What is security? Is it a mindset? Is it a measurable and actionable posture or position? Or is it a
bit of both? People, as a race, learn from doing; they learn by example. Ingrained into our psyche
is a process that builds new information upon previous knowledge as we learn. As Isaac Newton
said, “If I have seen further than...
There is very little specialist literature available on IMAP servers, and no
current documentation deals with the subject in sufficient depth.
There is a real need for a guide to IMAP. A quick look at relevant mailing
lists shows that they are full of questions and problems, indicating that the
software solutions now in use...
Image data compression is concerned with minimization of the number of information
carrying units used to represent an image. Image compression schemes can
be divided into two broad classes: lossless compression schemes and lossy compression
schemes. Lossless compression techniques, as their name implies aim at
exact reconstruction...
Systems Analysis and Design in a Changing World, Fifth Edition, was written and developed with
both instructor and student needs in mind. Here is just a sample of the unique and exciting
features that help bring the field of systems analysis and design to life.
SYSTEMS ANALYSIS AND DESIGN IN A CHANGING WORLD teaches the...
The definitive survey of computational intelligence from luminaries in the field
Computational intelligence is a fast-moving, multidisciplinary field - the nexus of diverse technical interest areas that include neural networks, fuzzy logic, and evolutionary computation. Keeping up with computational intelligence means understanding...
An Autodesk Official Training Guide to 3ds Max 2011
3ds Max is a popular 3D animation-and-effects software used in movies, visual effects, games, cartoons, short films, commercials, and other animation. However, it also presents a number of challenges to newcomers. This introduction to the latest version breaks down the...
Thirty years ago, when the first edition of this book was published, little had
been written about the management of libraries and information centers.
Those seeking advice, examples, and information about how to manage libraries
were forced to search for answers in the literature of public administration
or business management. Since...
We are all familiar with the time-honored idea of a Virtual Machine that is neutral
with respect to computer architecture and can be used to execute a high-level
language, after its translation to the VM byte-code. This approach can be found in
several successful mono-language systems, that support popular languages such as
Java or...
Augmented reality (AR) is a direct or indirect view of real world scenes in which
physical objects are annotated with, or overlaid by computer generated digital information.
The past two decades have seen a fast growing body of research and development
dedicated to techniques and technologies for AR. In particular, due to the
recent...
Soft Computing (SC) techniques have been recognized nowadays as attractive
solutions for modeling highly nonlinear or partially defined complex systems
and processes. These techniques resemble biological processes more closely than
conventional (more formal) techniques. However, despite its increasing popularity,
soft computing lacks...
Pick one. Test-drive a few luxury sports cars. A Ferrari, a Lamborghini,
a Maserati maybe? Or compare the top First Growth Bordeaux from 2005. Maybe an
Haut-Brion, Latour and Mouton-Rothschild? Alternatively, go play in a social media
application. Perhaps creating your profile on Facebook or blogging about your passions
or sharing...
This book is the outcome the 19th International Conference on Information Systems
Development (ISD 2010), hosted by the faculty of Mathematics and Physics, Charles
University in Prague during 25–27 August 2010.
The ISD conference evolved from the first Polish-Scandinavian Seminar on Current
Trends in Information Systems...