Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Computer Vision and Applications
Handbook of Computer Vision and Applications

The third volume of the Handbook on Computer Vision and Applications is centered on system aspects and applications. The system aspect actually has two meanings. First, there is the question of how all components that make up a computer vision system and that have been discussed in the rst two volumes of the handbook are put together...

The Complete Annotated Grateful Dead Lyrics
The Complete Annotated Grateful Dead Lyrics

No other band has ever surpassed the enduring popularity of The Grateful Dead. No other group has regularly scheduled radio shows devoted solely to it, or such an extensive fan base stretching over several generations. And, with the surviving members still touring and the official website receiving more that 100,000 hits a week, no other fan...

Cellular and Molecular Immunology, Updated Edition: With STUDENT CONSULT Online Access, 5e
Cellular and Molecular Immunology, Updated Edition: With STUDENT CONSULT Online Access, 5e

This highly acclaimed text is now more up to date than ever! The Updated 5th Edition features new information and free access to a full-text online edition, images, animations, and much more at the
brand-new STUDENT CONSULT website. Readers will continue to enjoy the current, concise, and straightforward approach to the field that
...

Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data
Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data

Linux Malware Incident Response is a "first look" at the Malware Forensics Field Guide for Linux Systems, exhibiting the first steps in investigating Linux-based incidents. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is...

Beginning iPhone Development with Swift: Exploring the iOS SDK
Beginning iPhone Development with Swift: Exploring the iOS SDK

The team that brought you the bestselling Beginning iPhone Development, the book that taught the world how to program on the iPhone, is back again for Beginning iPhone Development with Swift.This definitive guide is up to date with Apple's new Swift programming language and the latest and greatest iOS 8 SDK, and Xcode...

Testing Code Security
Testing Code Security

The huge proliferation of security vulnerability exploits, worms, and viruses place an incredible drain on both cost and confidence for manufacturers and consumers. The release of trustworthy code requires a specific set of skills and techniques, but this information is often dispersed and decentralized, encrypted in its own jargon and...

Mastering Rust: Learn about memory safety, type system, concurrency, and the new features of Rust 2018 edition, 2nd Edition
Mastering Rust: Learn about memory safety, type system, concurrency, and the new features of Rust 2018 edition, 2nd Edition

Become proficient in designing, developing and deploying effective software systems using the advanced constructs of Rust

Key Features

  • Improve your productivity using the latest version of Rust and write simpler and easier code
  • Understand Rust's immutability and...
Predictive Biomarkers in Oncology: Applications in Precision Medicine
Predictive Biomarkers in Oncology: Applications in Precision Medicine
  “Precision/personalized or stratified medicine” refers to the tailoring of medical treatment or drug administration to the individual characteristics of each patient treatment. It does not literally mean that a pharmaceutical company makes a drug for an individual patient for consumption and treatment but rather means the...
Maximizing .NET Performance (Expert's Voice)
Maximizing .NET Performance (Expert's Voice)

Maximizing .NET Performance is the first book dedicated entirely to providing developers and architects with information on .NET Framework performance. .NET is a technology with a vast surface area, and coverage of every aspect of performance relevant to all .NET technologies is not possible within a single volume. This book...

.NET Framework Solutions: In Search of the Lost Win32 API
.NET Framework Solutions: In Search of the Lost Win32 API
If you've begun programming using Microsoft's .NET Framework, you've discovered a lot of new and improved functionality. But, more than likely, you've also discovered a lot of missing functionality. Indeed, a third of the functions supported by the old Win32 API are not yet supported by .NET. Although you may not at first notice the loss of Win32...
Data Mining and Knowledge Discovery Technologies (Advances in Data Warehousing and Mining)
Data Mining and Knowledge Discovery Technologies (Advances in Data Warehousing and Mining)
Data warehousing and OLAP (online analytical processing) technologies have gained a widespread acceptance since the 90’s as a support for decision-making. A data warehouse is a collection of subject-oriented, integrated, consolidated, time-varying, and non-volatile data (Kimball, 1996; Inmon, 1996). It is manipulated through OLAP tools, which...
Learning SPARQL
Learning SPARQL

More and more people are using the query language SPARQL (pronounced “sparkle”) to pull data from a growing collection of public and private data. Whether this data is part of a semantic web project or an integration of two inventory databases on different platforms behind the same firewall, SPARQL is making it easier to access...

unlimited object storage image
Result Page: 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 96 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy