интернет
An information system may be regarded as an organized set of resources, both technological and human. Security should take this specificity into consideration in order to ensure an overall security of information systems. The security of information …
An information system may be regarded as an organized set of resources, both technological and human. Security should take this specificity into consideration in order to ensure an overall security of information systems. The security of information …
Working memory – a bigger asset than IQWorking memory – your ability to work with information – influences nearly everything you do.What if you could find a way to better handle a hectic schedule or expertly manage risks? What if you could gain an ad…
Working memory – a bigger asset than IQWorking memory – your ability to work with information – influences nearly everything you do.What if you could find a way to better handle a hectic schedule or expertly manage risks? What if you could gain an ad…
Where do the digital humanities really come from? Are they really news? What are the theoretical and technical influences that participate in this scientific field that arouses interest and questions? This book tries to show and explain the main theo…
Where do the digital humanities really come from? Are they really news? What are the theoretical and technical influences that participate in this scientific field that arouses interest and questions? This book tries to show and explain the main theo…
The aim of this book is to describe the methodology of conducting the THEDRE research «Traceable Human Experiment Design Research». It applies to Research in Human Centered Informatics (RICH). These are areas of computer research that integrate users…
The aim of this book is to describe the methodology of conducting the THEDRE research «Traceable Human Experiment Design Research». It applies to Research in Human Centered Informatics (RICH). These are areas of computer research that integrate users…
To analyze complex situations we use everyday analogies that allow us to invest in an unknown domain knowledge we have acquired in a known field. In this work the author proposes a modeling and analysis method that uses the analogy of the ecosystem t…
To analyze complex situations we use everyday analogies that allow us to invest in an unknown domain knowledge we have acquired in a known field. In this work the author proposes a modeling and analysis method that uses the analogy of the ecosystem t…
Although devoted to constructions of good codes for error control, secrecy or data compression, the emphasis is on the first direction. Introduces a number of important classes of error-detecting and error-correcting codes as well as their decoding m…
Although devoted to constructions of good codes for error control, secrecy or data compression, the emphasis is on the first direction. Introduces a number of important classes of error-detecting and error-correcting codes as well as their decoding m…
Speech coding is a highly mature branch of signal processing deployed in products such as cellular phones, communication devices, and more recently, voice over internet protocol This book collects many of the techniques used in speech coding and pres…
Speech coding is a highly mature branch of signal processing deployed in products such as cellular phones, communication devices, and more recently, voice over internet protocol This book collects many of the techniques used in speech coding and pres…
An essential overview of quantum information Information, whether inscribed as a mark on a stone tablet or encoded as a magnetic domain on a hard drive, must be stored in a physical object and thus made subject to the laws of physics. Traditionally, …
An essential overview of quantum information Information, whether inscribed as a mark on a stone tablet or encoded as a magnetic domain on a hard drive, must be stored in a physical object and thus made subject to the laws of physics. Traditionally, …
Introducing the basic concepts in total program control of the intelligent agents and machines, Intelligent Internet Knowledge Networks explores the design and architecture of information systems that include and emphasize the interactive role of mod…
Introducing the basic concepts in total program control of the intelligent agents and machines, Intelligent Internet Knowledge Networks explores the design and architecture of information systems that include and emphasize the interactive role of mod…
The latest edition of this classic is updated with new problem sets and material The Second Edition of this fundamental textbook maintains the book's tradition of clear, thought-provoking instruction. Readers are provided once again with an instructi…
The latest edition of this classic is updated with new problem sets and material The Second Edition of this fundamental textbook maintains the book's tradition of clear, thought-provoking instruction. Readers are provided once again with an instructi…
This book places IT in perspective by tracing its development through time, covering its origins in business, the massive expansion of the role of IT at the end of the 20th century, the growth of the internet, and the successes and failures of compan…
This book places IT in perspective by tracing its development through time, covering its origins in business, the massive expansion of the role of IT at the end of the 20th century, the growth of the internet, and the successes and failures of compan…
Introducing mobile multimedia – the technologies, digital rights management and everything else you need to know for delivering cost efficient multimedia to mobile terminals Efficiency and cost effectiveness within multimedia delivery is fast becomin…
Introducing mobile multimedia – the technologies, digital rights management and everything else you need to know for delivering cost efficient multimedia to mobile terminals Efficiency and cost effectiveness within multimedia delivery is fast becomin…
Get a clear picture of IP Multicast applications for delivering commercial high-quality video services This book provides a concise guide to current IP Multicast technology and its applications, with a focus on IP-based Television (IPTV) and Digital …
Get a clear picture of IP Multicast applications for delivering commercial high-quality video services This book provides a concise guide to current IP Multicast technology and its applications, with a focus on IP-based Television (IPTV) and Digital …
Defending your web applications against hackers and attackers The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookbook i…
Defending your web applications against hackers and attackers The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookbook i…
A fully updated guide to making your landing pages profitable Effective Internet marketing requires that you test and optimize your landing pages to maximize exposure and conversion rate. This second edition of a bestselling guide to landing page opt…
A fully updated guide to making your landing pages profitable Effective Internet marketing requires that you test and optimize your landing pages to maximize exposure and conversion rate. This second edition of a bestselling guide to landing page opt…
Adeptly address today’s business challenges with this powerful new book from web analytics thought leader Avinash Kaushik. Web Analytics 2.0 presents a new framework that will permanently change how you think about analytics. It provides specific rec…
Adeptly address today’s business challenges with this powerful new book from web analytics thought leader Avinash Kaushik. Web Analytics 2.0 presents a new framework that will permanently change how you think about analytics. It provides specific rec…
No longer can the offline remain separate from the online. Integrated, customer-centric, cross-channel marketing campaigns persuade customers to act, provide greater ROI, and ultimately improve your organization's bottom line. This must-have guide sy…
No longer can the offline remain separate from the online. Integrated, customer-centric, cross-channel marketing campaigns persuade customers to act, provide greater ROI, and ultimately improve your organization's bottom line. This must-have guide sy…
How to create a profitable, sustainable business developing and marketing iPhone apps iPhone apps are hot; the average app is downloaded more than 30,000 times. If you have some great apps in mind, Starting an iPhone Application Business For Dummies …
How to create a profitable, sustainable business developing and marketing iPhone apps iPhone apps are hot; the average app is downloaded more than 30,000 times. If you have some great apps in mind, Starting an iPhone Application Business For Dummies …
Questions about Exchange Server 2010? Flip open this easy-access guide! Have all your questions about Microsoft's new Exchange Server 2010 answered on the spot with this handy reference guide. Designed for easy access with special headings, thumb tab…
Questions about Exchange Server 2010? Flip open this easy-access guide! Have all your questions about Microsoft's new Exchange Server 2010 answered on the spot with this handy reference guide. Designed for easy access with special headings, thumb tab…
The future of computing-the future of business Rapid technological innovation is moving us towards a world of ubiquitous computing-a world in which we are surrounded by smart machines that are always on, always aware, and always monitoring us. These …
The future of computing-the future of business Rapid technological innovation is moving us towards a world of ubiquitous computing-a world in which we are surrounded by smart machines that are always on, always aware, and always monitoring us. These …