Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Perfect Passwords: Selection, Protection, Authentication
Perfect Passwords: Selection, Protection, Authentication
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.

Every computer user must face the problems of password security. According
...
Digital Signal Processing System Design, Second Edition: LabVIEW-Based Hybrid Programming
Digital Signal Processing System Design, Second Edition: LabVIEW-Based Hybrid Programming
The ideal book for quickly developing DSP systems by integrating MATLAB or C code into the LabVIEW graphical programming environment.

Reflecting LabView's new MathScripting feature, the new edition of this book combines textual and graphical programming to form a hybrid programming approach, enabling a more effective means of
...
Information Warfare: corporate attack and defence in a digital world (Computer Weekly Professional)
Information Warfare: corporate attack and defence in a digital world (Computer Weekly Professional)
The idea for this book came out of a need to find a text for a unit in Information Warfare given to Doctor of Business Administration students. Most of the existing texts had a military flavour and so did not suit our task. Others concentrated on security aspects and assumed some level of knowledge in this area. What we wanted was a text that...
Shrimp: The Endless Quest for Pink Gold
Shrimp: The Endless Quest for Pink Gold

 “Shrimp: The Endless Quest for Pink Gold is a deep and expert look not only at an important human food source, but also of the fragile complexity of the ecosystem in which it is created.”

–Edward O. Wilson, Pellegrino Research Professor, emeritus, Harvard...

Post-mining of Association Rules: Techniques for Effective Knowledge Extraction
Post-mining of Association Rules: Techniques for Effective Knowledge Extraction

Since its introduction for market basket analysis in the early 1990s, association rule mining has had a lot of research attention, and it is now widely used in many fields, for example in retail, telecom, insurance, and bioinformatics applications.

One familiar problem encountered in association mining exercises is that they...

Location-Based Information Systems: Developing Real-Time Tracking Applications
Location-Based Information Systems: Developing Real-Time Tracking Applications

Location-based services (LBS) are nally coming out of research labs and getting into the hands of nal users. It is fairly common to see cellular carriers and private companies o ering LBS to locate your children, friends, and sites of interest, track assets, enhance the security of key personnel, help people with disabilities use...

Windows 95 in a Nutshell: A Desktop Quick Reference (In a Nutshell (O'Reilly))
Windows 95 in a Nutshell: A Desktop Quick Reference (In a Nutshell (O'Reilly))

Windows 95 in a Nutshell is a comprehensive, compact reference that systematically unveils what serious users of Windows 95 will find interesting and useful. Little known details of the operating system, utility programs, and configuration settings are all captured in a consistent reference format.This is the first book in...

Raspberry Pi 3 Projects for Java Programmers
Raspberry Pi 3 Projects for Java Programmers

Learn the art of building enticing projects by unleashing the potential of Raspberry Pi 3 using Java

About This Book

  • Explore the small yet powerful mini computer in order to run java applications
  • Leverage Java libraries to build exciting projects on home automation, IoT, and Robotics by...
Apache Hive Essentials: Essential techniques to help you process, and get unique insights from, big data, 2nd Edition
Apache Hive Essentials: Essential techniques to help you process, and get unique insights from, big data, 2nd Edition

This book takes you on a fantastic journey to discover the attributes of big data using Apache Hive.

Key Features

  • Grasp the skills needed to write efficient Hive queries to analyze the Big Data
  • Discover how Hive can coexist and work with other tools within the Hadoop...
Create Your Own DVDs
Create Your Own DVDs
I set out to write this book for one simple reason: I want you to have fun making your own movies with your camcorder and your PC. I want to help you get up to speed so that you can easily create movies that your friends and family will actually watch.

Although the title of this book might suggest that it is strictly for people who want
...
Linux Performance Tuning and Capacity Planning (Kaleidoscope)
Linux Performance Tuning and Capacity Planning (Kaleidoscope)

Covering topics from analysis tools to kernel tuning, to capacity management, this book offers a single point of reference for what you need to know. Anyone who has ever had to speed existing operations or project usage patterns for future loads, knows that tracking down the relevant information can be a difficult task. That's why this book has...

The Theory of Gambling and Statistical Logic, Second Edition
The Theory of Gambling and Statistical Logic, Second Edition

Early in his rise to enlightenment, man invented a concept that has since been variously viewed as a vice, a crime, a business, a pleasure, a type of magic, a disease, a folly, a weakness, a form of sexual substitution, an expression of the human instinct. He invented gambling.

Recent advances in the field, particularly...

unlimited object storage image
Result Page: 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy