Dreamweaver MX 2004 Web Application Recipes Why reinvent the wheel every time you design a new Web site? With this book, you don't have to. By providing real-world recipes for building dynamic Web applications using Dreamweaver with ASP, ColdFusion, or PHP, this book shows you how to save time and money while focusing on the things that make your site unique. In these pages, a trio of...
MySQL/PHP Database Applications MySQL/PHP Database Applications Affordable Open Source Solutions to E-Commerce Challenges In this unique guide, two Web development gurus show you how to harness the open source power of MySQL and PHP — and create high-performance Web database applications that won't break the bank. Using plenty of ready-to-run code and seven concrete... Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The wide variety of methods used in terrorism informatics are... Dynamic Speech Models (Synthesis Lectures on Speech and Audio Processing)
In a broad sense, speech dynamics are time-varying or temporal characteristics in all stages
of the human speech communication process. This process, sometimes referred to as speech
chain , starts with the formation of a linguistic message in the speaker’s brain and ends with
the arrival of the message in the...
The Cambridge Handbook of Information and Computer Ethics
Information and Communication Technologies (ICTs) have profoundly changed many aspects of life, including the nature of entertainment, work, communication, education, healthcare, industrial production and business, social relations and conflicts. They have had a radical and widespread impact on our moral lives and hence on contemporary...
Network Security Essentials: Applications and Standards (4th Edition)
In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping
and electronic fraud, there is indeed no time at which security does not matter.Two
trends have come together to make the topic of this book of vital interest. First, the explosive
growth in computer systems and their interconnections...
|Result Page: 53 52 51 50 49 48 47 46 45 44 43 42 |