Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Database Security: Applications and Trends
Handbook of Database Security: Applications and Trends
Database security has been gaining a great deal of importance as industry, military, and government organizations have increasingly adopted Internet-based technologies on a large-scale, because of convenience, ease of use, and the ability to take advantage of rapid advances in the commercial market. Along with the traditional security aspects of...
Understanding DB2 9 Security
Understanding DB2 9 Security
Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world...
Building the E-Service Society: E-Commerce, E-Business, and E-Government (IFIP International Federation for Information Processing)
Building the E-Service Society: E-Commerce, E-Business, and E-Government (IFIP International Federation for Information Processing)
Building the E-Service Society is a state-of-the-art book which deals with innovative trends in communication systems, information processing, and security and trust in electronic commerce, electronic business, and electronic government. It comprises the proceedings of I3E2004, the Fourth International Conference on E-Commerce,...
Biometric Recognition: Challenges and Opportunities
Biometric Recognition: Challenges and Opportunities

Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric...

Who's Afraid of AI?: Fear and Promise in the Age of Thinking Machines
Who's Afraid of AI?: Fear and Promise in the Age of Thinking Machines
A penetrating guide to artificial intelligence: what it is, what it does, and how it will change our lives

At a breathtaking pace, artificial intelligence is getting better and faster at making complex decisions. AI can already identify malignant tumors on CT scans, give legal advice, out-bluff the best
...
Podcasting For Dummies
Podcasting For Dummies

Got something to say? It's easy with a podcast!

Subscribe to podcasts, put together your own, and build a fan base

Podcasting really is twenty-first century communication, and you can be a part of it! This book gives you the scoop on listening to, producing, and distributing podcasts, points you toward the best...

Natural language communication with computers (Lecture notes in computer science)
Natural language communication with computers (Lecture notes in computer science)

In recent years in numerous countries, attempts have been made to   develop natural language systems of communication with computers.

This research has been initiated by well-known research institutes sponsored often by government research programs.

This publication should facilitate an exchange of information,...

The Weed Runners: Travels with the Outlaw Capitalists of America's Medical Marijuana Trade
The Weed Runners: Travels with the Outlaw Capitalists of America's Medical Marijuana Trade


Make no mistake: the US government’s hundred-year-old war on marijuana isn’t over. Some 20 million Americans have been arrested on marijuana charges so far. The American marijuana industry remains underground, where modern-day moonshiners who view themselves as...

Federal Cloud Computing: The Definitive Guide for Cloud Service Providers
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers

Federal Cloud Computing: The Definitive Guide for Cloud Service Providers offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation.

You will learn the basics of...

Network Attacks and Exploitation: A Framework
Network Attacks and Exploitation: A Framework

Incorporate offense and defense for a more effective network security strategy

Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate...

Emotional Engineering vol. 2
Emotional Engineering vol. 2

In an age of increasing complexity, diversification and change, customers expect services that cater to their needs and to their tastes. Emotional Engineering vol 2. describes how their expectations can be satisfied and managed throughout the product life cycle, if producers focus their attention more on emotion. Emotional engineering...

The Electrical Engineering Handbook, First Edition
The Electrical Engineering Handbook, First Edition
The purpose of The Electrical Engineering Handbook is to provide a comprehensive reference work covering the broad spectrum of electrical engineering in a single volume. It is written and developed for the practicing electrical engineers in industry, government, and academia. The goal is to provide the most up-to-date information in classical...
unlimited object storage image
Result Page: 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy