 |
|
 How to Do Everything with Windows XPGet the most out of Windows XP using this friendly, solutions-oriented guide. See how much you can do with the world’s most popular operating system--including making movies and playing music--and learn about all its new updates such as networking for both home and office, faster boot features, better security, and improved Web browsing.... |  |  The Psychology of the InternetThis timely volume explores the psychological aspects of cyberspace, a virtual world in which people from around the globe are acting and interacting in many new, unusual, and occasionally alarming ways. Drawing on research in the social sciences, communications, business, and other fields, Patricia Wallace examines how the online environment can... |  |  Managing and Mining Multimedia DatabasesReading Data Mining by Bhavani Thuraisingham is a poignant experience masterful and readable summary of her field...a profound overview of an important domain of human knowledge a memorable opus. -Dr. Dobb's Journal
There is now so much data on the Web that managing it with conventional tools is becoming almost... |
|
 E-government Research: Policy and ManagementVirtual technology is increasingly prevalent in all spheres of daily life, including infiltration into governmental policies, processes, infrastructures, and frameworks. E-Government Research: Policy and Management provides scholars and practitioners with a critical mass of research on the integration, management, implications,... |  |  RFID Technology and ApplicationsThis book is addressed to business management and project managers as well as researchers who are evaluating the use of radio frequency identification (RFID) for tracking uniquely identified objects. In an effort to make RFID project management less of an art form and more of a science RFID Technology and Applications brings together pioneering... |  |  |
|
|
 Web Services Security and E-businessMany techniques, algorithms, protocols, and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality, and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols,... |  |  On the Way to the Web: The Secret History of the Internet and Its FoundersOn the Way to the Web: The Secret History of the Internet and Its Founders is an absorbing chronicle of the inventive, individualistic, and often cantankerous individuals who set the Internet free. Michael A. Banks describes how the online population created a new culture and turned a new frontier into their vision of the... |  |  Mobile Telemedicine: A Computing and Networking PerspectiveWireless and mobile telemedicine has drawn attention from health care providers and recipients, governments, industry, and researchers. Th ough various practices have been exercised, the realization of telemedicine depends on advances in computing and networking techniques. In recent decades technological development in computing and networking has... |
|
| Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 |