Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Data Mining in Bioinformatics (Advanced Information and Knowledge Processing)
Data Mining in Bioinformatics (Advanced Information and Knowledge Processing)
The aim of this book is to introduce the reader to some of the best techniques for data mining in bioinformatics in the hope that the reader will build on them to make new discoveries on his or her own. The book contains twelve chapters in four parts, namely, overview, sequence and structure alignment, biological...
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks

Master malware analysis to protect your systems from getting infected

Key Features

  • Set up and model solutions, investigate malware, and prevent it from recurring
  • Learn core concepts relating to dynamic malware analysis, memory forensics, decryption, and much more
  • ...
Integrated Cisco and UNIX Network Architectures (Cisco Press Networking Technology)
Integrated Cisco and UNIX Network Architectures (Cisco Press Networking Technology)

UNIX gateways introduce massive performance possibilities at a fraction of the price of dedicated proprietary appliances by performing network tasks entirely in software. With Cisco Systems routers dominating the Internet and enterprise networking and UNIX routing and gateway solutions spreading from within server farms and data...

Information Processing in Medical Imaging: 16th International Conference, IPMI'99, Visegrad, Hungary
Information Processing in Medical Imaging: 16th International Conference, IPMI'99, Visegrad, Hungary
This book constitutes the refereed proceedings of the 16th International Conference on Information Processing in Medical Imaging, IPMI'99, held in Visegrad, Hungary in June/July 1999.

The 24 revised full papers and the 28 posters presented have been carefully reviewed and selected from a total of 82 submissions. The volume addresses the
...
Acoustic And Radio Eev Neurtrino Detection Activities
Acoustic And Radio Eev Neurtrino Detection Activities
The ARENA Workshop in Zeuthen was the first to combine extensively the fields of acoustic and radio detection techniques for high-energetic particle cascades from cosmic neutrino interactions. The articles in this volume comprise the latest research work which was presented by over 50 speakers from 10 countries. The wide coverage includes:...
The Book of JavaScript: A Practical Guide to Interactive Web Pages
The Book of JavaScript: A Practical Guide to Interactive Web Pages
Most Web developers pick up a book to learn how to use a language like JavaScript, looking for practical examples of how to get things done. The Book of JavaScript: A Practical Guide to Interactive Web Pages is plenty practical, and hits the mark as a reader-friendly and well-organized tutorial on JavaScript.

The book...

Wireless Communication Systems: Advanced Techniques for Signal Reception
Wireless Communication Systems: Advanced Techniques for Signal Reception

A unified framework for using today's most advanced signal processing techniques

Driven by the rapidly escalating capacity demands of emerging wireless systems, researchers havedeveloped a wide array of novel signal processing techniques for use in such systems. Now, twoleading researchers synthesize the field's vast new...

Penetration Testing Essentials
Penetration Testing Essentials
Your pen testing career begins here, with a solid foundation in essential skills and concepts

Penetration Testing Essentials provides a starting place for professionals and beginners looking to learn more about penetration testing for cybersecurity. Certification eligibility requires work experience—but before...

Wireless Communications over MIMO Channels: Applications to CDMA and Multiple Antenna Systems
Wireless Communications over MIMO Channels: Applications to CDMA and Multiple Antenna Systems
Mobile radio communications are evolving from pure telephony systems to multimedia
platforms offering a variety of services ranging from simple file transfers and audio and
video streaming, to interactive applications and positioning tasks. Naturally, these services
have different constraints concerning data rate, delay, and
...
Machine Learning and Data Mining for Computer Security: Methods and Applications
Machine Learning and Data Mining for Computer Security: Methods and Applications

"Machine Learning and Data Mining for Computer Security" provides an overview of the current state of research in machine learning and data mining as it applies to problems in computer security. This book has a strong focus on information processing and combines and extends results from computer security.

The first part of the...

VMware vSphere 5 Clustering Technical Deepdive
VMware vSphere 5 Clustering Technical Deepdive

** Black & White edition ** VMware vSphere 5 Clustering Technical Deepdive zooms in on three key components of every VMware based infrastructure and is by no means a "how to" guide. It covers the basic steps needed to create a vSphere HA and vSphere DRS cluster and to implement vSphere Storage DRS. Even more important, it...

Glow Discharge Plasmas in Analytical Spectroscopy
Glow Discharge Plasmas in Analytical Spectroscopy

This multi-author, edited volume includes chapters which deal with both basic and highly complex applications. Glow discharge devices are now being used in very novel ways for the analysis of liquids and gases, including molecular species detection and identification, an area that was beyond the perceived scope of applicability just ten years...

unlimited object storage image
Result Page: 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy