Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hack Proofing Your Identity
Hack Proofing Your Identity
The use of a seal, card, or other identification while making a purchase or signing
a contract is a custom almost as old as history. As merchants and their customers
have begun using the Internet in recent years to conduct business online, they
have been challenged to find digital forms of identification that mimic traditional,...
Encyclopedia of Communities of Practice in Information and Knowledge Management
Encyclopedia of Communities of Practice in Information and Knowledge Management
"This encyclopedia has a breadth and depth that makes it a valuable reference work for anyone." --Prof. Miles Nicholls, RMIT University, Australia

The Encyclopedia of Communities of Practice in Information and Knowledge Management is the leading reference source for dynamic and innovative research in the field of
...
Advanced Pattern Recognition Technologies with Applications to Biometrics (Premier Reference Source)
Advanced Pattern Recognition Technologies with Applications to Biometrics (Premier Reference Source)
With the increasing concerns on security breaches and transaction fraud, highly reliable and convenient personal verification and identification technologies are more and more requisite in our social activities and national services. Biometrics, used to recognize the identity of an individual, are gaining ever-growing popularity in an extensive...
Reasoning in Event-Based Distributed Systems (Studies in Computational Intelligence)
Reasoning in Event-Based Distributed Systems (Studies in Computational Intelligence)

Event-based distributed systems are playing an ever increasing role in areas such as enterprise management, information dissemination, finance, environmental monitoring and geo-spatial systems. Event-based processing originated with the introduction of Event-Condition-Action (ECA) rules to database systems in the 1980s. Since then,...

Cyberbullying Prevention and Response: Expert Perspectives
Cyberbullying Prevention and Response: Expert Perspectives

Just as the previous generation was raised in front of televisions, adolescents at the turn of the 21st century are being raised in an internet-enabled world where blogs, social networking, and instant messaging are competing with face-to-face and telephone communication as the dominant means through which personal interaction takes place....

Biometrics for Network Security
Biometrics for Network Security

The complete guide to implementing biometric security solutions for your network

Network security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate." Newspaper headlines are routinely peppered with incidents of hackers thwarting the security put forth by...

Simulated Annealing and Boltzmann Machines: A Stochastic Approach to Combinatorial Optimization and Neural Computing
Simulated Annealing and Boltzmann Machines: A Stochastic Approach to Combinatorial Optimization and Neural Computing

Wiley-Interscience Series in Discrete Mathematics and Optimization Advisory Editors Ronald L. Graham Jan Karel Lenstra Robert E. Tarjan Discrete Mathematics and Optimization involves the study of finite structures. It is one of the fastest growing areas in mathematics today. The level and depth of recent advances in the area and the wide...

Intellectual Property Protection in VLSI Design: Theory and Practice
Intellectual Property Protection in VLSI Design: Theory and Practice
The development and implementation of intellectual property (IP) protection mechanisms is of crucial importance for the emerging reuse-based system design methodology. Maybe even more importantly, it is such an elegant scientific and engineering challenge that it has drawn a lot of attention from academia and industry in recent years....
Emerging Web Services Technology, Volume II (Whitestein Series in Software Agent Technologies and Autonomic Computing)
Emerging Web Services Technology, Volume II (Whitestein Series in Software Agent Technologies and Autonomic Computing)
This 2nd volume on Emerging Web Services Technologies continues to follow the current research activities in the areas of Web Services and Service Oriented Architectures. By collecting the proceedings of the second Workshop of Emerging Web Services Technology 2007 it contains many examples of promising research activities...
Information Security for Automatic Speaker Identification
Information Security for Automatic Speaker Identification
Speaker identification is a widely used technique in several security systems. In remote access systems, speaker utterances are recoded and communicated through a communication channel to a receiver that performs the identification process. Speaker identification is based on characterizing each speaker with a set of features...
Engineering Design, Planning, and Management
Engineering Design, Planning, and Management

Engineering Design, Planning and Management covers engineering design methodology with an interdisciplinary approach, concise discussions, and a visual format. The book covers the product design process in the context of both established companies and entrepreneurial start-ups. Readers will discover the usefulness of the design process...

Transactions on Aspect-Oriented Software Development III (Lecture Notes in Computer Science)
Transactions on Aspect-Oriented Software Development III (Lecture Notes in Computer Science)
The LNCS Journal "Transactions on Aspect-Oriented Software Developmen"t is devoted to all facets of aspect-oriented software development (AOSD) techniques in the context of all phases of the software life cycle, from requirements and design to implementation, maintenance and evolution. The focus of the journal is on approaches for...
unlimited object storage image
Result Page: 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy