 |
|
 Pattern Recognition, Second EditionPattern recognition is becoming increasingly important in the age of automation and information handling and retrieval. This book provides the most comprehensive treatment available of pattern recognition, from an engineering perspective. Developed through more than ten years of teaching experience, Pattern Recognition is appropriate for both... |  |  |  |  OS X Exploits and DefenseLong believed to be a sanctuary of computer security, the Macintosh OS X operating system is increasingly under fire, making it as vulnerable to attack as Windows or Linux operating systems.
Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an... |
|
 Strategies for Information Technology and Intellectual Capital"Due to the increasing importance of the intangible assets of a company, firms are now concerned with how best to manage and measure knowledge and other intangibles. In addition to this, information technology has drastically changed the way these measurements are managed. Strategies for Information Technology and Intellectual Capital:... |  |  A Distributed Pi-CalculusDistributed systems are fast becoming the norm in computer science. Formal mathematical models and theories of distributed behavior are needed in order to understand them. This book proposes a distributed pi-calculus called Dpi, for describing the behavior of mobile agents in a distributed world. It is based on an existing formal language, the... |  |  Technology Enhanced Learning: Best Practices (Knowledge and Learning Society Books)With the shift towards the knowledge society, the change of working conditions, and the high-speed evolution of information and communication technologies, peoples' knowledge and skills need continuous updating. Learning based on collaborative working, creativity, multidisciplinarity, adaptiveness, intercultural communication, and problem solving... |
|
 Local Area Network Management, Design & SecurityMost workplaces rely on local area networks (LANs) to connect their computers and the right LAN is increasingly important in promoting effective communication both within the organisation and with the world at large. Local Area Network Management, Design and Security is a practical and thorough introduction to managing and... |  |  |  |  |
|
 Encyclopedia of Data Warehousing and Mining, Second EditionThe Encyclopedia of Data Warehousing and Mining provides a comprehensive, critical and descriptive examination of concepts, issues, trends, and challenges in this rapidly expanding field of data warehousing and mining (DWM). This encyclopedia consists of more than 350 contributors from 32 countries, 1,800 terms and definitions, and more than 4,400... |  |  What is What in the Nanoworld: A Handbook on Nanoscience and NanotechnologyMore than 1,400 entries, from a few sentences to a page in length. The second, completely revised and enlarged edition of this introductory reference handbook summarizes the terms and definitions, most important phenomena, and regulations occurring in the physics, chemistry, technology, and application of nanostructures. A representative collection... |  |  Security and Software for Cybercafes (Premier Reference Source)Cybercafes, which are places where Internet access is provided for free, provide the opportunity for people without access to the Internet, or who are traveling, to access Web mail and instant messages, read newspapers, and explore other resources of the Internet. Due to the important role Internet cafes play in facilitating access to information,... |
|
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 |