Home | Amazing | Today | Tags | Publishers | Years | Search 
Digital Crime And Forensic Science in Cyberspace
Digital Crime And Forensic Science in Cyberspace
itself. Forensics—the process, means, and methods for collecting crime evidence—can be said to date back to the 18th century stemming from forensic medicine and studies of anatomy and fingerprints. Crime manifests itself in various ways and forms and digital crime is the newest one. As the essence of the various forms of crime has...
Advances in Fuzzy Clustering and its Applications
Advances in Fuzzy Clustering and its Applications

A comprehensive, coherent, and in depth presentation of the state of the art in fuzzy clustering.

Fuzzy clustering is now a mature and vibrant area of research with highly innovative advanced applications. Encapsulating this through presenting a careful selection of research contributions, this book...

WiMAX: Taking Wireless to the MAX
WiMAX: Taking Wireless to the MAX
With market value expected to reach $5 billion by 2007 and the endorsement of some of the biggest names in telecommunications, World Interoperability for Microwave Access (WiMAX) is poised to change the broadband wireless landscape. But how much of WiMAX's touted potential is merely hype? Now that several pre-WiMAX networks have been deployed, what...
Applescript Finder Guide: English Dialect
Applescript Finder Guide: English Dialect
Since 1985, Apple and Addison-Wesley have been publishing authoritative books about Apple technologies. The Apple Technical Library provides Macintosh developers with the official treatment of all the major new technologies that Apple releases. Timely, accurate, and clear, this collection of books is the essential resource for...
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
It's easy enough to install Wireshark and begin capturing packets off the wire--or from the air. But how do you interpret those packets once you've captured them? And how can those packets help you to better understand what's going on under the hood of your network? Practical Packet Analysis shows how to use Wireshark to capture and then...
CCNP BSCI Official Exam Certification Guide (4th Edition)
CCNP BSCI Official Exam Certification Guide (4th Edition)
CCNP BSCI Official Exam Certification Guide, Fourth Edition, is a best of breed Cisco® exam study guide that focuses specifically on the objectives for the BSCI exam. Successfully passing the BSCI 642-901 exam certifies that you have the knowledge and skills necessary to use advanced IP addressing and routing in implementing...
See MIPS Run, Second Edition
See MIPS Run, Second Edition
This second edition is not only a thorough update of the first edition, it is also a marriage of the best-known RISC architecture--MIPS--with the best-known open-source OS--Linux. The first part of the book begins with MIPS design principles and then describes the MIPS instruction set and programmers resources. It uses the MIPS32 standard as a...
Clsc Exam Certification Guide (Cisco Career Certification)
Clsc Exam Certification Guide (Cisco Career Certification)
CLSC Exam Certification Guide is a comprehensive preparation tool for the CLSC exam (#640-404) and Foundation Routing and Switching exam (#640-409). Coverage of all CLSC exam objectives ensures readers will arrive at a complete understanding of the exam topics. This title reviews the main features of the Catalyst family of switches and the...
Computational Intelligence in Reliability Engineering (Studies in Computational Intelligence)
Computational Intelligence in Reliability Engineering (Studies in Computational Intelligence)
This two-volume book covers the recent applications of computational intelligence techniques in reliability engineering. Research in the area of computational intelligence is growing rapidly due to the many successful applications of these new techniques in very diverse problems. “Computational Intelligence” covers many fields such as...
CCNA: Cisco Certified Network Associate Study Guide (Exam 640-802)
CCNA: Cisco Certified Network Associate Study Guide (Exam 640-802)
Let this in-depth guide prepare you for the latest CCNA exam

Approach the CCNA exam (640-802) with confidence through the detailed preparation you'll receive in this bestselling study guide from leading Cisco networking authority Todd Lammle. This new edition—updated to reflect the very latest changes in the CCNA exam—features...

Rough Sets and Current Trends in Computing: 4th International Conference, RSCTC 2004, Uppsala, Sweden, June 1-5, 2004
Rough Sets and Current Trends in Computing: 4th International Conference, RSCTC 2004, Uppsala, Sweden, June 1-5, 2004
This book constitutes the refereed proceedings of the 4th International Conference on Rough Sets and Current Trends in Computing, RSCTC 2004, held in Uppsala, Sweden in June 2004.

The 45 revised full papers and 60 revised short papers presented together with 3 invited papers and a bibliographic project report were carefully reviewed and...

Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading European researchers showing the present state and future directions of computer science research.

"Methods of Artificial Intelligence and Intelligent Agents" contains 13 contributions...

Result Page: 225 224 223 222 221 220 219 218 217 216 215 214 213 212 211 210 209 208 207 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy