Biometrics is becoming increasingly common in establishments that require high security such as state security and financial sectors. The increased threat to national security by terrorists has led to the explosive popularity of biometrics. A number of biometric devices are now available to capture biometric measurements such as fingerprints, palm,...
SharePoint 2010 enables businesses to set up collaboration with, and for, many types of entities (employees, vendors, customers, and so on) while integrating disparate technologies. It has proved so valuable a tool at many organizations that its growth has led it to become a mission-critical application. As SharePoint has grown through each...
There is growing concern about the state of the world's oceans. The rapid growth of human populations in coastal regions has led to increasing dependence on marine resources. Beneficial features related to food supply and life style need to be balanced against the hazards presented by microbial pathogens, chemical pollutants, and toxic algal...
China is currently the front-runner on the global crowdfunding market, even though this form of financing originated in the USA. Crowdfunding in China, however, differs significantly from its counterpart in the West. This book reveals that Chinese crowdfunding is a product of the country’s dynamic internet sector, which is...
"Quinn’s work captures a crucial truth about great leadership–that it is about who we are and not what we do. In facing our fears and harnessing our uniqueness, we bring forth the capacity for inspired leadership and for enduring change. Robert Quinn is a gifted storyteller. This is...
Since being introduced in 1999, JavaServer Pages™ (JSP) have become a popular and important technology for building dynamic, interactive, content-rich Web sites. JavaServer Pages™, Second Edition is a hands-on guide to working with JSP, offering the easiest and most efficient ways for non-programmers and Web...
Cross-layer design seeks to enhance the capacity of wireless networks significantly through the joint optimization of multiple layers in the network, primarily the physical (PHY) and medium access control (MAC) layers. Although there are advantages of such design in wireline networks as well, this approach is particularly advantageous for wireless...
This succinct new edition of our best-selling title presents everything you need know to get up and running with C sockets programming in one affordable volume!
The Internet allows computers thousands of miles apart to exchange information through programs such as Web browsers, and nearly all of these programs gain access to...
This text for students and professionals in computer science provides a valuable overview of current knowledge concerning parallel algorithms. These computer operations have recently acquired increased importance due to their ability to enhance the power of computers by permitting multiple processors to work on different parts of a problem...
An examination of the German Blitzkrieg operations from Poland to Operation Barbarossa, as experienced by junior commanders and enlisted men, exploring why they were so successful.
The successes of the German Blitzkrieg in 1939–41 were as surprising as they were swift. Allied...
The study of social networks was originated in social and business communities. In recent years, social network research has advanced significantly; the development of sophisticated techniques for Social Network Analysis and Mining (SNAM) has been highly influenced by the online social Web sites, email logs, phone logs and instant...