Home | Amazing | Today | Tags | Publishers | Years | Search 
Introduction to Biometrics
Introduction to Biometrics
A number of crucial societal applications like international border crossing, electronic commerce, and welfare disbursement require reliable person recognition systems. Traditional person authentication methods based on passwords and identity documents often fail to meet the stringent security and performance demands of these...
UMTS Networks: Architecture, Mobility and Services
UMTS Networks: Architecture, Mobility and Services
The world's first public GSM call was made on 1st July 1991 in a city park of Helsinki, Finland. That event is now regarded as the birthday of the second generation mobile telephony. GSM has been an overwhelming success, which was difficult to predict at that early stage. In the past 10 years GSM has become a truly global...
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Cloud Computing for Enterprise Architectures (Computer Communications and Networks)
Cloud Computing for Enterprise Architectures (Computer Communications and Networks)

Cloud Computing is emerging as a pervasive and consumer-driven utility that is attracting great interest from entrepreneurs, innovators and technology evangelists, as well as the ‘connected’ public at large. The shift from a focus upon IT, to a more assertive focus upon business, further strengthens the case for cloud adoption,...

Software Change Management: Case Studies and Practical Advice
Software Change Management: Case Studies and Practical Advice
This book presents ten case studies that revolve around how to manage change in industrial, governmental, and academic settings. Each case was selected to communicate lessons learned that the reader can use to address typical issues that occur during the process of change. Context-sensitive knowledge about how...
Sams Teach Yourself iOS 5 Application Development in 24 Hours (3rd Edition) (Sams Teach Yourself -- Hours)
Sams Teach Yourself iOS 5 Application Development in 24 Hours (3rd Edition) (Sams Teach Yourself -- Hours)

In less than half a decade, the iOS platform has changed the way that we, the public, think about our mobile computing devices. Only a few years ago, we were thrilled by phones with postage-stamp-sized screens, tinny audio, built-in tip calculators, and text-based web browsing. Times have indeed...

Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security

Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all...

Getting Started with Fluidinfo
Getting Started with Fluidinfo

Imagine a public storage system that has a place online for structured data about everything that exists—or that could exist. This book introduces Fluidinfo, a system that enables you to store information about anything, real or imaginary, in any digital form. You’ll learn how to organize and search for data, and decide...

American Religions: An Illustrated History
American Religions: An Illustrated History

As the twenty-first century begins, the United States has emerged as not only the most powerful nation on earth, but also by far the most religiously diverse nation ever. Several thousand distinct religious communities live side-by-side in relative harmony, and in any urban area it is not unusual to see a Catholic church...

Utilizing Information Technology Systems Across Disciplines: Advancements in the Application of Computer Science (Premier Reference Source)
Utilizing Information Technology Systems Across Disciplines: Advancements in the Application of Computer Science (Premier Reference Source)
In the information technology age coupled with computer advances, information systems have become an integral part of many disciplines; accordingly, business, marketing, medicine, communication, banking, geography, physics, chemistry, aviation, pilots, forensics, agriculture, and even traf.c lights have one thing in common called...
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Data is stolen; this is no uncommon occurrence. The electronic information age has made the theft of data a very lucrative occupation. Whether it’s phishing scams or largescale data breaches, criminals stand to greatly benefit from electronic crimes, making their investment well worth the risk. When I say that this occurrence is not...
Specification by Example: How Successful Teams Deliver the Right Software
Specification by Example: How Successful Teams Deliver the Right Software

The book you hold in your hands, or see on your screen, is the result of a series of studies of how teams all over the world specify, develop, and deliver the right software, without defects, in very short cycles. It presents the collective knowledge of about 50 projects, ranging from public websites to internal back-office systems....

Result Page: 142 141 140 139 138 137 136 135 134 133 132 131 130 129 128 127 126 125 124 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy