Home | Amazing | Today | Tags | Publishers | Years | Search 
Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure
Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure
Cyber security is big business today. Smart Grid is big business today. Therefore let’s put the two together and write a book? Well, surely there will be some individuals that may make that assumption as to the motivation behind the publication of this book. The real motivation behind the development of this book is because...
Introduction to Programming in Java: An Interdisciplinary Approach
Introduction to Programming in Java: An Interdisciplinary Approach

By emphasizing the application of computer programming not only in success stories in the software industry but also in familiar scenarios in physical and biological science, engineering, and applied mathematics, Introduction to Programming in Java takes an interdisciplinary approach to teaching programming with...

Introduction to Real Analysis: An Educational Approach
Introduction to Real Analysis: An Educational Approach

An accessible introduction to real analysis and its connection to elementary calculus

Bridging the gap between the development and history of real analysis, Introduction to Real Analysis: An Educational Approach presents a comprehensive introduction to real analysis while also offering a survey of the field. With its...

Examples and Counterexamples in Graph Theory
Examples and Counterexamples in Graph Theory
It is a real pleasure, indeed an honor, for me to have been invited by Mike Capobianco and John Molluzzo to write an introduction to this imaginative and valuable addition to graph theory. Let me therefore present a few of my thoughts on the current status of graph theory and how their work contributes to the field.

...
Linux System Programming: Talking Directly to the Kernel and C Library
Linux System Programming: Talking Directly to the Kernel and C Library

Write software that draws directly on services offered by the Linux kernel and core system libraries. With this comprehensive book, Linux kernel contributor Robert Love provides you with a tutorial on Linux system programming, a reference manual on Linux system calls, and an insider’s guide to writing smarter, faster code.

...
Bisociative Knowledge Discovery: An Introduction to Concept, Algorithms, Tools, and Applications
Bisociative Knowledge Discovery: An Introduction to Concept, Algorithms, Tools, and Applications

Modern knowledge discovery methods enable users to discover complex patterns of various types in large information repositories. However, the underlying assumption has always been that the data to which the methods are applied to originates from one domain. The focus of this book, and the BISON project from which the contributions are...

Computational Intelligence: A Compendium (Studies in Computational Intelligence)
Computational Intelligence: A Compendium (Studies in Computational Intelligence)

Computational Intelligence: A Compendium presents a well structured overview about this rapidly growing field with contributions from leading experts in Computational Intelligence. The main focus of the compendium is on applied methods, tried-and-proven as being effective to realworld problems, which is especially useful for practitioners,...

Vision with Direction: A Systematic Introduction to Image Processing and Computer Vision
Vision with Direction: A Systematic Introduction to Image Processing and Computer Vision

This introductory textbook presents the modern signal processing concepts used in computer vision and image analysis in a systematic and mathematically coherent way. For the first time in a textbook on image processing, single direction, group direction, corners and edges, Hough transform, and motion estimation are developed in a principled...

Topgrading, 3rd Edition: The Proven Hiring and Promoting Method That Turbocharges Company Performance
Topgrading, 3rd Edition: The Proven Hiring and Promoting Method That Turbocharges Company Performance
“BRAD HELPED US DEVELOP THE TOOLS TO PICK A-PLAYER LEADERS AT GE.” —JACK WELCH


Great companies, large and small, rise or fall because of their talent; the more high performers on your team, the more successful your organization will be. Of course, that’s easier said than done. Research
...
Managing Risk and Information Security: Protect to Enable
Managing Risk and Information Security: Protect to Enable
Newly promoted CISOs rapidly realize that the scope of the position they have taken on is often beyond what they have been prepared for. The nature of securing an enterprise is daunting and overwhelming. There are no simple checklists or roadmaps for success. Many of the technical security skills a CISO has acquired during the early...
MongoDB Applied Design Patterns
MongoDB Applied Design Patterns

Whether you’re building a social media site or an internal-use enterprise application, this hands-on guide shows you the connection between MongoDb and the business problems it’s designed to solve. You’ll learn how to apply MongoDb design patterns to several challenging domains, such as ecommerce, content...

Digital Signal Processing for Medical Imaging Using Matlab
Digital Signal Processing for Medical Imaging Using Matlab

This book describes medical imaging systems, such as X-ray, Computed tomography, MRI, etc. from the point of view of digital signal processing. Readers will see techniques applied to medical imaging such as Radon transformation, image reconstruction, image rendering, image enhancement and restoration, and more.

This book also...

Result Page: 182 181 180 179 178 177 176 175 174 173 172 171 170 169 168 167 166 165 164 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy