Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Boosting-Based Face Detection and Adaptation (Synthesis Lectures on Computer Vision)
Boosting-Based Face Detection and Adaptation (Synthesis Lectures on Computer Vision)
With the rapid increase of computational powers and availability of modern sensing, analysis and rendering equipment and technologies, computers are becoming more and more intelligent. Many research projects and commercial products have demonstrated the capability for a computer to interact with human in a natural way by looking at...
Phosphorescent Oxygen-Sensitive Probes (SpringerBriefs in Biochemistry and Molecular Biology)
Phosphorescent Oxygen-Sensitive Probes (SpringerBriefs in Biochemistry and Molecular Biology)

Biological O2 sensing probes and measurement techniques were first introduced in the late 80s. In the last 3-5 years they have undergone major development that have made them available and affordable for a broad range of applications in various disciplines of the life and biomedical sciences. These new chemistries and technologies,...

Creative Greenfoot
Creative Greenfoot

Build engaging interactive applications, games, and simulations using Java and Greenfoot

About This Book

  • Apply a wide variety of game design and programming animation techniques to create immersive interactive applications that use state-of-the-art controllers and input devices
  • Quickly...
Microsoft Encyclopedia of Security
Microsoft Encyclopedia of Security

Get the single resource that defines—and illustrates—the rapidly evolving world of computer and network security. The Microsoft Encyclopedia of Security delivers more than 1000 cross-referenced entries detailing the latest security-related technologies, standards, products, services, and issues—including sources...

Network Security: A Beginner's Guide
Network Security: A Beginner's Guide

Learn network security basics using this practical guide

Create a successful security program--even if you're new to the field of network security--using this practical guidebook. You can now get the technical background you need and have access to the best and most up-to-date security practices--from one resource. You'll learn how to...

Advanced Techniques in Knowledge Discovery and Data Mining
Advanced Techniques in Knowledge Discovery and Data Mining
Data mining and knowledge discovery (DMKD) is a rapidly expanding field in computer science. It has become very important because of an increased demand for methodologies and tools that can help the analysis and understanding of huge amounts of data generated on a daily basis by institutions like hospitals, research laboratories, banks, insurance...
Solid-State Mid-Infrared Laser Sources (Topics in Applied Physics)
Solid-State Mid-Infrared Laser Sources (Topics in Applied Physics)
According to the Encyclopaedia Britannica, the "middle infrared" region covers the portion of the electromagnetic spectrum between 400 and 4000 wave numbers, which corresponds to the wavelength range 2.5-25 gin. This range is of particular interest for many applications, especially for spectroscopy, since the electromagnetic frequencies...
Internet Lockdown: Internet Security Administrator's Handbook
Internet Lockdown: Internet Security Administrator's Handbook

Internet Lockdown: Internet Security Administrator's Handbook covers hot security technology including firewalls, intrusion detection and prevention, honeypots, network security on all operating systems. It explains confusing core concepts like certificates, cryptography, firewalls and encryption in a fashion anyone can understand....

Windows Security Monitoring: Scenarios and Patterns
Windows Security Monitoring: Scenarios and Patterns

Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security

Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...

Facial Analysis from Continuous Video with Applications to Human-Computer Interface (International Series on Biometrics)
Facial Analysis from Continuous Video with Applications to Human-Computer Interface (International Series on Biometrics)
Computer vision algorithms for the analysis of video data are obtained from a camera aimed at the user of an interactive system. It is potentially useful to enhance the interface between users and machines. These image sequences provide information from which machines can identify and keep track of their users, recognize their facial expressions...
Poser 7 Revealed: The efrontier Official Guide
Poser 7 Revealed: The efrontier Official Guide

Now you can conquer each essential feature of Poser 7! Poser 7 Revealed helps you develop the skills you need to create, render, and animate scenes and projects using the amazing tools offered by Poser 7. This hands-on guide provides you with step-by-step tutorials for each task, followed by projects that allow you to use each new skill on...

Kali Linux: Assuring Security By Penetration Testing
Kali Linux: Assuring Security By Penetration Testing

Master the art of penetration testing with Kali Linux

Overview

  • Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
  • Explore the insights and importance of testing your corporate network systems before the hackers strike
  • Understand the...
unlimited object storage image
Result Page: 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy