 |
|
 High-Level Data FusionMaster cutting-edge Level 2 fusion techniques that help you develop powerful situation assessment services with eye-popping capabilities and performance with this trail-blazing resource. The book explores object and situation fusion processes with an appropriate handling of uncertainties, and applies cutting-edge artificial intelligence and... |  |  |  |  |
|
 New Moon (The Twilight Saga, Book 2)"Shoot," I muttered when the paper sliced my finger; I pulled it out to examine the damage. A single drop of blood oozed from the tiny cut. It all happened very quickly then. Edward threw himself at me, flinging me back across the table... I tumbled down to the floor by the piano, with my arms thrown out instinctively to catch... |  |  Collaborative Computer Security and Trust Management (Premier Reference Source)
Collaborative Computer Security and Trust Management combines perspectives of leading researchers in collaborative security to discuss recent advances in this burgeoning new field. Practitioners, researchers, and academicians are presented with lessons learned by international experts to meet the new challenges of security in the... |  |  Mac Security Bible
Your essential, no-holds-barred guide to Mac security threats and solutions
Myth number one: Macs are safer than PCs. Not really, says author Joe Kissell, named one of MacTech's "25 Most Influential People" in the Mac community for 2008. In this timely guide, he not only takes you beyond the myths, he also delves into... |
|
|
|
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 |