Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Human-Computer Interaction Fundamentals (Human Factors and Ergonomics)
Human-Computer Interaction Fundamentals (Human Factors and Ergonomics)
Hailed on first publication as a compendium of foundational principles and cutting-edge research, The Human-Computer Interaction Handbook has become the gold standard reference in this field. Derived from select chapters of this groundbreaking and authoritative resource, Human-Computer Interaction Fundamentals emphasizes...
The Mac Hacker's Handbook
The Mac Hacker's Handbook
As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat...
Informatics: 10 Years Back. 10 Years Ahead (Lecture Notes in Computer Science)
Informatics: 10 Years Back. 10 Years Ahead (Lecture Notes in Computer Science)
From August 27 to 31, 2000, the International Conference and Research Center for Computer Science in Schloss Dagstuhl, Dagstuhl for short, celebrated its 10th anniversary. Since its founding in 1990, the objective of the Center has been to promote world-class research in computer science, support leading-edge continuing education, and promote the...
Markov Random Field Modeling in Image Analysis (Advances in Pattern Recognition)
Markov Random Field Modeling in Image Analysis (Advances in Pattern Recognition)

Modeling problems in this book are addressed mainly from the computational viewpoint. The primary concerns are how to define an objective function for the optimal solution to a image analysis or computer vision problem and how to find the optimal solution. The solution is defined in an optimization sense because the perfect solution is...

Microsoft Visual Basic 2010 for Windows, Web, and Office Applications: Complete (Shelly Cashman)
Microsoft Visual Basic 2010 for Windows, Web, and Office Applications: Complete (Shelly Cashman)

The Shelly Cashman Series® offers the finest textbooks in computer education. This Microsoft Visual Basic 2010 book utilizes an innovative step-by-step pedagogy, which integrates demonstrations of professional-quality programs with in-depth discussions of programming concepts and techniques and opportunities for hands-on practice...

Computer Methods for Analysis of Mixed-Mode Switching Circuits
Computer Methods for Analysis of Mixed-Mode Switching Circuits

Mixed-mode switching circuits distinguish themselves from other circuits by including switches that are either clocked externally or controlled internally. These circuits have found broad applications in telecommunication networks, instrumentation, and power electronic systems, to name a few. It is the emergence of switched capacitor...

Graphics Tools---The jgt Editors' Choice
Graphics Tools---The jgt Editors' Choice

Computer Graphics professionals can now find in one volume a collection of 32 "gems" chosen by the editors of the journal of graphics tools, one of the leading publications in the field. These selected papers provide practical ideas and techniques that solve real problems in the areas of - Math & Programming Techniques...

NLTK Essentials
NLTK Essentials

Build cool NLP and machine learning applications using NLTK and other Python libraries

About This Book

  • Extract information from unstructured data using NLTK to solve NLP problems
  • Analyse linguistic structures in text and learn the concept of semantic analysis and parsing
  • ...
Database Anonymization: Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections
Database Anonymization: Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections

The current social and economic context increasingly demands open data to improve scientific research and decision making. However, when published data refer to individual respondents, disclosure risk limitation techniques must be implemented to anonymize the data and guarantee by design the fundamental right to privacy of the subjects the...

Statistical Approach to Quantum Field Theory: An Introduction (Lecture Notes in Physics)
Statistical Approach to Quantum Field Theory: An Introduction (Lecture Notes in Physics)

Over the past few decades the powerful methods of statistical physics and Euclidean quantum field theory have moved closer together, with common tools based on the use of path integrals. The interpretation of Euclidean field theories as particular systems of statistical physics has opened up new avenues for understanding strongly coupled...

Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on ... (Smart Innovation, Systems and Technologies)
Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on ... (Smart Innovation, Systems and Technologies)

Advanced Computing, Networking and Informatics are three distinct and mutually exclusive disciplines of knowledge with no apparent sharing/overlap among them. However, their convergence is observed in many real world applications, including cyber-security, internet banking, healthcare, sensor networks, cognitive radio, pervasive computing...

Security Controls Evaluation, Testing, and Assessment Handbook
Security Controls Evaluation, Testing, and Assessment Handbook

Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of...

unlimited object storage image
Result Page: 638 637 636 635 634 633 632 631 630 629 628 627 626 625 624 623 622 621 620 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy