Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
MySQL and Java Developer's Guide
MySQL and Java Developer's Guide
The first comprehensive guide to MySQL for Java developers

With more than three million users, MySQL is the most popular open source database server in the world. It is the most popular database server for Linux and also runs on Windows, Macintosh, FreeBSD, and many flavors of UNIX. Most developers have built MySQL applications using...

Internet of Things with Arduino Cookbook
Internet of Things with Arduino Cookbook

Key Features

  • This book offers key solutions and advice to address the hiccups faced when working on Arduino-based IoT projects in the real world
  • Take your existing skills and capabilities to the next level by building challenging IoT applications with ease.
  • Be the tech disruptor you always...
Advances in Biometrics: Third International Conferences, ICB 2009, Alghero, Italy, June 2-5, 2009, Proceedings
Advances in Biometrics: Third International Conferences, ICB 2009, Alghero, Italy, June 2-5, 2009, Proceedings

It is a pleasure and an honour both to organize ICB 2009, the 3rd IAPR/IEEE International Conference on Biometrics. This will be held 2–5 June in Alghero, Italy, hosted by the Computer Vision Laboratory, University of Sassari. The conference series is the premier forum for presenting research in biometrics and its allied technologies:...

The Essential Guide to Image Processing
The Essential Guide to Image Processing
THE Must-have introduction to image processing for both students and practitioners.

This comprehensive and state-of-the art approach to image processing gives engineers and students a comprehensive introduction, and includes full coverage of key applications: image watermarking, fingerprint recognition, face recognition and
...
Automated Fingerprint Identification Systems (AFIS), First Edition
Automated Fingerprint Identification Systems (AFIS), First Edition
There is a world in which every crime is solved in 60 minutes, DNA matches are made “While U Wait,” and staff work on only one case at a time. But it is a fantasy land, an imaginary land; it is not the real world. This book is about the real world of biometric identification technology. It is a fascinating topic. This technology can...
Advances in Fingerprint Technology, Second Edition (Forensic and Police Science Series)
Advances in Fingerprint Technology, Second Edition (Forensic and Police Science Series)
Fingerprints constitute one of the most important categories of physical evidence, and it is among the few that can be truly individualized. During the last two decades, many new and exciting developments have taken place in the field of fingerprint science, particularly in the realm of methods for developing latent prints and in the growth of...
Android 6 Essentials
Android 6 Essentials

Design, build, and create your own applications using the full range of features available in Android 6

About This Book

  • Learn how to utilize the robust features of Android 6 to design, develop, and publish better Android applications
  • Get useful guidance on creating new apps or migrating...
Biometrics: Personal Identification in Networked Society
Biometrics: Personal Identification in Networked Society
Determining the identity of a person is becoming critical in our vastly interconnected
information society. As increasing number of biometrics-based identification systems
are being deployed for many civilian and forensic applications, biometrics and its
applications have evoked considerable interest. The current state of affairs is
...
Biometric Systems: Technology, Design and Performance Evaluation
Biometric Systems: Technology, Design and Performance Evaluation
This book provides practitioners with an overview of the principles & methods needed to build reliable biometric systems. It covers 3 main topics: key biometric technologies, testing & management issues, & the legal and system considerations of biometric systems for personal verification/identification. It focuses on the 4 most widely...
BeagleBone for Secret Agents
BeagleBone for Secret Agents

Browse anonymously, communicate secretly, and create custom security solutions with open source software, the BeagleBone Black, and cryptographic hardware

About This Book

  • Interface with cryptographic hardware to add security to your embedded project, securing you from external threats.
  • ...
How Computers Work (8th Edition) (How It Works)
How Computers Work (8th Edition) (How It Works)
A classic is back in its 8th and best edition yet! How Computers Work, 8th Edition is a must-have for anyone interested in the inner-workings of computers. The full-color, detailed illustrations will take you deep inside your PC and show you just how intricate it is. This latest edition has been updated with information on all of the...
Security and Privacy in Biometrics
Security and Privacy in Biometrics

This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues. Topics and...

unlimited object storage image
Result Page: 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy