Home | Amazing | Today | Tags | Publishers | Years | Search 
Mobility, Data Mining and Privacy: Geographic Knowledge Discovery
Mobility, Data Mining and Privacy: Geographic Knowledge Discovery
The technologies of mobile communications and ubiquitous computing pervade our society, and wireless networks sense the movement of people and vehicles, generating large volumes of mobility data. This is a scenario of great opportunities and risks: on one side, mining this data can produce useful knowledge, supporting sustainable mobility and...
Trust Management: Second International Conference, iTrust 2004, Oxford, UK
Trust Management: Second International Conference, iTrust 2004, Oxford, UK
This book constitutes the refereed proceedings of the Second International Conference on Trust Management, iTrust 2004, held in Oxford, UK, in March/April 2004.

The 21 revised full papers and 6 revised short papers presented together with 3 invited contributions were carefully reviewed and selected from 48 submissions. Besides technical topics...

Reconstruction Era: Primary Sources Edition 1. (U X L Reconstruction Era Reference Library)
Reconstruction Era: Primary Sources Edition 1. (U X L Reconstruction Era Reference Library)
Doody Enterprises : "Primary sources in this volume include reminiscences of John Brown Gordon, an ex-Confederate general; Louis Hughes, a former slave; Freedman's Burea Act; Frederick Douglass; Frances Butler Leigh, a plantation owner; Alexander Stephens, former Confederate vice president; Andrew Johnson; Charles Sumner; Hiram...
Perl Scripting for IT Security
Perl Scripting for IT Security
This book is intended for anyone who has an interest in useful Perl scripting, in particular on the Windows platform, for the purpose of incident response, and forensic analysis, and application monitoring. While a thorough grounding in scripting languages (or in Perl specifically) is not required, it is helpful in fully and more completely...
Patterns in Network Architecture: A Return to Fundamentals
Patterns in Network Architecture: A Return to Fundamentals
Groundbreaking Patterns for Building Simpler, More Powerful Networks

 

In Patterns in Network Architecture, pioneer John Day takes a unique approach to solving the problem of network architecture. Piercing the fog of history, he bridges the gap between our experience from the...

Mechanistic Images in Geometric Form: Heinrich Hertz's Principles of Mechanics
Mechanistic Images in Geometric Form: Heinrich Hertz's Principles of Mechanics
This book gives an analysis of Hertz's posthumously published Principles of Mechanics in its philosophical, physical and mathematical context. In a period of heated debates about the true foundation of physical sciences, Hertz's book was conceived and highly regarded as an original and rigorous foundation for a mechanistic research program....
Advances in Electronic Business, Volume I
Advances in Electronic Business, Volume I

Advances in Electronic Business, Volume 1 advances the understanding of management methods, information technology, and their joint applications in business processes. The applications of electronic commerce draw great attention from practitioners in applying digital technologies to the buy-and-sell activities. This first volume...

Discovering Real Business Requirements for Software Project Success (Computing Library)
Discovering Real Business Requirements for Software Project Success (Computing Library)
Text offers a methodology for discovering and testing the real business requirements that software products must meet in order to provide value. Presents more than 21 ways to test business requirements and evaluate substance and content. DLC: Computer software--Development.

While a
...
Digital Audio Essentials
Digital Audio Essentials
Join the digital audio revolution! Tens of millions of users are embracing digital music, and with Digital Audio Essentials, you can, too. Nearly every personal computer built in the last few years contains a CD-burning drive; MP3 and other portable player sales dominate the consumer electronics industry; and new networkable stereo...
Network Security: A Beginner's Guide, Second Edition
Network Security: A Beginner's Guide, Second Edition
Essential Skills--Made Easy!

Protect your digital knowledge, data, and capabilities from misuse or tampering. This fully updated guidebook provides step-by-step instruction on implementing firewalls, wireless security, desktop protection, biometrics, and many of today's essential security measures. Understand the four primary forms of attack...

Fields of Faith: Theology and Religious Studies for the Twenty-first Century
Fields of Faith: Theology and Religious Studies for the Twenty-first Century
How will the study of theology and the religions in higher education be shaped in the coming century? This book offers several different perspectives on this field of study with suggestions for a future in which theology and religious studies are pursued together. There are examples of the interplay of theology and religious studies with reference...
The Manager's Guide to Competitive Intelligence
The Manager's Guide to Competitive Intelligence
In The Managers Guide to Competitive Intelligence, McGonagle and Vella offer comprehensive guidelines for CI managers to achieve their goals. They cover the responsibilities and duties, and give strategic direction for managers trying to find their way in this important, but often overlooked, discipline....Get this book and read every...
Result Page: 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy