Home | Amazing | Today | Tags | Publishers | Years | Search 
Image Fusion: Algorithms and Applications
Image Fusion: Algorithms and Applications
A complete resource containing in one volume the latest algorithms, design techniques and applications on the 'hot' topic of image fusion

The application of sensor technology has brought considerable interest in the area of image fusion. Written by leading experts in the field, this book brings together in one volume the most
...
Web Standards Programmer's Reference : HTML, CSS, JavaScript, Perl, Python, and PHP
Web Standards Programmer's Reference : HTML, CSS, JavaScript, Perl, Python, and PHP
Web Standards

HTML, CSS, JavaScript,® Perl, Python,® and PHP

Serving as both a "how-to" guide and a reference, this book is one-stop reading for all the essential Web standards—XHTML, CSS, JavaScript, CGI with Perl and Python, and PHP. In today's web environment, professional web coders and serious...

The Hidden Power of Photoshop CS
The Hidden Power of Photoshop CS
AlthoughI wasn’t really thinking about it at the time, in a way, I really started writing this book in 1992 when I first started using Photoshop professionally (with Photoshop 2). At the time I wasn’t planning to write a book, but I had already been involved with scanning and editing digital artwork for several years. I had become...
Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense
Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense
Cyberspace security is a critical subject of our times.

On the one hand the development of Internet, mobile communications, distributed computing, computer software and databases storing essential enterprise information has helped to conduct business and personal communication between individual people. On the other hand it has created many...

Hands-On ZigBee: Implementing 802.15.4 with Microcontrollers (Embedded Technology)
Hands-On ZigBee: Implementing 802.15.4 with Microcontrollers (Embedded Technology)
"I recommend this book to anyone doing 802.15.4 or ZigBee development. It is likely that Eady touches on the platform you are or will be using and it contrasts it well with everything else out there." - William Wong, Electronic Design, August 2007

Since its recent introduction, the ZigBee protocol has created an
...
Computable Models of the Law: Languages, Dialogues, Games, Ontologies (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence)
Computable Models of the Law: Languages, Dialogues, Games, Ontologies (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence)
Information technology has now pervaded the legal sector, and the very modern concepts of e-law and e-justice show that automation processes are ubiquitous. European policies on transparency and information society, in particular, require the use of technology and its steady improvement.

Some of the revised papers presented in this book...

Human computer Interaction And Management Information Systems: Foundations (Advances in Management Series)
Human computer Interaction And Management Information Systems: Foundations (Advances in Management Series)
"Human-Computer Interaction and Management Information Systems: Foundations" offers state-of-the-art research by a distinguished set of authors who span the MIS and HCI fields. The original chapters provide authoritative commentaries and in-depth descriptions of research programs that will guide 21st century scholars, graduate students,...
Networked RFID: Systems, Software and Services (Computer Communications and Networks)
Networked RFID: Systems, Software and Services (Computer Communications and Networks)
RFID technology has been available for decades, but it is only recently that its application has become a core topic for computing. This book introduces the technologies and techniques of large-scale RFID-enabled mobile computing systems, set in the context of specific case studies.

The book begins with a quick introduction to RFID basics and...

Role-Based Access Control, Second Edition
Role-Based Access Control, Second Edition
Role-based access control (RBAC) is a security mechanism that has gained wide acceptance in the field because it can greatly lower the cost and complexity of securing large networked and Web-based systems. Written by leading experts, this newly revised edition of the Artech House bestseller, Role-Based Access Control, offers practitioners...
Security of e-Systems and Computer Networks
Security of e-Systems and Computer Networks
E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of...
Internet Technologies Handbook: Optimizing the IP Network
Internet Technologies Handbook: Optimizing the IP Network
The Internet is an amazing communication medium. Its predecessor network, the ARPANET, was developed over three decades ago, yet many of the fundamental algorithms and protocols are still in use today. Granted, we don’t have to run these protocols on a refrigerator-sized computer; our laptop or palmtop PC will do quite well. But think of it -...
Zigbee Wireless Networking
Zigbee Wireless Networking
Written by a member of the ZigBee Alliance, a consortium of over 200 companies promoting and maintaining this standard globally!

ZigBee is a standard based on the IEEE 802.15.4 standard for wireless personal networks. This standard allows for the creation of very lost cost and low power networks - these applications run for
...
Result Page: 849 848 847 846 845 844 843 842 841 840 839 838 837 836 835 834 833 832 831 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy