Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Securing Biometrics Applications
Securing Biometrics Applications
Biometrics is becoming increasingly common in establishments that require high security such as state security and financial sectors. The increased threat to national security by terrorists has led to the explosive popularity of biometrics. A number of biometric devices are now available to capture biometric measurements such as fingerprints, palm,...
Microsoft SharePoint 2010 Administration Cookbook
Microsoft SharePoint 2010 Administration Cookbook

SharePoint 2010 enables businesses to set up collaboration with, and for, many types of entities (employees, vendors, customers, and so on) while integrating disparate technologies. It has proved so valuable a tool at many organizations that its growth has led it to become a mission-critical application. As SharePoint has grown through each...

Marine Pollution and Human Health (Issues in Environmental Science and Technology)
Marine Pollution and Human Health (Issues in Environmental Science and Technology)
There is growing concern about the state of the world's oceans. The rapid growth of human populations in coastal regions has led to increasing dependence on marine resources. Beneficial features related to food supply and life style need to be balanced against the hazards presented by microbial pathogens, chemical pollutants, and toxic algal...
Crowdfunding in China: A New Institutional Economics Approach (Contributions to Management Science)
Crowdfunding in China: A New Institutional Economics Approach (Contributions to Management Science)

China is currently the front-runner on the global crowdfunding market, even though this form of financing originated in the USA. Crowdfunding in China, however, differs significantly from its counterpart in the West. This book reveals that Chinese crowdfunding is a product of the country’s dynamic internet sector, which is...

Building the Bridge As You Walk On It: A Guide for Leading Change
Building the Bridge As You Walk On It: A Guide for Leading Change
Dare to become a leader who inspires others

"Quinn’s work captures a crucial truth about great leadership–that it is about who we are and not what we do. In facing our fears and harnessing our uniqueness, we bring forth the capacity for inspired leadership and for enduring change. Robert Quinn is a gifted storyteller. This is...

JavaServer Pages, Second Edition
JavaServer Pages, Second Edition

Since being introduced in 1999, JavaServer Pages™ (JSP) have become a popular and important technology for building dynamic, interactive, content-rich Web sites. JavaServer Pages™, Second Edition is a hands-on guide to working with JSP, offering the easiest and most efficient ways for non-programmers and Web...

Wireless Networks: Multiuser Detection in Cross-Layer Design (Information Technology: Transmission, Processing and Storage)
Wireless Networks: Multiuser Detection in Cross-Layer Design (Information Technology: Transmission, Processing and Storage)
Cross-layer design seeks to enhance the capacity of wireless networks significantly through the joint optimization of multiple layers in the network, primarily the physical (PHY) and medium access control (MAC) layers. Although there are advantages of such design in wireline networks as well, this approach is particularly advantageous for wireless...
TCP/IP Sockets in C, Second Edition: Practical Guide for Programmers (The Morgan Kaufmann Practical Guides Series)
TCP/IP Sockets in C, Second Edition: Practical Guide for Programmers (The Morgan Kaufmann Practical Guides Series)
This succinct new edition of our best-selling title presents everything you need know to get up and running with C sockets programming in one affordable volume!

The Internet allows computers thousands of miles apart to exchange information through programs such as Web browsers, and nearly all of these programs gain access to
...
The Design and Analysis of Parallel Algorithms
The Design and Analysis of Parallel Algorithms

This text for students and professionals in computer science provides a valuable overview of current knowledge concerning parallel algorithms. These computer operations have recently acquired increased importance due to their ability to enhance the power of computers by permitting multiple processors to work on different parts of a problem...

Microsoft Dynamics AX 2012 Reporting Cookbook
Microsoft Dynamics AX 2012 Reporting Cookbook

Over 50 recipes to help you build Dynamics AX reports faster by simplifying your understanding of the report model

Overview

  • Practical recipes for creating and managing reports
  • Illustrated step-by-step examples that can be adopted in real time
  • Complete explanations of the...
Blitzkrieg: From the Ground Up
Blitzkrieg: From the Ground Up

An examination of the German Blitzkrieg operations from Poland to Operation Barbarossa, as experienced by junior commanders and enlisted men, exploring why they were so successful.

The successes of the German Blitzkrieg in 1939–41 were as surprising as they were swift. Allied
...

The Influence of Technology on Social Network Analysis and Mining (Lecture Notes in Social Networks)
The Influence of Technology on Social Network Analysis and Mining (Lecture Notes in Social Networks)

The study of social networks was originated in social and business communities. In recent years, social network research has advanced significantly; the development of sophisticated techniques for Social Network Analysis and Mining (SNAM) has been highly influenced by the online social Web sites, email logs, phone logs and instant...

unlimited object storage image
Result Page: 87 86 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy