Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are...
I am excited to share my photographic knowledge of Yosemite National Park with
all who seek it. In this book, I guide you to 29 of Yosemite’s most photogenic locations
in alphabetical order. For each location, I tell you where the landmark is
located, where to get the best image, when to get the best image, and what
equipment...
This book and its companion volume, LNCS vols. 6145 and 6146, constitute the
proceedings of the International Conference on Swarm Intelligence (ICSI 2010)
held in Beijing, the capital of China, during June 12-15, 2010. ICSI 2010 was
the first gathering in the world for researchers working on all aspects of swarm
intelligence, and...
With today’s technology, companies are able to
collect tremendous amounts of data with relative
ease. Indeed, many companies now have more data
than they can handle. However, the data are usually
meaningless until they are analyzed for trends,
patterns, relationships, and other useful information.
This book...
Is clutch performance innate-or can it be learned?
Sooner or later everyone encounters a situation in which the stakes are high and the outcome is crucial. And even top performers can crumble when faced with such extreme pressure. Consider the CEO who panics in a desperate attempt to shore up his...
Learn to capitalize on online word of mouth, leverage its power, and measure results of your initiatives
Savvy, strategic, and right on time, Implementing Word of Mouth Marketing is the essential guide for any company or organization needing to understand the dynamics of online word of mouth. This powerful book will coach...
At DART'09, held in conjunction with the 2009 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2009) and Intelligent Agent Technology (IAT 2009) in Milan (Italy), practitioners and researchers working on pervasive and intelligent access to web services and distributed information retrieval met to compare their work ad...
Use Lean Techniques to Integrate Enterprise Systems Faster, with Far Less Cost and Risk
By some estimates, 40 percent of IT budgets are devoted to integration. However, most organizations still attack integration on a project-by-project basis,...
The most up-to-date and comprehensive introductory ASP.NET book you’ll find on any shelf, Beginning ASP.NET 4 in C# 2010 guides you through Microsoft’s latest technology for building dynamic web sites. This book will enable you to build dynamic web pages on the fly, and assumes only the most basic knowledge of C#.
Multimedia data require specialized management techniques because the representations of color, time, semantic concepts, and other underlying information can be drastically different from one another. The user's subjective judgment can also have significant impact on what data or features are relevant in a given context. These factors...
This widely anticipated third edition provides a systematic exploration of one of the most common approaches to program verification, known as the assertional approach. This approach is applied to deterministic and nondeterministic sequential programs of varying complexity, together with both parallel and distributed concurrent programs. The...
The future of high-performance computing (HPC) lies with large distributed parallel systems with three levels of parallelism, thousands of nodes containing MIMD* groups of SIMD* processors. For the past 50 years, the clock cycle of single processors has decreased steadily and the cost of each processor has decreased. Most applications would...