| |
Invaluable coverage on all aspects of System Center 2012 R2 Configuration Manager Completely updated for System Center 2012 R2 Configuration Manager, this comprehensive book provides intermediate and advanced coverage of all aspects of the product, including planning...
Editeur :
Sybex
Parution :
2014-02-19
PDF, ePub
|
In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discussed in the fields...
Editeur :
Wiley-ISTE
Parution :
2014-02-19
PDF, ePub
|
Comprehensive, advanced coverage of C# 5.0 and .NET 4.5.1 Whether you're a C# guru or transitioning from C/C++, staying up to date is critical to your success. Professional C# 5.0 and .NET 4.5.1 is your go-to guide for navigating the programming environment for the...
Editeur :
Wrox
Parution :
2014-02-19
PDF, ePub
|
This book analyzes Bas van Fraassen’s characterization of representation and models in science. In this regard, it presents the philosophical coordinates of his approach and pays attention to his structural empiricism as a framework for his views on scientific...
Editeur :
Springer
Parution :
2014-02-19
PDF, ePub
|
Tap the power of Big Data with Microsoft technologies Big Data is here, and Microsoft's new Big Data platform is a valuable tool to help your company get the very most out of it. This timely book shows you how to use HDInsight along with HortonWorks Data Platform for...
Editeur :
Wiley
Parution :
2014-02-19
PDF, ePub
|
This book presents and discusses the state of the art and future trends in software engineering education. It introduces new and innovative methods, models and frameworks to focus the training towards the needs and requirements of the industry. Topics included in this...
Editeur :
Springer
Parution :
2014-02-18
ePub
|
The book is about user interfaces to applications that have been designed for social and physical interaction.The interfaces are ‘playful’, that is, users feel challenged to engage in social and physical interaction because that will be fun.The topics that will be...
Editeur :
Springer
Parution :
2014-02-17
PDF, ePub
|
This book reports on the development and validation of a generic defeasible logic programming framework for carrying out argumentative reasoning in Semantic Web applications (GF@SWA). The proposed methodology is unique in providing a solution for representing incomplete...
Editeur :
Springer
Parution :
2014-02-15
Collection :
Springer Theses
ePub
|
This book explores a proactive and domain-driven method to classification tasks.This novel proactive approach to data mining not only induces a model for predicting or explaining a phenomenon, but also utilizes specific problem/domain knowledge to suggest specific...
Editeur :
Springer
Parution :
2014-02-14
ePub
|
Support vector machines (SVM) have both a solid mathematical background and practical applications. This book focuses on the recent advances and applications of the SVM, such as image processing, medical practice, computer vision, and pattern recognition, machine...
Editeur :
Springer
Parution :
2014-02-12
ePub
|
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat...
Editeur :
Wiley
Parution :
2014-02-12
PDF, ePub
|
This book describes the benefits that emerge when the fields of constraint programming and concurrency meet. On the one hand, constraints can be used in concurrency theory to increase the conciseness and the expressive power of concurrent languages from a pragmatic...
Editeur :
Atlantis Press
Parution :
2014-02-11
ePub
|
The must-have companion guide to the Raspberry Pi User Guide! Raspberry Pi chose Python as its teaching language of choice to encourage a new generation of programmers to learn how to program. This approachable book serves as an ideal resource for anyone wanting to use...
Editeur :
Wiley
Parution :
2014-02-11
PDF, ePub
|
HTML5 Gamesshows you how to combine HTML5, CSS3 and JavaScript to make games for the web and mobiles - games that were previously only possible with plugin technologies like Flash. Using the latest open web technologies, you are guided through the process of creating a...
Editeur :
Wiley
Parution :
2014-02-10
PDF, ePub
|
Online social networks collect information from users' social contacts and their daily interactions (co-tagging of photos, co-rating of products etc.) to provide them with recommendations of new products or friends. Lately, technological progressions in mobile devices...
Editeur :
Springer
Parution :
2014-02-08
ePub
|
Smartphones, Tablets, Multimedia-Konsolen im Fahrzeug, Microsoft Windows 8, PixelSense, Surface – diese modernen Systeme haben alle eines gemeinsam: bedient werden sie mit Berührungen. Die aktuelle Generation bietet dabei durch gleichzeitige Interaktion mit mehreren...
Editeur :
Springer Vieweg
Parution :
2014-02-07
ePub
|
This book describes the trends in digital innovation that are of most importance for businesses and explores the key challenges. The book is in three parts, the first of which focuses on developments in digital systems. Here, the ever-growing relevance of big data,...
Editeur :
Springer
Parution :
2014-02-04
ePub
|
This book aims to examine innovation in the fields of computer engineering and networking. The book covers important emerging topics in computer engineering and networking, and it will help researchers and engineers improve their knowledge of state-of-art in related...
Editeur :
Springer
Parution :
2014-02-03
ePub
|
Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive...
Editeur :
Wiley
Parution :
2014-02-03
PDF, ePub
|
Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and...
Editeur :
Wiley
Parution :
2014-02-03
PDF, ePub
|