Home | Amazing | Today | Tags | Publishers | Years | Search 
Vehicular Networks: From Theory to Practice
Vehicular Networks: From Theory to Practice
Cohesively integrating the state of the art in this emerging field, this guide presents many issues involved in vehicular networking, including traffic engineering, human factors studies, and novel computer science research. It covers traffic monitoring and traffic flow modeling, innovative applications enabled by vehicular networks, routing and...
Handbook of Natural Language Processing, Second Edition
Handbook of Natural Language Processing, Second Edition

As the title of this book suggests, it is an update of the first edition of the Handbook of Natural Language Processing which was edited by Robert Dale, Hermann Moisl, and Harold Somers and published in the year 2000. The vigorous growth of new methods in Natural Language Processing (henceforth, NLP) since then, strongly suggested that...

Field Confirmation Testing for Suspicious Substances
Field Confirmation Testing for Suspicious Substances
Frequently a substance found at a port of entry, waste site, laboratory triage facility, or even in a hazardous materials emergency will be labeled and purportedly identified. But law enforcement and other first responders cannot take this claim at face value, as the accuracy is not confirmed and must be verified. A comprehensive handbook for...
IT Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement
IT Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement

Information technology auditing and Sarbanes-Oxley compliance have several overlapping characteristics. They both require ethical accounting practices, focused auditing activities, a functioning system of internal control, and a close watch by the board’s audit committee and CEO. Written as a contribution to the accounting and auditing...

How to Develop and Implement a Security Master Plan
How to Develop and Implement a Security Master Plan
Written for corporation security officers, this work is designed to help them garner executive support and increased funding for their security programs.  It provides a thorough understanding of the Security Master Planning process, explaining how to develop appropriate risk mitigation strategies, and how to focus on both effectiveness and...
Applied Calculus of Variations for Engineers
Applied Calculus of Variations for Engineers

The subject of calculus of variations is to find optimal solutions to engineering problems where the optimum may be a certain quantity, a shape, or a function. Applied Calculus of Variations for Engineers addresses this very important mathematical area applicable to many engineering disciplines. Its unique,...

Death Scene Investigation: A Field Guide
Death Scene Investigation: A Field Guide
Each and every death scene presents new challenges to even the most seasoned professional. This handy field guide provides easy direction for the death scene investigator. Organized in an accessible outline format, it covers protocols and guidelines, assessment and examination, medical history and records, and autopsy and death certificates....
Computational Statistics: An Introduction to R
Computational Statistics: An Introduction to R

Suitable for a compact course or self-study, Computational Statistics: An Introduction to R illustrates how to use the freely available R software package for data analysis, statistical programming, and graphics. Integrating R code and examples throughout, the text only requires basic knowledge of statistics and...

Biological Data Mining (Chapman & Hall/Crc Data Mining and Knowledge Discovery Series)
Biological Data Mining (Chapman & Hall/Crc Data Mining and Knowledge Discovery Series)

Like a data-guzzling turbo engine, advanced data mining has been powering post-genome biological studies for two decades. Reflecting this growth, Biological Data Mining presents comprehensive data mining concepts, theories, and applications in current biological and medical research. Each chapter is written by a distinguished...

Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking
Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking
Complex and controversial, hackers possess a wily, fascinating talent, the machinations of which are shrouded in secrecy. Providing in-depth exploration into this largely uncharted territory, Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking offers insight into the hacking realm by telling...
Theory of Science and Technology Transfer and Applications (Systems Evaluation, Prediction and Decision-Making)
Theory of Science and Technology Transfer and Applications (Systems Evaluation, Prediction and Decision-Making)

Constructive Suggestions for Efficiently Implementing Technology Transfer

Theory of Science and Technology Transfer and Applications presents the mechanisms, features, effects, and modes of technology transfer. It addresses the measurement, cost, benefit, optimal allocation, and game theory of technology transfer,...

Architecting Secure Software Systems
Architecting Secure Software Systems
Through the use of examples, this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development lifecycle. The authors examine security architectures and threat countermeasures for UNIX, .NET, Java, mobile, and Web environments, and they...
Result Page: Previous 1883 1884 1885 1886 1887 1888 1889 1890 1891 1892 1893 1894 1895 1896 1897 1898 1899 1900 1901 1902 1903 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy