Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Web Data Management
Web Data Management
Existence of huge amounts of data on the Web has developed an undeferring need to locate right information at right time, as well as to integrating information effectively to provide a comprehensive source of relevant information. There is a need to develop efficient tools for analyzing and managing Web data, and efficiently managing Web...
Practical Apache Spark: Using the Scala API
Practical Apache Spark: Using the Scala API
Work with Apache Spark using Scala to deploy and set up single-node, multi-node, and high-availability clusters. This book discusses various components of Spark such as Spark Core, DataFrames, Datasets and SQL, Spark Streaming, Spark MLib, and R on Spark with the help of practical code snippets for each topic....
Understanding Building Stones and Stone Buildings
Understanding Building Stones and Stone Buildings

This book covers the wide spectrum of subjects relating to obtaining and using building stones, starting with their geological origin and then describing the nature of granites, volcanics, limestones, sandstones, flint, metamorphic stones, breccias and conglomerates, with emphasis being placed on how to recognise the different stones...

Smart Card Research and Advanced Applications: 17th International Conference, CARDIS 2018, Montpellier, France, November 12–14, 2018, Revised Selected ... (Lecture Notes in Computer Science (11389))
Smart Card Research and Advanced Applications: 17th International Conference, CARDIS 2018, Montpellier, France, November 12–14, 2018, Revised Selected ... (Lecture Notes in Computer Science (11389))
These proceedings contain the papers selected for presentation at the 17th Smart Card Research and Advanced Applications Conference (CARDIS 2018), which was held in Montpellier, France, during November 12–14, 2018, and organized by the Montpellier Laboratory of Informatics, Robotics and Microelectronics (LIRMM)....
Network Security Auditing (Networking Technology: Security)
Network Security Auditing (Networking Technology: Security)

Mention the word audit to IT professionals and you will probably see their eyes glaze over as they imagine frightening visions of auditors with pointy tails, pitchforks, and checklists run ning around and pointing out all of the things they have done wrong to their manager. The purpose of a security audit is not to place blame or pick...

Chronobiology and Obesity
Chronobiology and Obesity

Circadian rhythms are such an innate part of our lives that we rarely pause to speculate why they even exist. Some studies have suggested that the disruption of the circadian system may be causal for obesity and manifestations of Metabolic Syndrome (MetS). Shift-work, sleep-deprivation and bright-light-exposure at night are related to...

Digital SLR Cameras & Photography For Dummies
Digital SLR Cameras & Photography For Dummies

Get the lowdown on megapixels, lenses, and filters

Choose the right camera and accessories, get perfect shots, and edit like a pro

Excited about that new digital SLR and eager to find inventive ways to put all its features to work? This book will help! It shows you (in rich, full color) exactly what you and your...

Rational and Irrational Beliefs: Research, Theory, and Clinical Practice
Rational and Irrational Beliefs: Research, Theory, and Clinical Practice

In Rational and Irrational Beliefs: Research, Theory, and Clinical Practice, leading scholars, researchers, and practitioners of rational emotive behavior therapy (REBT) and other cognitive-behavioral therapies (CBTs) share their perspectives and empirical findings on the nature of rational and irrational beliefs, the role of beliefs as...

Hackers Beware: The Ultimate Guide to Network Security
Hackers Beware: The Ultimate Guide to Network Security

Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested "in how they do that" - the techniques hackers use to...

50 Fast Digital Camera Techniques (50 Fast Techniques Series)
50 Fast Digital Camera Techniques (50 Fast Techniques Series)

"Applying the lively techniques in this book will make anyone’s digital camera a more productive tool."
—Al Francekevich, acclaimed professional photographer

Make the most of your digital camera! Whether you’ve just pur-chased your first one or you’re an old hand at digital photography,...

Atoms, Radiation, and Radiation Protection (Physics Textbook)
Atoms, Radiation, and Radiation Protection (Physics Textbook)
Since the preparation of the second edition (1995) of Atoms, Radiation, and Radiation Protection, many important developments have taken place that affect the profession of radiological health protection. The International Commission on Radiological Protection (ICRP) has issued new documents in a number of areas that are addressed in this third...
Practical OpenCV
Practical OpenCV

Practical OpenCV is a hands-on project book that shows you how to get the best results from OpenCV, the open-source computer vision library.

Computer vision is key to technologies like object recognition, shape detection, and depth estimation. OpenCV is an open-source library with over 2500 algorithms that you
...

unlimited object storage image
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy