 |
|
 |  |  Introduction to Biometrics
A number of crucial societal applications like international border crossing, electronic
commerce, and welfare disbursement require reliable person recognition systems.
Traditional person authentication methods based on passwords and identity
documents often fail to meet the stringent security and performance demands of
these... |  |  UMTS Networks: Architecture, Mobility and Services
The world's first public GSM call was made on 1st July 1991 in a city park of Helsinki,
Finland. That event is now regarded as the birthday of the second generation mobile telephony.
GSM has been an overwhelming success, which was difficult to predict at that early
stage. In the past 10 years GSM has become a truly global... |
|
 |  |  Practical Lock Picking: A Physical Penetration Tester's Training Guide
I feel somewhat like an old man remarking in this fashion, but this book is a great example of the
wonderful time in which you currently find yourself. To be alive and learning right now—when there
are accessible resources such as this about lockpicking, with beautiful illustrations and lessons written
with passion visible on... |  |  Handbook of Data Intensive Computing
This handbook is carefully edited book – contributors are worldwide experts in
the field of data intensive computing and their applications. The scope of the
book includes leading edge data intensive computing architectures and systems,
innovative storage, virtualization, and parallel processing technologies applied in... |
|
|
|
Result Page: 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 |