Home | Amazing | Today | Tags | Publishers | Years | Search 
Privacy Defended: Protecting Yourself Online
Privacy Defended: Protecting Yourself Online
Privacy Defended: Protecting Yourself Online is a comprehensive book that melds detailed, how-to information on PC hardware and operating system security within the context of protecting one's privacy in a digital world. It is designed for individuals who are serious about their privacy and who also want an accessible, one-stop source of practical...
Tricks of the Podcasting Masters
Tricks of the Podcasting Masters

Have you figured out the basics of making a podcast, but now want to make a great podcast, and possibly make some money? Tricks of the Podcasting Masters holds the answers to questions such as:

  • How do I interact with listeners and get them to come back...

Biometrics: Personal Identification in Networked Society
Biometrics: Personal Identification in Networked Society
Determining the identity of a person is becoming critical in our vastly interconnected
information society. As increasing number of biometrics-based identification systems
are being deployed for many civilian and forensic applications, biometrics and its
applications have evoked considerable interest. The current state of affairs is
...
Object-Oriented Software Construction (2nd Edition)
Object-Oriented Software Construction (2nd Edition)
The definitive reference on the most important new technology in software!

“While the original version of OOSC is a classic, OOSC 2/E is destined to overshadow it and all other general introductions . . . literally an epic work.” —James C. McKim, Jr., Hartford Graduate Center

“Compelling. Extremely...

Computer Vision: A Modern Approach
Computer Vision: A Modern Approach

This extraordinary book gives a uniquely modern view of computer vision. Offering a general survey of the whole computer vision enterprise along with sufficient detail for readers to be able to build useful applications, this book is invaluable in providing a strategic overview of computer vision. With extensive use of probabalistic...

Video Coding for Mobile Communications: Efficiency, Complexity and Resilience (Signal Processing and its Applications)
Video Coding for Mobile Communications: Efficiency, Complexity and Resilience (Signal Processing and its Applications)
This book concentrates on three main challenges of video coding for mobile communications: higher coding efficiency, reduced computational complexity, and improved error resilience. Unlike other high level books and articles that focus on individual aspects in this field, this book has been designed as a quick, easy, and practical introduction to...
Designing Microsoft(r) ASP.NET Applications
Designing Microsoft(r) ASP.NET Applications
When I look down, I miss all the good stuff.
And when I look up, I just trip over things.
—Ani DiFranco

When I first heard about ASP.NET at a Microsoft author’s conference over a year ago, I
thought it might just be too good to be true. I can now create Web pages that are based
on compiled code, in one of
...
Data Mining: Theory, Methodology, Techniques, and Applications (Lecture Notes in Computer Science)
Data Mining: Theory, Methodology, Techniques, and Applications (Lecture Notes in Computer Science)
Data mining has been an area of considerable research and application in Australia and the region for many years. This has resulted in the establishment of a strong tradition of academic and industry scholarship, blended with the pragmatics of practice in the field of data mining and analytics. ID3, See5, RuleQuest.com, MagnumOpus, and WEKA is but...
Foundations and Novel Approaches in Data Mining (Studies in Computational Intelligence)
Foundations and Novel Approaches in Data Mining (Studies in Computational Intelligence)
Data-mining has become a popular research topic in recent years for the treatment of the "data rich and information poor" syndrome. Currently, application oriented engineers are only concerned with their immediate problems, which results in an ad hoc method of problem solving. Researchers, on the other hand, lack an understanding of the...
Software Architecture: 2nd European Workshop, EWSA 2005, Pisa, Italy, June 13-14, 2005, Proceedings
Software Architecture: 2nd European Workshop, EWSA 2005, Pisa, Italy, June 13-14, 2005, Proceedings
This book constitutes the refereed proceedings of the 2nd European Workshop on Software Architecture, EWSA 2004, held in Pisa, Italy in June 2005. The 12 revised full research papers, one revised case study, and four revised position papers presented together with one invited presentation on ongoing European projects on software architectures were...
Managing IT in Government, Business & Communities
Managing IT in Government, Business & Communities
This guide presents the most current research and findings about the challenges governments around the world are now placing on small business IT entrepreneurs and how they are providing increased resources to support this emphasis. Described are how organizations and society rely heavily on virtual technologies for communication and how...
Spoken Language Processing: A Guide to Theory, Algorithm and System Development
Spoken Language Processing: A Guide to Theory, Algorithm and System Development
Our primary motivation in writing this book is to share our working experience to bridge the gap between the knowledge of industry gurus and newcomers to the spoken language processing community. Many powerful techniques hide in conference proceedings and academic papers for years before becoming widely recognized by the research community or the...
Result Page: 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy