Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Information Retrieval: Data Structures and Algorithms
Information Retrieval: Data Structures and Algorithms

Information retrieval is a sub-field of computer science that deals with the automated storage and retrieval of documents. Providing the latest information retrieval techniques, this guide discusses Information Retrieval data structures and algorithms, including implementations in C. Aimed at software engineers building systems with...

Behavioral Biometrics: A Remote Access Approach
Behavioral Biometrics: A Remote Access Approach

With the advent of the internet as a medium for performing business transactions, the need for a secure communication channel has never been more paramount. The study of behavioral biometrics - the verification and/or identification of individuals based on the way they provide information to an authentication system - originated from the need...

Adobe Photoshop Elements 8 for Photographers
Adobe Photoshop Elements 8 for Photographers

If you're new to Elements and need a complete overview of each feature and function, you'll find exactly what you're looking for here: step-by-step instructions covering every aspect of Elements, accompanied by helpful screenshots and colorful images. If you're a more experienced user, you'll find Philip's signature...

Digital Signatures (Advances in Information Security)
Digital Signatures (Advances in Information Security)

As a beginning graduate student, I recall being frustrated by a general lack of accessible sources from which I could learn about (theoretical) cryptography. I remember wondering: why aren’t there more books presenting the basics of cryptography at an introductory level? Jumping ahead almost a decade later, as a faculty member my...

Java How to Program (early objects) (9th Edition) (Deitel)
Java How to Program (early objects) (9th Edition) (Deitel)

Welcome to Java and Java How to Program, Ninth Edition! This book presents leadingedge computing technologies for students, instructors and software developers.

The new Chapter 1 engages students with intriguing facts and figures to get them excited about studying computers and programming. The chapter includes a table of some of...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Cisco Security Professional's Guide to Secure Intrusion Detection Systems
Cisco Security Professional's Guide to Secure Intrusion Detection Systems

This book presents a combination of intrusion detection systems (IDS) and security theory, Cisco security models, and detailed information regarding specific Cisco-based IDS solutions. Cisco Security Professional’s Guide to Secure Intrusion Detection Systems also serves as a guide for security administrators studying for the Cisco...

Design of Hashing Algorithms (Lecture Notes in Computer Science)
Design of Hashing Algorithms (Lecture Notes in Computer Science)

Historically, computer security is related to both cryptography and access control in operating systems. Cryptography, although mostly applied in the military and diplomacy, was used to protect communication channels and storage facilities (especially the backups). In the seventies there was a breakthrough in cryptography - the...

The Scrum Field Guide: Agile Advice for Your First Year and Beyond (2nd Edition)
The Scrum Field Guide: Agile Advice for Your First Year and Beyond (2nd Edition)

Extensively revised to reflect improved Scrum practices and tools, this edition adds an all-new section of tips from the field. 



The 1st Edition has a 5-Star Amazon Customer Rating and 135 reviews.

Thousands of organizations are adopting Scrum to
...
Multimedia Security Handbook
Multimedia Security Handbook
Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy. The Multimedia Security Handbook addresses issues related to protecting digital media. It begins by introducing security fundamentals and discussing the vulnerabilities of individual protection...
Act Natural: A Cultural History of Misadventures in Parenting
Act Natural: A Cultural History of Misadventures in Parenting

From a distinctive, inimitable voice, a wickedly funny and fascinating romp through the strange and often contradictory history of Western parenting

Why do we read our kids fairy tales about homicidal stepparents? How did helicopter parenting develop if it used to be perfectly socially acceptable
...

Essentials of Statistics for Business and Economics (with CD-ROM)
Essentials of Statistics for Business and Economics (with CD-ROM)

Trust the latest version of this market-leading essentials text to introduce sound statistical methodology in a proven applications setting. ESSENTIALS OF STATISTICS FOR BUSINESS AND ECONOMICS, 5e, includes all of the strengths of the longer best-selling Anderson/Sweeney/Williams STATISTICS FOR BUSINESS AND ECONOMICS, with a focus on the most...

unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy