Home | Amazing | Today | Tags | Publishers | Years | Search 
Insider Attack and Cyber Security: Beyond the Hacker (Advances in Information Security)
Insider Attack and Cyber Security: Beyond the Hacker (Advances in Information Security)
Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Information Security Departments of Columbia...
Symbolic Data Analysis and the SODAS Software
Symbolic Data Analysis and the SODAS Software
Classical statistical techniques are often inadequate when it comes to analysing some of the large and internally variable datasets common today. Symbolic Data Analysis (SDA) has evolved in response to this problem and is a vital tool for summarizing information in such a way that the resulting data is of a manageable size. Symbolic data,...
Computer Vision
Computer Vision
Scientists and science fiction writers have long been fascinated by the possibility of building intelligent machines and the capability of understanding the visual world is a prerequisite for such a machine. This book speaks to the notable research progress being conducted and brings together the important problem areas where computer vision is...
Learning ASP.NET 3.5
Learning ASP.NET 3.5
With this book, you will learn how to create engaging and interactive web applications using the latest version of the world's most popular web development platform: ASP.NET with AJAX, built on the productivity-enhancing features of Visual Studio 2008. All you need to get started is a basic knowledge of HTML and a desire to produce professional...
Programming in the OSEK/VDX Environment (With CD-ROM)
Programming in the OSEK/VDX Environment (With CD-ROM)
In May 1993, several German automotive manufacturers — BMW, Bosch, Daimler-Chrysler, Opel, Siemens, VW — agreed to collaborate on the specification for a common, real-time distributed operating system tailored for automotive applications. The project was coordinated by the University of Karlsruhe in Germany and was to be called...
Querying XML, : XQuery, XPath, and SQL/XML in context (The Morgan Kaufmann Series in Data Management Systems)
Querying XML, : XQuery, XPath, and SQL/XML in context (The Morgan Kaufmann Series in Data Management Systems)
There is no more authoritative pair of authors on Querying XML than Jim Melton and Stephen Buxton. Best of all, as readers of Jim's other books know, his informal writing style will teach you what you need to know about this complex subject without giving you a headache. If you need a comprehensive and accessible overview of Querying XML, this...
Abstract State Machines - Theory and Applications: International Workshop, ASM 2000 Monte Verita, Switzerland, March 19-24, 2000 Proceedings
Abstract State Machines - Theory and Applications: International Workshop, ASM 2000 Monte Verita, Switzerland, March 19-24, 2000 Proceedings
This book constitutes the thoroughly refereed post-proceedings of the International Workshop on Abstract State Machines, ASM 2000, held in Monte Verita, Switzerland in March 2000.

The 12 revised full papers presented were carefully reviewed and selected from 30 submissions. Also included are an introductory overview, two reports on
...
Algebraic Biology: Third International Conference, AB 2008, Castle of Hagenberg, Austria, July 31-August 2, 2008, Proceedings
Algebraic Biology: Third International Conference, AB 2008, Castle of Hagenberg, Austria, July 31-August 2, 2008, Proceedings
This book constitutes the refereed proceedings of the Third International Conference on Algebraic Biology, AB 2008, held at the Castle of Hagenberg, Austria in July 2008 as part of the RISC Summer 2008, organized by the Research Institute for Symbolic Computation.

The 14 revised full papers presented together with 3 tutorial lectures were...

Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition
Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition
An identity management system is defined as the management of the identity life cycle of entities (subjects or objects) during which the identity is established, described, and destroyed. What this definition fails to cover is the social, personal, and financial impact of the identity life cycle.

Before I joined Oracle as director of GRC
...
Pro SQL Server 2008 Relational Database Design and Implementation (Expert's Voice in SQL Server)
Pro SQL Server 2008 Relational Database Design and Implementation (Expert's Voice in SQL Server)
Learn effective and scalable database design techniques in a SQL Server environment. Pro SQL Server 2008 Relational Database Design and Implementation covers everything from design logic that business users will understand all the way to the physical implementation of the design in a SQL Server database. Grounded in best practices and a...
Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Nagios is an Open Source network, hardware, and application monitoring program. It is designed to inform system administrators of problems on their networks before their clients, end-users or managers do. Nagios is a SysAdmin's best friend. Nagios is installed on over 300,000 machines worldwide, and truly is a global product: approximately 25.6% of...
Text Mining for Biology And Biomedicine
Text Mining for Biology And Biomedicine
Univ. of Manchester, UK. Text provides bioinformatic practitioners with full range of text mining techniques to help address challenges in mining biology and biomedical texts. Includes methods of natural language processing (NLP) and their application in the biological domain; various lexical, terminological, and ontological resources; and...
Result Page: 1006 1005 1004 1003 1002 1001 1000 999 998 997 996 995 994 993 992 991 990 989 988 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy