Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Biometrics: Theory, Methods, and Applications (IEEE Press Series on Computational Intelligence)
Biometrics: Theory, Methods, and Applications (IEEE Press Series on Computational Intelligence)

An in-depth examination of the cutting edge of biometrics

This book fills a gap in the literature by detailing the recent advances and emerging theories, methods, and applications of biometric systems in a variety of infrastructures. Edited by a panel of experts, it provides comprehensive coverage of:

Defense and Detection Strategies against Internet Worms
Defense and Detection Strategies against Internet Worms
This is the first book focused exclusively on Internet worms, offering you solid worm detection and mitigation strategies for your work in the field. This ground-breaking volume enables you to put rising worm trends into perspective with practical information in detection and defense techniques utilizing data from live networks, real IP addresses,...
2013 Coding Workbook for the Physician's Office (Book Only)
2013 Coding Workbook for the Physician's Office (Book Only)

Reflecting the latest practices from the field, 2013 CODING WORKBOOK FOR THE PHYSICIAN'S OFFICE enables readers to expand their medical vocabulary, improve their CPT and ICD-9-CM coding skills, and transition to ICD-10-CM. Coding exercises reference each section of the CPT and ICD-9-CM coding manuals as well as HPCS Level II codes....

Web Design For Dummies (Computer/Tech)
Web Design For Dummies (Computer/Tech)
Build your own eye-popping site design

Create a user-friendly site, design great graphics, and make updating easy

It can take a flock of folks to build, design, and maintain an out-of-sight Web site. Whether you're designing a site on your own or are a member of a design team,...

Biometric Image Discrimination Technologies (Computational Intelligence and Its Applications Series)
Biometric Image Discrimination Technologies (Computational Intelligence and Its Applications Series)
Personal identification and verification both play a critical role in our society.
Today, more and more business activities and work practices are computerized. Ecommerce
applications, such as e-banking, or security applications, such as building
access, demand fast, real-time and accurate personal identification. Traditional
...
Discover Signal Processing: An Interactive Guide for Engineers
Discover Signal Processing: An Interactive Guide for Engineers

Signal processing is now a multidisciplinary topic, and one that has applications in many fields including, but not limited to, science, engineering, medicine, finance and the behavioural sciences. Modern software libraries that include dedicated languages and packages designed to simplify the development and application of signal processing...

Biometric Authentication: First International Conference, ICBA 2004, Hong Kong, China, July 15-17, 2004
Biometric Authentication: First International Conference, ICBA 2004, Hong Kong, China, July 15-17, 2004
The past decade has seen a rapid growth in the demand for biometric-based authentication solutions for a number of applications. With significant advances in biometric technology and an increase in the number of applications incorporating biometrics, it is essential that we bring together researchers from academia and industry as well as...
User Stories Applied: For Agile Software Development (Addison-Wesley Signature Series)
User Stories Applied: For Agile Software Development (Addison-Wesley Signature Series)
Thoroughly reviewed and eagerly anticipated by the agile community, User Stories Applied offers a requirements process that saves time, eliminates rework, and leads directly to better software.

The best way to build software that meets users' needs is to begin with "user stories": simple, clear, brief descriptions of...

Mobile Web Services: Architecture and Implementation
Mobile Web Services: Architecture and Implementation

Mobile Web services offer new possibilities and extraordinary rewards for the mobile telecommunications market.

Service-oriented architectures (SOAs) implemented with Web services are fundamentally changing business processes supported by distributed computing. These technologies bring forward the promise of...

Marketing Strategy
Marketing Strategy

Thoroughly revised and updated, MARKETING STRATEGY, 5e continues with one primary goal: to teach students to think and act like marketers. Packed with cutting-edge coverage, current examples, new cases, and--for the first time--photographs, the fifth edition delivers a practical, straightforward approach to analyzing, planning, and...

Time Domain Electromagnetics (Academic Press Series in Engineering)
Time Domain Electromagnetics (Academic Press Series in Engineering)
In recent times, we have seen increased interest in the direct time domain methods to calculate electromagnetic scattering/interaction phenomenon. This may be due to the surge in activities in the areas of EMP, short-pulse radar, or other related applications. It may also be due to the fact that the time domain methods have several...
Advanced CISSP Prep Guide: Exam Q & A
Advanced CISSP Prep Guide: Exam Q & A

Get ready to pass the CISSP exam and earn your certification with this advanced test guide

Used alone or as an in-depth supplement to the bestselling The CISSP Prep Guide, this book provides you with an even more intensive preparation for the CISSP exam. With the help of more than 300 advanced questions and detailed answers,...

unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy