Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
First Look Microsoft Office 2003
First Look Microsoft Office 2003

What’s inside the newest Microsoft Office System? How can your business put its new capabilities to work right away? With First Look Microsoft Office 2003, you get exclusive, advance insights and straight talk from a well-known author and columnist who works closely with the Microsoft Office team. Get the edge on understanding...

Optical Network Design and Implementation
Optical Network Design and Implementation

Multiservice optical networking has multiple applications in service provider and enterprise environments. To help you make the most of these applications, Optical Network Design and Implementation provides a complete reference of technology solutions for next-generation optical networks. The...

Biologically Inspired Artificial Intelligence for Computer Games
Biologically Inspired Artificial Intelligence for Computer Games
As game developers a few years from now, we may look back at current generation AI with astonishment and possibly with a hint of nostalgia. We will notice the extreme simplicity of the systems and behaviours we created, asking ourselves whether it was in fact by design or more by necessity. More importantly, we will be surprised by the amount of...
Numerical Solution of Partial Differential Equations on Parallel Computers
Numerical Solution of Partial Differential Equations on Parallel Computers

Since the dawn of computing, the quest for a better understanding of Nature has been a driving force for technological development. Groundbreaking achievements by great scientists have paved the way from the abacus to the supercomputing power of today. When trying to replicate Nature in the computer’s silicon test tube, there is need...

Computer Vision Systems: 8th International Conference, ICVS 2011, Sophia Antipolis, France, September 20-22, 2011, Proceedings
Computer Vision Systems: 8th International Conference, ICVS 2011, Sophia Antipolis, France, September 20-22, 2011, Proceedings
Computer Vision is the science and technology of machines that see. The dominant scientific conferences in computer vision, such as ICCV, CVPR and ECCV, concentrate on theories and models for obtaining information from images and image sequences. The intensely competitive nature of these conferences leaves little room to...
Introducing Microsoft  LINQ
Introducing Microsoft LINQ

Your first look at building data-rich applications using Microsoft LINQ.

Get a head start using Microsoft Language Integrated Query (LINQ). Two experienced developers give you advanced insights and expert guidance for using this unified model for data access. You will learn how to write queries in your native programming...

C Compilers for ASIPs: Automatic Compiler Generation with LISA
C Compilers for ASIPs: Automatic Compiler Generation with LISA

This book presents a novel approach for Architecture Description Language (ADL)-based instruction-set description that enables the automatic retargeting of the complete software toolkit from a single ADL processor model. This allows a high speedup in compiler generation and contributes to a more efficient ASIP design flow. Coverage includes a...

Computational Linguistics and Intelligent Text Processing: 12th International Conference, CICLing 2011
Computational Linguistics and Intelligent Text Processing: 12th International Conference, CICLing 2011

CICLing 2011 was the 12th Annual Conference on Intelligent Text Processing and Computational Linguistics. The CICLing conferences provide a wide-scope forum for the discussion of the art and craft of natural language processing research as well as the best practices in its applications.

This set of two books contains four invited...

Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.

Key Features

  • Learn how to test for common bugs
  • Discover tools and methods for hacking ethically
  • Practice working through pentesting engagements...
Rule Based Expert Systems: The Mycin Experiments of the Stanford Heuristic Programming Project
Rule Based Expert Systems: The Mycin Experiments of the Stanford Heuristic Programming Project
The last seven years have seen the field of artificial intelligence (AI) transformed. This transformation is not simple, nor has it yet run its course. The transformation has been generated by the emergence of expert systems. Whatever exactly these are or turn out to be, they first arose during the 1970s, with a triple claim: to be AI systems that...
Cdma Mobile Radio Design (Artech House Telecommunications Library)
Cdma Mobile Radio Design (Artech House Telecommunications Library)
Wireless communications is growing at a phenomenal rate. From 1991 to 1999, the number of subscribers increased from about 25 million to over 250 million. Incredibly, over the next seven years, the number. of subscribers is expected to quadruple, to over 1 billion [ 1]. That growth rate is faster than that of any other consumer...
Web Penetration Testing with Kali Linux
Web Penetration Testing with Kali Linux

A practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux

Overview

  • Learn key reconnaissance concepts needed as a penetration tester
  • Attack and exploit key features, authentication, and sessions on web...
unlimited object storage image
Result Page: 130 129 128 127 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy