Home | Amazing | Today | Tags | Publishers | Years | Search 
Managing Business Risk: A Practical Guide to Protecting Your Business
Managing Business Risk: A Practical Guide to Protecting Your Business
The balance between risk and reward is the very essence of business: you have to take risks in order to generate returns and, generally speaking, higher returns involve greater risks. However, there is a difference between risks taken as a result of careful judgement and those taken unwittingly.

In a world of
...
Real-Time Systems Design and Analysis: Tools for the Practitioner
Real-Time Systems Design and Analysis: Tools for the Practitioner

The leading text in the field explains step by step how to write software that responds in real time

From power plants to medicine to avionics, the world increasingly depends on computer systems that can compute and respond to various excitations in real time. The Fourth Edition of Real-Time Systems Design and...

Optical Network Control: Architecture, Protocols, and Standards
Optical Network Control: Architecture, Protocols, and Standards

Optical Network Control is the first expert guide and single-source reference for controlling and managing optical networks. This book fills the gap between optical network engineering and routing/signaling-helping both optical and IP professionals build networks that are more robust, flexible, manageable, and profitable. Coverage includes:...

Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols
Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications,...

OpenCV Computer Vision with Python
OpenCV Computer Vision with Python

This book will show you how to use OpenCVs Python bindings to capture video, manipulate images, and track objects with either a normal webcam or a specialized depth sensor, such as the Microsoft Kinect. OpenCV is an open source, cross-platform libran' that provides building blocks for computer vision experiments and applications. It...

Thinking Objects: Contemporary Approaches to Product Design
Thinking Objects: Contemporary Approaches to Product Design
Thinking Objects: Contemporary Approaches to Product Design explores the many approaches designers take to their work, deconstructing the design process. How do objects “communicate” to us? This book reveals how designers can learn to read the signals an object sends, interpret meaning, and discover historical context, and...
Creative Project Management
Creative Project Management

The seven essential tools for keeping projects on time and under budget

You're executing risk management, leadership, and planning--all hallmarks of outstanding project management. And yet you're still having trouble keeping your projects on schedule.

Creative Project Management adds two new elements to...

Model Reduction for Circuit Simulation (Lecture Notes in Electrical Engineering)
Model Reduction for Circuit Simulation (Lecture Notes in Electrical Engineering)

Simulation based on mathematical models plays a major role in computer aided design of integrated circuits (ICs). Decreasing structure sizes, increasing packing densities and driving frequencies require the use of refined mathematical models, and to take into account secondary, parasitic effects. This leads to very high dimensional problems...

Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard
Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard

Cybercrime Investigation Case Studies is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real cases. Using a variety of case types,...

Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects
Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects

Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify...

Foundations of Multidimensional and Metric Data Structures (The Morgan Kaufmann Series in Computer Graphics)
Foundations of Multidimensional and Metric Data Structures (The Morgan Kaufmann Series in Computer Graphics)

The field of multidimensional data structures is large and growing very quickly. Here, for the first time, is a thorough treatment of multidimensional point data, object and image-based representations, intervals and small rectangles, and high-dimensional datasets. The book includes a thorough introduction; a comprehensive survey to spatial...

Smart Card Handbook
Smart Card Handbook

The most comprehensive book on state-of-the-art smart card technology available

Updated with new international standards and specifications, this essential fourth edition now covers all aspects of smart card in a completely revised structure. Its enlarged coverage now includes smart cards for passports and ID cards, health...

Result Page: 263 262 261 260 259 258 257 256 255 254 253 252 251 250 249 248 247 246 245 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy