Home | Amazing | Today | Tags | Publishers | Years | Search 
Multimedia Fingerprinting Forensics for Traitor Tracing (EURASIP Book Series on Signal Processing and Communications)
Multimedia Fingerprinting Forensics for Traitor Tracing (EURASIP Book Series on Signal Processing and Communications)
The popularity of multimedia content has led to the widespread distribution and consumption of digital multimedia data. As a result of the relative ease with which individuals may now alter and repackage digital content, ensuring that media content is employed by authorized users for its intended purpose is becoming an issue of eminent importance...
Java Rules
Java Rules
Detailed yet accessible, Java™ Rules is a comprehensive reference for the application programmer who needs to master the intricacies of the Java™ programming language. Thoroughly describing the core of the Java programming language and the Java™ virtual machine (JVM™), Java™ Rules makes it...
Running Xen: A Hands-On Guide to the Art of Virtualization
Running Xen: A Hands-On Guide to the Art of Virtualization
“This accessible and immediately useful book expertly provides the Xen community with everything it needs to know to download, build, deploy and manage Xen implementations.”

—Ian Pratt, Xen Project Leader VP Advanced Technology, Citrix Systems

Scaling Software Agility: Best Practices for Large Enterprises (The Agile Software Development Series)
Scaling Software Agility: Best Practices for Large Enterprises (The Agile Software Development Series)
Agile development practices, while still controversial in some circles, offer undeniable benefits: faster time to market, better responsiveness to changing customer requirements, and higher quality. However, agile practices have been defined and recommended primarily to small teams. In Scaling Software Agility, Dean...
Programming Video Games for the Evil Genius
Programming Video Games for the Evil Genius
IF EVIL'S YOUR NAME, THEN THESE ARE YOUR GAMES!

Always wanted to be a genius game creator? This Evil Genius guide goes far beyond a typical programming class or text to reveal insider tips for breaking the rules and constructing wickedly fun games that you can tweak and customize to suit your needs!

In...

A Practical Guide to Information Systems Process Improvement
A Practical Guide to Information Systems Process Improvement
When you invest in expensive technology and systems, you want to get the most out of them. Process improvement has been used for years as an effective strategy to reduce costs, shorten cycle times, improve quality, and increase user satisfaction in other areas of business such as Quality, Manufacturing, and Engineering. While there are many books...
Apple Training Series: Mac OS X Support Essentials (2nd Edition)
Apple Training Series: Mac OS X Support Essentials (2nd Edition)
The only Apple-certified book on supporting Mac OS X 10.5 Leopard, this comprehensive reference takes support technicians and Mac aficionados deep inside the new operating system, covering everything from installation to networking technologies, and more. Following the learning objectives of the Apple Certified Support Professional exam, the...
C# for Java Developers
C# for Java Developers
The similarities between C# and Java are immediate and obvious, but Java programmers need to overcome certain challenges before they can get up to speed with C#. The expert authors of this title have written the perfect guide to help Java developers move past pitfalls and learn to make use of C#.The authors demonstrate the syntactical and...
Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century
Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century
The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to top $250 billion annually and also costs the United States approximately 750,000 jobs. The International Chamber of Commerce puts the global fiscal loss...
High Performance Computer Architecture (3rd Edition) (Addison-Wesley Series in Electrical and Computer Engineering)
High Performance Computer Architecture (3rd Edition) (Addison-Wesley Series in Electrical and Computer Engineering)
Teaching computer architecture is an interesting challenge for the instructor because the field is in constant flux. What the architect does depends strongly on the devices available, and the devices have been changing every two to three years, with major breakthroughs once or twice a decade. Within the brief life of the first edition of this...
Supervised and Unsupervised Ensemble Methods and their Applications (Studies in Computational Intelligence)
Supervised and Unsupervised Ensemble Methods and their Applications (Studies in Computational Intelligence)
The rapidly growing amount of data, available from different technologies in the field of bio-sciences, high-energy physics, economy, climate analysis, and in several other scientific disciplines, requires a new generation of machine learning and statistical methods to deal with their complexity and heterogeneity. As data collections becomes...
The Medieval City (Greenwood Guides to Historic Events of the Medieval World)
The Medieval City (Greenwood Guides to Historic Events of the Medieval World)
After a long decline in urban life following the fall of the Roman Empire, towns became centers of trade and of liberty during the medieval period. Here, the author describes how, as Europe stabilized after centuries of strife, commerce and the commercial class grew, and urban areas became an important source of revenue into royal coffers. Towns...
Result Page: 276 275 274 273 272 271 270 269 268 267 266 265 264 263 262 261 260 259 258 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy