Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Sensors: Theory, Algorithms, and Applications (Springer Optimization and Its Applications)
Sensors: Theory, Algorithms, and Applications (Springer Optimization and Its Applications)
In recent years, technological advances have resulted in the rapid development of a new exciting research direction – the interdisciplinary use of sensors for data collection, systems analysis, and monitoring. Application areas include military surveillance, environmental screening, computational neuroscience,...
Software Engineering Reviews and Audits
Software Engineering Reviews and Audits

I have worked in systems engineering, software development, software configuration management, software testing, and software quality assurance organizations for more than 30 years. My experience in these selected fields has been somewhat different from that of most people. I always wanted to experience the software disciplines required in...

The Lanczos and Conjugate Gradient Algorithms: From Theory to Finite Precision Computations
The Lanczos and Conjugate Gradient Algorithms: From Theory to Finite Precision Computations
"No present book comes near this one in the range and depth of treatment of these two extremely important methods—the Lanczos algorithm and the method of conjugate gradients." Chris Paige, School of Computer Science, McGill University.   The Lanczos and conjugate gradient (CG) algorithms are fascinating numerical...
CompTIA Security+ 2008 In Depth
CompTIA Security+ 2008 In Depth

Security continues to be the number-one concern of computer professionals today, and with good reason. Consider the evidence: as many as 150 million computers worldwide may be remotely controlled by attackers. Over 94 million credit and debit cards were compromised in one data security breach, with losses totaling over $140 million. On average,...

Active Defense: A Comprehensive Guide to Network Security
Active Defense: A Comprehensive Guide to Network Security
Today's networks incorporate more security features than ever before, yet
hacking grows more common and more severe. Technology alone is not the
answer. You need the knowledge to select and deploy the technology
effectively, and the guidance of experts to develop a comprehensive plan that
keeps your organization two steps ahead
...
Security Assessment: Case Studies for Implementing the NSA IAM
Security Assessment: Case Studies for Implementing the NSA IAM
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or...
ActiveMQ in Action
ActiveMQ in Action

To this day, enterprise message queuing is a concept that is not well understood by most software developers. Commercial message-oriented middleware (MOM) did not help to encourage adoption of the process; most of the MOMs on the market were closed source, were costly to buy and support, and required trained system administrators for...

Implementing Software Defined Radio
Implementing Software Defined Radio

Software Defined Radio makes wireless communications easier, more efficient, and more reliable. This book bridges the gap between academic research and practical implementation. When beginning a project, practicing engineers, technical managers, and graduate students can save countless hours by considering the concepts presented in these...

Designing Human Interface in Speech Technology
Designing Human Interface in Speech Technology
Designing Human Interface in Speech Technology bridges a gap between the needs of the technical engineer and cognitive researchers working in the multidisciplinary area of speech technology applications. The approach is systematic and the focus is on the utility of developing and designing speech related products....
Handbook of Financial Cryptography and Security
Handbook of Financial Cryptography and Security

Cryptography has made a peculiar journey to become a modern science. It had long been associated with the military and with magic. The rst published work in the eld was Steganographia, by an alchemist named Trithemius. Although written earlier, the book was published in 1606. Cryptography has continued this connection with the arcane...

Machine Learning and Statistical Modeling Approaches to Image Retrieval (The Information Retrieval Series)
Machine Learning and Statistical Modeling Approaches to Image Retrieval (The Information Retrieval Series)

In the early 1990s, the establishment of the Internet brought forth a revolutionary viewpoint of information storage, distribution, and processing: the World-Wide Web is becoming an enormous and expanding distributed digital library. Along with the development of the Web, image indexing and retrieval have grown into research areas...

The Encyclopedia of the Cold War: A Political, Social, and Military History, 5 Volume Set
The Encyclopedia of the Cold War: A Political, Social, and Military History, 5 Volume Set

A comprehensive five-volume reference on the defining conflict of the second half of the 20th century, covering all aspects of the Cold War as it influenced events around the world.

• 1,299 entries covering all facets of the Cold War from its origins to its aftermath, including all political, diplomatic, military,...

Result Page: 31 30 29 28 27 26 25 24 23 22 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy