, these events can be attributed to coincidence, but for psychics, such episodes occur more frequently and intensely, often manifesting in dreams,...

Visual Data Mining: Techniques and Tools for Data Visualization and Mining
Visual Data Mining: Techniques and Tools for Data Visualization and Mining

Business intelligence solutions transform business data into conclusive, fact-based, and actionable information and enable businesses to spot customer trends, create customer loyalty, enhance supplier relationships, reduce financial risk, and uncover new sales opportunities. The goal of business intelligence is to make sense of change-to...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Secure Coding in C and C++
Secure Coding in C and C++

"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append...

Machine Learning and Security: Protecting Systems with Data and Algorithms
Machine Learning and Security: Protecting Systems with Data and Algorithms

Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you’ll explore ways to apply machine learning to security...

Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy