Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Data Protection in a Profiled World
Data Protection in a Profiled World

One of the most challenging issues facing our current information society is the accelerating accumulation of data trails in transactional and communication systems, which may be used not only to profile the behaviour of individuals for commercial, marketing and law enforcement purposes, but also to locate and follow things and actions. Data...

Marine Biofouling: Colonization Processes and Defenses
Marine Biofouling: Colonization Processes and Defenses

Recent instances of bioinvasion, such as the emergence of the zebra mussel in the American Great Lakes, generated a demand among marine biologists and ecologists for groundbreaking new references that detail how organisms colonize hard substrates, and how to prevent damaging biomass concentrations.

Marine Biofouling:
...

Intellectual Property Protection in VLSI Design: Theory and Practice
Intellectual Property Protection in VLSI Design: Theory and Practice
The development and implementation of intellectual property (IP) protection mechanisms is of crucial importance for the emerging reuse-based system design methodology. Maybe even more importantly, it is such an elegant scientific and engineering challenge that it has drawn a lot of attention from academia and industry in recent years....
Vision-based Pedestrian Protection Systems for Intelligent Vehicles (SpringerBriefs in Computer Science)
Vision-based Pedestrian Protection Systems for Intelligent Vehicles (SpringerBriefs in Computer Science)

Pedestrian Protection Systems (PPSs) are on-board systems aimed at detecting and tracking people in the surroundings of a vehicle in order to avoid potentially dangerous situations. These systems, together with other Advanced Driver Assistance Systems (ADAS) such as lane departure warning or adaptive cruise control, are one of the most...

Profiting from Innovation in China
Profiting from Innovation in China

China is dramatically catching up and is rapidly becoming a leading technological innovator on the global scale. The number of Chinese firms with global ambitions is growing fast, more and more technological innovation is coming from China, and the number of patents in China is also growing steadily. The negative side of this development is...

Security in Computing, Third Edition
Security in Computing, Third Edition

Security in Computing, Third Edition systematically demonstrates how to control failures of confidentiality, integrity, and availability in applications, databases, operating systems, and networks alike.

This sweeping revision of the field's classic guide to computer...

Alan Simpson's Windows XP Bible
Alan Simpson's Windows XP Bible
If Windows XP can do it, you can do it too ...

Windows XP is the undisputed market leader among operating systems, and the enhancements and security improvements in Service Pack 2 made it even better. So if you already know how to turn on a PC and use a mouse, here's the place to learn how to use every fabulous feature of Windows XP. Let an...

Privacy Protection for E-Services
Privacy Protection for E-Services
There is a deep need for privacy education and technology with which to educate the e-services industry, and provide it the tools to build privacy preserving e-services. Privacy Protection for E-Services fulfills this need by reporting on the latest advances in privacy protection issues and technologies for e-services, covering important material,...
Sarbanes-Oxley and Nonprofit Management: Skills, Techniques, and Methods
Sarbanes-Oxley and Nonprofit Management: Skills, Techniques, and Methods
Is your nonprofit organization ready for increased scrutiny, reporting requirements, regulations, and increased expectations from donors? This combination reference/workbook prepares you and shows you how Sarbanes-Oxley best practices can benefit your organization. It includes:
  • A structured description of Sarbanes-Oxley and its...
Understanding Digital Games
Understanding Digital Games
The aim of this book is to satisfy the need for a single accessible textbook which offers a broad introduction to the range of literatures and approaches currently contributing to digital game research. Each of the chapters outline key theoretical perspectives, theorists, and literatures to demonstrate their relevance to, and use in, the study of...
Privacy Protection and Computer Forensics, Second Edition
Privacy Protection and Computer Forensics, Second Edition
This book deals with security from hostile computer forensics (mostly on
one’s computer, but also on one’s digital camera, fax machine, and related
computer-like electronics), as distinct from network forensics, which in this
context is snooping into users’ online activities. Computer forensics deals
with
...
Nuclear Engineering Handbook (Mechanical Engineering)
Nuclear Engineering Handbook (Mechanical Engineering)

Nuclear power has, in recent years, undergone a major transformation, resulting in major technical developments and a new generation of nuclear scientists and engineers. A comprehensive book that reflects the latest nuclear technologies has been lacking—until now.

The Nuclear Engineering Handbook is a response to...

unlimited object storage image
Result Page: 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy