Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Get Ready for OpenID
Get Ready for OpenID
This is the first book written on the OpenID system and it provides comprehensive information to beginners and mid level programmers of OpenID. The book includes topics like: o Introduction to identity management o Creating OpenID identities o Using OpenID to login to web sites o Understanding the OpenID protocol o Structure of OpenID messages o...
Construction Waterproofing Handbook
Construction Waterproofing Handbook
The Latest Waterproofing Techniques and Technology

Fully updated to include new techniques for mold remediation, Construction Waterproofing Handbook simplifies the critical task of keeping a building's envelope watertight. It begins with a tutorial on basic waterproofing concepts and materials, then moves on to the...

Foundations of Dependable Computing: System Implementation
Foundations of Dependable Computing: System Implementation
Foundations of Dependable Computing: System Implementation, explores the system infrastructure needed to support the various paradigms of Paradigms for Dependable Applications. Approaches to implementing support mechanisms and to incorporating additional appropriate levels of fault detection and fault tolerance at the processor, network, and...
Wavelet Theory and Its Application to Pattern Recognition (Series in Machine Perception and Artificial Intelligence)
Wavelet Theory and Its Application to Pattern Recognition (Series in Machine Perception and Artificial Intelligence)

This 2nd edition is an update of the book "Wavelet Theory and Its Application to Pattern Recognition" published in 2000. Three new chapters, which are research results conducted during 2001-2008, will be added. The book consists of two parts - the first contains the basic theory of wavelet analysis and the second includes...

Quantum Computing and Communications: An Engineering Approach
Quantum Computing and Communications: An Engineering Approach
Quantum computers will revolutionize the way telecommunications networks function.

Quantum computing holds the promise of solving problems that would be intractable with conventional computers, by implementing principles from quantum physics in the development of computer hardware, software and communications equipment....

Extreme Exploits: Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses...

Image Analysis: 15th Scandinavian Conference, SCIA 2007, Aalborg, Denmark, June 10-24, 2007, Proceedings
Image Analysis: 15th Scandinavian Conference, SCIA 2007, Aalborg, Denmark, June 10-24, 2007, Proceedings
This book constitutes the refereed proceedings of the 15th Scandinavian Conference on Image Analysis, SCIA 2007, held in Aalborg, Denmark in June 2007.

The 66 revised full papers and 33 revised poster papers presented were carefully reviewed and selected from 228 submissions. The papers are organized in topical sections on computer vision, 2D...

Human Ear Recognition by Computer (Advances in Pattern Recognition)
Human Ear Recognition by Computer (Advances in Pattern Recognition)

Biometrics deals with recognition of individuals based on their physiological or behavioral characteristics. The human ear is a new feature in biometrics that has several merits over the more common face, fingerprint and iris biometrics. Unlike the fingerprint and iris, it can be easily captured from a distance without a fully cooperative...

Design Methods and Applications for Distributed Embedded Systems
Design Methods and Applications for Distributed Embedded Systems

The ever decreasing price/performance ratio of microcontrollers makes it economically attractive to replace more and more conventional mechanical or electronic control systems within many products by embedded real-time computer systems. An embedded real-time computer system is always part of a well-specified larger system, which we call an...

A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness
A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness

Information technology is an increasingly large factor in legal proceedings. In cases large and small, from the U.S. Government's antitrust suit against Microsoft Corporation, to civil lawsuits filed over the failure of a network, to criminal cases in which the authenticity of electronic evidence is questioned, the testimony of a technical...

Aspects of Explosives Detection
Aspects of Explosives Detection
Detection and quantification of trace chemicals is a major thrust of analytical chemistry. In recent years much effort has been spent developing detection systems for priority pollutants. Less mature are the detections of substances of interest to law enforcement and security personnel:in particular explosives. This volume will discuss the...
Handbook of Plastic Optics
Handbook of Plastic Optics

This volume is the only book to describe in detail all aspects of plastic optics from design issues to production technology and quality control aspects. Throughout, the focus is firmly set on practical applications, making this an indispensable source of information for all those working in optics research and development.

Topics...

unlimited object storage image
Result Page: 69 68 67 66 65 64 63 62 61 60 59 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy