Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Art of War in the Network Age: Back to the Future (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)
The Art of War in the Network Age: Back to the Future (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)

Previous studies have looked at the contribution of information technology and network theory to the art of warfare as understood in the broader sense. This book, however, focuses on an area particularly important in understanding the significance of the information revolution; its impact on strategic theory. The purpose of the book is to...

Cryptography: A Very Short Introduction
Cryptography: A Very Short Introduction

We are surrounded by cryptography, from the ATM, where we withdraw cash, mobile phones, and the Internet, to workplace security systems that protect business secrets, and the civil and military codes that protect the skies above us.

In this fascinating introduction to how cryptography actually works, Fred Piper and Sean Murphy highlight...

Fundamentals of Predictive Text Mining (Texts in Computer Science)
Fundamentals of Predictive Text Mining (Texts in Computer Science)

Five years ago, we authored “Text Mining: Predictive Methods for Analyzing Unstructured Information.” That book was geared mostly to professional practitioners, but was adaptable to course work with some effort by the instructor. Many topics were evolving, and this was one of the earliest efforts to collect material for predictive...

Algorithms and Protocols for Wireless Sensor Networks (Wiley Series on Parallel and Distributed Computing)
Algorithms and Protocols for Wireless Sensor Networks (Wiley Series on Parallel and Distributed Computing)
Boukerche is well-known and established international researcher in the field of wireless mobile networks and distributed systems. This is one of the first publications to focus on wireless ad hoc and sensor networks with a concentration on algorithms and protocols providing you with a comprehensive resource to learn about the continuous advances...
Middleware for Network Eccentric and Mobile Applications
Middleware for Network Eccentric and Mobile Applications
Middleware is a critical foundation needed to leverage the development of a wide range of mobile and ubiquitous applications. Intrinsic challenges when building such middleware require the combination of expertise from areas like distributed systems, networking, software engineering, and application development.

This textbook provides a...

The Myths of Security: What the Computer Security Industry Doesn't Want You to Know
The Myths of Security: What the Computer Security Industry Doesn't Want You to Know
If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. Why is...
Hacking Exposed Wireless
Hacking Exposed Wireless

Secure Your Wireless Networks the Hacking Exposed Way

Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute...

Information Retrieval and Mining in Distributed Environments (Studies in Computational Intelligence)
Information Retrieval and Mining in Distributed Environments (Studies in Computational Intelligence)

At DART'09, held in conjunction with the 2009 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2009) and Intelligent Agent Technology (IAT 2009) in Milan (Italy), practitioners and researchers working on pervasive and intelligent access to web services and distributed information retrieval met to compare their work ad...

Computer Vision
Computer Vision
Scientists and science fiction writers have long been fascinated by the possibility of building intelligent machines and the capability of understanding the visual world is a prerequisite for such a machine. This book speaks to the notable research progress being conducted and brings together the important problem areas where computer vision is...
Cartesian Reflections: Essays on Descartes's Philosophy
Cartesian Reflections: Essays on Descartes's Philosophy
John Cottingham explores central areas of Descartes's rich and wide-ranging philosophical system, including his accounts of thought and language, of freedom and action, of our relationship to the animal domain, and of human morality and the conduct of life. He also examines ways in which his philosophy has been misunderstood. The Cartesian...
The Birth of Satan: Tracing the Devil's Biblical Roots
The Birth of Satan: Tracing the Devil's Biblical Roots
"An informative study of the biblical origins of Satan…With resourceful though never excessive citation, Mobley and Wray make a good job of pinning down the roots of a notoriously protean character."--The Times Literary Supplement

"Let's admit it. Even in a secular age we are all still
...
Integriertes Roadmapping: Nachhaltigkeitsorientierung in Innovationsprozessen des Pervasive Computing
Integriertes Roadmapping: Nachhaltigkeitsorientierung in Innovationsprozessen des Pervasive Computing

Innovationen entziehen sich immer deutlicher einer technologisch verkürzten Sichtweise. Angesichts der gestiegenen Dynamik und Komplexität der Umfeldbedingungen für Unternehmen kommen der Früherkennung und dem Monitoring technologischer, wirtschaftlicher, politischer und gesellschaftlicher Entwicklungen immer...

Result Page: 18 17 16 15 14 13 12 11 10 9 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy