Account
Orders
Advanced search
26th European Symposium on Computer Aided Process Engineering contains the papers presented at the26th European Society of Computer-Aided Process Engineering (ESCAPE) Event held at Portorož Slovenia, from June 12th to June 15th, 2016. Themes discussed at the conference...
Programming in GW-BASIC provides a reference guide on GW-Basic along with a range of extra commands and functions. The book discusses starting a program, program planning and the essentials of GW-Basic, including the most commonly used commands; how data is stored in...
Hidden semi-Markov models (HSMMs) are among the most important models in the area of artificial intelligence / machine learning. Since the first HSMM was introduced in 1980 for machine recognition of speech, three other HSMMs have been proposed, with various definitions...
Online Social Networks: Human Cognitive Constraints in Facebook and Twitter provides new insights into the structural properties of personal online social networks and the mechanisms underpinning human online social behavior. As the availability of digital communication...
"What information do these data reveal?" "Is the information correct?" "How can I make the best use of the information?" The widespread use of computers and our reliance on the data generated by them have made these questions increasingly common and important....
Data Analysis in the Cloud introduces and discusses models, methods, techniques, and systems to analyze the large number of digital data sources available on the Internet using the computing and storage facilities of the cloud. Coverage includes scalable data mining and...
Fundamentals and Analytical Applications of Multi-Way Calibration presents researchers with a set of effective tools they can use to obtain the maximum information from instrumental data. It includes the most advanced techniques, methods, and algorithms related to...
Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and privacy perspective. Gain an in-depth understanding of the risks and benefits of cloud storage illustrated using a Use-Case...
Security technology convergence, which refers to the incorporation of computing, networking, and communications technologies into electronic physical security systems, was first introduced in the 1970s with the advent of computer-based access control and alarm systems....
In corporate security today, while the topic of information technology (IT) security metrics has been extensively covered, there are too few knowledgeable contributions to the significantly larger field of global enterprise protection. Measuring and Communicating...
Industrial Agents explains how multi-agent systems improve collaborative networks to offer dynamic service changes, customization, improved quality and reliability, and flexible infrastructure. Learn how these platforms can offer distributed intelligent management and...
Repurposing Legacy Data: Innovative Case Studies takes a look at how data scientists have re-purposed legacy data, whether their own, or legacy data that has been donated to the public domain. Most of the data stored worldwide is legacy data—data created some time in...
How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable, skilled workforce the times now demand? With Security Leader...
IT Perspectives Conference is a documentation of the top-level conference sponsored by the publishers of Computer Weekly, which aims to examine the issues that concern computer professionals and to provide at least some of the answers while indicating the directions...
Computer Jargon Explained is a feature inComputer Weekly publications that discusses 68 of the most commonly used technical computing terms. The book explains what the terms mean and why the terms are important to computer professionals. The text also discusses how the...
Breakdowns in Computer Security: Commentary and Analysis is a compendium of 100 genuine incidents that have taken place in the past three or so years. The book describes computer breakdown incidents during the years 1988-1990 and provides to each incident a short...
Security for Small Computer Systems: A Practical Guide for Users is a guidebook for security concerns for small computers. The book provides security advice for the end-users of small computers in different aspects of computing security. Chapter 1 discusses the...
A Simple Introduction to Data and Activity Analysis provides an introduction to the main concepts embodied in the analysis techniques. This book provides a more balanced picture of the methods of the analysis by showing what deliverables are collected as well as how to...
Computational Materials Science provides the theoretical basis necessary for understanding atomic surface phenomena and processes of phase transitions, especially crystallization, is given. The most important information concerning computer simulation by different...
Women in Computing presents how the computing industry delivered the opportunities for women. This book identifies the distinct attitudes in companies towards equal opportunities. Organized into eight chapters, this book begins with an overview of the problems, the...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers