Use this practical, hands-on guide to get started with ProcessMaker. The book provides clear steps for you to walk through and set up ProcessMaker on your own system and make processes run faster and smarter. You will model and build a complete business process for requesting, approving, and reporting expenses.
The only book available on the market that addresses and discusses in-depth forensic analysis of Windows systems. Windows Forensic Analysis DVD Toolkit takes the reader to a whole new, undiscovered level of forensic analysis for Windows systems, providing unique information and resources not available anywhere else. This book covers both live and...
The Algorithms such as SVD, Eigen decomposition, Gaussian Mixture Model, HMM etc. are scattered in different fields. There is the need to collect all such algorithms for quick reference. Also there is the need to view such algorithms in application point of view. Algorithm Collections for Digital Signal Processing Applications using MATLAB...
The chapters in this volume were presented at the July–August 2006 NATO
Advanced Study Institute on Imaging for Detection and Identification. The
conference was held at the beautiful Il Ciocco resort near Lucca, in the glorious
Tuscany region of northern Italy. For the eighth time we gathered at this
idyllic spot to explore and...
Pass the CISSP and ISSEP exams with this new edition of the bestselling prep guide!
The U.S. government has mandated that all contractors–nearly all current CISSPs, and those yet to be certified as CISSPs–attain the security engineering subject certification Information Systems Security Engineering Professional (ISSEP). The ISSEP...
Today government agencies not only have official Web sites but also sponsor moderated chats, blogs, digital video clips, online tutorials, videogames, and virtual tours of national landmarks. Sophisticated online marketing campaigns target citizens with messages from the government—even as officials make news with digital gaffes involving...
In the dramatic few years when colonial Americans were galvanized to resist British rule, perhaps nothing did more to foment anti-British sentiment than the armed occupation of Boston. As If an Enemy's Country is Richard Archer's gripping narrative of those critical months between October 1, 1768 and the winter of 1770 when Boston was...
Learn to design, implement, measure, and improve DevOps programs that are tailored to your organization. This concise guide assists leaders who are accountable for the rapid development of high-quality software applications.
In DevOps for Digital Leaders, deep collective experience on both...
How manufacturing textiles and guns transformed the United States from colonial dependent to military power.
In 1783, the Revolutionary War drew to a close, but America was still threatened by enemies at home and abroad. The emerging nation faced tax rebellions, Indian warfare, and hostilities with France and...
Security continues to be the predominant concern for any organization that is either on the Internet now or considering it. Nary a week passes where there isn't some new report of hackers breaking into computer systems at some government agency, or trashing some Fortune 500 company's Web site, or even stealing user passwords and credit card...
The purpose of The Electrical Engineering Handbook, 3rd Edition is to provide a ready reference for the
practicing engineer in industry, government, and academia, as well as aid students of engineering. The third
edition has a new look and comprises six volumes including:
Circuits, Signals, and Speech and Image Processing...
This comparative text provides an understanding of major world criminal justice systems by discussing and comparing the systems of six of the world's countries: England, France, Russia, China, Japan, and a new chapter on South Africa -- each representative of a different type of legal system. An additional chapter on Islamic law uses...