Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Digital Image Processing: An Algorithmic Approach with MATLAB (Chapman & Hall/CRC Textbooks in Computing)
Digital Image Processing: An Algorithmic Approach with MATLAB (Chapman & Hall/CRC Textbooks in Computing)

Avoiding heavy mathematics and lengthy programming details, Digital Image Processing: An Algorithmic Approach with MATLAB® presents an easy methodology for learning the fundamentals of image processing. The book applies the algorithms using MATLAB®, without bogging down...

The Ultimate Windows Server 2003 System Administrator's Guide
The Ultimate Windows Server 2003 System Administrator's Guide

Windows Server 2003 is more an update of Windows 2000 than a new operating system. This latest version of the base Windows NT technology now expands to support Microsoft's .NET Framework and new security initiatives. This book reflects these changes by expanding our previous book, The Ultimate Windows...

Computer Privacy Annoyances
Computer Privacy Annoyances

From the moment you're born, you enter the data stream-from birth certificates to medical records to what you bought on Amazon last week. As your dossier grows, so do the threats, from identity thieves to government snoops to companies who want to sell you something. Computer Privacy Annoyances...

Wireless Sensor and Actuator Networks: Algorithms and Protocols for Scalable Coordination and Data Communication
Wireless Sensor and Actuator Networks: Algorithms and Protocols for Scalable Coordination and Data Communication

A mixture of theory, experiments, and simulations that provide qualitative and quantitative insights into the technology

The important new technology of wireless sensor and actuator networks provides radically new communication and networking paradigms with many new applications. Wireless Sensor and Actuator Networks...

Ubiquitous Computing
Ubiquitous Computing

Near Field Communication (NFC) technology has become increasingly important for ubiquitous computing. Florian Resatsch investigates the optimal strategies for developing and evaluating ubiquitous computing applications based on NFC. He draws on a variety of current theories on ubiquitous computing, human-computer interaction, and technology...

Topics in Cryptology -- CT-RSA 2011: The Cryptographers' Track at the RSA Conference 201
Topics in Cryptology -- CT-RSA 2011: The Cryptographers' Track at the RSA Conference 201

The RSA conference was initiated in 1991 and is a major international event for cryptography and information security researchers as well as the industry related to these disciplines. It is an annual event that attracts hundreds of vendors and thousands of participants from industry and academia. Since 2001, the RSA conference has included...

Using Information Technology 9e Complete Edition
Using Information Technology 9e Complete Edition

The Williams, Using Information Technology, 9th edition utilizes a practical, applied approach to technology. This text is user-focused and has been highly updated including topics, pictures and examples. The Williams text contains less theory and more application to engage students who might be more familiar with technology. Continually...

MCTS 70-680 Cert Guide: Microsoft Windows 7, Configuring
MCTS 70-680 Cert Guide: Microsoft Windows 7, Configuring

MCTS Windows 7 Configuring Cert Guide (Exam 70-680) is designed for network administrators, network engineers, and consultants who are pursuing the Microsoft Certified Technology Specialist (MCTS) or Microsoft Certified IT Professional (MCITP) certifications for Windows 7. This book covers the “TS: Microsoft Windows...

Emerging Web Services Technology, Volume II (Whitestein Series in Software Agent Technologies and Autonomic Computing)
Emerging Web Services Technology, Volume II (Whitestein Series in Software Agent Technologies and Autonomic Computing)
This 2nd volume on Emerging Web Services Technologies continues to follow the current research activities in the areas of Web Services and Service Oriented Architectures. By collecting the proceedings of the second Workshop of Emerging Web Services Technology 2007 it contains many examples of promising research activities...
Models and Analysis for Distributed Systems (ISTE)
Models and Analysis for Distributed Systems (ISTE)
Verification and hence modeling are a mandatory but intricate problem for engineers developing embedded distributed real-time systems that are entrusted with critical safety applications like medical care, transportation, energy production, industrial processes, military operations. Therefore, while emerging 40 years ago, first for...
Professional Hadoop
Professional Hadoop

The professional's one-stop guide to this open-source, Java-based big data framework

Professional Hadoop is the complete reference and resource for experienced developers looking to employ Apache Hadoop in real-world settings. Written by an expert team of certified Hadoop developers, committers, and Summit...

Analysis of Phylogenetics and Evolution with R (Use R!)
Analysis of Phylogenetics and Evolution with R (Use R!)
Phylogenetics is the science of the evolutionary relationships among species. Recently, the term has come to include broader issues such as estimating rates of evolution, dating divergence among species, reconstructing ancestral characters, or quantifying adaptation, all these using phylogenies as frameworks. ...
unlimited object storage image
Result Page: 203 202 201 200 199 198 197 196 195 194 193 192 191 190 189 188 187 186 185 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy