Home | Amazing | Today | Tags | Publishers | Years | Search 
Neuroergonomics: The Brain at Work (Oxford Series in Human-Technology Interaction)
Neuroergonomics: The Brain at Work (Oxford Series in Human-Technology Interaction)
Neuroergonomics can be defined as the study of brain and behavior at work. It combines two disciplines--neuroscience, the study of brain function, and human factors, the study of how to match technology with the capabilities and limitations of people so they can work effectively and safely. The goal of merging these two fields is to use the...
Crime Mapping Case Studies: Practice and Research
Crime Mapping Case Studies: Practice and Research
Crime Mapping Case Studies: From Research to Practice provides a series of key examples from practice and research that demonstrate applications of crime mapping and its effect in many areas of policing and crime reduction. This book brings together case studies that show how crime mapping can be used for analysis,...
Detecting Lies and Deceit: Pitfalls and Opportunities (Wiley Series in Psychology of Crime, Policing and Law)
Detecting Lies and Deceit: Pitfalls and Opportunities (Wiley Series in Psychology of Crime, Policing and Law)

Why do people lie?

Do gender and personality differences affect how people lie?

How can lies be detected?

Detecting Lies and Deceit provides the most comprehensive review of deception to date. This revised edition provides an up-to-date...

Mobile Telemedicine: A Computing and Networking Perspective
Mobile Telemedicine: A Computing and Networking Perspective
Wireless and mobile telemedicine has drawn attention from health care providers and recipients, governments, industry, and researchers. Th ough various practices have been exercised, the realization of telemedicine depends on advances in computing and networking techniques. In recent decades technological development in computing and networking has...
Networks: Design and Management
Networks: Design and Management
Networks are groups of computers that communicate by either cable or wireless transmissions. By the use of computer networking, we can share data with others. Today, all businesses, small or large use some type of computers and most use computer networking to handle their daily business operations such as bookkeeping, inventory tracking, document...
Linux Security: Craig Hunt Linux Library
Linux Security: Craig Hunt Linux Library
Authoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators

This is the most complete, most advanced guide to Linux security you’ll find anywhere. Written by a Linux security expert with over a decade of experience, Linux Security teaches you, step-by-step, all the...

SSL Remote Access VPNs (Networking Technology: Security)
SSL Remote Access VPNs (Networking Technology: Security)
This book provides a complete guide to the SSL VPN technology and discusses its implementation on Cisco SSL VPN–capable devices. Design guidance is provided to assist you in implementing SSL VPNs in an existing network infrastructure. This includes examining existing hardware and software to determine whether they are SSL VPN capable,...
Wireless Security Essentials: Defending Mobile Systems from Data Piracy
Wireless Security Essentials: Defending Mobile Systems from Data Piracy
Protect your wireless systems from attack with this clear-cut guide on how to implement proven security methodologies

Effective security is the most important element now missing from most wireless networks. Vulnerabilities in these networks leave them open to eavesdropping, session highjacking, data alteration and manipulation,
...
Contributions to Ubiquitous Computing (Studies in Computational Intelligence)
Contributions to Ubiquitous Computing (Studies in Computational Intelligence)
Mark Weisers vision of computers moving out of our focus of attention and becoming oblivious devices that occur in large numbers and provide smart computing und communication services to individuals as needed is still far from being reality.

This book puts the larger vision of ubiquitous computing in the context of todays mobile and distributed...

Information Processing and Routing in Wireless Sensor Networks
Information Processing and Routing in Wireless Sensor Networks
Wireless sensor networks (WSNs) have become an important technology in the realization of many applications, including both simple event/phenomena monitoring applications and heavy-duty data streaming applications. While many systems are being developed, we focus on two fundamental operations: information processing and information routing. In the...
MCSE: ISA Server 2000 Administration Study Guide: Exam 70 227 with CDROM
MCSE: ISA Server 2000 Administration Study Guide: Exam 70 227 with CDROM

Here’s the book you need to prepare for Exam 70-227, Installing, Configuring, and Administering Microsoft Internet Security and Acceleration (ISA) Server 2000, Enterprise Edition:

  • In-depth coverage of every exam objective—all the information you need to know
  • Practical...
i -Net+ Study Guide
i -Net+ Study Guide

Here's the book you need to prepare for CompTIA's i-Net+ Exam. This Sybex Study Guide provides:

  • Full coverage of every exam objective
  • Practical information on network hardware
  • Hundreds of challenging review questions, in the book...
Result Page: 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy