Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Strategic Computing: DARPA and the Quest for Machine Intelligence, 1983-1993 (History of Computing)
Strategic Computing: DARPA and the Quest for Machine Intelligence, 1983-1993 (History of Computing)
This is the story of an extraordinary effort by the U.S. Department of Defense to hasten the advent of "machines that think." From 1983 to 1993, the Defense Advanced Research Projects Agency (DARPA) spent an extra $1 billion on computer research aimed at achieving artificial intelligence. The Strategic Computing Initiative (SCI) was...
Cybersecurity Law
Cybersecurity Law

A definitive guide to cybersecurity law

Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information...

Biometrics for Network Security
Biometrics for Network Security

The complete guide to implementing biometric security solutions for your network

Network security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate." Newspaper headlines are routinely peppered with incidents of hackers thwarting the security put forth by...

Linux Security: Craig Hunt Linux Library
Linux Security: Craig Hunt Linux Library
Authoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators

This is the most complete, most advanced guide to Linux security you’ll find anywhere. Written by a Linux security expert with over a decade of experience, Linux Security teaches you, step-by-step, all the...

Learning OpenCV: Computer Vision with the OpenCV Library
Learning OpenCV: Computer Vision with the OpenCV Library
Learning OpenCV puts you right in the middle of the rapidly expanding field of computer vision. Written by the creators of OpenCV, the widely used free open-source library, this book introduces you to computer vision and demonstrates how you can quickly build applications that enable computers to "see" and make decisions based on the...
Learning SQL Server 2008 Reporting Services
Learning SQL Server 2008 Reporting Services

Microsoft SQL Server Reporting Services 2008 is the third generation Microsoft reporting software that is more tightly integrated with SQL Server 2008 than ever before. It provides a complete server-based platform that is designed to support a wide variety of reporting needs, including managed enterprise reporting, special purpose reporting,...

Architecture of Network Systems (The Morgan Kaufmann Series in Computer Architecture and Design)
Architecture of Network Systems (The Morgan Kaufmann Series in Computer Architecture and Design)

Data communication networks are widely used today and are an integral part of our daily life. The Internet is a medium for business, personal, and government communication, and it is difficult to envision today’s society without this essential infrastructure. The continued success of the Internet is dependent on our ability to...

Demystifying Smart Cities: Practical Perspectives on How Cities Can Leverage the Potential of New Technologies
Demystifying Smart Cities: Practical Perspectives on How Cities Can Leverage the Potential of New Technologies

The concept of Smart Cities is accurately regarded as a potentially transformative power all over the world. Bustling metropolises infused with the right combination of the Internet of Things, artificial intelligence, big data, and blockchain promise to improve both our daily lives and larger structural operations at a city...

Information Systems Development: Asian Experiences
Information Systems Development: Asian Experiences

Information Systems Development (ISD) progresses rapidly, continually creating new challenges for the professionals involved. New concepts, approaches and techniques of systems development emerge constantly in this field. Progress in ISD comes from research as well as from practice.

This conference will discuss issues pertaining to...

Advanced Negotiation Techniques
Advanced Negotiation Techniques

Advanced Negotiation Techniques provides a wealth of material in a winning combination of practical experience and good research to give you a series of tools, techniques, and real-life examples to help you achieve your negotiation...

Republic of Lies: American Conspiracy Theorists and Their Surprising Rise to Power
Republic of Lies: American Conspiracy Theorists and Their Surprising Rise to Power

A riveting tour through the landscape and meaning of modern conspiracy theories, exploring the causes and tenacity of this American malady, from Birthers to Pizzagate and beyond.

American society has always been fertile ground for conspiracy theories, but with the election of Donald Trump, previously
...

Computer Privacy Annoyances
Computer Privacy Annoyances

From the moment you're born, you enter the data stream-from birth certificates to medical records to what you bought on Amazon last week. As your dossier grows, so do the threats, from identity thieves to government snoops to companies who want to sell you something. Computer Privacy Annoyances...

unlimited object storage image
Result Page: 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy