Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
RFID Handbook: Applications, Technology, Security, and Privacy
RFID Handbook: Applications, Technology, Security, and Privacy
Radio Frequency Identification (RFID) tagging is now used by the department of defense and many of the worlds largest retailers including Wal-Mart. As RFID continues to infiltrate industries worldwide, organizations must harness a clear understanding of this technology in order to maximize its potential and protect against the potential risks it...
Legal Programming: Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond
Legal Programming: Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond
"Thought-provoking and far-sighted, this book provides a detailed analysis of the legal issues involved in on-line business and how a new generation of electronic agents can help. If you’re grappling with these issues today—or if you just want to see what’s coming tomorrow—this book is an excellent place to...
Facebook: The Missing Manual
Facebook: The Missing Manual

Facebook's popularity is skyrocketing, drawing more than 400 million people to this combination online village green, personal website creator, and souped-up address book. But one thing you won't get when signing up is a printed manual. Enter Facebook: The Missing Manual, Second Edition -- the witty, authoritative...

The Cambridge Handbook of Information and Computer Ethics
The Cambridge Handbook of Information and Computer Ethics

Information and Communication Technologies (ICTs) have profoundly changed many aspects of life, including the nature of entertainment, work, communication, education, healthcare, industrial production and business, social relations and conflicts. They have had a radical and widespread impact on our moral lives and hence on contemporary...

CyberForensics: Understanding Information Security Investigations (Springer's Forensic Laboratory Science Series)
CyberForensics: Understanding Information Security Investigations (Springer's Forensic Laboratory Science Series)
The introduction was composed by Jennifer L. Bayuk, the editor of this volume. It briefly describes the history of the cyberforensics field and places the subsequent chapters into context. The last section of the introduction, Expert Explanations, describes the format of the following sections and also how the sections complement...
Privacy at Risk: The New Government Surveillance and the Fourth Amendment
Privacy at Risk: The New Government Surveillance and the Fourth Amendment
"The discussion of surveillance techniques is excellent, the legal analysis is sound, and the case for Fourth Amendment reform compelling. Recommended."-Choice (D. E. Smith Choice )

Without our consent and often without our knowledge, the government can constantly...
Semantic Web for the Working Ontologist, Second Edition: Effective Modeling in RDFS and OWL
Semantic Web for the Working Ontologist, Second Edition: Effective Modeling in RDFS and OWL

Since the first edition of Semantic Web for the Working Ontologist came out in June 2008, we have been encouraged by the reception the book has received. Practitioners from a wide variety of industries— health care, energy, environmental science, life sciences, national intelligence, and publishing, to name a few—have told...

Data Matching: Concepts and Techniques for Record Linkage, Entity Resolution, and Duplicate Detection (Data-Centric Systems and Applications)
Data Matching: Concepts and Techniques for Record Linkage, Entity Resolution, and Duplicate Detection (Data-Centric Systems and Applications)

Data matching (also known as record or data linkage, entity resolution, object identification, or field matching) is the task of identifying, matching and merging records that correspond to the same entities from several databases or even within one database. Based on research in various domains including applied statistics, health...

Programming MapPoint in .NET
Programming MapPoint in .NET

Interactive web maps generated by MapPoint-Microsoft's popular mapping technology are crucial for businesses in a number of fields, including real estate, package delivery, and commercial air travel. In a word, MapPoint provides businesses with "location." Specifically, it provides an integrated set of products,...

Responsible Management of Information Systems
Responsible Management of Information Systems

This book discusses the question of how information systems can be used and managed in a responsible manner. Normative problems such as intellectual property, privacy, power distribution, etc., are at the heart of many of the problems faced by users and managers of information systems. Responsible Management of Information Systems...

Human-Computer Interaction Fundamentals (Human Factors and Ergonomics)
Human-Computer Interaction Fundamentals (Human Factors and Ergonomics)
Hailed on first publication as a compendium of foundational principles and cutting-edge research, The Human-Computer Interaction Handbook has become the gold standard reference in this field. Derived from select chapters of this groundbreaking and authoritative resource, Human-Computer Interaction Fundamentals emphasizes...
Beginning Facebook Game Apps Development (Beginning Apress)
Beginning Facebook Game Apps Development (Beginning Apress)
Facebook has emerged over the last several years as the dominant social space. Their astronomical growth has made it the platform for social interaction on the web. Although there have been some hiccups along the way with privacy concerns, Facebook continues to grow and provide a space for users worldwide to interact with one...
unlimited object storage image
Result Page: 40 39 38 37 36 35 34 33 32 31 30 29 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy