Home | Amazing | Today | Tags | Publishers | Years | Search 
Intelligent Autonomous Systems: Foundations and Applications
Intelligent Autonomous Systems: Foundations and Applications

Intelligent Autonomous Systems (IAS) are the physical embodiment of machine intelligence providing a core concept for integrating various advanced technologies with pattern recognition and learning. The basic philosophy of IAS research is to explore and understand the nature of intelligence in problems of perception, reasoning, learning and...

Networking Fundamentals: Wide, Local and Personal Area Communications
Networking Fundamentals: Wide, Local and Personal Area Communications

Information networking has emerged as a multidisciplinary diversified area of research over the past few decades. From traditional wired telephony to cellular voice telephony and from wired access to wireless access to the Internet, information networks have profoundly impacted our lifestyle. At the time of writing, over 3 billion...

Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century

The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention

 

Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments....

jQuery Mobile First Look
jQuery Mobile First Look

The jQuery Mobile framework is jQuery’s latest rabbit out of the hat project. The jQuery Mobile framework is open source and is supported by all the big players: iOS, Android, Bada, BlackBerry, Nokia, Adobe, and so, covering all the names behind the project. It is a truly cross platform framework and porting applications made in...

PowerShell for SharePoint 2010 How-To
PowerShell for SharePoint 2010 How-To

PowerShell is becoming the de facto administration tool for Microsoft Server products. The ability to script out reusable steps and code makes life easier for administrators, developers, and managers alike. With the latest release of Microsoft SharePoint Server 2010, PowerShell is the recommended administration...

Model-Based Development: Applications
Model-Based Development: Applications

A Proven Development Methodology That Delivers On the Promise of Model-Based Approaches

Software continues to become more and more complex, while software consumers’ expectations for performance, reliability, functionality, and speed-to-market are also growing exponentially. H. S. Lahman shows how...

Think Stats
Think Stats

If you know how to program, you have the skills to turn data into knowledge using the tools of probability and statistics. This concise introduction shows you how to perform statistical analysis computationally, rather than mathematically, with programs written in Python.

You'll work with a case study throughout the...

Mobile Opportunistic Networks: Architectures, Protocols and Applications
Mobile Opportunistic Networks: Architectures, Protocols and Applications

The widespread availability of mobile devices coupled with recent advancements in networking capabilities make opportunistic networks one of the most promising technologies for next-generation mobile applications. Are you ready to make your mark?

Featuring the contributions of prominent researchers from academia and industry,...

Verifying Concurrent Processes Using Temporal Logic (Lecture Notes in Computer Science) (v. 129)
Verifying Concurrent Processes Using Temporal Logic (Lecture Notes in Computer Science) (v. 129)

Concurrent processes can exhibit extremely complicated behavior, and neither informal reasoning nor testing is reliable enough to establish their correctness. In this thesis, we develop a new technique for the verification of parallel programs. The technique is stated in terms of axioms and inference rules, and it is used to prove...

Thor's Microsoft Security Bible: A Collection of Practical Security Techniques
Thor's Microsoft Security Bible: A Collection of Practical Security Techniques

What is security? Is it a mindset? Is it a measurable and actionable posture or position? Or is it a bit of both? People, as a race, learn from doing; they learn by example. Ingrained into our psyche is a process that builds new information upon previous knowledge as we learn. As Isaac Newton said, “If I have seen further than...

ActionScript 3.0 Game Programming University (2nd Edition)
ActionScript 3.0 Game Programming University (2nd Edition)

When the first edition of ActionScript 3.0 Game Programming University came out, ActionScript 3.0 was new. It was so new, in fact, that most programmers were still stuck using older ActionScript 1.0 and 2.0.

But by now, most Flash developers have moved on to AS3, and they are loving the speed, reliability and logical...

Test-Driven Infrastructure with Chef
Test-Driven Infrastructure with Chef

Test-Driven Infrastructure with Chef demonstrates a radical approach to developing web infrastructure that combines the powerful Chef configuration management framework with Cucumber, the leading Behavior-driven development (BDD) tool. Learn how to deliver real business value by developing infrastructure code test-first.

...
Result Page: 98 97 96 95 94 93 92 91 90 89 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy