 |
|
 Internet Addiction: A Handbook and Guide to Evaluation and Treatment
Internet Addiction: A Handbook and Guide to Evaluation and Treatment
"This book provides cutting-edge coverage by expanding the field to include specific problems such as online gaming, cybersex addiction, and gambling addiction. Its extensive attention to dealing with adolescents is essential, given the rapid... |  |  Biometric Recognition: Challenges and Opportunities
Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric... |  |  Software Engineering Reviews and Audits
I have worked in systems engineering, software development, software configuration management, software testing, and software quality assurance organizations for more than 30 years. My experience in these selected fields has been somewhat different from that of most people. I always wanted to experience the software disciplines required in... |
|
|
|
 Location-Based Information Systems: Developing Real-Time Tracking Applications
Location-based services (LBS) are nally coming out of research labs and getting
into the hands of nal users. It is fairly common to see cellular carriers
and private companies oering LBS to locate your children, friends, and sites
of interest, track assets, enhance the security of key personnel, help people
with disabilities use... |  |  Linear Programming and Network Flows
Linear Programming deals with the problem of minimizing or maximizing a
linear function in the presence of linear inequalities. Since the development of
the simplex method by George B. Dantzig in 1947, linear programming has been
extensively used in the military, industrial, governmental, and urban planning
fields, among others. The... |  |  Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
This book is designed to cover the strategic, operational, and tactical aspects of the
conflicts in cyberspace today. The perspectives of the two authors balance the viewpoints
of what many are calling cyber warfare today. One comes from a commercial
background and the other brings the military viewpoint. The book is designed to help... |
|
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 |