What do people learn when they do not know that they are learning? Until recently all of the work in the area of implicit learning focused on empirical questions and methods. In this book, Axel Cleeremans explores unintentional learning from an information-processing perspective. He introduces a theoretical framework that unifies existing...
Today’s Web users expect exciting pages
that are updated frequently and provide
a customized experience. For them, Web
sites are more like communities, to which
they’ll return time and again. At the same
time, Web-site administrators want sites
that are easier to update and maintain,
understanding...
Cloud Computing is emerging as a pervasive and consumer-driven utility that is attracting great interest from entrepreneurs, innovators and technology evangelists, as well as the ‘connected’ public at large. The shift from a focus upon IT, to a more assertive focus upon business, further strengthens the case for cloud adoption,...
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known
as black hats, are preying on information systems of government, corporate, public, and private networks and...
Designed for anyone interested in graphics, photography, or photographic
creations, this book came into existence to show you how you can put the incredible power of
Corel PaintShop Pro X4 into play.
This book cuts right to the chase of the PaintShop Pro X4 tools that are best used when working with
photographs...
Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However, based on the broad reach of wireless, stopping someone from passively listening is just as critical. Intrusion detection systems, firewalls, and forensics are just a few of the...
The Shelly Cashman Series® offers the fi nest textbooks in computer
education. This book is our answer to the many requests we have
received from instructors and students for a textbook that provides a
succinct, yet thorough, introduction to computers.
A number of crucial societal applications like international border crossing, electronic
commerce, and welfare disbursement require reliable person recognition systems.
Traditional person authentication methods based on passwords and identity
documents often fail to meet the stringent security and performance demands of
these...
To explain the perspective from which this book was written, it will be helpful to define
the terms machine learning and hackers.
What is machine learning? At the highest level of abstraction, we can think of machine
learning as a set of tools and methods that attempt to infer patterns and extract...
CCNP Security FIREWALL 642-617 Official Cert Guide is a best of breed Cisco exam study guide that focuses specifically on the objectives for the CCNP Security FIREWALL exam. Senior security consultants and instructors David Hucaby, Dave Garneau, and Anthony Sequeira share preparation hints and test-taking tips,...
Many data-mining algorithms were developed for the world of business, for
example for customer relationship management. The datasets in this environment,
although large, are simple in the sense that a customer either did or
did not buy three widgets, or did or did not fly from Chicago to Albuquerque.
This is a practical book for computer engineers who want to understand or
implement hardware/software systems. It focuses on problems that require one
to combine hardware design with software design – such problems can be solved
with hardware/software codesign. When used properly, hardware/software codesign
works better...