Home | Amazing | Today | Tags | Publishers | Years | Search 
Practical Studies in E-Government: Best Practices from Around the World
Practical Studies in E-Government: Best Practices from Around the World

Information and communication technology (ICT) is permeating all aspects of service management; in the public sector, ICT is improving the capacity of government agencies to provide a wide array of innovative services that benefit citizens. E-Government is emerging as a multidisciplinary field of research based initially on empirical insights...

Managing and Mining Uncertain Data (Advances in Database Systems)
Managing and Mining Uncertain Data (Advances in Database Systems)

Uncertain data management has seen a revival in interest in recent years because of a number of new fields which utilize this kind of data. For example, in fields such as privacy-preserving data mining, additional errors may be added to data in order to mask the identity of the records. Often the data may be imputed using statistical methods...

Identity Management: Concepts, Technologies, and Systems
Identity Management: Concepts, Technologies, and Systems

Digital identity can be defined as the digital representation of the information known about a specific individual or organization. Digital identity management technology is an essential function in customizing and enhancing the network user experience, protecting privacy, underpinning accountability in transactions and interactions, and...

Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems

For generations, people have defined and protected their property and their privacy using locks, fences, signatures, seals, account books, and meters. These have been supported by a host of social constructs ranging from international treaties through national laws to manners and customs.

This is changing, and quickly. Most records...

Sams Teach Yourself Foursquare in 10 Minutes (Sams Teach Yourself -- Minutes)
Sams Teach Yourself Foursquare in 10 Minutes (Sams Teach Yourself -- Minutes)

A clear, super quick, easy-to-understand guide for new Foursquare users

Foursquare is a location based social network for mobile devices that incorporates gaming elements

With more than 1 million users it is verging on breaking out into the mainstream

This is the first book on...

RFID Systems: Research Trends and Challenges
RFID Systems: Research Trends and Challenges

This book provides an insight into the 'hot' field of Radio Frequency Identification (RFID) Systems

In this book, the authors provide an insight into the field of RFID systems with an emphasis on networking aspects and research challenges related to passive Ultra High Frequency (UHF) RFID systems. The book reviews...

Understanding Voice over IP Security (Artech House Telecommunications Library)
Understanding Voice over IP Security (Artech House Telecommunications Library)

VoIP is poised to take over from the century-old public switched telephone network (PSTN). But VoIP telephony does not enjoy the same privacy as the old PSTN. This is because PSTN phone calls were based on establishing a “closed circuit” between the two parties, while VoIP phone calls send packets through the Internet, which...

New Frontiers in Information and Software as Services: Service and Application Design Challenges in the Cloud
New Frontiers in Information and Software as Services: Service and Application Design Challenges in the Cloud

The increasing costs of creating and maintaining infrastructures for delivering services to consumers have led to the emergence of cloud based third party service providers renting networks, computation power, storage, and even entire software application suites. On the other hand, service customers demand competitive pricing, service level...

Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011
Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011

These are the proceedings of TCC 2011, the 8th Theory of Cryptography Conference, which was held in Brown University, Providence, RI, during March 28–30, 2011. The conference was sponsored by the International Association for Cryptologic Research (IACR). The General Chair was Anna Lysyanskaya.

The Program Committee,...

Adaptive Hypermedia and Adaptive Web-Based Systems: 5th International Conference, AH 2008
Adaptive Hypermedia and Adaptive Web-Based Systems: 5th International Conference, AH 2008

Adaptive Hypermedia has emerged as an important area of both academic and deployed research. It encompasses a broad range of research that will enable personalized, adaptive hypermedia systems to play an even more effective role in people’s lives. The Web has enabled the widespread use of many personalized systems, such as recommenders,...

Semantic Web for the Working Ontologist, Second Edition: Effective Modeling in RDFS and OWL
Semantic Web for the Working Ontologist, Second Edition: Effective Modeling in RDFS and OWL

Since the first edition of Semantic Web for the Working Ontologist came out in June 2008, we have been encouraged by the reception the book has received. Practitioners from a wide variety of industries— health care, energy, environmental science, life sciences, national intelligence, and publishing, to name a few—have told...

Sams Teach Yourself Facebook in 10 Minutes (2nd Edition)
Sams Teach Yourself Facebook in 10 Minutes (2nd Edition)

With more than 400 million active users and growing, it’s hard to ignore the buzz about Facebook. It’s a hot topic these days, and shows no signs of letting up. If you’re ready to get to the bottom of this Internet sensation and find out how to use this social networking phenomenon for yourself,...

Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy