Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mobile Security: How to Secure, Privatize, and Recover Your Devices
Mobile Security: How to Secure, Privatize, and Recover Your Devices

Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens.

Overview

  • Learn how mobile devices are monitored and the impact of cloud computing
  • ...
Persuasive Technology: Using Computers to Change What We Think and Do (The Morgan Kaufmann Series in Interactive Technologies)
Persuasive Technology: Using Computers to Change What We Think and Do (The Morgan Kaufmann Series in Interactive Technologies)
With compelling insights and illuminating examples, the author reveals how Web sites, software applications, and mobile devices can be used to change people’s attitudes and behavior.

Can computers change what you think and do? Can they motivate you to stop smoking, persuade you to buy insurance, or convince you to join the Army?

...
Catastrophe Modeling: A New Approach to Managing Risk (Huebner International Series on Risk, Insurance and Economic Security)
Catastrophe Modeling: A New Approach to Managing Risk (Huebner International Series on Risk, Insurance and Economic Security)
This book had its genesis in June 1996 when the Wharton Risk
Management and Decision Processes Center (Wharton Risk Center) co-hosted
a conference on “Information Technology and Its Impact on Catastrophic
Risks”. It was one of the events that year celebrating the Anniversary of
the first computer (ENIAC) at the
...
Beginning Spatial with SQL Server 2008
Beginning Spatial with SQL Server 2008
Microsoft SQL Server 2008 introduces new geography and geometry spatial datatypes that enable the storage of structured data describing the shape and position of objects in space. This is an interesting and exciting new feature, with many potentially useful applications.

Beginning Spatial with SQL Server 2008 covers everything you need...

Special Edition Using Microsoft CRM
Special Edition Using Microsoft CRM

A sophisticated yet easy-to-use software program, Microsoft CRM handles the full range of Sales and Customer Service functions, and allows the user to access key customer and sales information from Microsoft Outlook and the Web. It is designed for rapid deployment, ease of use, and integration with Microsoft Office and Microsoft Great Plains'...

Post-mining of Association Rules: Techniques for Effective Knowledge Extraction
Post-mining of Association Rules: Techniques for Effective Knowledge Extraction

Since its introduction for market basket analysis in the early 1990s, association rule mining has had a lot of research attention, and it is now widely used in many fields, for example in retail, telecom, insurance, and bioinformatics applications.

One familiar problem encountered in association mining exercises is that they...

The Freelancer's Bible: Everything You Need to Know to Have the Career of Your DreamsOn Your Terms
The Freelancer's Bible: Everything You Need to Know to Have the Career of Your DreamsOn Your Terms

Amazingly, one-third of the American workforce is freelance―that’s 42 million people who have to wrestle with not just doing the work, but finding the work, then getting paid for the work, plus health care, taxes, setting up an office, marketing, and so on. Now help is here, and consultants, independent contractors, the...

Big Data Application Architecture Q&A: A Problem - Solution Approach (Expert's Voice in Big Data)
Big Data Application Architecture Q&A: A Problem - Solution Approach (Expert's Voice in Big Data)

Big Data Application Architecture Pattern Recipes provides an insight into heterogeneous infrastructures, databases, and visualization and analytics tools used for realizing the architectures of big data solutions. Its problem-solution approach helps in selecting the right architecture to solve the problem at hand. In the process of...

LDAP Metadirectory Provisioning Methodology: a step by step method to implementing LDAP based metadirectory provisioning
LDAP Metadirectory Provisioning Methodology: a step by step method to implementing LDAP based metadirectory provisioning

This work provides system architects a methodology for the implementation of x.500 and LDAP based metadirectory provisioning systems. In addition this work assists in the business process analysis that accompanies any deployment. DOC Safe Harbor & European Commission’s Directive on Data Protection (Directive 95/46/EC) issues are also...

Applications of Data Mining in E-Business and Finance (Frontiers in Artificial Intelligence and Applications)
Applications of Data Mining in E-Business and Finance (Frontiers in Artificial Intelligence and Applications)
The application of Data Mining (DM) technologies has shown an explosive growth in an increasing number of different areas of business, government and science. Two of the most important business areas are finance, in particular in banks and insurance companies, and e-business, such as web portals, e-commerce and ad management services.In...
Drools JBoss Rules 5.0 Developer's Guide
Drools JBoss Rules 5.0 Developer's Guide
Business rules can help your business by providing a level of agility and flexibility. As a developer, you will be largely responsible for implementing these business rules effectively, but implementing them systematically can often be difficult due to their complexity. Drools, or JBoss Rules, makes the process of implementing these rules quicker...
Fatal Exit: The Automotive Black Box Debate
Fatal Exit: The Automotive Black Box Debate
A compelling argument for automotive technologies that speak for the victim, tell the truth, and could save millions of lives

Fatal Exit: The Automotive Black Box Debate cuts through thirty years of political wrangling and institutional biases to provide an argument for the Motor Vehicle Event Data Recorder (MVEDR). This automotive equivalent...

unlimited object storage image
Result Page: 19 18 17 16 15 14 13 12 11 10 9 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy