Home | Amazing | Today | Tags | Publishers | Years | Search 
An Introduction to Knowledge Engineering
An Introduction to Knowledge Engineering
An Introduction to Knowledge Engineering presents a simple but detailed exploration of current and established work in the field of knowledge-based systems and related technologies. Its treatment of the increasing variety of such systems is designed to provide the reader with a substantial grounding in such technologies as expert systems, neural...
CCNP ONT Official Exam Certification Guide
CCNP ONT Official Exam Certification Guide
CCNP ONT Official Exam Certification Guide is an excellent self-study resource for the 642-845 ONT exam. Passing the exam certifies that the successful candidate has important knowledge and skills in optimizing and providing effective QoS techniques for converged networks. Passing the exam is one of the requirements for the Cisco Certified Network...
Grid Computing: Experiment Management, Tool Integration, and Scientific Workflows (Lecture Notes in Computer Science)
Grid Computing: Experiment Management, Tool Integration, and Scientific Workflows (Lecture Notes in Computer Science)
Grid computing has become a topic of significant interest in the scientific community as a means of enabling application developers to aggregate resources scattered around the globe for solving large-scale scientific problems. This monograph addresses four critical software development aspects for the engineering and execution of applications on...
Mike Meyers' A+ Guide to Managing and Troubleshooting PCs Lab Manual, Second Edition
Mike Meyers' A+ Guide to Managing and Troubleshooting PCs Lab Manual, Second Edition
Practice the IT Skills Essential for Your Success

  • 60+ lab exercises challenge you to solve problems based on realistic case studies
  • Step-by-step scenarios require you to think critically
  • Lab analysis tests measure your understanding of lab results...
Business Continuity and Disaster Recovery for InfoSec Managers
Business Continuity and Disaster Recovery for InfoSec Managers
Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or
communications systems. Since 9/11 it has become increasingly important for companies to implement a
plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security
management requirements of
...
Home Theater For Dummies (Computer/Tech)
Home Theater For Dummies (Computer/Tech)

A low-tech way to understand a high-tech system!

Create the home entertainment center that fits your home and your tastes

Gadget fans, a home theater setup is the stuff your dreams are made of. This book keeps the dream from becoming a nightmare! Here's how to select, set up, and optimize a system, translate the salesperson's...

Grid Computing Security
Grid Computing Security
Grid computing is widely regarded as a technology of immense potential in both industry and academia. Yet many enterprises are still hesitant about the implementation of an enterprise-level grid system, due to the lack of consistent and widely used standards. Security is probably the most important concern and needs both close understanding and...
Computational Intelligence in Economics and Finance: Volume II
Computational Intelligence in Economics and Finance: Volume II
Computational intelligence (CI), as an alternative to statistical and econometric approaches, has been applied to a wide range of economics and finance problems in recent years, for example to price forecasting and market efficiency.

This book contains research ranging from applications in financial markets and business administration to...

Spatial Data on the Web: Modeling and Management
Spatial Data on the Web: Modeling and Management
Spatial data is essential in a wide range of application domains today. While geographical applications remain the key target area, spatial properties are required in other contexts such as computer-aided design, robotics and image processing. Associated with these is the constantly growing number of distributed processing architectures, based on,...
Java Methods for Financial Engineering: Applications in Finance and Investment
Java Methods for Financial Engineering: Applications in Finance and Investment
In order to build a successful, Java-based application it is important to have a clear understanding of the principles underlying the various financial models. Those models guide the application designer in choosing the most appropriate Java data structures and implementation strategy. This book describes the principles of model building in...
Synchronizing Internet Protocol Security (SIPSec) (Advances in Information Security)
Synchronizing Internet Protocol Security (SIPSec) (Advances in Information Security)
The open design of the internet has not only opened many new opportunities for communications, but it has also opened many new avenues for attacks against organizational network and computing resources. Information security has become a major concern in recent times, as more and more computers are being connected to the global internet. With so...
WiMAX / MobileFi: Advanced Research and Technology
WiMAX / MobileFi: Advanced Research and Technology
WiMAX is bringing about a worldwide revolution in broadband wireless access, including both fixed and mobile handsets. The IEEE 802.16 working group standardized most aspects of WiMAX signaling messages. However, several algorithms were left unspecified opening the door for innovations in protocol engineering for 802.16/802.20-based broadband...
Result Page: 269 268 267 266 265 264 263 262 261 260 259 258 257 256 255 254 253 252 251 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy