Home | Amazing | Today | Tags | Publishers | Years | Search 
Biometric Recognition: Challenges and Opportunities
Biometric Recognition: Challenges and Opportunities

Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric...

OpenSocial Network Programming (Wrox Programmer to Programmer)
OpenSocial Network Programming (Wrox Programmer to Programmer)
OpenSocial is a set of common application programming interfaces for Web-based social network applications. As the first book on OpenSocial, this valuable resource discusses the unique area of social networking and the needs and different attributes of social network applications. You?ll get step-by-step instructions for creating OpenSocial...
JBoss Portal Server Development
JBoss Portal Server Development
Enterprises need more than just basic services; they need value-creating entities, which are crucial for running a successful business. Portals offer tremendous value to enterprises, and JBoss Portal Server is a popular, feature-rich open-source server that provides a standards-compliant platform for hosting functionality that serves the diverse...
Microsoft Content Management Server Field Guide
Microsoft Content Management Server Field Guide
Microsoft Content Management Server Field Guide  provides simple crisis-management instructions for intermediate- to advanced-level network administrators who work in the trenches. It offers practical procedural information, reference materials, and focused presentations. This book also features self-contained topics so you do not have to look...
trixbox CE 2.6
trixbox CE 2.6

The open source telephony platform trixbox CE is designed to implement a PBX system with features typically reserved for large enterprise businesses. trixBox allows an individual or organization to set up a telephone system with traditional telephone networks as well as internet-based telephony or VoIP. The task is time consuming and involves a...

Liferay Portal 5.2 Systems Development
Liferay Portal 5.2 Systems Development
Liferay portal is one of the most mature portal frameworks in the market, offering many key business benefits that involve personalization, customization, and workflow. If you are a Java developer who wants to build custom web sites and intranet applications using Liferay portal, this is where your search ends.

This book shows how Java...

Minds, Machines, and the Multiverse: The Quest for the Quantum Computer
Minds, Machines, and the Multiverse: The Quest for the Quantum Computer
Just how smart can computers get? Science journalist Julian Brown takes a hard look at the spooky world of quantum computation in Minds, Machines, and the Multiverse--and his report is optimistic. Based in large part on the groundbreaking work of David Deutsch, the book mostly sidesteps the shouting matches of the AI debate and...
Cellular Authentication for Mobile and Internet  Services
Cellular Authentication for Mobile and Internet Services
An invaluable reference discussing the Generic Authentication   Architecture (GAA), its infrastructure, usage and integration into existing networks

Cellular Authentication for Mobile and Internet Services introduces the reader into the field of secure communication for mobile applications, including secure...

Bioinformatics - From Genomes to Therapies
Bioinformatics - From Genomes to Therapies
"This treatise on bioinformatics is an excellent reference set to use as additional reading in advanced undergraduate and graduate courses..."
(ChemMedChem, October 2007)

Once again, Thomas Lengauer has succeeded in creating a comprehensive and immensely useful resource that meets even the high
...
Advanced Web Technologies and Applications
Advanced Web Technologies and Applications
This book constitutes the refereed proceedings of the 6th Asia-Pacific Web Conference, APWeb 2004, held in Hangzhou, China, in April 2004.

The 60 revised full papers, 24 revised short papers, 15 revised poster papers, and 3 revised industrial papers presented together with 3 keynote papers and 3 invited papers were carefully reviewed and...

Embedded Security in Cars: Securing Current and Future Automotive IT Applications
Embedded Security in Cars: Securing Current and Future Automotive IT Applications
Most innovations in the car industry are based on software and electronics, and IT will soon constitute the major production cost factor. It seems almost certain that embedded IT security will be crucial for the next generation of applications. Yet whereas software safety has become a relatively well-established field, the protection of automotive...
Moving to Microsoft Windows Vista: Visual QuickProject Guide
Moving to Microsoft Windows Vista: Visual QuickProject Guide
The Visual QuickProject Guide you’re reading o􀈔 ers a unique way to learn new skills. Instead of boring you with long text descriptions, this book uses color screen shots with clear, concise, step-by-step instructions to show you how to complete a specifi c project in a matter of minutes.

The short projects in this book
...
Result Page: 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy