Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Introduction to Biometrics
Introduction to Biometrics
A number of crucial societal applications like international border crossing, electronic commerce, and welfare disbursement require reliable person recognition systems. Traditional person authentication methods based on passwords and identity documents often fail to meet the stringent security and performance demands of these...
Preparing for the Worst: A Comprehensive Guide to Protecting Your Family from Terrorist Attacks, Natural Disasters, and Other Catastrophes
Preparing for the Worst: A Comprehensive Guide to Protecting Your Family from Terrorist Attacks, Natural Disasters, and Other Catastrophes

Preparing for the Worst details the best practices in antiterrorism tactics and preparing for disaster. This book is for typical American families, business travelers, corporate executive management personnel, emergency first responders, school administrators, and local government officials responsible for public safety and emergency...

Learning Microsoft Windows Server 2012 Dynamic Access Control
Learning Microsoft Windows Server 2012 Dynamic Access Control

When you know Dynamic Access Control, you know how to take command of your organization's data for security and control. This book is a practical tutorial that will make you proficient in the main functions and extensions.

Overview

  • Understand the advantages of using Dynamic Access Control and how it...
In Pursuit of the Traveling Salesman: Mathematics at the Limits of Computation
In Pursuit of the Traveling Salesman: Mathematics at the Limits of Computation

What is the shortest possible route for a traveling salesman seeking to visit each city on a list exactly once and return to his city of origin? It sounds simple enough, yet the traveling salesman problem is one of the most intensely studied puzzles in applied mathematics--and it has defied solution to this day. In this book, William Cook...

Professional haXe and Neko
Professional haXe and Neko
Professional haXe and Neko

haXe is an exciting new programming language, as well as a compiler and a framework, that can be used to build web applications and write code aimed at multiple platforms on an array of operating systems. Neko is a fast, flexible, and reliable cross-platform virtual machine that allows for the...

Professional Microsoft SharePoint 2007 Workflow Programming
Professional Microsoft SharePoint 2007 Workflow Programming
Microsoft Windows SharePoint Services (WSS) 3.0 and Microsoft Office SharePoint Server (MOSS) 2007 provide you with a rich framework for collaborative applications. Packed with practical, real-world examples, this book offers you clear instructions for implementing workflow, custom activities, and conditions into SharePoint applications....
Technological Turf Wars: A Case Study of the Computer Antivirus Industry
Technological Turf Wars: A Case Study of the Computer Antivirus Industry
Computer security is a technical and social problem. It is just as much about social relationships as it is about computers as tools. Internet security professionals are as concerned with how people use information as they are with how machines manipulate and process that information. This book is a case study of how the knowledge systems...
Multimedia Encryption and Authentication Techniques and Applications (Internet and Communications)
Multimedia Encryption and Authentication Techniques and Applications (Internet and Communications)

Recent advances in digital communications and storage technologies have brought major changes for consumers. High-capacity hard disks and DVDs can store large amounts of audiovisual data. In addition, faster Internet connection speeds and the emerging high bitrate DSL connections provide sufficient bandwidth for entertainment...

Secure Coding in C and C++
Secure Coding in C and C++

"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append...

A First Systems Book: Technology and Management (Second Edition)
A First Systems Book: Technology and Management (Second Edition)

To tackle the complex problems of life today, we need to coordinate a wide range of expertise. Systems concepts and methods offer the means of integrating the contributions of specialists, including managers, scientists and engineers. The book introduces simple yet sound concepts and a language understandable to all concerned. Its methods of...

Content and Workflow Management for Library Websites: Case Studies
Content and Workflow Management for Library Websites: Case Studies

Using database-driven web pages or web content management (WCM) systems to manage increasingly diverse web content and to streamline workflows is a commonly practiced solution recognized in libraries to-day. However, limited library web content management models and funding constraints prevent many libraries from purchasing commercially...

Treatise on Process Metallurgy, Volume 2: Process Phenomena
Treatise on Process Metallurgy, Volume 2: Process Phenomena

Process metallurgy provides academics with the fundamentals of the manufacturing of metallic materials, from raw materials into finished parts or products.

Coverage is divided into three volumes, entitled Process Fundamentals, encompassing process fundamentals, extractive and refining processes, and metallurgical process...

unlimited object storage image
Result Page: 397 396 395 394 393 392 391 390 389 388 387 386 385 384 383 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy