Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Expert One-on-One Oracle
Expert One-on-One Oracle
Tom Kyte is of a rare breed. To begin, he's technically expert in his subject (administration of and development of applications for Oracle database management systems). What's more (and what distinguishes him from the ranks of the super-competent), he is both able and willing to share his considerable store of wisdom with Oracle users via...
Machine Learning and Robot Perception (Studies in Computational Intelligence)
Machine Learning and Robot Perception (Studies in Computational Intelligence)
This book presents some of the most recent research results in the area of machine learning and robot perception. The book contains eight chapters.

Relevant progress has been done, within the Robotics field, in mechanical systems, actuators, control and planning. This fact, allows a wide application of industrial robots, where
...
Mastering OpenCV 4 with Python: A practical guide covering topics from image processing, augmented reality to deep learning with OpenCV 4 and Python 3.7
Mastering OpenCV 4 with Python: A practical guide covering topics from image processing, augmented reality to deep learning with OpenCV 4 and Python 3.7

Create advanced applications with Python and OpenCV, exploring the potential of facial recognition, machine learning, deep learning, web computing and augmented reality.

Key Features

  • Develop your computer vision skills by mastering algorithms in Open Source Computer Vision 4 (OpenCV 4)and...
Sensors Handbook
Sensors Handbook

Complete, State-of-the-Art Coverage of Sensor Technologies and Applications

Fully revised with the latest breakthroughs in integrated sensors and control systems, Sensors Handbook, Second Edition provides all of the information needed to select the optimum sensor for any type of application, including engineering,...

CCIE Self-Study: CCIE Security Exam Certification Guide, Second Edition
CCIE Self-Study: CCIE Security Exam Certification Guide, Second Edition
The Cisco authorized self-study test preparation guide for CCIE Security 2.0 350-018 written exam The only official, Cisco endorsed study guide for the CCIE Security 2.0 written exam Includes best-of-breed self-assessment series features, including a CD-ROM test engine, "Do I Know This Already?" quizzes, topic lists/foundation...
Cisco Catalyst QoS: Quality of Service in Campus Networks
Cisco Catalyst QoS: Quality of Service in Campus Networks

Quality of service (QoS) is the set of techniques designed to manage network resources. QoS refers to the capability of a network to provide better service to selected network traffic over various LAN and WAN technologies. The primary goal of QoS is to provide flow priority, including dedicated bandwidth, controlled jitter and...

Apple Pro Training Series : Final Cut Pro 5
Apple Pro Training Series : Final Cut Pro 5
The scalability, performance and Emmy Award-winning workflow of Final Cut Pro 5 make it the first choice of professional editors everywhere. For those clamoring to get in on the action, this best-selling volume uses a series of class-length lessons designed to provide a strong foundation in all aspects of the digital video editing powerhouse....
An Introduction to IMS(TM) : Your Complete Guide to IBM's Information Management System
An Introduction to IMS(TM) : Your Complete Guide to IBM's Information Management System

The Only Up-to-the-Minute Guide to IMS Version 9--Straight from IBM IMS Experts

  • Introduces IMS, one of the world's premiere software products
  • Thoroughly covers key IMS functions, from security to Java support
  • For both new and experienced IMS...
Java Performance Tuning
Java Performance Tuning
No matter what language they're programming in, developers always wish things would run faster! Especially when writing mission-critical applications, no one wants to be limited by the programming environment.
Java Performance Tuning provides all the details you need to know to "performance tune" any type of Java program
...
AD HOC NETWORKS: Technologies and Protocols
AD HOC NETWORKS: Technologies and Protocols
Wireless mobile networks and devices are becoming increasingly popular as
they provide users access to information and communication anytime and anywhere.
Conventional wireless mobile communications are usually supported
by a wired fixed infrastructure. A mobile device would use a single-hop wireless
radio communication to
...
.NET Gotchas
.NET Gotchas
Like most complex tasks, .NET programming is fraught with potential costly, and time-consuming hazards. The millions of Microsoft developers worldwide who create applications for the .NET platform can attest to that. Thankfully there's now a book that shows you how to avoid such costly and time-consuming mistakes. It's called ...
Internet Communications Using SIP: Delivering VoIP and Multimedia Services with Session Initiation Protocol
Internet Communications Using SIP: Delivering VoIP and Multimedia Services with Session Initiation Protocol
"This book is like a good tour guide.It doesn't just describe the major attractions; you share in the history, spirit, language, and culture of the place."
—Henning Schulzrinne, Professor, Columbia University

Since its birth in 1996, Session Initiation Protocol (SIP) has grown up. As a richer, much more robust...

unlimited object storage image
Result Page: 639 638 637 636 635 634 633 632 631 630 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy