Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Behavioral Biometrics: A Remote Access Approach
Behavioral Biometrics: A Remote Access Approach

With the advent of the internet as a medium for performing business transactions, the need for a secure communication channel has never been more paramount. The study of behavioral biometrics - the verification and/or identification of individuals based on the way they provide information to an authentication system - originated from the need...

Facebook: The Missing Manual (Missing Manuals)
Facebook: The Missing Manual (Missing Manuals)

Facebook's spreading about as far and fast as the Web itself: 500 million members and counting. But there's a world of fun packed into the site that most folks miss. With this bestselling guide, learn how to unlock Facebook's talents as personal website creator, souped-up address book, and bustling community forum....

A Probability Path (Modern Birkhäuser Classics)
A Probability Path (Modern Birkhäuser Classics)

Many probability books are written by mathematicians and have the built-in bias that the reader is assumed to be a mathematician coming to the material for its beauty. This textbook is geared towards beginning graduate students from a variety of disciplines whose primary focus is not necessarily mathematics for its own sake. Instead,...

Neo4j High Performance
Neo4j High Performance

Design, build, and administer scalable graph database systems for your applications using Neo4j

About This Book

  • Explore the numerous components that provide abstractions for pretty much any functionality you need from your persistent graphs
  • Familiarize yourself with how to test the...
The Influence of Technology on Social Network Analysis and Mining (Lecture Notes in Social Networks)
The Influence of Technology on Social Network Analysis and Mining (Lecture Notes in Social Networks)

The study of social networks was originated in social and business communities. In recent years, social network research has advanced significantly; the development of sophisticated techniques for Social Network Analysis and Mining (SNAM) has been highly influenced by the online social Web sites, email logs, phone logs and instant...

Geophysical Approach to Marine Coastal Ecology: The Case of Iriomote Island, Japan (Springer Oceanography)
Geophysical Approach to Marine Coastal Ecology: The Case of Iriomote Island, Japan (Springer Oceanography)

This book presents recent results of collaborative studies in geophysics and ecology, focusing on the relationship between the physical environment and the distribution of the marine coastal ecosystems. The study area, the Sakiyamawan–Amitoriwan nature conservation area in Iriomote Island of Japan, is the only oceanic nature...

The Syntax and Semantics of Noun Modifiers and the Theory of Universal Grammar: A Korean Perspective (Studies in Natural Language and Linguistic Theory (96))
The Syntax and Semantics of Noun Modifiers and the Theory of Universal Grammar: A Korean Perspective (Studies in Natural Language and Linguistic Theory (96))
This book takes Korean as a basis to provide a detailed universal Determiner Phrase (DP) structure. Adnominal adjectival expressions are apparently optional noun dependents but their syntax and semantics have been shown to provide an important window on the internal structure of DP. By carefully examining data from Korean, an understudied...
Six Sigma and Beyond: Statistics and Probability, Volume III
Six Sigma and Beyond: Statistics and Probability, Volume III
This text explains the tools of statistics and how to apply them effectively to improve processes and profitability in an organization, and also delineates the importance of collecting, analyzing, and interpreting data.

Researchers and professionals in all walks of life need to use the many tools offered by the statistical world, but...

Security+ Study Guide, 2nd Edition (SYO-101)
Security+ Study Guide, 2nd Edition (SYO-101)
Here's the book you need to prepare for CompTIA's Security+ exam. This updated edition of the best-selling Security+ Study Guide was developed to meet the exacting requirements of today's certification candidates and aspiring IT security professionals. In addition to the consistent and accessible instructional...
SCWCD Exam Study Kit Second Edition: Java Web Component Developer Certification
SCWCD Exam Study Kit Second Edition: Java Web Component Developer Certification
This book is for Java programmers who want to prepare for the SCWCD exam, which focuses on the Servlet and JavaServer Pages technologies. This book will also be very useful for beginners since we have explained the concepts using simple examples. The text will bring you up to speed even if you are totally new to these technologies. Even expert...
Solaris 8 System Administrator Exam Cram (Exam: 310-011, 310-012)
Solaris 8 System Administrator Exam Cram (Exam: 310-011, 310-012)
The perfect study companion for UNIX system professionals preparing for both Solaris 8 System Administrator exams. The book contains accurate and efficient coverage of the many new features of the Solaris 8 system including new support for Ipv6, LDAP, and DHCP, installs using Solaris Web Start, new Universal Disk Format (UDF) file system support,...
Basic Statistics Using SAS Enterprise Guide: A Primer
Basic Statistics Using SAS Enterprise Guide: A Primer

Now it's easy to perform many of the most common statistical techniques when you use the SAS Enterprise Guide point-and-click interface to access the power of SAS. Emphasizing the practical aspects of the analysis, this example-rich guide shows you how to conduct a wide range of statistical analyses without any SAS programming required. One or...

unlimited object storage image
Result Page: 292 291 290 289 288 287 286 285 284 283 282 281 280 279 278 277 276 275 274 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy