Filter
Databaser & WWW
Filter
In the past four decades, information technology has altered chains of value production, distribution, and information access at a significant rate. These changes, although they …
Though an enormous amount of information relating to earth sciences are available on the Internet, for a serious researcher, teacher, librarian or a student who has deadlines to …
How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials. The book has three primary objectives: to help readers …
Online Social Networks: Human Cognitive Constraints in Facebook and Twitter provides new insights into the structural properties of personal online social networks and the …
The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, …
Application Performance Management (APM) in the Digital Enterprise enables IT professionals to be more successful in managing their company's applications. It explores the …
Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute …
Optimization of Manufacturing Systems Using the Internet of Things extends the IoT (Internet of Things) into the manufacturing field to develop an IoMT (Internet of Manufacturing …
Microsoft Outlook Programming unleashes the power of Microsoft Outlook, allowing administrators and end users to customize Outlook in the same way that they've used macros and …
The aim of Sentiment Analysis is to define automatic tools able to extract subjective information from texts in natural language, such as opinions and sentiments, in order to …