Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CISSP(r): Certified Information Systems Security Professional Study Guide, 2nd Edition
CISSP(r): Certified Information Systems Security Professional Study Guide, 2nd Edition
Here's the book you need to prepare for the challenging CISSP exam from (ISC)2. This revised edition was developed to meet the exacting requirements of today's security certification candidates. In addition to the consistent and accessible instructional approach that earned...
Electronic Monitoring in the Workplace: Controversies and Solutions
Electronic Monitoring in the Workplace: Controversies and Solutions

Due to the use of new technologies, coupled with the fact that there is an increasing amount of work being done online, whether on the Internet, intranets, LANs or other networks, extensive employee monitoring by employers is inexpensive and easy. Employers have legitimate concerns about the efficiency of their employees and the quality of the...

Data Compression: The Complete Reference
Data Compression: The Complete Reference
Giambattista della Porta, a Renaissance scientist, was the author in 1558 of Magia Naturalis (Natural Magic), a book in which he discusses many subjects, including demonology, magnetism, and the camera obscura. The book mentions an imaginary device that has since become known as the “sympathetic telegraph.” This device was to have...
Mrs. Lirriper's Lodgings [EasyRead Edition]
Mrs. Lirriper's Lodgings [EasyRead Edition]
"Mrs. Lirriper's Lodging" unwaveringly presents Charles Dickens' idealistic approach. It tells the story of an affectionate, humanistic lady Mrs. Emma Lirriper. She has come out of the pit of suffering and distress with new optimistic vision. The story beautifully intertwines the themes of humanism, faith in the final outcome of human...
Beginning Cryptography with Java
Beginning Cryptography with Java
Beginning Cryptography with Java

While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications—if you know how.

This book teaches you how. Chapters one through...

Advances in Evolutionary Algorithms: Theory, Design and Practice
Advances in Evolutionary Algorithms: Theory, Design and Practice
The goal of this book is to develop efficient optimization algorithms to solve diverse real-world problems of graded difficulty. Genetic and evolutionary mechanisms have been deployed for reaching the goal.

This book has made five significant contributions in the realm of genetic and evolutionary computation (GEC).

Practical
...
Hybrid Intelligent Systems for Pattern Recognition Using Soft Computing: An Evolutionary Approach for Neural Networks and Fuzzy Systems
Hybrid Intelligent Systems for Pattern Recognition Using Soft Computing: An Evolutionary Approach for Neural Networks and Fuzzy Systems
We describe in this book, new methods for intelligent pattern recognition using soft computing techniques. Soft Computing (SC) consists of several computing paradigms, including fuzzy logic, neural networks, and genetic algorithms, which can be used to produce powerful hybrid intelligent systems for pattern recognition. Hybrid intelligent systems...
Current Topics in Aritficial Intelligence (Lecture Notes Series)
Current Topics in Aritficial Intelligence (Lecture Notes Series)
The Spanish Association for Artificial Intelligence (AEPIA) was founded in 1983 aiming to encourage the development of artificial intelligence in Spain. AEPIA is a member of the ECCAI (European Co-ordinating Committee for Artificial Intelligence) and a founder member of IBERAMIA, the Iberoamerican Conference on Artificial Intelligence. Under the...
Enterprise Information Systems: 8th International Conference, ICEIS 2006, Paphos, Cyprus, May 23-27, 2006, Revised
Enterprise Information Systems: 8th International Conference, ICEIS 2006, Paphos, Cyprus, May 23-27, 2006, Revised
This book contains the carefully selected best papers of the 8th International Conference on Enterprise Information Sysetms, ICEIS 2006, held in Paphos, Cyprus, in May 2006.

The 4 invited papers and 27 revised and selected papers presented in this volume cover different aspects related to enterprise computing. They were selected from 63...

Advanced Project Portfolio Management and the PMO: Multiplying ROI at Warp Speed
Advanced Project Portfolio Management and the PMO: Multiplying ROI at Warp Speed

This comprehensive book covers the strategy, tactics, and processes needed for successful project portfolio management. It outlines a road map to unprecedented project management improvement and includes a detailed implementation plan for both strategic planning and a PMO that gives you measurable results in weeks. The author delineates four...

Computational Complexity: A Conceptual Perspective
Computational Complexity: A Conceptual Perspective
This book offers a comprehensive perspective to modern topics in complexity theory, which is a central field of the theoretical foundations of computer science. It addresses the looming question of what can be achieved within a limited amount of time with or without other limited natural computational resources. Can be used as an introduction for...
Visual Effects in A Digital World: A Comprehensive Glossary of over 7,000 Visual Effects Terms
Visual Effects in A Digital World: A Comprehensive Glossary of over 7,000 Visual Effects Terms
"Extensive, exhaustive, complete...Half the terms I didn't know! Every studio exec, director, producer, student and journalist should read this book cover to cover!"
Scott Ross, Co-Founder/CEO, Digital Domain

"An indispensable tool for anyone working in the visual effects medium today."
Marty Cohen, Post
...
unlimited object storage image
Result Page: 814 813 812 811 810 809 808 807 806 805 804 803 802 801 800 799 798 797 796 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy