Home | Amazing | Today | Tags | Publishers | Years | Search 
Distributed Multimedia Information Retrieval: SIGIR 2003 Workshop on Distributed Information Retrieval
Distributed Multimedia Information Retrieval: SIGIR 2003 Workshop on Distributed Information Retrieval
During the last decade companies, governments, and research groups worldwide have directed significant effort towards the creation of sophisticated digital libraries across a variety of disciplines. As digital libraries proliferate, in a variety of media, and from a variety of sources, problems of resource selection and data...
Think Complexity: Complexity Science and Computational Modeling
Think Complexity: Complexity Science and Computational Modeling
This book is inspired by boredom and fascination: boredom with the usual presentation of data structures and algorithms, and fascination with complex systems. The problem with data structures is that they are often taught without a motivating context; the problem with complexity science is that it is usually not taught at...
Grading Knowledge: Extracting Degree Information from Texts
Grading Knowledge: Extracting Degree Information from Texts
If you are sitting in a basement room without a view — not to mention the bars in front of the windows — and writing a book, then you better have good company. I had the best company you could imagine. Waltraud Hiltl, Katja Markert, Martin Romacker, Klemens Schnattinger, Andreas Klee and I shared very little office...
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
This book is intended for individuals who are interested in the iPhone and other iOS devices and, more importantly, in the type of data that is stored and can be recovered from these devices. The demand for mobile forensics has grown tremendously with the release of smart phones. Communication on these devices is now documented...
Fundamentals of Database Management Systems
Fundamentals of Database Management Systems
A course in database management has become well established as a required course in both undergraduate and graduate management information systems degree programs. This is as it should be, considering the central position of the database field in the information systems environment. Indeed, a solid understanding of the...
Big Java: Compatible with Java 5, 6 and 7
Big Java: Compatible with Java 5, 6 and 7

This book introduces programmers to objects at a gradual pace. The syntax boxes are revised to show typical code examples rather than abstract notation. This includes optional example modules using Alice and Greenfoot. The examples feature annotations with dos and don'ts along with cross references to more detailed explanations in the...

Computing with Windows 7 for the Older and Wiser: Get Up and Running on Your Home PC
Computing with Windows 7 for the Older and Wiser: Get Up and Running on Your Home PC

This book is written for those who are about to use their fi rst home computer or those who have yet to explore the wider opportunities afforded by a computer beyond searching the Internet and sending the occasional email message. You have my word that there will be very few acronyms and those that do appear will be fully explained in...

Ethics in Information Technology
Ethics in Information Technology

We are excited to publish the third edition of Ethics in Information Technology. This new edition builds on the success of the previous editions and meets the need for a resource that helps readers understand many of the legal, ethical, and societal issues associated with IT. We have responded to the feedback from our first and second...

Beginning DirectX 11 Game Programming
Beginning DirectX 11 Game Programming

Many of us wish to create our own video games. For some, gaming is a hobby, and for others it is something fun to participate in casually. But for the rest of us, gaming and the dream of making our own games is more like a passion. Chances are, if you’ve purchased this book, you are looking to turn your desire and passion into...

Hacking the Human
Hacking the Human

Information security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is crucial in the majority of successful attacks on systems and attackers are rarely required to find technical vulnerabilities, hacking the human is usually sufficient.Ian Mann turns the black art of...

Data Mining Techniques: For Marketing, Sales, and Customer Relationship Management
Data Mining Techniques: For Marketing, Sales, and Customer Relationship Management

Fifteen years ago, Michael and I wrote the first version of this book. A little more than 400 pages, the book fulfilled our goal of surveying the field of data mining by bridging the gap between the technical and the practical, by helping business people understand the data mining techniques and by helping technical people understand the...

Introduction to Information Systems: Supporting and Transforming Business
Introduction to Information Systems: Supporting and Transforming Business

Rainer, Cegielski Introduction to Information Systems will answer this question for you. In every chapter, you will see how real global businesses use technology and information systems to increase their profitability, gain market share, improve their customer service, and manage their daily operations. In other words, information...

Result Page: 459 458 457 456 455 454 453 452 451 450 449 448 447 446 445 444 443 442 441 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy