Home | Amazing | Today | Tags | Publishers | Years | Search 
Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The wide variety of methods used in terrorism informatics are...
Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks (Wiley Series on Parallel and Distributed Computing)
Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks (Wiley Series on Parallel and Distributed Computing)
Learn the fundamental algorithms and protocols for wireless and mobile ad hoc networks

Advances in wireless networking and mobile communication technologies, coupled with the proliferation of portable computers, have led to development efforts for wireless and mobile ad hoc networks. This book focuses on several aspects of wireless ad hoc...

Artificial Vision: Image Description, Recognition, and Communication (Signal Processing and its Applications)
Artificial Vision: Image Description, Recognition, and Communication (Signal Processing and its Applications)
Artificial vision is a rapidly growing discipline, aiming to build computational models of the visual capabilites in humans, as well as the machines that emulate them. Recent research work suggests that vision is a complex functionality, involving active sensing and attentional mechanisms, and is strictly related to cognitive processes like...
Light-Emitting Diodes
Light-Emitting Diodes
'Light-Emitting Diodes is an excellent examination of the physics and technology of semiconductor LEDs. The narration is simple and direct, and the book is well referenced for those seeking a deeper understanding of the topic.' Physics Today

Revised and fully up-dated, the second edition of this graduate textbook offers a
...
Implementing 802.1X Security Solutions for Wired and Wireless Networks
Implementing 802.1X Security Solutions for Wired and Wireless Networks
When deploying a wireless or wired network, you must ensure that proper security safeguards are put in place. An enterprise, for example, often has valuable resources stored inside databases that are attached to the network. Using passwords to access specific applications is usually not good enough to keep hackers from accessing the resources in an...
Wireless Security: Know It All
Wireless Security: Know It All
The latest technologies - the leading experts - proven real-world design solutions - together in one must-have volume!

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and
...
Practical Database Programming with Visual Basic.NET
Practical Database Programming with Visual Basic.NET
Unlike most other database programming books, which discuss and present database programming techniques through huge blocks of programming code, this book uses a unique writing style to show readers how to develop professional and practical database programs using Visual Basic.NET 2005 Design Tools and Wizards related to ADO.NET 2.0, and to apply...
Digital Integrated Circuits: Analysis and Design
Digital Integrated Circuits: Analysis and Design
This is a well-written solid engineering oriented book … an excellent book for a first course which concentrates on digital electronics at the transistor level.
-IEEE Circuits and Systems Magazine, Vol. 4, No. 4, 2004

…Ayers discusses a wide range of topics-each properly arranged, concisely explained, and clearly
...
Electric Power System Basics for the Nonelectrical Professional (IEEE Press Series on Power Engineering)
Electric Power System Basics for the Nonelectrical Professional (IEEE Press Series on Power Engineering)

A clear and easy-to-follow overview of power system technology for nonelectrical professionals

This book explains the essentials of interconnected electric power systems in very basic, practical terms, giving a comprehensible overview of the terminology, electrical concepts, design considerations, construction practices, operational...

Modern Cryptology: A Tutorial (Lecture Notes in Computer Science)
Modern Cryptology: A Tutorial (Lecture Notes in Computer Science)

The present work grew out of lecture notes I prepared for a Vh hour tutorial that I was invited to give at the 29th IEEE Computer Conference (CompCon) in San Francisco on February 27, 1987. I have just completed a substantial update of the material, including the addition of several topics. My main purpose is to provide a...

Data Structures and Problem Solving Using Java (3rd Edition)
Data Structures and Problem Solving Using Java (3rd Edition)

T^his book is designed for a two-semester sequence in computer science, beginning with what is typically known as Data Structures and continuing with advanced data structures and algorithm analysis. It is appropriate for the courses from both the two-course and three-course sequences in "B.l...

Advanced Statistical Steganalysis (Information Security and Cryptography)
Advanced Statistical Steganalysis (Information Security and Cryptography)

Steganography and steganalysis, the hiding and detection of a covert payload within an innocent cover object, started to receive attention from the computer science, engineering, and mathematics communities in the 1990s. At first the problems were not clearly defined, but proper statistical foundations were proposed and mathematical...

Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy