Home | Amazing | Today | Tags | Publishers | Years | Search 
Access to Knowledge in the Age of Intellectual Property
Access to Knowledge in the Age of Intellectual Property

At the end of the twentieth century, intellectual property rights collided with everyday life. Expansive copyright laws and digital rights management technologies sought to shut down new forms of copying and remixing made possible by the Internet. International laws expanding patent rights threatened the lives of millions of people around the...

Practical Oracle Security: Your Unauthorized Guide to Relational Database Security
Practical Oracle Security: Your Unauthorized Guide to Relational Database Security

A senior database manager at one of the world’s largest banks once told me that the best way to secure Oracle is to unplug it from the wall…and he is probably right. In fact, this holds true for nearly every networked application. Unfortunately, for many of us turning off the database is not an option; we must find another way to...

Google Web Toolkit 2 Application Development Cookbook
Google Web Toolkit 2 Application Development Cookbook

GWT 2 radically improves web experience for users by using existing Java tools to build no-compromise AJAX for any modern browser. It provides a solid platform so that other great libraries can be built on top of GWT. Creating web applications efficiently and making them impressive, however, is not as easy as it sounds. Writing web...

Data Mining and Knowledge Discovery Handbook (Texts and Monographs in Physics)
Data Mining and Knowledge Discovery Handbook (Texts and Monographs in Physics)

Knowledge Discovery demonstrates intelligent computing at its best, and is the most desirable and interesting end-product of Information Technology. To be able to discover and to extract knowledge from data is a task that many researchers and practitioners are endeavoring to accomplish. There is a lot of hidden knowledge waiting to be...

Handbook of Face Recognition
Handbook of Face Recognition

Face recognition has a large number of applications, including security, person verification, Internet communication, and computer entertainment. Although research in automatic face recognition has been conducted since the 1960s, this problem is still largely unsolved. Recent years have seen significant progress in this area owing to advances...

3D Game Engine Design: A Practical Approach to Real-Time Computer Graphics
3D Game Engine Design: A Practical Approach to Real-Time Computer Graphics

Now considered an essential reference in the game industry, 3D Game Engine Design is the first book to go beyond basic descriptions of algorithms and accurately demonstrate the complex engineering process required to design and build a real-time graphics engine to support physical realism. Faster algorithms will always win out over...

Managing Strategic Intelligence: Techniques and Technologies (Premier Reference)
Managing Strategic Intelligence: Techniques and Technologies (Premier Reference)

Environments needing information technology and management skills combined often find that strategic information and intelligence is not always readily available. How to scan management environments for relevant information and then make sense of the information remains a challenge. Managing Strategic Intelligence: Techniques and Technologies...

Essential Discrete Math for Computer Science
Essential Discrete Math for Computer Science

This book introduces readers to the mathematics of computer science and prepares them for the math they will encounter in other college courses. It includes applications that are specific to computer science, helps learners to develop reasoning skills, and provides the fundamental mathematics necessary for computer scientists. Chapter topics...

Distributed Programming with Ruby
Distributed Programming with Ruby

 “A must have title for the well-rounded Ruby programmer building advanced Rails applications and large systems!”

OBIE FERNANDEZ, Series Editor

 

Complete, Hands-On Guide to Building Advanced Distributed Applications...

Inkscape 0.48 Essentials for Web Designers
Inkscape 0.48 Essentials for Web Designers

Do you think that your website could do with more visual appeal? Are you looking to spice it up with attractive designs and effects? Enter Inkscape 0.48 Essentials for Web Designers--the only book specifically tailored to using Inkscape for web design. This book will teach you how to effectively use the fascinating new Inkscape vector...

Adobe Digital Imaging How-Tos: 100 Essential Techniques for Photoshop CS5, Lightroom 3, and Camera Raw 6
Adobe Digital Imaging How-Tos: 100 Essential Techniques for Photoshop CS5, Lightroom 3, and Camera Raw 6

The year 2010 has been an exciting time for digital photographers and imaging professio nals. The introduction of Photoshop CS5 and ACR 6, as well as Lightroom 3, brought many new capabilities and improvements. When I was offered the chance to put together 100 tips for these applications, I was excited. The trick, of course, is to narrow...

CCTV, Second Edition: Networking and Digital Technology
CCTV, Second Edition: Networking and Digital Technology

Closed circuit television (CCTV) is experiencing a leap in technology using digital techniques and the Internet. The new edition of this high-level professional reference retains the particulars that made the first edition a success, including the details of CCD cameras, lenses, coaxial cables, fiber-optics, and system design, but it is...

Result Page: 86 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy