Home | Amazing | Today | Tags | Publishers | Years | Search 
Computer Vision Using Local Binary Patterns (Computational Imaging and Vision)
Computer Vision Using Local Binary Patterns (Computational Imaging and Vision)

Humans receive the great majority of information about their environment through sight, and at least 50% of the human brain is dedicated to vision. Vision is also a key component for building artificial systems that can perceive and understand their environment. Computer vision is likely to change society in many ways; for example, it...

Microsoft Access 2010 VBA Programming Inside Out
Microsoft Access 2010 VBA Programming Inside Out

Microsoft Visual Basic for Applications (VBA) is an exceptional programming language and environment. The language has grown out of a need to have a programming language that would allow more business-focused individuals to write programs, but equally support the programming features that developers look for in a product. The...

Network Security Auditing (Networking Technology: Security)
Network Security Auditing (Networking Technology: Security)

Mention the word audit to IT professionals and you will probably see their eyes glaze over as they imagine frightening visions of auditors with pointy tails, pitchforks, and checklists run ning around and pointing out all of the things they have done wrong to their manager. The purpose of a security audit is not to place blame or pick...

Fundamentals of Graphics Communication with AutoDESK 2008 Inventor DVD
Fundamentals of Graphics Communication with AutoDESK 2008 Inventor DVD

Engineering and technical graphics have gone through significant changes in the last decade, due to the use of computers and CAD software. It seems as if some new hardware or software development that impacts technical graphics is occurring every year. Although these changes are important to the subject of technical graphics, there...

PowerShell for SharePoint 2010 How-To
PowerShell for SharePoint 2010 How-To

PowerShell is becoming the de facto administration tool for Microsoft Server products. The ability to script out reusable steps and code makes life easier for administrators, developers, and managers alike. With the latest release of Microsoft SharePoint Server 2010, PowerShell is the recommended administration...

Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web
Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web

Privacy is a basic human need, and losing privacy is perceived as an extremely threatening experience. Privacy embraces solitude, personal space, or intimacy with family and friends and as such, it is a ubiquitous and trans-cultural phenomenon. Privacy leverages well-being; without privacy we are at risk of becoming physically or...

Penetration Testing: Procedures & Methodologies
Penetration Testing: Procedures & Methodologies

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

The Digital Consumer Technology Handbook: A Comprehensive Guide to Devices, Standards, Future Directions, and Programmable Logic Solutions
The Digital Consumer Technology Handbook: A Comprehensive Guide to Devices, Standards, Future Directions, and Programmable Logic Solutions

Studying the history of consumer electronics is nothing short of fascinating. The landscape is filled with countless stories of product successes and failures— fickle consumer adoptions, clever marketing campaigns that outsmart the best technologies, better packaging winning over better technology, and products that are simply...

System Center Service Manager 2010 Unleashed
System Center Service Manager 2010 Unleashed

Service Manager 2010 is without a doubt the most customizable and extensible product in the System Center suite. The ability to customize and extend the product is enabled by the common technology platform born in Operations Manager that now underlies other Microsoft products such as System Center Essentials, Windows InTune, Virtual...

E-Mail Marketing For Dummies (Business & Personal Finance)
E-Mail Marketing For Dummies (Business & Personal Finance)

E-mail isn’t a new technology any more, but you can do a lot of new things with e-mail marketing. E-mail can be delivered to mobile devices and can integrate nicely into a social media marketing strategy.

Still, the same challenges that existed in the past apply to the new world of e-mail marketing. Namely,...

Virtualization Security (EC-Council Disaster Recovery Professional)
Virtualization Security (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Knowledge Discovery from Data Streams (Chapman & Hall/CRC Data Mining and Knowledge Discovery Series)
Knowledge Discovery from Data Streams (Chapman & Hall/CRC Data Mining and Knowledge Discovery Series)

In the last three decades, machine learning research and practice have focused on batch learning usually using small datasets. In batch learning, the whole training data is available to the algorithm, which outputs a decision model after processing the data eventually (or most of the times) multiple times. The rationale behind this...

Result Page: 109 108 107 106 105 104 103 102 101 100 99 98 97 96 95 94 93 92 91 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy