Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Perimeter Security
Perimeter Security
Perimeter Security has taken on a new level of importance since 9/11. Whether insuring the safety of government buildings, hospitals, residences, or bio-research labs, the safety of workers and materials can only be ensured by outfitting all points of entry with the appropriate alarm and surveillance equipment. This comprehensive hands-on resource...
Unix Unleashed: Internet Edition
Unix Unleashed: Internet Edition
The first edition of Unix Unleashed provided a thick, comprehensive guide to the basic tools of the Unix trade, covering everything from system administration to the windowing system to the compiler environments. The guide also featured information on other tools, such as the vi editor, the command shells, the AWK, PERL, C and C++...
Learning OpenCV: Computer Vision with the OpenCV Library
Learning OpenCV: Computer Vision with the OpenCV Library
Learning OpenCV puts you right in the middle of the rapidly expanding field of computer vision. Written by the creators of OpenCV, the widely used free open-source library, this book introduces you to computer vision and demonstrates how you can quickly build applications that enable computers to "see" and make decisions based on the...
Learn the MFC C++ Classes
Learn the MFC C++ Classes
It is not necessary to learn the Windows API in order to begin using the
Microsoft Foundation Class (MFC) Library of C++ classes; you do not even
have to know more than a few basic C++ concepts in order to begin. I have
been teaching extension classes through the University of California, Berkeley,
since 1993. My students have
...
Embedded Multiprocessors: Scheduling and Synchronization (Signal Processing)
Embedded Multiprocessors: Scheduling and Synchronization (Signal Processing)
From the Foreword. . . . . .The intellectual content in this book is high. While some of the methods it describes are relatively simple, most are quite sophisticated. Yet examples are given that concretely demonstrate how these concepts can be applied in practical hardware architectures. Moreover, there is very little overlap with other books on...
MP3: The Definitive Guide
MP3: The Definitive Guide
MP3, standing for MPEG-1, Layer 3, is a codec for compressing the size of audio files for digital distribution. Much more than a definition, MP3 is nothing less than a cultural and economic revolution on the Internet. Every day, hundreds of thousands of MP3 music files are searched for, shared, recorded and listened to by computer and Internet...
Equidistribution in Number Theory, An Introduction
Equidistribution in Number Theory, An Introduction
From July 11th to July 22nd, 2005, a NATO advanced study institute, as part of the series “S´eminaire de math´ematiques sup´erieures”, was held at the Universit ´e de Montr´eal, on the subject Equidistribution in the theory of numbers. There were about one hundred participants from sixteen...
The Lanczos Method: Evolution and Application (Software, Environments and Tools)
The Lanczos Method: Evolution and Application (Software, Environments and Tools)
'I recommend this book to anyone who wants to appreciate the often subtle interactions between algorithm research and engineering applications. For the engineer, it comprehensively summarizes 25 years of intellectual development in the understanding of the basic Lanczos algorithm and its many variants. For the numerical analysts, it describes the...
sendmail, 3rd Edition
sendmail, 3rd Edition
The new edition of sendmail has been completely revised to cover sendmail 8.12--a version with more features and fundamental changes than any previous version of the Unix-based email routing program. Because the latest version of sendmail differs so significantly from earlier versions, a massive rewrite of this...
Optimal Portfolio Modeling, CD-ROM includes Models Using Excel and R: Models to Maximize Returns and Control Risk in Excel and R (Wiley Trading)
Optimal Portfolio Modeling, CD-ROM includes Models Using Excel and R: Models to Maximize Returns and Control Risk in Excel and R (Wiley Trading)

it takes more than just precise timing and picking the right stocks to achieve exceptional results in today's markets. In order to capture consistent success, you need to strike the right balance between position sizing and risk management.

Nobody understands this better than author Philip McDonnell, and with Optimal Portfolio Modeling,...

Microeconomics: Theory and Applications with Calculus Value Package (includes Study Guide for Microeconomics: Theory and Applications with Calculus)
Microeconomics: Theory and Applications with Calculus Value Package (includes Study Guide for Microeconomics: Theory and Applications with Calculus)

his book is a new type of intermediate macroeconomics textbook- Until now, the choice was between books that use calculus to present formal theory dryly and with few, if any, applications to the real world and books that include applications but present theory using only graphs and algebra. This book uses calcu- lus, algebra, and graphs to...

Handbook of Computer Crime Investigation: Forensic Tools & Technology
Handbook of Computer Crime Investigation: Forensic Tools & Technology
Computers can be used in virtually any type of crime, ranging from cyberstalking and child pornography to financial fraud, espionage and terrorism. The Handbook of Computer crime investigation presents detailed technical information that can be used to help solve these crimes.

Following on the success of his introductory text, Digital
...
unlimited object storage image
Result Page: 16 15 14 13 12 11 10 9 8 7 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy