Warning: file_put_contents(cache/omni_8a46254a3f85ac19a67e8fca6b2bcb01.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Annual Review of Information Science and Technology
No description available....
View Book →
Variant Construction from Theoretical Foundation to Applications
...
View Book →
Hacking Portugal
Making Portugal a global player in Software Development...
View Book →
Computerworld
For more than 40 years, Computerworld has been the leading source of technology news and information for IT influencers worldwide. Computerworld's award-winning Web site (Computerworld.com), twice-mon...
View Book →
Programming for Computations - Python
A Gentle Introduction to Numerical Simulations with Python 3.6...
View Book →
Security Infrastructure Technology for Integrated Utilization of Big Data
Applied to the Living Safety and Medical Fields...
View Book →
Electrical & Electronics Abstracts
No description available....
View Book →
Platform Embedded Security Technology Revealed
Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...
View Book →
CIA Reading Room 06741381: CY 2010 FOIA CASE LOG
Approved for Release: 2020/10/07 006741381 Unclassified CY 2010 FOIA CASE LOG Case Opened Case Number , Subject 1/5/2010 F-2010-00429 Albert Julius Meyer 1/5/2010 F-2010-00430 Philip Burnett Franklin ...
View Book →
Efficient Learning Machines
Theories, Concepts, and Applications for Engineers and System Designers...
View Book →
Signal Computing
Digital Signals in the Software Domain...
View Book →
Language Technologies for the Challenges of the Digital Age
27th International Conference, GSCL 2017, Berlin, Germany, September 13-14, 2017, Proceedings...
View Book →
Data Parallel C++
Mastering DPC++ for Programming of Heterogeneous Systems using C++ and SYCL...
View Book →
Interface Oral Health Science 2016
Innovative Research on Biosis–Abiosis Intelligent Interface...
View Book →
Bayesian Methods in the Search for MH370
...
View Book →
Ambisonics
A Practical 3D Audio Theory for Recording, Studio Production, Sound Reinforcement, and Virtual Reality...
View Book →
GDPR and Biobanking
Individual Rights, Public Interest and Research Regulation across Europe...
View Book →
Error-Correction Coding and Decoding
Bounds, Codes, Decoders, Analysis and Applications...
View Book →
Electronics
June issues, 1941-44 and Nov. issue, 1945, include a buyers' guide section....
View Book →
Don't Panic: Mobile Developer's Guide to The Galaxy
A Community Publication about All Things Mobile...
View Book →
Internet of Things
Information Processing in an Increasingly Connected World...
View Book →
Informatics in the Future
Proceedings of the 11th European Computer Science Summit (ECSS 2015), Vienna, October 2015...
View Book →
The Psychology of Silicon Valley
Ethical Threats and Emotional Unintelligence in the Tech Industry...
View Book →
Optimizing HPC Applications with Intel Cluster Tools
Hunting Petaflops...
View Book →
Security in Computer and Information Sciences
First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...
View Book →
Housing in Phoenix: Housing element
No description available....
View Book →
Digital Video Concepts, Methods, and Metrics
Quality, Compression, Performance, and Power Trade-off Analysis...
View Book →
Linear Selection Indices in Modern Plant Breeding
...
View Book →COVID-19 and Public Policy in the Digital Age
COVID-19 and Public Policy in the Digital Age explores how states and societies have responded to the COVID-19 pandemic and their long-term implications for public policy and the rule of law globally....
View Book →
Solving PDEs in Python
The FEniCS Tutorial I...
View Book →
Biodiversity and Health in the Face of Climate Change
...
View Book →The 9/11 Commission
"The National Commission on Terrorist Attacks Upon the United States met over the course of nineteen days from March 2003 to June 2004, with twelve hearings covering topics from intelligence gathering...
View Book →
The Security Development Lifecycle
SDL: A Process for Developing Demonstrably More Secure Software...
View Book →
Ethics and Civil Drones
European Policies and Proposals for the Industry...
View Book →Cybersecurity and Privacy in Cyber Physical Systems
Cybersecurity and Privacy in Cyber-Physical Systems collects and reports on recent high-quality research that addresses different problems related to cybersecurity and privacy in cyber-physical system...
View Book →
Physical (A)Causality
Determinism, Randomness and Uncaused Events...
View Book →
Clinical Text Mining
Secondary Use of Electronic Patient Records...
View Book →
Finite Difference Computing with PDEs
A Modern Software Approach...
View Book →
Linked Democracy
Foundations, Tools, and Applications...
View Book →
Russia's Turn to the East
Domestic Policymaking and Regional Cooperation...
View Book →
Tilted Mirrors
"Instead of examining the impact of media on society, Tilted Mirrors explores the impact of society on media. How do communities affect the way media build different issue perspectives or frames? Intr...
View Book →
Access Controlled
The Shaping of Power, Rights, and Rule in Cyberspace...
View Book →
Online privacy for journalists
A must-have guide for journalism in 2017...
View Book →
The Huawei and Snowden Questions
Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?...
View Book →
The Privacy Engineer's Manifesto
Getting from Policy to Code to QA to Value...
View Book →
Enhanced Living Environments
Algorithms, Architectures, Platforms, and Systems...
View Book →
Foundations of Machine Learning
...
View Book →
Seeing Ourselves Through Technology: How We Use Selfies, Blogs and Wearable Devices to See and Shape
...
View Book →Placing Private Conscience in Early Modern England
No description available....
View Book →
Introducing Aviary
The world is changing. Where before you needed to purchase and install big and expensive programs on your computer in order to create stunning images, you can now do it all online for free using Aviar...
View Book →
Sensitivity Analysis: Matrix Methods in Demography and Ecology
...
View Book →Computing Concepts with Java Essentials
This unique book teaches you the fundamental concepts of good computer programming while introducing you to one of the most powerful languages in use today—Java! It gives you an ideal balance betwee...
View Book →
Analysis for Computer Scientists
Foundations, Methods, and Algorithms...
View Book →
Intel Xeon Phi Coprocessor Architecture and Tools
The Guide for Application Developers...
View Book →
New Horizons for a Data-Driven Economy
A Roadmap for Usage and Exploitation of Big Data in Europe...
View Book →
Blown to Bits
Your Life, Liberty, and Happiness After the Digital Explosion...
View Book →
Handbook of Vascular Biometrics
...
View Book →
Big Data in Context
Legal, Social and Technological Insights...
View Book →
Societal Implications of Community-Oriented Policing and Technology
...
View Book →
Intelligent Human Computer Interaction
9th International Conference, IHCI 2017, Evry, France, December 11-13, 2017, Proceedings...
View Book →
Security and Privacy Assurance in Advancing Technologies: New Developments
"This book provides a comprehensive collection of knowledge from experts within the field of information security and privacy and explores the changing roles of information technology and how this cha...
View Book →
Open Government
Collaboration, Transparency, and Participation in Practice...
View Book →
Data-Driven Policy Impact Evaluation
How Access to Microdata is Transforming Policy Design...
View Book →
Foundations of Quantum Theory
From Classical Concepts to Operator Algebras...
View Book →
Anonymous Point Collection
Improved Models and Security Definitions...
View Book →
Agile Processes in Software Engineering and Extreme Programming – Workshops
XP 2019 Workshops, Montréal, QC, Canada, May 21–25, 2019, Proceedings...
View Book →
Enabling Things to Talk
Designing IoT solutions with the IoT Architectural Reference Model...
View Book →
Optimizing software in C++
An optimization guide for Windows, Linux and Mac platforms...
View Book →
Ionospheric Multi-Spacecraft Analysis Tools
Approaches for Deriving Ionospheric Parameters...
View Book →
Pro TBB
C++ Parallel Programming with Threading Building Blocks...
View Book →
Fundamentals of Clinical Data Science
...
View Book →
Understanding Machine Learning
From Theory to Algorithms...
View Book →
Ethics and Drug Resistance
Collective Responsibility for Global Public Health...
View Book →
Happiness is the Wrong Metric
A Liberal Communitarian Response to Populism...
View Book →
The Cloud-to-Thing Continuum
Opportunities and Challenges in Cloud, Fog and Edge Computing...
View Book →
An Introduction to Ethics in Robotics and AI
...
View Book →