Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Next Wave: Using Digital Technology to Further Social and Political Innovation (Brookings FOCUS Book)
The Next Wave: Using Digital Technology to Further Social and Political Innovation (Brookings FOCUS Book)

The digital revolution is in full force but many public and private sector leaders are stymied: How can they maximize the full potential of digital technology? This hesitancy puts a brake on the transformational power of digital technology and means private companies and governmental bodies fall well behind other digital pioneers....

Algorithms and Theory of Computation Handbook, Second Edition, Volume 2: Special Topics and Techniques
Algorithms and Theory of Computation Handbook, Second Edition, Volume 2: Special Topics and Techniques

Algorithms and Theory of Computation Handbook, Second Edition: Special Topics and Techniques provides an up-to-date compendium of fundamental computer science topics and techniques. It also illustrates how the topics and techniques come together to deliver efficient solutions to important practical problems.

Along...

Electronic Monitoring in the Workplace: Controversies and Solutions
Electronic Monitoring in the Workplace: Controversies and Solutions

Due to the use of new technologies, coupled with the fact that there is an increasing amount of work being done online, whether on the Internet, intranets, LANs or other networks, extensive employee monitoring by employers is inexpensive and easy. Employers have legitimate concerns about the efficiency of their employees and the quality of the...

Ubiquitous Computing Fundamentals
Ubiquitous Computing Fundamentals

a must-read text that provides a historical lens to see how ubicomp has matured into a multidisciplinary endeavor. It will be an essential reference to researchers and those who want to learn more about this evolving field.

-From the Foreword, Professor Gregory D. Abowd, Georgia Institute of Technology

...
The Facebook Era: Tapping Online Social Networks to Build Better Products, Reach New Audiences, and Sell More Stuff
The Facebook Era: Tapping Online Social Networks to Build Better Products, Reach New Audiences, and Sell More Stuff

“People in all demographics and regions of the world are more connected than ever before to the products, issues, places, and individuals in their lives. This book recognizes that we’ve come to a place where people can represent their real identity--both personal and professional--and use the social filters...

Simple Steps to Data Encryption: A Practical Guide to Secure Computing
Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who...

Windows 8.1 Inside Out
Windows 8.1 Inside Out

You're beyond the basics - so dive right in and really put your PC to work! This supremely organized reference packs hundreds of timesaving solutions, troubleshooting tips, and workarounds for Windows 8.1. Plus, you get access to two and half hours of video training and a companion ebook.

Topics include:

Data Mining: Concepts, Methods and Applications in Management and Engineering Design (Decision Engineering)
Data Mining: Concepts, Methods and Applications in Management and Engineering Design (Decision Engineering)
Data Mining introduces in clear and simple ways how to use existing data mining methods to obtain effective solutions for a variety of management and engineering design problems.

Data Mining is organised into two parts: the first provides a focused introduction to data mining and the second goes into greater depth on subjects
...
Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The wide variety of methods used in terrorism informatics are...
The Law, In Plain English, For Photographers
The Law, In Plain English, For Photographers
The photographer's definitive business and legal resource is now completely updated and expanded. In this valuable guide, arts attorney Leonard DuBoff takes you step by step though all the legal aspects of the photography business. Here is expert advice for everything from contracts to trademarks, including government licenses, taxes, censorship,...
Computers For Seniors For Dummies
Computers For Seniors For Dummies

Great advice on choosing a computer, getting online, and having fun!

Computers are an essential part of daily life these days, but they can be a bit intimidating at first. Computers For Seniors For Dummies, 2nd Edition gets you going with lots of illustrations and easy-to-follow-instructions, never assuming you already know...

Information Security Management Handbook, Volume 7
Information Security Management Handbook, Volume 7

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding...

unlimited object storage image
Result Page: 40 39 38 37 36 35 34 33 32 31 30 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy