Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Android Malware (SpringerBriefs in Computer Science)
Android Malware (SpringerBriefs in Computer Science)

Mobile devices, such as smart phones, have achieved computing and networking capabilities comparable to traditional personal computers. Their successful consumerization has also become a source of pain for adopting users and organizations. In particular, the widespread presence of information-stealing applications and other types of mobile...

Spoken Multimodal Human-Computer Dialogue in Mobile Environments (Text, Speech and Language Technology)
Spoken Multimodal Human-Computer Dialogue in Mobile Environments (Text, Speech and Language Technology)
The ongoing migration of computing and information access from stationary environments to mobile computing devices for eventual use in mobile environments, such as Personal Digital Assistants (PDAs), tablet PCs, next generation mobile phones, and in-car driver assistance systems, poses critical challenges for natural human-computer interaction....
Location-Based Services Handbook: Applications, Technologies, and Security
Location-Based Services Handbook: Applications, Technologies, and Security

Location-Based Services Handbook: Applications, Technologies, and Security is a comprehensive reference containing all aspects of essential technical information on location-based services (LBS) technology. With broad coverage ranging from basic concepts to research-grade material, it presents a much-needed overview of...

Wireless Security Essentials: Defending Mobile Systems from Data Piracy
Wireless Security Essentials: Defending Mobile Systems from Data Piracy
Protect your wireless systems from attack with this clear-cut guide on how to implement proven security methodologies

Effective security is the most important element now missing from most wireless networks. Vulnerabilities in these networks leave them open to eavesdropping, session highjacking, data alteration and manipulation,
...
UX Fundamentals for Non-UX Professionals: User Experience Principles for Managers, Writers, Designers, and Developers
UX Fundamentals for Non-UX Professionals: User Experience Principles for Managers, Writers, Designers, and Developers
What can a WWII-era tank teach us about design? What does a small, blue flower tell us about audiences? What do drunk, French marathon-runners show us about software? In 40+ chapters and stories, you will learn the ways in which UX has influenced history and vice versa, and how it continues to change our daily lives. ...
Big Data Imperatives: Enterprise Big Data Warehouse, BI Implementations and Analytics (The Expert's Voice)
Big Data Imperatives: Enterprise Big Data Warehouse, BI Implementations and Analytics (The Expert's Voice)

Big Data Imperatives, focuses on resolving the key questions on everyone’s mind: Which data matters? Do you have enough data volume to justify the usage? How you want to process this amount of data? How long do you really need to keep it active for your analysis, marketing, and BI applications?

Big data is emerging...

Handbook of Data Intensive Computing
Handbook of Data Intensive Computing
This handbook is carefully edited book – contributors are worldwide experts in the field of data intensive computing and their applications. The scope of the book includes leading edge data intensive computing architectures and systems, innovative storage, virtualization, and parallel processing technologies applied in...
Fixing Windows XP Annoyances : How to Fix the Most Annoying Things About the Windows OS
Fixing Windows XP Annoyances : How to Fix the Most Annoying Things About the Windows OS

Windows XP is the most popular operating system on the planet--and the most annoying. From incomprehensible error messages to inexplicable crashes, from wonky wireless setups to just finding a file, Windows can make your computing life a nightmare. But thanks to Fixing Windows XP Annoyances, you...

Web Services Security and E-business
Web Services Security and E-business
Many techniques, algorithms, protocols, and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality, and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols,...
Windows 10 All-In-One For Dummies
Windows 10 All-In-One For Dummies
The most comprehensive guide to Windows 10, updated with the latest enhancements

If you're new to Windows 10 and want an authoritative and accessible guide to the basics of the widely used operating system, Windows 10 All-in-One For Dummies is the book for you. Written by trusted Windows expert Woody Leonhard,...

Sams Teach Yourself Google+ in 10 Minutes (Sams Teach Yourself -- Minutes)
Sams Teach Yourself Google+ in 10 Minutes (Sams Teach Yourself -- Minutes)

Sams Teach Yourself Google™+ in 10 Minutes gives you straightforward, practical answers when you need fast results. Work through its 10-minute lessons to jumpstart your Google+ experience...and then use today’s hottest social network to connect with everyone and everything you care about!  

...
Using Social Media for Global Security
Using Social Media for Global Security

Essential reading for cybersecurity professionals, security analysts, policy experts, decision-makers, activists, and law enforcement!

During the Arab Spring movements, the world witnessed the power of social media to dramatically shape events. Now this timely book shows government decision-makers, security analysts, and...

unlimited object storage image
Result Page: 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy