| |
This book introduces the core concepts of bloodstain pattern analysis that help to understand and make independent contributions to crime scenes accurately. It presents a bridge between new research results and the practical work field of crime scene investigation in...
Editeur :
Springer
Parution :
2020-12-12
PDF, ePub
|
Rediscover fundamental and advanced topics in IPAM, DNS, DHCP and other core networking technologies with this updated one-stop reference The thoroughly revised second edition of IP Address Management is the definitive reference for working with core IP management...
Editeur :
Wiley-IEEE Press
Parution :
2020-12-12
Collection :
IEEE Press Series on Network and Service Management
PDF, ePub
|
Learn how to work with Ember Data efficiently, from APIs, adapters, and serializers to polymorphic relationships, using your existing JavaScript and Ember knowledge. This book will teach you how to adapt Ember Data to fit your custom API.Have a custom API that you...
Editeur :
Apress
Parution :
2020-12-12
PDF, ePub
|
This book offers practical as well as conceptual knowledge of the latest trends, tools, techniques and methodologies of data analytics in smart cities. The smart city is an advanced technological area that is capable of understanding the environment by examining the...
Editeur :
Springer
Parution :
2020-12-11
PDF, ePub
|
This book provides a comprehensive overview of the most relevant research and standardization results in the area of wireless networking for Industrial IoT, covering both critical and massive connectivity. Most chapters in this book are intended to serve as short...
Editeur :
Springer
Parution :
2020-12-11
PDF, ePub
|
This is the first study of Boko Haram that brings advanced data-driven, machine learning models to both learn models capable of predicting a wide range of attacks carried out by Boko Haram, as well as develop data-driven policies to shape Boko Haram’s behavior and...
Editeur :
Springer
Parution :
2020-12-11
PDF, ePub
|
This book was developed during a particular pandemic situation in the whole world which confined people to their homes. Therefore, there was a rise in the use of distance working and learning (e-learning) which led to a very quick adoption of...
Editeur :
Springer
Parution :
2020-12-11
PDF, ePub
|
This book focuses on crisis management in software development which includes forecasting, responding and adaptive engineering models, methods, patterns and practices. It helps the stakeholders in understanding and identifying the key technology, business and human...
Editeur :
Springer
Parution :
2020-12-11
PDF, ePub
|
Explore the capabilities of the NVIDIA Jetson Nano, an IoT device designed to perform computations like a computer desktop. This book will show you how to build your first project and optimize your devices, programs, and daily activities with the AI computation...
Editeur :
Apress
Parution :
2020-12-11
PDF, ePub
|
Cybersecurity is a critical concern for individuals and for organizations of all types and sizes. Authentication and access control are the first line of defense to help protect you from being attacked.
This book begins with the theoretical background of cryptography...
Editeur :
Apress
Parution :
2020-12-11
PDF, ePub
|
This monograph is devoted to a new class of non-commutative rings, skew Poincaré–Birkhoff–Witt (PBW) extensions. Beginning with the basic definitions and ring-module theoretic/homological properties, it goes on to investigate finitely generated projective modules over...
Editeur :
Springer
Parution :
2020-12-11
PDF
|
AI is one of the fastest growing corners of the tech world. But there remains one big problem: manyAI projects fail. The fact is thatAI is unique among IT projects. The technology requires a different mindset, in terms of understanding probabilities, data structures and...
Editeur :
Apress
Parution :
2020-12-11
PDF, ePub
|
Learn the essential source code of Blender and its unique build system. This book provides the inner workings of the Blender C-based source code, and will be indispensable for those wanting to contribute to this important open-source project.Blender is an...
Editeur :
Apress
Parution :
2020-12-11
PDF, ePub
|
Ready to learn programming with less effort and more fun? Then do it the lazy way! C++20 for Lazy Programmers uses humor and fun to make you actually willing to read and eager to do the projects as you master the popular and powerful C++ language. Along the way it...
Editeur :
Apress
Parution :
2020-12-11
PDF, ePub
|
'The best book on codebreaking I have read', SIR DERMOT TURING 'Brings back the joy I felt when I first read about these things as a kid', PHIL ZIMMERMANN 'This is at last the single book on codebreaking that you must have. If you are not yet addicted to cryptography,...
Editeur :
Robinson
Parution :
2020-12-10
ePub
|
This book features selected papers from the 6th International Conference on Mathematics and Computing (ICMC 2020), organized by Sikkim University, Gangtok, Sikkim, India, during September 2020. It covers recent advances in the field of mathematics, statistics, and...
Editeur :
Springer
Parution :
2020-12-10
PDF, ePub
|
Harness the power of Jakarta EE to build sturdy back ends while applying Vue.js on the front end. The demand for modern, high-performing enterprise web applications is growing swiftly. The basic HTML front end is no longer enough to meet customer demands. This book...
Editeur :
Apress
Parution :
2020-12-10
PDF, ePub
|
Learn the principles behind object-oriented programming in Ruby and within a few chapters create a fully functional Ruby 3-based application. You'll gain a basic understanding of many ancillary technologies such as databases, XML, web frameworks, and networking - some...
Editeur :
Apress
Parution :
2020-12-09
PDF, ePub
|
This book provides a valuable reference for digital forensics practitioners and cyber security experts operating in various fields of law enforcement, incident response and commerce. It is also aimed at researchers seeking to obtain a more profound knowledge of Digital...
Editeur :
Springer
Parution :
2020-12-09
PDF, ePub
|
Examines the design and use of Intrusion Detection Systems (IDS) to secure Supervisory Control and Data Acquisition (SCADA) systems Cyber-attacks on SCADA systems?the control system architecture that uses computers, networked data communications, and graphical user...
Editeur :
Wiley
Parution :
2020-12-09
Collection :
Wiley Series on Parallel and Distributed Computing
PDF, ePub
|