Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. In addition, new issues have surfaced that did not exist previously, e.g.... Eye Tracking Methodology: Theory and Practice Despite the availability of cheap, fast, accurate and usable eye trackers, there is still little information available on how to develop, implement and use these systems. This second edition of Andrew Duchowski’s successful guide to these systems contains significant additional material on the topic and fills this gap in the market with this...
The New Fiscal Sociology: Taxation in Comparative and Historical Perspective The New Fiscal Sociology: Taxation in Comparative and Historical Perspective demonstrates that the study of taxation can illuminate fundamental dynamics of modern societies. The sixteen essays in this collection offer a state-of-the-art survey of the new fiscal sociology that is emerging at the intersection of sociology, history, political science,... Peer-to-Peer Computing: Applications, Architecture, Protocols, and Challenges
Peer-to-peer computing, at least on a conceptual level, is a genuine paradigm
shift—intelligence is at the edge, computing is completely decentralized, and
the network is just there to knit the distributed intelligence together. Indeed,
with advancements in hardware technology, proliferation of the open source
development... Big Data Forensics: Learning Hadoop Investigations
Perform forensic investigations on Hadoop clusters with cutting-edge tools and techniques
About This Book
Identify, collect, and analyze Hadoop evidence forensically
Learn about Hadoop's internals and Big Data file storage concepts
A step-by-step guide to help you...
|Result Page: 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 |