Home | Amazing | Today | Tags | Publishers | Years | Search 
The Definitive Guide to PC-BSD (Expert's Voice in BSD)
The Definitive Guide to PC-BSD (Expert's Voice in BSD)

This book is the ultimate reference for both beginners and power users to PC-BSD—the free, easy-to-use operating system based on FreeBSD. Existing power users will learn how to look under the hood and contribute to the global PC-BSD community. PC-BSD is turning into a hassle-free alternative to Linux on the desktop.

Biomedical Image Analysis and Machine Learning Technologies: Applications and Techniques
Biomedical Image Analysis and Machine Learning Technologies: Applications and Techniques

Medical images are at the base of many routine clinical decisions and their influence continues to increase in many fields of medicine. Since the last decade, computers have become an invaluable tool for supporting medical image acquisition, processing, organization and analysis.

Biomedical Image Analysis and Machine Learning...

Mechanics: From Newton's Laws to Deterministic Chaos
Mechanics: From Newton's Laws to Deterministic Chaos

This book covers all topics in mechanics from elementary Newtonian mechanics, the principles of canonical mechanics and rigid body mechanics to relativistic mechanics and nonlinear dynamics. It was among the first textbooks to include dynamical systems and deterministic chaos in due detail. As compared to the previous editions the present...

Microsoft Windows Home Server Unleashed (2nd Edition)
Microsoft Windows Home Server Unleashed (2nd Edition)

This is the most comprehensive, practical, and useful guide to Windows Home Server, including Microsoft’s major updates in PowerPacks 1, 2, and 3. Top Windows expert Paul McFedries brings together tips, techniques, and shortcuts available nowhere else and presents them all in plain English for every Windows Home...

Seven Deadliest Network Attacks (Syngress Seven Deadliest Attacks)
Seven Deadliest Network Attacks (Syngress Seven Deadliest Attacks)

Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend...

Professional Xcode 3 (Wrox Programmer to Programmer)
Professional Xcode 3 (Wrox Programmer to Programmer)

A solid guide that responds to the active interest in Apple's Xcode tools

Apple's Xcode tools are a collection of applications and frameworks that are used to develop, test, and optimize applications primarily written for Mac OS X or the iPhone. The steady increase in sales of Apple computers has triggered a strong interest...

Linear and Nonlinear Multivariable Feedback Control: A Classical Approach
Linear and Nonlinear Multivariable Feedback Control: A Classical Approach

Automatic feedback control systems play crucial roles in many fields, including manufacturing industries, communications, naval and space systems. At its simplest, a control system represents a feedback loop in which the difference between the ideal (input) and actual (output) signals is used to modify the behaviour of the system. Control...

Practical Digital Wireless Signals (The Cambridge RF and Microwave Engineering Series)
Practical Digital Wireless Signals (The Cambridge RF and Microwave Engineering Series)

Wireless communications is rapidly becoming one of the ubiquitous technological underpinnings of modern society (such as electric power, fossil fuels, automobiles, etc.). Few people think about the technology within their mobile phones, remote controls, garage door openers, GPS navigation devices, and so on. These devices are always at hand...

Inventing Software: The Rise of Computer-Related Patents
Inventing Software: The Rise of Computer-Related Patents

Since the introduction of personal computers, software has emerged as a driving force in the global economy and a major industry in its own right. During this time, the U.S. government has reversed its prior policy against software patents and is now issuing thousands of such patents each year, provoking heated controversy among programmers,...

Digital Design for Computer Data Acquisition
Digital Design for Computer Data Acquisition

This digital electronics text focuses on "how to" design, build, operate and adapt data acquisition systems. The material begins with basic logic gates and ends with a 40 KHz voltage measurer. The approach aims to cover a minimal number of topics in detail. The data acquisition circuits described communicate with a host computer...

Post Quantum Cryptography
Post Quantum Cryptography
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature...
Seven Deadliest Social Network Attacks (Syngress Seven Deadliest Attacks)
Seven Deadliest Social Network Attacks (Syngress Seven Deadliest Attacks)

Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your...

Result Page: 144 143 142 141 140 139 138 137 136 135 134 133 132 131 130 129 128 127 126 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy