Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Linux Email
Linux Email
Many businesses want to run their email servers on Linux for greater control and flexibility of corporate communications, but getting started can be complicated. The attractiveness of a free-to-use and robust email service running on Linux can be undermined by the apparent technical challenges involved. Some of the complexity arises from the fact...
Plan, Activity, and Intent Recognition: Theory and Practice
Plan, Activity, and Intent Recognition: Theory and Practice

Plan recognition, activity recognition, and intent recognition together combine and unify techniques from user modeling, machine vision, intelligent user interfaces, human/computer interaction, autonomous and multi-agent systems, natural language understanding, and machine learning.

Plan, Activity, and Intent Recognition...

Raspberry Pi for Secret Agents
Raspberry Pi for Secret Agents

Turn your Raspberry Pi into your very own secret agent toolbox with this set of exciting projects!

Overview

  • Detect an intruder on camera and set off an alarm
  • Listen in or record conversations from a distance
  • Find out what the other computers on your network are up to
  • ...
JMX in Action
JMX in Action
Covering the Java Management Extensions specification, this guide teaches programmers how JMX can provide robust management and monitoring capabilities for Java and non-Java resources including hardware. Going beyond covering the API, real-life examples and useful code are demonstrated in detail. In addition to describing the JMX...
Work Naked: Eight Essential Principles for Peak Performance in the Virtual Workplace
Work Naked: Eight Essential Principles for Peak Performance in the Virtual Workplace
"Enlightening, enjoyable, and extremely practical, Work Naked offers real clarity about what is wrong with the way most companies work, plus exact directions on how to fix each and every office foolishness. Do what Froggatt says and watch your employee productivity rise." --Scott Shuster, Business Week "High-tech tools (cell...
Conscious Experience: A Logical Inquiry
Conscious Experience: A Logical Inquiry

A distinguished philosopher offers a novel account of experience and reason, and develops our understanding of conscious experience and its relationship to thought: a new reformed empiricism.

The role of experience in cognition is a central and ancient philosophical concern. How, theorists ask, can our private...

Developing Intelligent Agent Systems: A Practical Guide (Wiley Series in Agent Technology)
Developing Intelligent Agent Systems: A Practical Guide (Wiley Series in Agent Technology)

Build your own intelligent agent system…

Intelligent agent technology is a tool of modern computer science that can be used to engineer complex computer programmes that behave rationally in dynamic and changing environments. Applications range from small programmes that intelligently search the Web buying and selling...

Unity 5.x Game AI Programming Cookbook
Unity 5.x Game AI Programming Cookbook

Key Features

  • Empower your agent with decision making capabilities using advanced minimaxing and Negamaxing techniques
  • Discover how AI can be applied to a wide range of games to make them more interactive.
  • Instigate vision and hearing abilities in your agent through collider based and graph...
Cisco Security Agent
Cisco Security Agent
Prevent security breaches by protecting endpoint systems with Cisco Security Agent (CSA), the Cisco host Intrusion Prevention System Learn the basics of endpoint security and why it is so important in today's security landscape Protect endpoint systems from hackers, viruses, and worms with host intrusion prevention security Prevent...
The State of the Art in Intrusion Prevention and Detection
The State of the Art in Intrusion Prevention and Detection

The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in...

Computational Logic in Multi-Agent Systems: 4th International Workshop, CLIMA IV, Fort Lauderdale, FL, USA, January 6-7, 2004
Computational Logic in Multi-Agent Systems: 4th International Workshop, CLIMA IV, Fort Lauderdale, FL, USA, January 6-7, 2004
This book constitutes the strictly refereed post-proceedings of the 4th International Workshop on Computational Logic for Multi-Agent Systems, CLIMA IV, held in Fort Lauderdale, Fl, USA in January 2004.

The 11 revised full papers presented together with 2 invited papers were carefully selected during two rounds of reviewing and improvement. The...

Malware Forensics: Investigating and Analyzing Malicious Code
Malware Forensics: Investigating and Analyzing Malicious Code

Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and...

unlimited object storage image
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy