Home | Amazing | Today | Tags | Publishers | Years | Search 
Machine Learning and Robot Perception (Studies in Computational Intelligence)
Machine Learning and Robot Perception (Studies in Computational Intelligence)
This book presents some of the most recent research results in the area of machine learning and robot perception. The book contains eight chapters.

Relevant progress has been done, within the Robotics field, in mechanical systems, actuators, control and planning. This fact, allows a wide application of industrial robots, where
...
Ethical Hacking and Countermeasures: Web Applications and Data Servers
Ethical Hacking and Countermeasures: Web Applications and Data Servers
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Foundation Website Creation with HTML5, CSS3, and JavaScript
Foundation Website Creation with HTML5, CSS3, and JavaScript

Foundation Website Creation with HTML5, CSS3, and JavaScript shows the entire process of building a website. This process involves much more than just technical knowledge, and this book provides all the information you'll need to understand the concepts behind designing and developing for the Web, as well as the best means...

CCNP Wireless (642-747 IUWMS) Quick Reference (2nd Edition)
CCNP Wireless (642-747 IUWMS) Quick Reference (2nd Edition)
Context-aware services provision refers to the ability to locate an 802.11 device and provide services based on this location information. Services can be offered to the located device itself or to another application based on the device location. Typical examples of services offered to the located devices include a map of a shopping...
Less Than Zero: The Case for a Falling Price Level in a Growing Economy (Hobart Papers)
Less Than Zero: The Case for a Falling Price Level in a Growing Economy (Hobart Papers)
One of main features of the 'counter-revolution' in economics which has resulted in the revival of classical liberal ideas has been a change in views about government's ability to control the economy. 'Fiscal fine tuning' is virtually discredited and monetary policy is no longer seen as a means of...
Balsamiq Wireframes Quickstart Guide
Balsamiq Wireframes Quickstart Guide
I was first introduced to Balsamiq while working as the Director of User Experience for a software company in Chicago. Until that point in my career, I had been designing user interfaces and clickable prototypes using Photoshop, handcoding layouts in HTML and CSS, and spending a lot of time learning prototype software like...
Programming Windows 8 Apps with HTML, CSS, and JavaScript
Programming Windows 8 Apps with HTML, CSS, and JavaScript
Welcome, my friends, to Windows 8! On behalf of the thousands of designers, program managers, developers, test engineers, and writers who have brought the product to life, I'm delighted to welcome you into a world of Windows Reimagined. This theme is no mere sentimental marketing ploy, intended to bestow an aura of newness to something...
Visual Studio 2012 Cookbook
Visual Studio 2012 Cookbook
When we sat down to map out the next version of our premier software development tool, Microsoft Visual Studio 2012, we had a few key scenarios in mind.

One of those scenarios was Developers are Raving Fans. We clearly heard the feedback about the speed of Visual Studio, about the discoverability of features, its
...
Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
CouchDB and PHP Web Development Beginner’s Guide
CouchDB and PHP Web Development Beginner’s Guide

PHP and CouchDB Web Development will teach you the fundamentals of combining CouchDB and PHP to create a full application from conception to deployment. This book will direct you in developing a basic social network, while guiding you through some of the common pitfalls that are frequently associated with NoSQL databases.

CouchDB...

Drupal Search Engine Optimization
Drupal Search Engine Optimization
Drupal is one of the most popular web content management systems. It powers a number of today's websites and is a solid choice for many businesses that want to create a compelling online presence. On today's Web, when noise and competition are at their highest levels ever, simply having a great site isn't enough. If you...
Result Page: 126 125 124 123 122 121 120 119 118 117 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy