Home | Amazing | Today | Tags | Publishers | Years | Search 
Networks for Grid Applications: Third International ICST Conference, GridNets 2009
Networks for Grid Applications: Third International ICST Conference, GridNets 2009

The GridNets conference is an annual international meeting that provides a focused and highly interactive forum where researchers and technologists have an opportunity to present and discuss leading research, developments, and future directions in grid networking. The goal of this event is to serve as both the premier conference...

Data Mining Techniques: For Marketing, Sales, and Customer Relationship Management
Data Mining Techniques: For Marketing, Sales, and Customer Relationship Management

Fifteen years ago, Michael and I wrote the first version of this book. A little more than 400 pages, the book fulfilled our goal of surveying the field of data mining by bridging the gap between the technical and the practical, by helping business people understand the data mining techniques and by helping technical people understand the...

Metasploit: The Penetration Tester's Guide
Metasploit: The Penetration Tester's Guide
"The best guide to the Metasploit Framework." —HD Moore, Founder of the Metasploit Project

The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for...

Anticipatory Optimization for Dynamic Decision Making (Operations Research/Computer Science Interfaces Series)
Anticipatory Optimization for Dynamic Decision Making (Operations Research/Computer Science Interfaces Series)

Anticipatory optimization for dynamic decision making relies on a number of different scientific disciplines. On a general level, the foundations of the field may be localized at the intersection of operations research, computer science and decision theory. Closer inspection reveals the important role of branches such as simulation,...

Systems Thinking, Third Edition: Managing Chaos and Complexity: A Platform for Designing Business Architecture
Systems Thinking, Third Edition: Managing Chaos and Complexity: A Platform for Designing Business Architecture

This is an unconventional book for an unconventional reader. It is intended for those professionals who, in addition to their specialized knowledge, would like to get a handle on life so they may put their special text into its proper context. It speaks to those thinkers and practitioners who have come to realize that learning to be...

Oracle Warehouse Builder 11g R2: Getting Started 2011
Oracle Warehouse Builder 11g R2: Getting Started 2011

Competing in today's world requires a greater emphasis on strategy, long-range planning, and decision making, and this is why businesses are building data warehouses. Data warehouses are becoming more and more common as businesses have realized the need to mine the information that is stored in electronic form. Data warehouses provide...

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

With the increasing focus on IT Security comes a higher demand for identity management in the modern business. This requires a flexible, scalable, and secure authentication method. Identity control is made mandatory by many public standards, such as PCI, and PKI is an essential component to set up authentication in many technologies,...

Linux Command Line and Shell Scripting Bible, Second Edition
Linux Command Line and Shell Scripting Bible, Second Edition

Welcome to the second edition of Linux Command Line and Shell Scripting Bible. Like all books in the Bible series, you can expect to find both hands-on tutorials and real-world information, as well as reference and background information that provides a context for what you are learning. This book is a fairly comprehensive resource on the...

Focke-Wulf Fw 190 Aces of the Russian Front (Osprey Aircraft of the Aces, No 6)
Focke-Wulf Fw 190 Aces of the Russian Front (Osprey Aircraft of the Aces, No 6)

Of all the fronts fought on by the Jagdflieger during World War 2, the Russian, or Eastern, was easily the most lucrative in terms of targets for the experten. Marry an abundance of targets with the Luftwaffe’s best piston-engined fighter of the war – Focke-Wulf’s Fw 190 ‘Butcher Bird’ – and it quickly...

SQL and Relational Theory: How to Write Accurate SQL Code
SQL and Relational Theory: How to Write Accurate SQL Code

This edition differs from its predecessor in a number of ways. The overall objective remains the same, of course— using SQL relationally is still the emphasis—but the text has been revised throughout to reflect, among other things, experience gained from teaching live seminars based on the first edition.

One...

Filtering, Segmentation and Depth (Lecture Notes in Computer Science)
Filtering, Segmentation and Depth (Lecture Notes in Computer Science)

Computer vision seeks a process that starts with a noisy, ambiguous signal from a TV camera and ends with a high-level description of discrete objects located in 3-dimensional space and identified in a human classification. In this book we address this process at several levels. We first treat the low-level image-processing issues of...

Multimedia over IP and Wireless Networks: Compression, Networking, and Systems
Multimedia over IP and Wireless Networks: Compression, Networking, and Systems

This all-inclusive, expertly structured contributed volume will serve as an indispensable guide for professionals or researchers working in areas like networking, communications, data compression, multimedia processing, streaming architectures, and computer graphics. Beginning with a concise overview of the fundamental principles and...

Result Page: 557 556 555 554 553 552 551 550 549 548 547 546 545 544 543 542 541 540 539 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy