 |
|
 Mobility, Data Mining and Privacy: Geographic Knowledge DiscoveryThe technologies of mobile communications and ubiquitous computing pervade our society, and wireless networks sense the movement of people and vehicles, generating large volumes of mobility data. This is a scenario of great opportunities and risks: on one side, mining this data can produce useful knowledge, supporting sustainable mobility and... |  |  Trust Management: Second International Conference, iTrust 2004, Oxford, UKThis book constitutes the refereed proceedings of the Second International Conference on Trust Management, iTrust 2004, held in Oxford, UK, in March/April 2004.
The 21 revised full papers and 6 revised short papers presented together with 3 invited contributions were carefully reviewed and selected from 48 submissions. Besides technical topics... |  |  |
|
 Perl Scripting for IT SecurityThis book is intended for anyone who has an interest in useful Perl scripting, in particular on the Windows platform, for the purpose of incident response, and forensic analysis, and application monitoring. While a thorough grounding in scripting languages (or in Perl specifically) is not required, it is helpful in fully and more completely... |  |  Patterns in Network Architecture: A Return to FundamentalsGroundbreaking Patterns for Building Simpler, More Powerful Networks
In Patterns in Network Architecture, pioneer John Day takes a unique approach to solving the problem of network architecture. Piercing the fog of history, he bridges the gap between our experience from the... |  |  Mechanistic Images in Geometric Form: Heinrich Hertz's Principles of MechanicsThis book gives an analysis of Hertz's posthumously published Principles of Mechanics in its philosophical, physical and mathematical context. In a period of heated debates about the true foundation of physical sciences, Hertz's book was conceived and highly regarded as an original and rigorous foundation for a mechanistic research program.... |
|
|
 Network Security: A Beginner's Guide, Second EditionEssential Skills--Made Easy!
Protect your digital knowledge, data, and capabilities from misuse or tampering. This fully updated guidebook provides step-by-step instruction on implementing firewalls, wireless security, desktop protection, biometrics, and many of today's essential security measures. Understand the four primary forms of attack... |  |  Fields of Faith: Theology and Religious Studies for the Twenty-first CenturyHow will the study of theology and the religions in higher education be shaped in the coming century? This book offers several different perspectives on this field of study with suggestions for a future in which theology and religious studies are pursued together. There are examples of the interplay of theology and religious studies with reference... |  |  The Manager's Guide to Competitive IntelligenceIn The Managers Guide to Competitive Intelligence, McGonagle and Vella offer comprehensive guidelines for CI managers to achieve their goals. They cover the responsibilities and duties, and give strategic direction for managers trying to find their way in this important, but often overlooked, discipline....Get this book and read every... |
|
Result Page: 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 |