|
|
Knowledge and Knowledge Systems: Learning from the Wonders of the MindIn recent years there has been a growing interest in the nature of knowledge, its structure, and its utilization. With the advent and eventual proliferation of computers and databases, knowledge has become a commodity embedded in our tools and in machines we use for everyday needs. We produce today more information (and knowledge) in one day than... | | Business Metadata: Capturing Enterprise KnowledgePeople have a hard time communicating, and also have a hard time finding business knowledge in the environment. With the sophistication of search technologies like Google, business people expect to be able to get their questions answered about the business just like you can do an internet search. The truth is, knowledge management is primitive... | | |
|
Web Application Vulnerabilities: Detect, Exploit, PreventThis book is about Web Application Hacking. The world-renowned authors teach the reader to use publicly available tools to conduct thorough assessments of web application. This assessment process provides the reader with an understanding of Web application vulnerabilities and how they are exploited. The book goes on to teach the reader to detect,... | | | | Introduction to the Mathematics of Medical Imaging, Second EditionAt the heart of every medical imaging technology is a sophisticated mathematical model of the measurement process and an algorithm to reconstruct an image from the measured data. This book provides a firm foundation in the mathematical tools used to model the measurements and derive the reconstruction algorithms used in most imaging modalities in... |
|
|
|
Result Page: Previous 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 Next |