Product Compare (0)
<div><p>Silicon chips are out. Today's scientists are using real, wet, squishy, living b..
Half a century of research has resulted in machines capable of beating the best human chess players ..
Enterprise architecture makes a vital contribution to the running of a large organisation. It was or..
Where your information security is concerned, prevention is better than cure.If you want to tackle t..
Digital Signal Processing: Everything You Need to Know to Get Started provides a basic tutorial on d..
An Introduction to IT GovernanceIf you are unsure what IT governance is, or how it is relevant to yo..
In today's computer-driven world, every modern business depends on its information technology. This..
Contemporary biomedical and clinical research is undergoing constant development thanks to the rapid..
Tong, Joo Chuan
Computational pre-screening of antigens is now routinely applied to the discovery of vaccine candida..
The subject of this book is mathematical cryptography. By this we mean the mathematics involved..
Vabishchevich, Petr N.
In this book we describe the basic elements of present computational technologies that use the ..
This book systematically describes important aspects when planning secure IT systems, as well a..
Safety-critical, interactive, human-computer systems are used for real-time process control in ..
This textbook is based on the lectures titled "e;Human-Machine Interaction"e; and inclu..
A networked information society generates complex interactions between information technology a..
Showing 241 to 255 of 261 (18 Pages)