Home | Amazing | Today | Tags | Publishers | Years | Search 
CCNP Security Firewall 642-617 Official Cert Guide
CCNP Security Firewall 642-617 Official Cert Guide

CCNP Security FIREWALL 642-617 Official Cert Guide is a best of breed Cisco exam study guide that focuses specifically on the objectives for the CCNP Security FIREWALL exam. Senior security consultants and instructors David Hucaby, Dave Garneau, and Anthony Sequeira share preparation hints and test-taking tips,...

Super-Resolved Imaging: Geometrical and Diffraction Approaches (SpringerBriefs in Physics)
Super-Resolved Imaging: Geometrical and Diffraction Approaches (SpringerBriefs in Physics)
Super resolution is one of the most fascinating and applicable fields in optical data processing. The urge to obtain highly resolved images using low-quality imaging optics and detectors is very appealing.

The field of super resolution may be categorized into two groups: diffractive and geometrical super
...
Understanding Complex Datasets: Data Mining with Matrix Decompositions
Understanding Complex Datasets: Data Mining with Matrix Decompositions
Many data-mining algorithms were developed for the world of business, for example for customer relationship management. The datasets in this environment, although large, are simple in the sense that a customer either did or did not buy three widgets, or did or did not fly from Chicago to Albuquerque.

In contrast,
...
Irrlicht 1.7 Realtime 3D Engine Beginner's Guide
Irrlicht 1.7 Realtime 3D Engine Beginner's Guide
The Irrlicht Engine is a cross-platform high-performance real-time 3D engine written in C++. It features a powerful high-level API for creating complete 3D and 2D applications such as games or scientific visualizations.

Irrlicht 1.7.1 Realtime 3D Engine Beginner's Guide will teach you to master all that is required to create 2D and...

Windows Phone 7.5 Data Cookbook
Windows Phone 7.5 Data Cookbook
Storing and manipulating data plays an important role in making any mobile phone effective in business applications or any other data-driven application. Windows Phone 7.5 Data Cookbook covers topics such as how to bind data easily using databinding techniques, how to save data in local storage for later retrieval, how to format XML for data...
Development of Multimodal Interfaces: Active Listening and Synchrony: Second COST 2102 International Training School
Development of Multimodal Interfaces: Active Listening and Synchrony: Second COST 2102 International Training School
This volume brings together, through a peer-revision process, the advanced research results obtained by the European COST Action 2102: Cross-Modal Analysis of Verbal and Nonverbal Communication, primarily discussed for the first time at the Second COST 2102 International Training School on “Development of Multimodal...
Discrete Geometry for Computer Imagery: 16th IAPR International Conference, DGCI 2011, Nancy, France
Discrete Geometry for Computer Imagery: 16th IAPR International Conference, DGCI 2011, Nancy, France
The 16th edition of the International Conference on Discrete Geometry for Computer Imagery was held in Nancy, France, April 6–8, 2011, and was organized by the ADAGIo team of the LORIA laboratory (Lorraine research center in computer science and its applications). DGCI 2011 attracted many researchers from all around the...
Cryptography and Network Security
Cryptography and Network Security
The Internet, as a worldwide communication network, has changed our daily life in many ways. A new paradigm of commerce allows individuals to shop online. The World Wide Web (WWW) allows people to share information. The E-mail technology conned people in far-flung corners of the world. 'ITiis inevitable evolution has also cre-...
Data Structures and Algorithm Analysis in C (2nd Edition)
Data Structures and Algorithm Analysis in C (2nd Edition)

This book describes data structures, methods of organizing large amounts of data, and algorithm analysis, the estimation of the running time of algorithms. As computers become faster and faster, the need for programs that can handle large amounts of input becomes more acute. Paradoxically, this requires more careful attention...

Data Structures and Algorithm Analysis in Java (3rd Edition)
Data Structures and Algorithm Analysis in Java (3rd Edition)

This new Java edition describes data structures, methods of organizing large amounts of data, and algorithm analysis, the estimation of the running time of algorithms. As computers become faster and faster, the need for programs that can handle large amounts of input becomes more acute. Paradoxically, this requires more...

Java Software Solutions: Foundations of Program Design, Update JavaPlace
Java Software Solutions: Foundations of Program Design, Update JavaPlace
This book is about writing well-designed software. To understand software, we must first have a fundamental understanding of its role in a computer system. Hardware and software cooperate in a computer system to accomplish complex tasks. The nature of that cooperation and the purpose of various hardware components are important...
Coding for Penetration Testers: Building Better Tools
Coding for Penetration Testers: Building Better Tools

My Dear Reader,

This wretched war, the gravest threat humankind has ever faced, is not going well at all.We have suffered major setbacks, as our ruthless adversary has conquered vast territories, leaving little ground controlled by our ragtag band of rebels. Our few surviving generals blame the lack of skills in our fighting
...

Result Page: 771 770 769 768 767 766 765 764 763 762 761 760 759 758 757 756 755 754 753 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy