 |
|
|
 Security of Mobile CommunicationsThe explosive demand for mobile communications is driving the development of wireless technology at an unprecedented pace. Unfortunately, this exceptional growth is also giving rise to a myriad of security issues at all levels — from subscriber to network operator to service provider.
Providing technicians and designers with a... |  |  Ubiquitous Computing Fundamentals…a must-read text that provides a historical lens to see how ubicomp has matured into a multidisciplinary endeavor. It will be an essential reference to researchers and those who want to learn more about this evolving field.
-From the Foreword, Professor Gregory D. Abowd, Georgia Institute of Technology ... |  |  Data Mining: Special Issue in Annals of Information SystemsOver the course of the last twenty years, research in data mining has seen a substantial increase in interest, attracting original contributions from various disciplines including computer science, statistics, operations research, and information systems. Data mining supports a wide range of applications, from medical decision making,... |
|
|
 Mashup Patterns: Designs and Examples for the Modern EnterpriseUsing new mashup tools and technologies, enterprise developers can impose their own APIs on everything from Web sites and RSS feeds to Excel and PDF files–transforming a world of content into their own customized informationsource. In Mashup Patterns, Michael Ogrinz applies the concept of software development... |  |  Microsoft Windows 7 UnleashedCovers Release Candidate of Windows 7.
With purchase of this book you will get a free online edition written on final product. See product registration ad in back of book for details.
Microsoft® Windows 7 Unleashed... |  |  |
|
| Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 |