Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cisco Secure Intrusion Detection System
Cisco Secure Intrusion Detection System

Organizations continue to deploy firewalls as their central gatekeepers to prevent unauthorized users from entering their networks. However, network security is in many ways similar to physical security in that no one technology serves all needs-rather, a layered defense provides the best results. Organizations are increasingly looking to...

Autonomy Oriented Computing : From Problem Solving to Complex Systems Modeling (Multiagent Systems, Artificial Societies, and Simulated Organizations)
Autonomy Oriented Computing : From Problem Solving to Complex Systems Modeling (Multiagent Systems, Artificial Societies, and Simulated Organizations)
With the advent of computing, we are fast entering a new era of discovery
and opportunity. In business, market researchers will be able to predict the potential
market share of a new product on-the-fly by synthesizing news reports,
competitor analysis, and large-scale simulations of consumer behavior. In life
and material
...
Handbook of Biosurveillance
Handbook of Biosurveillance
Over the past five years, the very real threat posed by emerging infections and bioterrorism has challenged and revolutionized the practice of disease surveillance. Many cities and countries are constructing new disease surveillance systems. Even the basic concept of surveillance data has changed, expanding dramatically beyond notifiable disease...
Computer and Machine Vision, Fourth Edition: Theory, Algorithms, Practicalities
Computer and Machine Vision, Fourth Edition: Theory, Algorithms, Practicalities

Computer and Machine Vision: Theory, Algorithms, Practicalities (previously entitled Machine Vision) clearly and systematically presents the basic methodology of computer and machine vision, covering the essential elements of the theory while emphasizing algorithmic and practical design constraints. This fully revised fourth edition has...

Rubella Viruses, Volume 15 (Perspectives in Medical Virology)
Rubella Viruses, Volume 15 (Perspectives in Medical Virology)

This latest volume provides a comprehensive review of the latest developments and research studies on the pathogenesis and molecular biology of human congenital infections. It reviews current diagnostic techniques and epidemiological data while describing the progress in research and understanding of continuing prevention of congenital...

Encyclopedia of Infectious Diseases: Modern Methodologies
Encyclopedia of Infectious Diseases: Modern Methodologies

New multidisciplinary approaches that are changing our understanding of infectious diseases

Discover how the application of novel multidisciplinary, integrative approaches and technologies are dramatically changing our understanding of the pathogenesis of infectious diseases and their treatments. Each article...

Outspoken: Free Speech Stories
Outspoken: Free Speech Stories
"America's national obsession with asserting, and quelling, free-speech comes alive in this collection of profiles of First Amendment firebrands.Ê.Ê.Ê. The author goes beyond the usual polarized corners of political correctness.Ê.Ê.Ê.Êher nuanced treatment of all sides of the debate makes this a...
Net Locality: Why Location Matters in a Networked World
Net Locality: Why Location Matters in a Networked World
A man is walking down Michigan Avenue in Chicago. He shares a sidewalk with crowds of anonymous people. He sees skyscrapers and signage extending to the horizon. There is a lot going on – people talking, walking, playing, fighting, screaming, driving, and smiling. He sees a coffee shop that excites his interest. He pulls...
Deploying Voice over Wireless LANs (Networking Technology)
Deploying Voice over Wireless LANs (Networking Technology)

The definitive guide to planning, architecting, deploying, supporting, and creating Voice over Wireless LAN solutions

 

Recent advances make it possible to deliver high-quality voice and video communications over a wireless LAN (WLAN), replacing costly...

Real-Time Image and Video Processing: From Research to Reality
Real-Time Image and Video Processing: From Research to Reality
This book presents an overview of the guidelines and strategies for transitioning an image or video processing algorithm from a research environment into a real-time constrained environment. Such guidelines and strategies are scattered in the literature of various disciplines including image processing, computer engineering, and software...
Firewalls Don’t Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies
Firewalls Don’t Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies

Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself?step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't really know....

PC Toys: 14 Cool Projects for Home, Office, and Entertainment
PC Toys: 14 Cool Projects for Home, Office, and Entertainment
Come on out and play

You can only surf the Net so long. You can only play so much video poker. So if you’re a PC addict who’s ready for some new fun, this book is your toybox. Each of the 14 projects inside includes a parts list, suggestions for finding the needed equipment, clues to the cost, helpful Web links, and complete...

unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy