Home | Amazing | Today | Tags | Publishers | Years | Search 
Face Processing: Advanced Modeling and Methods
Face Processing: Advanced Modeling and Methods
As one of the most important applications of image analysis and understanding, face recognition has recently received significant attention, especially during the past 10 years. There are at least two reasons for this trend: the first is the wide range of commercial and law-enforcement applications, and the second is the availability of feasible...
Terrorism and Homeland Security: An Introduction with Applications (The Butterworth-Heinemann Homeland Security Series)
Terrorism and Homeland Security: An Introduction with Applications (The Butterworth-Heinemann Homeland Security Series)
Terrorism and Homeland Security: An Introduction with Applications provides a comprehensive overview of terrorism, public and private sector counterterrorism, and "all hazards" emergency management. The book presents national, state, and local perspectives and up-to-date information, including the reorganization of the...
The Handbook of Information and Computer Ethics
The Handbook of Information and Computer Ethics
This handbook provides an accessible overview of the most important issues in information and computer ethics. It covers: foundational issues and methodological frameworks; theoretical issues affecting property, privacy, anonymity, and security; professional issues and the information-related professions; responsibility issues and risk assessment;...
20,000 Leagues under the Sea: Complete and Unabridged
20,000 Leagues under the Sea: Complete and Unabridged
Founded in 1906 by J.M. Dent, the Everyman Library has always tried to make the best books ever written available to the greatest number of people at the lowest possible price. Unique editorial features that help Everyman Paperback Classics stand out from the crowd include: a leading scholar or literary critic's introduction to the text,...
Hackers: Heroes of the Computer Revolution
Hackers: Heroes of the Computer Revolution
Steven Levy's classic book explains why the misuse of the word "hackers" to describe computer criminals does a terrible disservice to many important shapers of the digital revolution. Levy follows members of an MIT model railroad club--a group of brilliant budding electrical engineers and computer innovators--from the late 1950s to...
Wireless Security: Know It All
Wireless Security: Know It All
The latest technologies - the leading experts - proven real-world design solutions - together in one must-have volume!

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and
...
Create Your Own Future: How to Master the 12 Critical Factors of Unlimited Success
Create Your Own Future: How to Master the 12 Critical Factors of Unlimited Success
Now in paperback, Create Your Own Future is a powerful book on self-empowerment that offers a wealth of ideas readers can apply immediately to take complete control of their personal and work lives. Intended for anyone who wants to make more money and get more satisfaction from life, the book offers twelve principles for success and...
Math You Can't Use: Patents, Copyright, and Software
Math You Can't Use: Patents, Copyright, and Software
The field of software is awash in disputes. Market participants and analysts routinely disagree on how computer programs should be produced, marketed, regulated, and sold. On one subject, however, just about everyone can agree: the current intellectual property protection regime for software is a mess. At present, all of the traditional means...
The Culture of Vengeance and the Fate of American Justice
The Culture of Vengeance and the Fate of American Justice
America is driven by vengeance in Terry Aladjem's provocative account - a reactive, public anger that is a threat to democratic justice itself. From the return of the death penalty to the wars on terror and in Iraq, Americans demand retribution and moral certainty; they assert the "rights of victims" and make pronouncements against...
Beginning OpenOffice 3: From Novice to Professional
Beginning OpenOffice 3: From Novice to Professional
Office suites are one of the most popular types of software, and most computer users will, at some point, find themselves staring at the user interface of a word processor, spreadsheet, or presentation package. Traditionally, office suites have been quite expensive packages, but thanks to the generosity of Sun Microsystems and a massive community...
iPhone Forensics: Recovering Evidence, Personal Data, and Corporate Assets
iPhone Forensics: Recovering Evidence, Personal Data, and Corporate Assets
"This book is a must for anyone attempting to examine the iPhone. The level of forensic detail is excellent. If only all guides to forensics were written with this clarity!" -Andrew Sheldon, Director of Evidence Talks, computer forensics experts With iPhone use increasing in business networks, IT and security professionals face a serious...
Guide to Computer Network Security (Computer Communications and Networks)
Guide to Computer Network Security (Computer Communications and Networks)
Contemporary societies have increasing dependence on computers and computer networks, and the increasing popularity of mobile computing, have given rise to numerous computer security problems. Yet despite a high proliferation of expert remedies, a viable and comprehensive solution to these security issues remains elusive, and society continues to...
Result Page: 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy