Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ethics of Big Data: Balancing Risk and Innovation
Ethics of Big Data: Balancing Risk and Innovation

What are your organization’s policies for generating and using huge datasets full of personal information? This book examines ethical questions raised by the big data phenomenon, and explains why enterprises need to reconsider business decisions concerning privacy and identity. Authors Kord Davis and Doug Patterson provide...

An Introduction to Cryptography, Second Edition (Discrete Mathematics and Its Applications)
An Introduction to Cryptography, Second Edition (Discrete Mathematics and Its Applications)
Continuing a bestselling tradition, An Introduction to Cryptography, Second Edition provides a solid foundation in cryptographic concepts that features all of the requisite background material on number theory and algorithmic complexity as well as a historical look at the field. With numerous additions and restructured material, this edition...
A Concise Introduction to Data Compression (Undergraduate Topics in Computer Science)
A Concise Introduction to Data Compression (Undergraduate Topics in Computer Science)
Compressing data is an option naturally selected when faced with problems of high costs or restricted space. Written by a renowned expert in the field, this book offers readers a succinct, reader-friendly foundation to the chief approaches, methods and techniques currently employed in the field of data compression.

Part I presents the basic...

Information: A Very Short Introduction
Information: A Very Short Introduction

We live in a society that is awash with information, but few of us really understand what information is. In this Very Short Introduction, one of the world's leading authorities on the philosophy of information and on information ethics, Luciano Floridi, offers an illuminating exploration of information as it relates to both...

Variable-length Codes for Data Compression
Variable-length Codes for Data Compression
Most data compression methods that are based on variable-length codes employ the Huffman or Golomb codes. However, there are a large number of less-known codes that have useful properties - such as those containing certain bit patterns, or those that are robust - and these can be useful. This book brings this large set of codes to the attention of...
Quantum Cryptography and Secret-Key Distillation
Quantum Cryptography and Secret-Key Distillation
This book aims at giving an introduction to the principles and techniques of quantum cryptography, including secret-key distillation, as well as some more advanced topics. As quantum cryptography is now becoming a practical reality with products available commercially, it is important to focus not only on the theory of quantum...
Anti-Hacker Tool Kit, Fourth Edition
Anti-Hacker Tool Kit, Fourth Edition

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best...

Data Matching: Concepts and Techniques for Record Linkage, Entity Resolution, and Duplicate Detection (Data-Centric Systems and Applications)
Data Matching: Concepts and Techniques for Record Linkage, Entity Resolution, and Duplicate Detection (Data-Centric Systems and Applications)

Data matching (also known as record or data linkage, entity resolution, object identification, or field matching) is the task of identifying, matching and merging records that correspond to the same entities from several databases or even within one database. Based on research in various domains including applied statistics, health...

Microsoft Windows XP: Do Amazing Things!
Microsoft Windows XP: Do Amazing Things!

Who knows what cool things you could be doing right now with Windows XP? You do! So let’s go—it’s time to have some fun and amaze yourself with all you can do with your PC! This friendly, fast-paced guide highlights dozens of activities and experiences—and shares the straightforward how-to’s for trying everything...

Real World Linux Security (2nd Edition)
Real World Linux Security (2nd Edition)

 

Stop today's most vicious Internet attackers—right in their tracks!

Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or...

The SSCP Prep Guide: Mastering the Seven Key Areas of System Security
The SSCP Prep Guide: Mastering the Seven Key Areas of System Security
A one-stop source of security and privacy information for IT professionals, covering everything you’ll need to know to pass the Systems Security Certified Practitioner examination

This prep guide and general reference will help you breeze through the SSCP security certification test by greatly enhancing your understanding of how to...

Unit and Ubiquitous Internet of Things
Unit and Ubiquitous Internet of Things

Although the Internet of Things (IoT) will play a key role in the development of next generation information, network, and communication technologies, many are still unclear about what makes IoT different from similar concepts.

Answering fundamental questions about IoT architectures and models, Unit and Ubiquitous
...

Result Page: 36 35 34 33 32 31 30 29 28 27 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy