Home | Amazing | Today | Tags | Publishers | Years | Search 
Mind Performance Projects for the Evil Genius: 19 Brain-Bending Bio Hacks
Mind Performance Projects for the Evil Genius: 19 Brain-Bending Bio Hacks

Have some evil fun inside your head!

This wickedly inventive guide offers 19 build-it-yourself projects featuring high-tech devices that can map, manipulate, and even improve the greatest computer on earth-the human brain. Every project inside Mind Performance Projects for the Evil Genius is perfectly safe and...

Advances in Machine Learning I: Dedicated to the Memory of Professor Ryszard S. Michalski (Studies in Computational Intelligence)
Advances in Machine Learning I: Dedicated to the Memory of Professor Ryszard S. Michalski (Studies in Computational Intelligence)

This is the first volume of a large two-volume editorial project we wish to dedicate to the memory of the late Professor Ryszard S. Michalski who passed away in 2007. He was one of the fathers of machine learning, an exciting and relevant, both from the practical and theoretical points of view, area in modern computer science and...

Advances in Machine Learning II: Dedicated to the memory of Professor Ryszard S. Michalski
Advances in Machine Learning II: Dedicated to the memory of Professor Ryszard S. Michalski

This is the second volume of a large two-volume editorial project we wish to dedicate to the memory of the late Professor Ryszard S. Michalski who passed away in 2007. He was one of the fathers of machine learning, an exciting and relevant, both from the practical and theoretical points of view, area in modern computer science and information...

Medical Imaging Informatics
Medical Imaging Informatics

Medical Imaging Informatics provides an overview of this growing discipline, which stems from an intersection of biomedical informatics, medical imaging, computer science and medicine. Supporting two complementary views, this volume explores the fundamental technologies and algorithms that comprise this field, as well as the application...

System Modeling and Control with Resource-Oriented Petri Nets (Automation and Control Engineering)
System Modeling and Control with Resource-Oriented Petri Nets (Automation and Control Engineering)

Petri nets are widely used in modeling, analysis, and control of discrete event systems arising from manufacturing, transportation, computer and communication networks, and web service systems. However, Petri net models for practical systems can be very large, making it difficult to apply such models to real-life problems.

System...

Upgrading and Repairing PCs (19th Edition)
Upgrading and Repairing PCs (19th Edition)

“…a comprehensive resource for PC enthusiasts and professionals alike. Packed with the latest speeds and feeds, you’ll want to keep this book on-hand as an authoritative technology reference.”

–Chris Angelini, Managing Editor, Tom’s...

JSF 1.2 Components
JSF 1.2 Components
This book is a practical, hands-on guide to learning JavaServer Faces components based on a fictitious computer hardware e-commerce application. It adopts an example-driven approach focused on solving common web application development tasks using a wide range of JSF components from today's most popular JSF component libraries. Each chapter covers...
Blender 3D 2.49 Incredible Machines
Blender 3D 2.49 Incredible Machines
Blender 3D provides all the features you need to create super-realistic 3D models of machines for use in artwork, movies, and computer games. Blender 3D 2.49 Incredible Machines gives you step-by-step instructions for building weapons, vehicles, robots, and more.

This book will show you how to use Blender 3D for mechanical modeling and
...
Principles of Wireless Networks: A Unified Approach (Prentice Hall Communications Engineering and Emerging Technologies Series)
Principles of Wireless Networks: A Unified Approach (Prentice Hall Communications Engineering and Emerging Technologies Series)
For upper level undergraduate Electrical Engineering, Computer Science, Telecommunications or Information Science courses that focus on wireless communications technology, as well as a reference for technicians and other professionals in the wireless industry.Takes a unified and comprehensive approach to introducing the full spectrum of engineering...
Data Mining: Special Issue in Annals of Information Systems
Data Mining: Special Issue in Annals of Information Systems

Over the course of the last twenty years, research in data mining has seen a substantial increase in interest, attracting original contributions from various disciplines including computer science, statistics, operations research, and information systems. Data mining supports a wide range of applications, from medical decision making,...

Photoshop CS4 QuickSteps
Photoshop CS4 QuickSteps

Your full-color, fast reference to Photoshop CS4

In this thoroughly revised guide, full-color screenshots and brief instructions show you how to use the latest version of Photoshop quickly and easily. Learn how to edit and retouch photos,...

Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

Result Page: 625 624 623 622 621 620 619 618 617 616 615 614 613 612 611 610 609 608 607 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy