Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cognitive Networks: Towards Self-Aware Networks
Cognitive Networks: Towards Self-Aware Networks

Cognitive networks can dynamically adapt their operational parameters in response to user needs or changing environmental conditions. They can learn from these adaptations and exploit knowledge to make future decisions.

Cognitive networks are the future, and they are needed simply because they enable users to focus on things other...

Visual Basic® .NET Power Coding
Visual Basic® .NET Power Coding

Visual Basic(R) .NET Power Coding is the experienced developer's guide to mastering advanced Visual Basic .NET concepts. Paul Kimmel saves readers time and money by providing thorough explanations of essential topics so you can quickly begin creating robust programs that have fewer bugs. He...

Professional Windows PowerShell (Programmer to Programmer)
Professional Windows PowerShell (Programmer to Programmer)
Professional Windows® PowerShell

Forget everything you know about the Windows command line because you're about to enter a whole new ballgame. Windows PowerShell provides a new environment for interactive exploration and administration of Windows machines that's different from and more consistent than what you've previously used on Windows...

Pro T-SQL 2005 Programmer's Guide (Expert's Voice)
Pro T-SQL 2005 Programmer's Guide (Expert's Voice)
Pro T-SQL 2005 Programmer's Guide provides comprehensive and detailed coverage of all the major features and facilities of T-SQL for SQL Server 2005. It is designed for all users of T-SQL, database administrators, systems administrators, application developers, and end-users, who want to learn how to exploit the power of T-SQL. Whatever...
Handbook of Mobile Broadcasting: DVB-H, DMB, ISDB-T, AND MEDIAFLO (Internet and Communications)
Handbook of Mobile Broadcasting: DVB-H, DMB, ISDB-T, AND MEDIAFLO (Internet and Communications)
Consumption of media has grown rapidly in the previous decade due to advances in digital technology. In recent years, the wireless industry has seen explosive growth in device capability. Everincreasing computing power, memory, and high-end graphic functionalities have accelerated the development of new and exciting wireless services. Personal...
Nexus One For Dummies
Nexus One For Dummies
Exploit the full power of the revolutionary Google Nexus One superphone

Nexus One is Google's answer to Apple’s iPhone and RIM's BlackBerry. Covering a range of how-to topics, from the most useful Nexus One features and tricks of the core applications, to techniques to get the...

Learning Metasploit Exploitation and Development
Learning Metasploit Exploitation and Development

Metasploit is an open source exploit framework that provides you with heaps of exploits, as well as tools to assist you in creating your own exploits. This includes the ability to generate a large range of shellcodes for different purposes and platforms that can be customized to attack your target. The recent improvements in network security...

Molecular Diagnosis of Cancer: Methods and Protocols (Methods in Molecular Medicine)
Molecular Diagnosis of Cancer: Methods and Protocols (Methods in Molecular Medicine)

We are currently experiencing a fundamental shift in the way in which we approach the characterization of cancer. Never before has the make up of cancer tissues and individual cells been so exhaustively researched and char- terized. We are now capable of producing molecular “fingerprints” that ch- acterize the expression of all...

Multimedia Security Handbook
Multimedia Security Handbook
Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy. The Multimedia Security Handbook addresses issues related to protecting digital media. It begins by introducing security fundamentals and discussing the vulnerabilities of individual protection...
Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It
Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to...

Learning Image Processing with OpenCV
Learning Image Processing with OpenCV

Exploit the amazing features of OpenCV to create powerful image processing applications through easy-to-follow examples

About This Book

  • Learn how to build full-fledged image processing applications using free tools and libraries
  • Take advantage of cutting-edge image processing...
Mastering Windows Server 2016 Hyper-V
Mastering Windows Server 2016 Hyper-V

Build a seamless, flexible, full-service datacenter solution

Microsoft Windows Server 2016 Hyper-V is the IT administrator's guide to this rising datacenter solution. Hyper-V has already surpassed VMWare in datacenter management, identity service for multiple devices, and more; this book shows you how to harness...

Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy