Home | Amazing | Today | Tags | Publishers | Years | Search 
Biometrics: Theory, Methods, and Applications (IEEE Press Series on Computational Intelligence)
Biometrics: Theory, Methods, and Applications (IEEE Press Series on Computational Intelligence)

An in-depth examination of the cutting edge of biometrics

This book fills a gap in the literature by detailing the recent advances and emerging theories, methods, and applications of biometric systems in a variety of infrastructures. Edited by a panel of experts, it provides comprehensive coverage of:

Seven Deadliest Social Network Attacks (Syngress Seven Deadliest Attacks)
Seven Deadliest Social Network Attacks (Syngress Seven Deadliest Attacks)

Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your...

GlassFish Security
GlassFish Security

Security was, is, and will be one of the most important aspects of Enterprise Applications and one of the most challenging areas for architects, developers, and administrators. It is mandatory for Java EE application developers to secure their enterprise applications using Glassfish security features.

Learn to secure Java EE...

Worldmark Encyclopedia of Cultures and Daily Life
Worldmark Encyclopedia of Cultures and Daily Life

Th e Worldmark Encyclopedia of Cultures and Daily Life, Second Edition, contains over 500 articles exploring the ways of life of peoples of the world. Arranged in fi ve volumes by geographic regions—Africa, Americas, Asia & Oceania (two volumes), and Europe—the volumes of this encyclopedia parallel the organization of its...

Mechanical Science: v. II
Mechanical Science: v. II

The syllabus of Mechanical Science-II as designed by WBUT explains the important Chapters of Thermodynamics and Fluid Mechanics. The book covers all the topics of the syllabus in a well explained and easily understandable manner to the students. In addition to this, many numerical examples have been worked out for each chapter. Multiple...

Computer Crime, Investigation, and the Law
Computer Crime, Investigation, and the Law

One can hardly open a newspaper or read news online without seeing another story about a computer-related crime. We are awash in identity theft, online child predators, and even cyber espionage. It seems overwhelming. And people in many different professions find themselves involved with computer-crime investigations. Obviously,...

CSS Detective Guide: Tricks for solving tough CSS mysteries, The
CSS Detective Guide: Tricks for solving tough CSS mysteries, The

One of the toughest challenges novice CSS developers face is when seemingly perfect code doesn’t translate into a perfectly rendered browser page—and with all the different browsers available today, this happens all too often. The CSS Detective Guide aims to help, by teaching real world troubleshooting skills. You’ll...

Cyberthreats: The Emerging Fault Lines of the Nation State
Cyberthreats: The Emerging Fault Lines of the Nation State

As new technologies develop, terrorist groups are developing new methods of attack by using the Internet, and by using cyberspace as a battlefield, it has become increasingly difficult to discover the identity of attackers and bring them to justice. The seemingly limitless boundaries of cyberspace has allowed virtually anyone to launch an...

The Facebook Era: Tapping Online Social Networks to Build Better Products, Reach New Audiences, and Sell More Stuff
The Facebook Era: Tapping Online Social Networks to Build Better Products, Reach New Audiences, and Sell More Stuff

“People in all demographics and regions of the world are more connected than ever before to the products, issues, places, and individuals in their lives. This book recognizes that we’ve come to a place where people can represent their real identity--both personal and professional--and use the social filters...

Web Form Design: Filling in the Blanks
Web Form Design: Filling in the Blanks

Forms make or break the most crucial online interactions: checkout, registration, and any task requiring information entry. In Web Form Design, Luke Wroblewski draws on original research, his considerable experience at Yahoo! and eBay, and the perspectives of many of the field's leading designers to show you everything you need to know...

Elements of Computer Security (Undergraduate Topics in Computer Science)
Elements of Computer Security (Undergraduate Topics in Computer Science)

As our society grows ever more reliant on computers, so it also becomes more vulnerable to computer crime. Cyber attacks have been plaguing computer users since the 1980s, and computer security experts are predicting that smart telephones and other mobile devices will also become the targets of cyber security threats in the future.

...

The Facebook Effect: The Inside Story of the Company That Is Connecting the World
The Facebook Effect: The Inside Story of the Company That Is Connecting the World

IN LITTLE MORE THAN HALF A DECADE, Facebook has gone from a dorm-room novelty to a company with 500 million users. It is one of the fastest growing companies in history, an essential part of the social life not only of teenagers but hundreds of millions of adults worldwide. As Facebook spreads around the globe, it creates surprising...

Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy