 |
|
 Embedded Systems: Hardware, Design and Implementation
Covers the significant embedded computing technologies—highlighting their applications in wireless communication and computing power
An embedded system is a computer system designed for specific control functions within a larger system—often with real-time computing constraints. It is embedded as part of a... |  |  Mobile Payment
Paying with mobile devices such as mobile phones or smart phones will expand worldwide in the coming years. This development provides opportunities for various industries (banking, telecommunications, credit card business, manufacturers, suppliers, retail) and for consumers.
The book comprehensively describes current status, trends... |  |  Metasploit Penetration Testing Cookbook, Second Edition
Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in... |
|
 Android 4: New Features for Application Development
Recently, with the increasing popularity of mobile phones, mobile operating systems have emerged and quickly spread. Now people with smart phones can do everything that they can do with their computers. The popularity of the Android mobile operating system has increased and is widely used. In this book, new features and innovations of Android... |  |  Alfresco 4 Enterprise Content Management Implementation
Alfresco 4 has improved a lot with its new and advanced concepts for content management. Users have been waiting for a book that covers these concepts along with security, dashboards, and the configuration features of Alfresco 4.
Alfresco 4 Enterprise Content Management Implementation is a well-crafted and easy-to-use book, and it... |  |  Microsoft Mapping: Geospatial Development with Bing Maps and C#
Geospatial mapping applications have become hugely popular in recent years. With smart-phone and tablet numbers snow-balling this trend looks set to continue well into the future. Indeed, it is true to say that in today’s mobile world location-aware apps are becoming the norm rather than the exception.
In... |
|
|
 Plan, Activity, and Intent Recognition: Theory and Practice
Plan recognition, activity recognition, and intent recognition together combine and unify techniques from user modeling, machine vision, intelligent user interfaces, human/computer interaction, autonomous and multi-agent systems, natural language understanding, and machine learning.
Plan, Activity, and Intent Recognition... |  |  Handbook of Networks in Power Systems I (Energy Systems)
Energy has been an inevitable component of human lives for decades. Recent rapid developments in the area require analyzing energy systems not as independent components but rather as connected interdependent networks. The Handbook of Networks in Power Systems includes the state-of-the-art developments that occurred in the power systems... |  |  Handbook of Networks in Power Systems II (Energy Systems)
Energy has been an inevitable component of human lives for decades. Recent rapid developments in the area require analyzing energy systems not as independent components but rather as connected interdependent networks. The Handbook of Networks in Power Systems includes the state-of-the-art developments that occurred in the power systems... |
|
Result Page: 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 |