Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CCSP: Complete Study Guide (642-501, 642-511, 642-521, 642-531, 642-541)
CCSP: Complete Study Guide (642-501, 642-511, 642-521, 642-531, 642-541)
This Study Guide is an introduction to the Cisco Certified Security Professional (CCSP) certification
track. It will help improve your Cisco security skills so that you can have more
opportunities for a better job or job security. Security experience has been the buzzword and
it will continue to be because networks need security....
Multi-Carrier and Spread Spectrum Systems
Multi-Carrier and Spread Spectrum Systems
Multi-Carrier and Spread Spectrum Systems describes and analyses the basic concepts of the combination of multi-carrier transmission with spread spectrum (MC-SS). The various architectures and the different detection strategies are examined in some depth. Techniques for capacity and flexibility enhancement of multi-carrier systems such as...
Networking (2nd Edition) (Networking Technology)
Networking (2nd Edition) (Networking Technology)

This text provides a comprehensive look at computer networking from the point of view of the network administrator. It guides readers from an entry-level knowledge in computer networks to advanced concepts in Ethernet networks; router configuration; TCP/IP networks; local-, campus-, and wide-area network configuration; network security; optical...

Software Error Detection through Testing and Analysis
Software Error Detection through Testing and Analysis

An in-depth review of key techniques in software error detection

Software error detection is one of the most challenging problems in software engineering. Now, you can learn how to make the most of software testing by selecting test cases to maximize the probability of revealing latent errors. Software Error Detection through...

Learning Modernizr
Learning Modernizr

Modern web browsers support a whole range of new HTML5 and CSS3 features that make web development fun. But supporting old browsers can make a web developer's life difficult. With HTML5 Modernizr, you can check for features and deliver a design around them that is not only backward, but also forward compatible.

"Learning...

Breast Cancer: Translational Therapeutic Strategies (Translational Medicine)
Breast Cancer: Translational Therapeutic Strategies (Translational Medicine)

Considering the impact of translational breakthroughs on the early detection, diagnosis, prevention, and treatment of breast cancer, this all-encompassing guide collects cutting-edge research on the most promising strategies and agents likely to impact the management and long-term outcomes of women with breast cancer. This book will provide...

Practical Convolutional Neural Networks: Implement advanced deep learning models using Python
Practical Convolutional Neural Networks: Implement advanced deep learning models using Python

One stop guide to implementing award-winning, and cutting-edge CNN architectures

Key Features

  • Fast-paced guide with use cases and real-world examples to get well versed with CNN techniques
  • Implement CNN models on image classification, transfer learning, Object Detection,...
CCNA ICND Exam Certification Guide (CCNA Self-Study, 640-811, 640-801), Fourth Edition
CCNA ICND Exam Certification Guide (CCNA Self-Study, 640-811, 640-801), Fourth Edition
This Study Guide is an introduction to the Cisco Certified Security Professional (CCSP) certification
track. It will help improve your Cisco security skills so that you can have more
opportunities for a better job or job security. Security experience has been the buzzword and
it will continue to be because networks need security....
Reasoning in Event-Based Distributed Systems (Studies in Computational Intelligence)
Reasoning in Event-Based Distributed Systems (Studies in Computational Intelligence)

Event-based distributed systems are playing an ever increasing role in areas such as enterprise management, information dissemination, finance, environmental monitoring and geo-spatial systems. Event-based processing originated with the introduction of Event-Condition-Action (ECA) rules to database systems in the 1980s. Since then,...

Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia
Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia
Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at our finger tips, its rapid growth has raised some weighty security concerns with...
Learning OpenCV: Computer Vision with the OpenCV Library
Learning OpenCV: Computer Vision with the OpenCV Library
Learning OpenCV puts you right in the middle of the rapidly expanding field of computer vision. Written by the creators of OpenCV, the widely used free open-source library, this book introduces you to computer vision and demonstrates how you can quickly build applications that enable computers to "see" and make decisions based on the...
Security Monitoring
Security Monitoring
How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic...
unlimited object storage image
Result Page: 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy