Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Data Protection in a Profiled World
Data Protection in a Profiled World

One of the most challenging issues facing our current information society is the accelerating accumulation of data trails in transactional and communication systems, which may be used not only to profile the behaviour of individuals for commercial, marketing and law enforcement purposes, but also to locate and follow things and actions. Data...

Cross-Modal Analysis of Speech, Gestures, Gaze and Facial Expressions: COST Action 2102 International Conference Prague, Czech Republic, October
Cross-Modal Analysis of Speech, Gestures, Gaze and Facial Expressions: COST Action 2102 International Conference Prague, Czech Republic, October

This volume brings together the peer-reviewed contributions of the participants at the COST 2102 International Conference on “Cross-Modal Analysis of Speech, Gestures, Gaze and Facial Expressions” held in Prague, Czech Republic, October 15–18, 2008. The conference was sponsored by COST (European Cooperation in the Field of...

AdvancED Flex 3
AdvancED Flex 3
Whether you're a Flex 3 beginner or intermediate user, this book provides the necessary information to help you develop into an expert. Using a practical hands-on approach, it illustrates exactly how to create robust and scalable enterprise-grade Rich Internet Applications (RIAs).

The book is divided into three parts. The first part discusses...

Learning Red Hat Linux
Learning Red Hat Linux
The third edition of Learning Red Hat Linux guides you through the process of installing and running Red Hat Linux on your PC. Written in a friendly, easy-to-understand style, this book contains all you need to get started . With new tutorials covering OpenOffice Tools and the desktop, this book is excellent for...
Java Servlet Programming, 2nd Edition
Java Servlet Programming, 2nd Edition

Since I wrote the first edition of this book, servlets and the server-side Java platform have grown in popularity beyond everyone's wildest expectations. Adoption is pervasive. Web server vendors now offer servlet support as a standard feature. The Java 2, Enterprise Edition (J2EE), specification has included servlets...

Virtual Honeypots: From Botnet Tracking to Intrusion Detection
Virtual Honeypots: From Botnet Tracking to Intrusion Detection
Honeypots have demonstrated immense value in Internet security, but physical honeypot deployment can be prohibitively complex, time-consuming, and expensive. Now, there’s a breakthrough solution. Virtual honeypots share many attributes of traditional honeypots, but you can run thousands of them on a single system-making them easier and...
Space Physics and Aeronomy, Ionosphere Dynamics and Applications (Geophysical Monograph Series Book 260) 1st Edition
Space Physics and Aeronomy, Ionosphere Dynamics and Applications (Geophysical Monograph Series Book 260) 1st Edition

A comprehensive review of global ionospheric research from the polar caps to equatorial regions

It's more than a century since scientists first identified the ionosphere, the layer of the Earth’s upper atmosphere that is ionized by solar and cosmic radiation. Our understanding of this dynamic part of the...

The Official Damn Small Linux(R) Book: The Tiny Adaptable Linux(R) That Runs on Anything (Negus Live Linux Series)
The Official Damn Small Linux(R) Book: The Tiny Adaptable Linux(R) That Runs on Anything (Negus Live Linux Series)
Damn Small Linux (DSL) started as an exercise by John Andrews to fit an entire desktop computer system into a compressed 50MB image. Within a few years, DSL grew to one of the most popular Linux systems in the world (in the Top Ten, by some accounts) without growing beyond that 50MB target.

In a world where desktop systems are...

Fedora Core 7 & Red Hat Enterprise Linux: The Complete Reference
Fedora Core 7 & Red Hat Enterprise Linux: The Complete Reference
The Red Hat Linux and Fedora distributions have become one of the major Linux distributions, bringing to the PC all the power and flexibility of a Unix workstation as well as a complete set of Internet applications and a fully functional desktop interface. This book is designed not only to be a complete reference on Linux, but also to provide clear...
Art of Computer Programming, Volume 2: Seminumerical Algorithms (3rd Edition)
Art of Computer Programming, Volume 2: Seminumerical Algorithms (3rd Edition)

The bible of all fundamental algorithms and the work that taught many of today's software developers most of what they know about computer programming.

 

Byte, September 1995

 

...
Your Money: The Missing Manual
Your Money: The Missing Manual
Keeping your financial house in order is more important than ever. But how do you deal with expenses, debt, taxes, and retirement without getting overwhelmed? This book points the way. It's filled with the kind of practical guidance and sound insights that makes J.D. Roth's GetRichSlowly.org a critically acclaimed source of...
Ruby In A Nutshell
Ruby In A Nutshell
Ruby in a Nutshell is a practical reference covering everything from Ruby syntax to the specifications of its standard class libraries. With portability and convenience in mind, I have arranged it into a concise tool that provides just the information you need while programming. Although this book is based on Ruby 1.6.5, its contents should remain...
unlimited object storage image
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy