Home | Amazing | Today | Tags | Publishers | Years | Search 
Theory and Practice of Uncertain Programming
Theory and Practice of Uncertain Programming
Real-life decisions are usually made in the state of uncertainty (randomness, fuzziness, roughness, etc.). How do we model optimization problems in uncertain environments? How do we solve these models? In order to answer these questions, this book provides a self-contained, comprehensive and up-to-date presentation of uncertain programming theory....
Data Conversion Handbook (Analog Devices)
Data Conversion Handbook (Analog Devices)
Analog-to-digital (A/D) and digital-to-analog (D/A) converters provide the link between analog data produced by sensors and transducers (links to the real world, from microphones and video cameras to radar speed guns) and the digital data of signal processing, computing and other digital data collection or data processing systems. This complete...
Pattern Recognition in Medical Imaging
Pattern Recognition in Medical Imaging
Medical Imaging has become one of the most important visualization and interpretation methods in biology and medecine over the past decade. This time has witnessed a tremendous development of new, powerful instruments for detecting, storing, transmitting, analyzing, and displaying medical images. This has led to a huge growth in the application of...
Cities in a Globalizing World: Governance, Performance, And Sustainability (Wbi Learning Resources Series)
Cities in a Globalizing World: Governance, Performance, And Sustainability (Wbi Learning Resources Series)
World Bank research shows that in 2003, 48 percent of the world’s population (3 billion people) lived in urban areas—a 33 percent increase from the 1990 level. By 2020, 4.1 billion people (55 percent of the world’s population) will live in urban areas. Almost 94 percent of the increase will occur in developing countries. By 2015,...
IP Telephony with H.323: Architectures for Unified Networks and Integrated Services
IP Telephony with H.323: Architectures for Unified Networks and Integrated Services
A comprehensive introduction to the protocols and architecture everyone must know in order to implement H.323-based IP telephony

IP Telephony with H.323

Internet Protocol (IP) telephony is changing the way business gets done, allowing multimedia messages such as voice, data, and video to be transmitted over standard routers,...

The Best Damn IT Security Management Book Period
The Best Damn IT Security Management Book Period
This chapter will address vulnerabilities and why they are important. It also discusses a concept known as Windows of Vulnerability, and shows how to determine the risk a given vulnerability poses to your environment.

What Are Vulnerabilities?

So, what are
...
Algorithm Design for Networked Information Technology Systems
Algorithm Design for Networked Information Technology Systems

Networked information technology (NIT) systems are synonymous with network-centric or net-centric systems and constitute the cornerstone of the fast-growing information age. NIT systems' field of application ranges from the traditional worldwide telecommunication systems, banking and financial transactions, on-line travel reservation...

The Psychological Foundations of Culture
The Psychological Foundations of Culture
Why do beliefs spread? traditions persist? customs survive? This collection proposes clever and thoughtful answers and it should inspire lively discussion as sociologists, anthropologists, and organizational scholars welcome their psychologist colleagues to the ongoing debate about culture.

Chip Heath,...

Microsoft Windows Vista Management and Administration
Microsoft Windows Vista Management and Administration

This book will show administrators how to manage and administer the advanced functions and security features in Windows Vista. The recommendations, tips, tricks, and best practices are based on years of early-adopter implementations of Windows Vista in large corporate and private environments. The authors highlight the functions...

Security+ Training Guide
Security+ Training Guide
The Security+ certification is CompTIA's response to membership requests to develop a foundation-level certification for security workers. The IT industry is in agreement that there is a need to better train, staff, and empower those tasked with designing and implementing information security, and Security+ is an effort to meet this demand. The...
Handbook of Personology and Psychopathology
Handbook of Personology and Psychopathology
A MONUMENTAL WORK IN THE STUDY OF HUMAN CHARACTER AND ALL OF ITS COMPLEXITIES

The Handbook of Personology and Psychopathology offers a state-of-the-art overview of a burgeoning field of inquiry that addresses the full spectrum of human personality and functioning, from normal to abnormal. Inspired by the seminal contributions and achievements...

Programming ADO.NET
Programming ADO.NET

Seasoned trainers Richard Hundhausen and Steven Borg provide a thorough and detailed reference to everything that’s ADO.NET. This is no small undertaking! The ADO.NET section of the .NET Framework, which you will come to know as System.Data and its related namespaces, delivers more than 200 classes, structures, and enumerations, each...

Result Page: 2282 2281 2280 2279 2278 2277 2276 2275 2274 2273 2272 2271 2270 2269 2268 2267 2266 2265 2264 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy