Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Soft Computing in XML Data Management: Intelligent Systems from Decision Making to Data Mining
Soft Computing in XML Data Management: Intelligent Systems from Decision Making to Data Mining

Being the de-facto standard for data representation and exchange over the Web, XML (Extensible Markup Language) allows the easy development of applications that exchange data over the Web. This creates a set of data management requirements involving XML. XML and related standards have been extensively applied in many business, service, and...

Advanced Digital Signal Processing and Noise Reduction
Advanced Digital Signal Processing and Noise Reduction

Digital signal processing plays a central role in the development of modern communication and information processing systems. The theory and application of signal processing is concerned with the identification, modelling and utilisation of patterns and structures in a signal process. The observation signals are often distorted, incomplete...

Linksys WRT54G Ultimate Hacking
Linksys WRT54G Ultimate Hacking
This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54Gs hardware components, the different third-party firmware available and the differences between them, choosing the...
Remote Sensing for Sustainable Forest Management
Remote Sensing for Sustainable Forest Management
As remote sensing data and methods have become increasingly complex and varied - and increasingly reliable - so have their uses in forest management. New algorithms have been developed in virtually every aspect of image analysis, from classification to enhancements to estimating parameters. Remote Sensing for Sustainable Forest Management reviews...
Intrusion Detection in Wireless Ad-Hoc Networks
Intrusion Detection in Wireless Ad-Hoc Networks

Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including...

Analytical Electrochemistry
Analytical Electrochemistry

The critically acclaimed guide to the principles, techniques, and instruments of electroanalytical chemistry–now expanded and revised

Joseph Wang, internationally renowned authority on electroanalytical techniques, thoroughly revises his acclaimed book to reflect the rapid growth the field has experienced in recent years. He...

Instant Nokogiri
Instant Nokogiri

Learning data scraping and parsing in Ruby using the Nokogiri gem

Overview

  • Learn something new in an Instant! A short, fast, focused guide delivering immediate results
  • Master Nokogiri with the use of clear, step-by-step instructions and real world examples
  • ...
Advances in Intelligent Informatics, Smart Technology and Natural Language Processing: Selected Revised Papers from the Joint International Symposium ... in Intelligent Systems and Computing (807))
Advances in Intelligent Informatics, Smart Technology and Natural Language Processing: Selected Revised Papers from the Joint International Symposium ... in Intelligent Systems and Computing (807))

This book constitutes the refereed proceedings of the 13th Joint International Symposium on Artificial Intelligence and Natural Language Processing, iSAI-NLP2017, held in Prachuap Khiri Khan, Thailand, in August 2017, and the 10th International Conference on Knowledge, Information and Creativity Support Systems, KICSS2015, held in...

Linux Troubleshooting Bible
Linux Troubleshooting Bible

If something goes wrong, roll up your sleeves, then troubleshoot and fix Linux yourself!

Commercial support packages for Linux can be expensive. This unique book gives you the power to diagnose and fix a wide range of Linux problems. Using Fedora Core Linux and Red Hat Enterprise Linux examples, Thomas Weeks and bestselling Red Hat...

Nokia Firewall, VPN, and IPSO Configuration Guide
Nokia Firewall, VPN, and IPSO Configuration Guide
The Only Book and Companion Web Site Covering Nokia's Firewall/VPN Appliances, which is the #3 security appliance worldwide.

"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its
...
Physics And Modeling Of Tera- And Nano-Devices (Selected Topics in Eletronics and Systems)
Physics And Modeling Of Tera- And Nano-Devices (Selected Topics in Eletronics and Systems)
Physics and Modeling of Tera- and Nano-Devices is a compilation of papers by well-respected researchers working in the field of physics and modeling of novel electronic and optoelectronic devices. The topics covered include devices based on carbon nanotubes, generation and detection of terahertz radiation in semiconductor structures including...
The Game Maker's Companion
The Game Maker's Companion

The Game Maker’s Companion is the long-awaited sequel to The Game Maker’s Apprentice. This book picks up where the last book left off, advancing your game development journey with some seriously impressive gaming projects. This time you’ll learn how to make professional-quality platform games with solid...

unlimited object storage image
Result Page: 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy