Home | Amazing | Today | Tags | Publishers | Years | Search 
XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts
XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts

Game consoles have evolved to become complex computer systems that may contain evidence to assist in a criminal investigation. From networking capabilities to chat, voicemail, streaming video and email, the game consoles of today are unrecognizable from complex computer systems. With over 10 million XBOX 360s sold in the United States the...

Microsoft SharePoint 2010 Business Intelligence Unleashed
Microsoft SharePoint 2010 Business Intelligence Unleashed

Business intelligence (BI) has been around for many more years than you might think. Decision support systems (DSS) and executive information systems (EIS) from the 1970s and 1980s, along with artificial intelligence (AI) systems from the 1990s, can now all be considered as part of what BI comprises today.

In brief, BI refers...

Multimodal Interactive Pattern Recognition and Applications
Multimodal Interactive Pattern Recognition and Applications

Our interest in human–computer interaction started with our participation in the TT2 project (“Trans–Type-2”, 2002–2005—http://www.tt2.atosorigin.es), funded by the European Union (EU) and coordinated by Atos Origin, which dealt with the development of statistical-based technologies for computer...

Network Security Auditing (Networking Technology: Security)
Network Security Auditing (Networking Technology: Security)

Mention the word audit to IT professionals and you will probably see their eyes glaze over as they imagine frightening visions of auditors with pointy tails, pitchforks, and checklists run ning around and pointing out all of the things they have done wrong to their manager. The purpose of a security audit is not to place blame or pick...

Social Location Marketing: Outshining Your Competitors on Foursquare, Gowalla, Yelp & Other Location Sharing Sites
Social Location Marketing: Outshining Your Competitors on Foursquare, Gowalla, Yelp & Other Location Sharing Sites

Social Location Marketing

 

Breakthrough social location marketing techniques for promoting your service, product, or venue!

 

Social Location Marketing offers...

Project Management for Information Systems (5th Edition)
Project Management for Information Systems (5th Edition)

We are very pleased to present this fifth edition of Project Management for Information Systems. As with its predecessors, our ‘target audience’ fall into four groups:

  • IS project managers and systems developers who find themselves responsible for managing systems projects. Newcomers to this activity will find...
Networking Fundamentals: Wide, Local and Personal Area Communications
Networking Fundamentals: Wide, Local and Personal Area Communications

Information networking has emerged as a multidisciplinary diversified area of research over the past few decades. From traditional wired telephony to cellular voice telephony and from wired access to wireless access to the Internet, information networks have profoundly impacted our lifestyle. At the time of writing, over 3 billion...

Qualitative Representation of Spatial Knowledge (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence)
Qualitative Representation of Spatial Knowledge (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence)

Cognitive spatial concepts are qualitative in nature, i.e., they are based not so much on exact quantities but on comparisons between perceived magnitudes. We develop a qualitative model for the representation of spatial knowledge (in particular, of positional information about 2-dimensional projections) that is based only on locative...

Multimedia over IP and Wireless Networks: Compression, Networking, and Systems
Multimedia over IP and Wireless Networks: Compression, Networking, and Systems

This all-inclusive, expertly structured contributed volume will serve as an indispensable guide for professionals or researchers working in areas like networking, communications, data compression, multimedia processing, streaming architectures, and computer graphics. Beginning with a concise overview of the fundamental principles and...

IBM WebSphere Application Server v7.0 Security
IBM WebSphere Application Server v7.0 Security

IBM WebSphere Application Server Network Deployment is IBM's flagship J2EE application server platform. It implements the J2EE technology stack. This stack enables the WebSphere Application Server platform to execute the user's Java enterprise applications that perform business functions. There are several roles who use this platform...

Multidimensional Signal, Image, and Video Processing and Coding, Second Edition
Multidimensional Signal, Image, and Video Processing and Coding, Second Edition

This is a textbook for a first- or second-year graduate course for electrical and computer engineering (ECE) students in the area of digital image and video processing and coding. The course might be called Digital Image and Video Processing (DIVP) or some such, and has its heritage in the signal processing and communications areas of...

Prime Numbers and Computer Methods for Factorization (Modern Birkhäuser Classics)
Prime Numbers and Computer Methods for Factorization (Modern Birkhäuser Classics)

From the original hard cover edition:In the modern age of almost universal computer usage, practically every individual in a technologically developed society has routine access to the most up-to-date cryptographic technology that exists, the so-called RSA public-key cryptosystem. A major component of this system is the factorization of large...

Result Page: 172 171 170 169 168 167 166 165 164 163 162 161 160 159 158 157 156 155 154 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy