 |
|
|
 How Personal & Internet Security Works (How It Works)In 2003, fraud and identity theft cost consumers at least $437 million dollars. In 2004, the U.S. Federal Trade Commission received 247,000 consumer complaints in 2004 (up 15% from 2003), from individuals whose identity was stolen, and according to Reuters.com (2/2005), Americans lost $548 million dollars to identity theft... |  |  Computer Science Handbook, Second Edition
The second edition of this elemental handbook reviews the current state of theory and practice in the field while emphasizing a more practical/applied approach to IT topics such as information management, net-centric computing, and human computer interaction. With a complete revision of its sections on software engineering, architecture, and... |  |  Security in Computing (4th Edition)The New State-of-the-Art in Information Security: Now Covers the Economics of Cyber Security and the Intersection of Privacy and Information Security
For years, IT and security professionals and students have turned to Security in Computing as the definitive guide to information... |
|
 Oracle 10g Data WarehousingOracle 10g Data Warehousing is a guide to using the Data Warehouse features in the latest version of Oracle Oracle Database 10g. Written by people on the Oracle development team that designed and implemented the code and by people with industry experience implementing warehouses using Oracle technology, this thoroughly updated and extended edition... |  |  Robust Statistics: Theory and Methods (Probability and Statistics)Classical statistical techniques fail to cope well with deviations from a standard distribution. Robust statistical methods take into account these deviations while estimating the parameters of parametric models, thus increasing the accuracy of the inference. Research into robust methods is flourishing, with new methods being developed and... |  |  |
|
 Application of Agents and Intelligent Information TechnologiesThe Web has sparked renewed interest in developing intelligent information systems that enable users to accomplish complex tasks in Web-centric environments with relative ease. Although artificially intelligent (AI) technologies such as expert systems and neural networks have been successfully used in aerospace, communication, medical, and... |  |  Swarm Intelligence in Data Mining (Studies in Computational Intelligence)Science is a swarm.
To the layperson, the stereotypical scientist is logical, clear-thinking, wellinformed but perhaps socially awkward, carefully planning his or her experiments and then analyzing the resulting data deliberately, with precision. The scientist works alone, emotion-free, searching only for truth, having been well advised... |  |  |
|
| Result Page: 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 |