Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Biometric User Authentication for IT Security: From Fundamentals to Handwriting (Advances in Information Security)
Biometric User Authentication for IT Security: From Fundamentals to Handwriting (Advances in Information Security)
Biometric user authentication techniques have evoked an enormous interest by science, industry and society in the recent past. Scientists and developers have constantly pursued the technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans. Many biometric...
HP-UX 11i Internals (Hewlett-Packard Professional Books)
HP-UX 11i Internals (Hewlett-Packard Professional Books)
HP-UX under the hood: practical insight for optimization and troubleshooting

To maximize the performance, efficiency, and reliability of your HP-UX sysem, you need to know what's going on under the hood. HP-UX 11i Internals goes beyond generic UNIX internals, showing exactly how HP-UX works in PA-RISC environments.

HP experts...

Domain Architectures : Models and Architectures for UML Applications
Domain Architectures : Models and Architectures for UML Applications
The last two decennia have witnessed many advances in the area of software
development. The advent of object-oriented programming languages and modelling
languages such as Unified Modeling Language (UML) has increased our ability
as developers to design and realize large and enterprise-wide software systems.
However, software
...
Process-Driven Applications with BPMN
Process-Driven Applications with BPMN

How can we optimize differentiating business processes and exploit their full potential? Here Volker Stiehl provides answers, utilizing the various options that the BPMN (Business Process Model and Notation) standard offers for planning, implementing and monitoring processes.

The book presents an approach for implementing an...

A Theory of Distributed Objects
A Theory of Distributed Objects

Distributed and communicating objects are becoming ubiquitous. In global, Grid and Peer-to-Peer computing environments, extensive use is made of objects interacting through method calls. So far, no general formalism has been proposed for the foundation of such systems.

Caromel and Henrio are the first to define a calculus for distributed...

Access to Knowledge in the Age of Intellectual Property
Access to Knowledge in the Age of Intellectual Property

At the end of the twentieth century, intellectual property rights collided with everyday life. Expansive copyright laws and digital rights management technologies sought to shut down new forms of copying and remixing made possible by the Internet. International laws expanding patent rights threatened the lives of millions of people around the...

ITIL Service Operation 2011 Edition (Best Management Practices)
ITIL Service Operation 2011 Edition (Best Management Practices)

The ITIL Editions 2011 has been updated for clarity, consistency, correctness and completeness. By focusing on delivery and control process activities, ITIL Service Operation describes how a highly desirable steady state of managing services can be achieved on a day-to-day basis. Key Features The updated ITIL publications share a similar...

Information Modeling for Internet Applications
Information Modeling for Internet Applications

Different kinds of objects containing data are found on the Internet, including structured (e.g., relational) databases, collections of documents, and search engines. On the one hand, creating, storing, manipulating, and retrieving Internet documents can benefit from techniques known from the databases and data modeling...

C++ Design Patterns and Derivatives Pricing (Mathematics, Finance and Risk)
C++ Design Patterns and Derivatives Pricing (Mathematics, Finance and Risk)
'This is a short book, but an elegant one. It would serve as an excellent course text for a course on the practical aspects of mathematical finance.' International Statistical Institute

'This book is thought-provoking and rewarding. Even for the less experienced programmer, the presentation is readily accessible, and the coded examples
...
ITIL Service Strategy 2011 Edition
ITIL Service Strategy 2011 Edition

The ITIL 2011 Editions have been updated for clarity, consistency, correctness and completeness. ITIL Service Strategy provides a view of ITIL that aligns business and IT so that each brings out the best in the other. It ensures that every stage of the service lifecycle stays focused on the business case and relates to all the companion...

Atari Roots
Atari Roots
Many books have been written about 6502 assembly language. But this book is different in several important ways. Until now, there have been two main kinds of books about 6502 assembly language. There are generic books that make no mention of Atari computers, and there are reference books that...
Context-Aware Pervasive Systems: Architectures for a New Breed of Applications
Context-Aware Pervasive Systems: Architectures for a New Breed of Applications

The concept of aware systems is one of the most exciting trends in computing today, fueled by recent developments in pervasive computing. This book introduces a new breed of computer applications that are termed "context-aware pervasive systems" and provides architectural blueprints for building context-aware behavior into...

unlimited object storage image
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy