Home | Amazing | Today | Tags | Publishers | Years | Search 
Networking Concepts and Technology : A Designer's Resource (Sun Bluprints)
Networking Concepts and Technology : A Designer's Resource (Sun Bluprints)
This book is a resource for network architects who must create solutions for emerging network environments in enterprise data centers. You'll find information on how to leverage Sun(TM) Open Network Environment (Sun ONE) technologies to create Services on Demand solutions, as well as technical details about the networking internals. The information...
Colonialism in Question: Theory, Knowledge, History
Colonialism in Question: Theory, Knowledge, History
The burst of scholarship on colonial studies in the last two decades—crossing the disciplinary boundaries of literature, anthropology, and history—has begun to fill one of the most notable blind spots in the Western world’s examination of its history.Yet there is something strange about the timing: scholarly interest in...
New Directions in Statistical Signal Processing: From Systems to Brains (Neural Information Processing)
New Directions in Statistical Signal Processing: From Systems to Brains (Neural Information Processing)
Signal processing and neural computation have separately and significantly influenced many disciplines, but the cross-fertilization of the two fields has begun only recently. Research now shows that each has much to teach the other, as we see highly sophisticated kinds of signal processing and elaborate hierachical levels of neural computation...
Hacking Exposed Web Applications, 2nd Ed.
Hacking Exposed Web Applications, 2nd Ed.

Implement bulletproof e-business security the proven Hacking Exposed way

Defend against the latest Web-based attacks by looking at your Web applications through the eyes of a malicious intruder. Fully revised and updated to cover the latest Web exploitation techniques, Hacking Exposed Web Applications, Second Edition shows you,...

Dynamical Vision: ICCV 2005 and ECCV 2006 Workshops, WDV 2005 and WDV 2006, Beijing, China, October 21, 2005, Graz, Austria, May 13, 2006
Dynamical Vision: ICCV 2005 and ECCV 2006 Workshops, WDV 2005 and WDV 2006, Beijing, China, October 21, 2005, Graz, Austria, May 13, 2006
Classical multiple-view geometry studies the reconstruction of a static scene observed by a rigidly moving camera. However, in many real-world applications the scene may undergo much more complex dynamical changes. For instance, the scene may consist of multiple moving objects (e.g., a traffic scene) or articulated motions (e.g., a walking human)...
Deadly Connections: States that Sponsor Terrorism
Deadly Connections: States that Sponsor Terrorism
"Dan Byman has written what will likely become the standard text on state-sponsored terrorism. Deadly Connections is an important book that not only fills a long-standing gap in the field of terrorism studies, but significantly advances our understanding of this particularly opaque and complex phenomenon." --Bruce Hoffman, author of...
Enterprise Modeling and Computing With UML
Enterprise Modeling and Computing With UML
This book is important: I will tell you why. I will also say a few words about me so that you get an idea of this person advising you on how to spend your time. Finally, I will outline my wishes about the direction I would like the future research on enterprise modeling to take.

In general terms, this book is focused on tools for the
...
Kernel Based Algorithms for Mining Huge Data Sets: Supervised, Semi-supervised, and Unsupervised Learning
Kernel Based Algorithms for Mining Huge Data Sets: Supervised, Semi-supervised, and Unsupervised Learning

"Kernel Based Algorithms for Mining Huge Data Sets" is the first book treating the fields of supervised, semi-supervised and unsupervised machine learning collectively. The book presents both the theory and the algorithms for mining huge data sets by using support vector machines (SVMs) in an iterative way. It demonstrates how kernel...

Watermarking Systems Engineering
Watermarking Systems Engineering
The growth of the Internet has fueled the demand for enhanced watermarking and data hiding technologies and has stimulated research into new ways to implement watermarking systems in the real world. Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications presents the principles of watermarking system design and...
The Slayer's Guide To Derro
The Slayer's Guide To Derro
The derro have long been a mysterious race, hiding in darkness, their presence frequently but a whisper. Brought to the fore in this supplement, their culture, habitats, methods of warfare, and more are detailed in full so as to be usable by game masters and players alike.

The dwarven racesarequitediverse,but perhapsthe most deviant,
...
Phishing Exposed
Phishing Exposed
Phishing Exposed provides an in-depth, high-tech view from both sides of the phishing playing field. In this unprecedented book, world-renowned phishing expert Lance James exposes the technical and financial techniques used by international clandestine phishing gangs to steal billions of dollars every year. The book is filled with...
Mobile Commerce Applications
Mobile Commerce Applications
Today, various m-commerce applications are increasingly enhancing enterprises' abilities to offer mobile services that are easily accessed by a mobile device anytime and anywhere. With the unique advantages of emerging mobile communications and wireless technologies, m-commerce applications are generally used to fulfill some tasks that are not...
Result Page: 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy