Home | Amazing | Today | Tags | Publishers | Years | Search 
Pattern Recognition, Second Edition
Pattern Recognition, Second Edition
Pattern recognition is becoming increasingly important in the age of automation and information handling and retrieval.
This book provides the most comprehensive treatment available of pattern recognition, from an engineering perspective. Developed through more than ten years of teaching experience, Pattern Recognition is appropriate for both
...
Ubiquitous and Pervasive Knowledge and Learning Management: Semantics, Social Networking and New Media to Their Full Potential
Ubiquitous and Pervasive Knowledge and Learning Management: Semantics, Social Networking and New Media to Their Full Potential
The importance of semantics has been recognized in different areas of data and information management, including better access, exchange, interoperability, integration, and analysis of data. Semantics of data is about associating meaning to data, understanding what data represents, and improving the value of data. Ubiquitous and Pervasive...
OS X Exploits and Defense
OS X Exploits and Defense
Long believed to be a sanctuary of computer security, the Macintosh OS X operating system is increasingly under fire, making it as vulnerable to attack as Windows or Linux operating systems.

Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an
...
Strategies for Information Technology and Intellectual Capital
Strategies for Information Technology and Intellectual Capital
"Due to the increasing importance of the intangible assets of a company, firms are now concerned with how best to manage and measure knowledge and other intangibles. In addition to this, information technology has drastically changed the way these measurements are managed. Strategies for Information Technology and Intellectual Capital:...
A Distributed Pi-Calculus
A Distributed Pi-Calculus
Distributed systems are fast becoming the norm in computer science. Formal mathematical models and theories of distributed behavior are needed in order to understand them. This book proposes a distributed pi-calculus called Dpi, for describing the behavior of mobile agents in a distributed world. It is based on an existing formal language, the...
Technology Enhanced Learning: Best Practices (Knowledge and Learning Society Books)
Technology Enhanced Learning: Best Practices (Knowledge and Learning Society Books)
With the shift towards the knowledge society, the change of working conditions, and the high-speed evolution of information and communication technologies, peoples' knowledge and skills need continuous updating. Learning based on collaborative working, creativity, multidisciplinarity, adaptiveness, intercultural communication, and problem solving...
Local Area Network Management, Design & Security
Local Area Network Management, Design & Security
Most workplaces rely on local area networks (LANs) to connect their computers and the right LAN is increasingly important in promoting effective communication both within the organisation and with the world at large.

Local Area Network Management, Design and Security is a practical and thorough introduction to managing and
...
Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques
Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques
This book - in conjunction with the two volumes LNCS 4681 and LNAI 4682 - constitutes the refereed proceedings of the Third International Conference on Intelligent Computing, ICIC 2007, held in Qingdao, China in August 2007.

The intelligent computing technology includes a range of techniques such as artificial intelligence, perceptual and...

Essential PowerShell (Addison-Wesley Microsoft Technology Series)
Essential PowerShell (Addison-Wesley Microsoft Technology Series)
Use PowerShell to Streamline and Automate Your Most Time-Consuming Windows Administration Tasks

 

With Windows PowerShell, Microsoft brings innovative console-based system administration and scripting to Windows clients and servers....

Encyclopedia of Data Warehousing and Mining, Second Edition
Encyclopedia of Data Warehousing and Mining, Second Edition
The Encyclopedia of Data Warehousing and Mining provides a comprehensive, critical and descriptive examination of concepts, issues, trends, and challenges in this rapidly expanding field of data warehousing and mining (DWM). This encyclopedia consists of more than 350 contributors from 32 countries, 1,800 terms and definitions, and more than 4,400...
What is What in the Nanoworld: A Handbook on Nanoscience and Nanotechnology
What is What in the Nanoworld: A Handbook on Nanoscience and Nanotechnology
More than 1,400 entries, from a few sentences to a page in length. The second, completely revised and enlarged edition of this introductory reference handbook summarizes the terms and definitions, most important phenomena, and regulations occurring in the physics, chemistry, technology, and application of nanostructures. A representative collection...
Security and Software for Cybercafes (Premier Reference Source)
Security and Software for Cybercafes (Premier Reference Source)
Cybercafes, which are places where Internet access is provided for free, provide the opportunity for people without access to the Internet, or who are traveling, to access Web mail and instant messages, read newspapers, and explore other resources of the Internet. Due to the important role Internet cafes play in facilitating access to information,...
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy