Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Unconstrained Face Recognition (International Series on Biometrics)
Unconstrained Face Recognition (International Series on Biometrics)
Face recognition has been actively studied over the past decade and continues to be a big research challenge. Just recently, researchers have begun to investigate face recognition under unconstrained conditions. Unconstrained Face Recognition provides a comprehensive review of this biometric, especially face recognition from video, assembling a...
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory

Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to...

Do You Matter? How Great Design Will Make People Love Your Company
Do You Matter? How Great Design Will Make People Love Your Company

“Definitely, a game changer! Design experience is the power shift to our era what mass marketing was to the last century.”

John Sculley  former CEO, Pepsi and Apple

 

“Great design is about...

Radiology Illustrated: Chest Radiology
Radiology Illustrated: Chest Radiology
Multidetector CT images of the state-of-the-art quality are increasingly produced in thoracic imaging, and in the near future, the CT imaging is expected to substitute chest radiography especially in outpatient clinic and may be ordered as a routine admission battery examination.

In MEDLINE or other search engines,
...
History of Nordic Computing
History of Nordic Computing
This book is dedicated to the men and women who seek to preserve the legacy of the computing profession, particularly those from the Nordic ...
Holy War, Holy Peace: How Religion Can Bring Peace to the Middle East
Holy War, Holy Peace: How Religion Can Bring Peace to the Middle East
Part I: Analysis 1. The Interaction between Religion and Culture in Peace and Conflict 2. Family Myths and Cultural Conflict 3. Political and Mythic Interdependencies 4. Patterns of Abrahamic Incrimination 5. Conflict, Injury, and Transformation Part II: Practical Applications 6. Patterns of Abrahamic Reconciliation: Act, Ritual, and Symbol as...
Beginning Ubuntu Linux, Second Edition (Beginning from Novice to Professional)
Beginning Ubuntu Linux, Second Edition (Beginning from Novice to Professional)
Linux has come a long way in a short time. Computing itself is still relatively young by any standard; if the era of modern computing started with the invention of the microchip, it’s still less than 50 years old. But Linux is a youngster compared even to this; it has been around for only 16 of those years.

In that brief time span,
...
Beginning Microsoft SQL Server 2008 Programming (Wrox Programmer to Programmer)
Beginning Microsoft SQL Server 2008 Programming (Wrox Programmer to Programmer)
And so the journey continues, and, as I’ve said before, what a long, strange trip it’s been. When I first wrote Professional SQL Server 7.0 Programming in early 1999, the landscape of both books and the development world was much different than it is today. At the time, .NET was as yet unheard of, and while Visual Studio 98 ruled the...
Building Telephony Systems with OpenSER
Building Telephony Systems with OpenSER
We are starting a new era in the collaboration area. Voice and Video over IP are starting to dominate the world of telecommunications in a disruptive movement capable of changing the whole industry. The SIP (Session Initiation protocol) technology is at the center of this revolution. I believe, at present, SIP is the most used protocol for Voice...
Data versus Democracy: How Big Data Algorithms Shape Opinions and Alter the Course of History
Data versus Democracy: How Big Data Algorithms Shape Opinions and Alter the Course of History
Human attention is in the highest demand it has ever been. The drastic increase in available information has compelled individuals to find a way to sift through the media that is literally at their fingertips. Content recommendation systems have emerged as the technological solution to this...
Curious Encounters: Voyaging, Collecting, and Making Knowledge in the Long Eighteenth Century (UCLA Clark Memorial Library Series)
Curious Encounters: Voyaging, Collecting, and Making Knowledge in the Long Eighteenth Century (UCLA Clark Memorial Library Series)

With contributions from historians, literary critics, and geographers, Curious Encounters uncovers a rich history of global voyaging, collecting, and scientific exploration in the long eighteenth century. Leaving behind grand narratives of discovery, these essays collectively restore a degree of symmetry and contingency to our...

Nano-CMOS Design for Manufacturability: Robust Circuit and Physical Design for Sub-65nm Technology Nodes
Nano-CMOS Design for Manufacturability: Robust Circuit and Physical Design for Sub-65nm Technology Nodes
This book is the sequel to Nano-CMOS Circuit and Physical Design, taking design to technology nodes beyond 65nm geometries. It examines the challenges that design engineers face in the nano-scaled era, such as exacerbated effects and the proven design for manufacturability (DFM) methodology in the midst of increasing variability and design process...
unlimited object storage image
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy