Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Programming with Microsoft Visual C++ .NET, Sixth Edition (Core Reference)
Programming with Microsoft Visual C++ .NET, Sixth Edition (Core Reference)

The release of the Microsoft Visual Studio .NET (and Visual C++ .NET in particular) has underscored Microsoft’s increasing focus on Internet technologies, which are at the heart of the Microsoft .NET architecture. In addition to supporting the .NET initiative, Visual C++ .NET keeps all the productivity-boosting features...

Handbook of Integrated Risk Management for E-Business: Measuring, Modeling, and Managing Risk
Handbook of Integrated Risk Management for E-Business: Measuring, Modeling, and Managing Risk
"This book provides a recipe for the practical application of technology and the implementation of solutions to solve specific problems." -- Dr. Krishna Nathan, Vice President, IBM Research

This ground-breaking professional reference integrates converging views of e-business processes and offers ways to
...
Image Fusion: Theories, Techniques and Applications
Image Fusion: Theories, Techniques and Applications

This textbook provides a comprehensive introduction to the theories, techniques and applications of image fusion. It is aimed at advanced undergraduate and first-year graduate students in electrical engineering and computer science. It should also be useful to practicing engineers who wish to learn the concepts of image fusion and use them in...

Rethink: A Business Manifesto for Cutting Costs and Boosting Innovation
Rethink: A Business Manifesto for Cutting Costs and Boosting Innovation

It's the trap that ensnares virtually every business. We focus on process: "how" we're doing the job. And we forget about the bigger issue: "what" we're doing and "why" we're doing it. That's why we're leaving so much value on the table. In Rethink, business architect Ric Merrifield...

Red Hat Linux Security and Optimization
Red Hat Linux Security and Optimization
Your Official Red Hat® Linux® Guide to Security and Optimization Reviewed and approved by the experts at Red Hat, this comprehensive guide delivers the know-how you need to improve the performance of your Red Hat Linux system—and protect it from attacks and break-ins. Red Hat Linux expert Mohammed Kabir starts by...
Ensemble Machine Learning: Methods and Applications
Ensemble Machine Learning: Methods and Applications

It is common wisdom that gathering a variety of views and inputs improves the process of decision making, and, indeed, underpins a democratic society. Dubbed “ensemble learning” by researchers in computational intelligence and machine learning, it is known to improve a decision system’s robustness and accuracy. Now, fresh...

ElasticSearch Cookbook
ElasticSearch Cookbook

As a user of ElasticSearch in your web applications you’ll already know what a powerful technology it is, and with this book you can take it to new heights with a whole range of enhanced solutions from plugins to scripting.

Overview

  • Write native plugins to extend the capabilities of ElasticSearch to...
Mastering Autodesk Inventor and Autodesk Inventor LT 2011
Mastering Autodesk Inventor and Autodesk Inventor LT 2011

Autodesk Inventor was introduced in 1999 as an ambitious 3D parametric modeler based not on the familiar AutoCAD programming architecture but instead on a separate foundation that would provide the room needed to grow into the fully featured modeler it is now, a decade later. Inventor 2011 continues the development of Inventor with...

Linux Desktop Hacks
Linux Desktop Hacks

With hacks that any user can follow, Linux Desktop Hacks demonstrates how easy it is to modify Linux to suit your desires. The book is packed with tips on customizing and improving the interface, boosting performance, administering your desktop, and generally making the most out of what X, KDE,...

Algorithmic Learning Theory: 15th International Conference, ALT 2004, Padova, Italy, October 2-5, 2004. Proceedings
Algorithmic Learning Theory: 15th International Conference, ALT 2004, Padova, Italy, October 2-5, 2004. Proceedings
This book constitutes the refereed proceedings of the 15th International Conference on Algorithmic Learning Theory, ALT 2004, held in Padova, Italy in October 2004.

The 29 revised full papers presented together with 5 invited papers and 3 tutorial summaries were carefully reviewed and selected from 91 submissions. The papers are organized in...

Boosting-Based Face Detection and Adaptation (Synthesis Lectures on Computer Vision)
Boosting-Based Face Detection and Adaptation (Synthesis Lectures on Computer Vision)
With the rapid increase of computational powers and availability of modern sensing, analysis and rendering equipment and technologies, computers are becoming more and more intelligent. Many research projects and commercial products have demonstrated the capability for a computer to interact with human in a natural way by looking at...
Solr 1.4 Enterprise Search Server
Solr 1.4 Enterprise Search Server
If you are a developer building a high-traffic web site, you need to have a terrific search engine. Sites like Netflix.com and Zappos.com employ Solr, an open source enterprise search server, which uses and extends the Lucene search library. This is the first book in the market on Solr and it will show you how to optimize your web site for high...
unlimited object storage image
Result Page: 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy