Home | Amazing | Today | Tags | Publishers | Years | Search 
Managing and Mining Uncertain Data (Advances in Database Systems)
Managing and Mining Uncertain Data (Advances in Database Systems)

Uncertain data management has seen a revival in interest in recent years because of a number of new fields which utilize this kind of data. For example, in fields such as privacy-preserving data mining, additional errors may be added to data in order to mask the identity of the records. Often the data may be imputed using statistical methods...

Practical Studies in E-Government: Best Practices from Around the World
Practical Studies in E-Government: Best Practices from Around the World

Information and communication technology (ICT) is permeating all aspects of service management; in the public sector, ICT is improving the capacity of government agencies to provide a wide array of innovative services that benefit citizens. E-Government is emerging as a multidisciplinary field of research based initially on empirical insights...

Location-Based Services Handbook: Applications, Technologies, and Security
Location-Based Services Handbook: Applications, Technologies, and Security

Location-Based Services Handbook: Applications, Technologies, and Security is a comprehensive reference containing all aspects of essential technical information on location-based services (LBS) technology. With broad coverage ranging from basic concepts to research-grade material, it presents a much-needed overview of...

How to Do Everything MacBook
How to Do Everything MacBook

Easy-to-follow coverage of portable Macs, including the MacBook, MacBook Pro, and MacBook Air

How to Do Everything: MacBook strongly emphasizes the portability and other unique features of the laptop versions of the Mac, examining ports and jacks, discussing user accounts and privacy, managing multiple network connections,...

Network Security: A Decision and Game-Theoretic Approach
Network Security: A Decision and Game-Theoretic Approach

Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems. It provides the reader with a system-level theoretical understanding of...

802.11 Security
802.11 Security

802.11 Security covers the entire process of building secure 802.11-based wireless networks, in particular, the 802.11b ("Wi-Fi") specification. The authors provide detailed coverage of security issues unique to wireless networking, such as Wireless Access Points (WAP), bandwidth stealing, and the problematic Wired Equivalent...

Mike Meyers' CompTIA A Guide to Managing & Troubleshooting PCs Lab Manual, Third Edition
Mike Meyers' CompTIA A Guide to Managing & Troubleshooting PCs Lab Manual, Third Edition

Practice the IT Skills Essential for Your Success

  • 115+ lab exercises challenge you to solve problems based on realistic case studies
  • Step-by-step scenarios require you to think critically
  • Lab analysis tests measure your understanding of lab results
  • Key term quizzes help build...
Facebook for Grown-Ups
Facebook for Grown-Ups

Facebook started out as a social network for high school and college kids. But now grown-ups like you are getting connected, too–even if you use Facebook much differently than your kids do. If you’re a grown-up looking to join the Facebook bandwagon, Facebook for Grown-Ups is just the guide you...

Cloud Security: A Comprehensive Guide to Secure Cloud Computing
Cloud Security: A Comprehensive Guide to Secure Cloud Computing

Well-known security experts decipher the most challenging aspect of cloud computing-security

Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access...

Computers For Seniors For Dummies
Computers For Seniors For Dummies

Great advice on choosing a computer, getting online, and having fun!

Computers are an essential part of daily life these days, but they can be a bit intimidating at first. Computers For Seniors For Dummies, 2nd Edition gets you going with lots of illustrations and easy-to-follow-instructions, never assuming you already know...

SSL and TLS: Theory and Practice (Information Security and Privacy)
SSL and TLS: Theory and Practice (Information Security and Privacy)

SSL (secure socket layer) and TLS (Transport Layer Security) are widely deployed security protocols that are used in all kinds of web-based e-commerce and e-business applications and are part of most contemporary security systems available today. This practical book provides a comprehensive introduction to these protocols, offering you a...

Facebook: The Missing Manual
Facebook: The Missing Manual

Facebook's popularity is skyrocketing, drawing more than 400 million people to this combination online village green, personal website creator, and souped-up address book. But one thing you won't get when signing up is a printed manual. Enter Facebook: The Missing Manual, Second Edition -- the witty, authoritative...

Result Page: 40 39 38 37 36 35 34 33 32 31 30 29 28 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy