Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Combinatorial Optimization: Methods and Applications: Volume 31 NATO Science for Peace and Security Series - D: Information and Communication Security
Combinatorial Optimization: Methods and Applications: Volume 31 NATO Science for Peace and Security Series - D: Information and Communication Security

This book is a collection of six articles arising from the meeting of the NATO Advanced Study Institute (ASI) ''Combinatorial Optimization: Methods and Applications,'' which was held at the University of Montreal in June 2006. This ASI consisted of seven series of five one-hour lectures and one series of four one-hour...

Attitudes and Opinions
Attitudes and Opinions
Notable advances resulting from new research findings, measurement approaches, widespread uses of the Internet, and increasingly sophisticated approaches to sampling and polling, have stimulated a new generation of attitude scholars. This extensively revised edition captures this excitement, while remaining grounded in scholarly research....
The Well Timed Strategy: Managing the Business Cycle for Competitive Advantage
The Well Timed Strategy: Managing the Business Cycle for Competitive Advantage

Most companies ignore one of their best opportunities for honing competitive advantage: the opportunity to proactively manage business cycles and macroeconomic turbulence. Despite the profound impact that the business cycle has on the fortunes and fate of so many businesses large and small--and the employees and investors...

Alzheimer's Disease: A Century of Scientific And Clinical Research (Stand Alone)
Alzheimer's Disease: A Century of Scientific And Clinical Research (Stand Alone)

This publication is a landmark work commemorating the centennial of Alois Alzheimer's discovery of what would be known as Alzheimer's disease (AD). The centennial of Alois Alzheimer's original description of the disease that would come to bear his name offers a vantage point from which to commemorate the seminal discoveries in the...

Cyber Warfare and Cyber Terrorism (Premier Reference)
Cyber Warfare and Cyber Terrorism (Premier Reference)
The number of publicized terrorist attacks started to escalate beginning in the mid-1990s. From the attacks that received wide coverage by the world press, we have arrived to the point where not a single day passes without a terrorist committing such acts. It is the spectacular that is getting first-page coverage by the mass media. The basic...
Phishing: Cutting the Identity Theft Line
Phishing: Cutting the Identity Theft Line
Have you been caught yet?

They don't just want to know who you are, they want to BE who you are. By duplicating a legitimate website, phishers can convince you that email asking for your personal information came from your bank, an online retailer, even your ISP. Their high-tech identity theft costs American consumers and businesses billions,...

Understanding Criminology: Current Theoretical Debates (Crime and Justice)
Understanding Criminology: Current Theoretical Debates (Crime and Justice)
"Provides a very clear, easily readable introduction to the wide range of criminological theories.". Anne Rees, University of Portsmouth, UK
  • What does contemporary criminological theory look like? .
  • What impact, if any, does it have on policy?
The new edition of this
...
Computer Security Fundamentals (2nd Edition)
Computer Security Fundamentals (2nd Edition)

It has been more than 6 years since the publication of the original edition of this book. A great deal has happened in the world of computer security since that time. This edition is updated to include newer information, updated issues, and revised content.

The real question is who is this book for. This book is...

Beyond Red and Blue: How Twelve Political Philosophies Shape American Debates
Beyond Red and Blue: How Twelve Political Philosophies Shape American Debates
On any given night cable TV news will tell us how polarized American politics is: Republicans are from Mars, Democrats are from Canada. But in fact, writes Peter Wenz in Beyond Red and Blue, Americans do not divide neatly into two ideological camps of red/blue, Republican/Democrat, right/left. If they did, what could explain Republicans...
Political Self-Sacrifice: Agency, Body and Emotion in International Relations (Cambridge Studies in International Relations)
Political Self-Sacrifice: Agency, Body and Emotion in International Relations (Cambridge Studies in International Relations)

Over the last decade the increasing phenomenon of suicide terrorism has raised questions about how it might be rational for individuals to engage in such acts. This book examines a range of different forms of political self-sacrifice, including hunger strikes, self-burning and non-violent martyrdom, all of which have taken place in resistance...

The Text Mining Handbook: Advanced Approaches in Analyzing Unstructured Data
The Text Mining Handbook: Advanced Approaches in Analyzing Unstructured Data
Text mining tries to solve the crisis of information overload by combining techniques from data mining, machine learning, natural language processing, information retrieval, and knowledge management. In addition to providing an in-depth examination of core text mining and link detection algorithms and operations, this book examines advanced...
Intelligence and Security Informatics: Techniques and Applications (Studies in Computational Intelligence)
Intelligence and Security Informatics: Techniques and Applications (Studies in Computational Intelligence)
The book is organized in four major areas. The first unit focuses on the terrorism informatics and data mining. The second unit discusses the intelligence and crime analysis. The third unit covers access control, infrastructure protection, and privacy. The fourth unit presents surveillance and emergency response.

Readers will find the book...

Result Page: 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy