Home | Amazing | Today | Tags | Publishers | Years | Search 
How to Do Everything with Windows XP
How to Do Everything with Windows XP
Get the most out of Windows XP using this friendly, solutions-oriented guide. See how much you can do with the world’s most popular operating system--including making movies and playing music--and learn about all its new updates such as networking for both home and office, faster boot features, better security, and improved Web browsing....
The Psychology of the Internet
The Psychology of the Internet
This timely volume explores the psychological aspects of cyberspace, a virtual world in which people from around the globe are acting and interacting in many new, unusual, and occasionally alarming ways. Drawing on research in the social sciences, communications, business, and other fields, Patricia Wallace examines how the online environment can...
Managing and Mining Multimedia Databases
Managing and Mining Multimedia Databases
Reading Data Mining by Bhavani Thuraisingham is a poignant experience masterful and readable summary of her field...a profound overview of an important domain of human knowledge a memorable opus.
-Dr. Dobb's Journal

There is now so much data on the Web that managing it with conventional tools is becoming almost
...
E-government Research: Policy and Management
E-government Research: Policy and Management
Virtual technology is increasingly prevalent in all spheres of daily life, including infiltration into governmental policies, processes, infrastructures, and frameworks. E-Government Research: Policy and Management provides scholars and practitioners with a critical mass of research on the integration, management, implications,...
RFID Technology and Applications
RFID Technology and Applications
This book is addressed to business management and project managers as well as researchers who are evaluating the use of radio frequency identification (RFID) for tracking uniquely identified objects. In an effort to make RFID project management less of an art form and more of a science RFID Technology and Applications brings together pioneering...
Digital Rights Management: Protecting and Monetizing Content (NAB Executive Technology Briefings)
Digital Rights Management: Protecting and Monetizing Content (NAB Executive Technology Briefings)
"The author, who specialises in digital and interactive media, sets out the arguments with a view to readers being able to make informed decisions on the issues before them." -Book Shelf

Digital rights management (DRM) is a type of server software developed to enable secure distribution - and perhaps more
...
Insider Attack and Cyber Security: Beyond the Hacker (Advances in Information Security)
Insider Attack and Cyber Security: Beyond the Hacker (Advances in Information Security)
Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Information Security Departments of Columbia...
IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002
IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002

Information is widely regarded as the lifeblood of modern business, but organizations are facing a flood of threats to such “intellectual capital” from hackers, viruses, and online fraud.  Directors must respond to increasingly complex and competing...

RFID for the Optimization of Business Processes
RFID for the Optimization of Business Processes
Prof. Elgar Fleisch, ETH Zürich and University of St. Gallen:

"A comprehensive, clear and practical introduction for RFID designers."

Prof. Rolf Jansen, Faculty of Logistics, Dortmund University:

"The book comprehensively deals with the topic in a solution-oriented way, expertly conveying...

Web Services Security and E-business
Web Services Security and E-business
Many techniques, algorithms, protocols, and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality, and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols,...
On the Way to the Web: The Secret History of the Internet and Its Founders
On the Way to the Web: The Secret History of the Internet and Its Founders
On the Way to the Web: The Secret History of the Internet and Its Founders is an absorbing chronicle of the inventive, individualistic, and often cantankerous individuals who set the Internet free. Michael A. Banks describes how the online population created a new culture and turned a new frontier into their vision of the...
Mobile Telemedicine: A Computing and Networking Perspective
Mobile Telemedicine: A Computing and Networking Perspective
Wireless and mobile telemedicine has drawn attention from health care providers and recipients, governments, industry, and researchers. Th ough various practices have been exercised, the realization of telemedicine depends on advances in computing and networking techniques. In recent decades technological development in computing and networking has...
Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy