Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Understanding Search Engines: Mathematical Modeling and Text Retrieval (Software, Environments, Tools), Second Edition
Understanding Search Engines: Mathematical Modeling and Text Retrieval (Software, Environments, Tools), Second Edition
“There is no other information retrieval/search book where the heart is the mathematical foundations. This book is greatly needed to further establish information retrieval as a serious academic, as well as practical and industrial, area." ---Jaime Carbonell, Carnegie Mellon University. “Berry and Browne describe most of what...
MySpace Unraveled: What it is and how to use it safely
MySpace Unraveled: What it is and how to use it safely
Do you know what your children are up to on MySpace? MySpace Unraveled: What it is and how to use it safely discusses the booming MySpace social-networking phenomenon and shows you exactly what you need know about MySpace and how to create a safe online experience for your kids. Written by Larry Magid and Anne Collier of Family Tech...
A Word to the Wise: Traditional Advice and Old Country Ways
A Word to the Wise: Traditional Advice and Old Country Ways
If you've ever wondered whether carrots improve your vision (they do) and why elephants have great memories, consult A Word to the Wise. You'll discover that it's never too late to learn from a proverb or an old wives' tale. This captivating book is a fascinating compilation of age-old expressions and...
Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet
Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet

WHEN I FIRST MET BARRETT LYON in 2004, I was covering Internet security for the Los Angeles Times from an office in San Francisco. His story was so good—and met a journalistic need so deep—that I had a hard time believing it was true.

For more than a year, I had been grappling with an onslaught of urgent but...

Emerging Spatial Information Systems and Applications
Emerging Spatial Information Systems and Applications
Spatial information systems were created manually for many years. For example, historically, the source of cholera in London in 1854 was found by John Snow, by mapping where victims of the disease lived. The graph clearly showed them to be close to the Broad Street Pump,1 one of the city’s water wells. Another example is Zipf’s Law,2...
Knowledge-Based Software Engineering:  Proceedings of the Seventh Joint Conference on Knowledge-Based Software Engineering
Knowledge-Based Software Engineering: Proceedings of the Seventh Joint Conference on Knowledge-Based Software Engineering
This article proposes an automatic generation method of relation matrix for Interpretive Structural Modelling (ISM), which is a popular tool widely used for visualising problem structure, problem structure analysis, and decision making. In ISM, problems are divided into sub problems. Then hierarchy relations are introduced into the set of sub...
Adobe Photoshop CS2: Photographers' Guide
Adobe Photoshop CS2: Photographers' Guide
Photography and Photoshop go hand in hand. If you feel there isn?t enough photography in the average Photoshop book, and there isn?t enough Photoshop in the average photography book, then the book you?re looking for is right in your hands. This full-color book is packed with effective examples, simple to follow techniques, and tricks that serve as...
Look Both Ways: Help Protect Your Family on the Internet
Look Both Ways: Help Protect Your Family on the Internet
Learn the 14 ways in which you can help make the Internet a safer place for you and your family. You teach your children to look both ways before crossing the street. You tell them not to talk to strangers. But do you really know how to teach them to safely use the Internet? In this book, Linda Criddle, a leading child safety expert, offers a...
Computer Security in the 21st Century
Computer Security in the 21st Century

Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.

Highlights include...

The Handbook of Information and Computer Ethics
The Handbook of Information and Computer Ethics
This handbook provides an accessible overview of the most important issues in information and computer ethics. It covers: foundational issues and methodological frameworks; theoretical issues affecting property, privacy, anonymity, and security; professional issues and the information-related professions; responsibility issues and risk assessment;...
The Adventures of Tintin in the Land of the Soviets
The Adventures of Tintin in the Land of the Soviets

This new facsimile reprint of the very first adventure of one of the world's most beloved cartoon characters shows Tintin's creator, the famed Belgian cartoonist Herge, just beginning to learn his craft. The story was originally created in 1929 for a children's supplement in the Belgian newspaper Le Vingtieme Siecle. Readers meet Tintin,...

Mars, A Cosmic Stepping Stone: Uncovering Humanity's Cosmic Context
Mars, A Cosmic Stepping Stone: Uncovering Humanity's Cosmic Context
The questions of our origin and cosmic abundance of life are among the most compelling facing humanity. We have determined much about the nature and origin of the Universe and our place in it, but with virtually all evidence of our origin long since gone from our world and an unimaginably vast Universe still to explore, defining answers are...
unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy