 |
|
 Image Processing in C: Analyzing and Enhancing Digital Images with 3.5 DiskThis book is a tutorial on image processing. Each chapter explains basic concepts with words and gures, shows image processing results with photographs, and implements the operations in C. Information herein comes from articles published in The C/C++ Users Journal from 1990 through 1998 and from the first edition of this book published in 1994.... |  |  |  |  |
|
 Zenoss Core Network and System MonitoringAs the world becomes more connected, the complexity of information technology is expanding. Information workers rely on an expanding number of technologies to collaborate: email, instant messaging, web forums, and wikis. Organizations that at one time relied solely on paper are becoming more dependent on information systems. In addition there is an... |  |  Nmap in the Enterprise: Your Guide to Network ScanningRichard Stiennon, vice president at Gartner "Nmap is one of the tools in your toolbox you need as a network analyst. I would recommend everyone in the world use it to check port 135 to see if [they] have desktop servers listening on it. If you don't, you're going to be down in the next couple of weeks."
A... |  |  Learning the vi and Vim EditorsThere's nothing that hard-core Unix and Linux users are more fanatical about than their text editor. Editors are the subject of adoration and worship, or of scorn and ridicule, depending upon whether the topic of discussion is your editor or someone else's. vi has been the standard editor for close to 30 years. Popular on Unix and Linux, it has a... |
|
|
 Windows to Linux Business Desktop MigrationOver the last four years, Linux has established itself as the fastest growing server platform for enterprise Information Technology. As the server platform grows the desktop platform is also growing, domestically and abroad. One of the areas most lacking information, however, is in the capability of Linux as a desktop replacement for a Microsoft... |  |  Asterisk Gateway Interface 1.4 and 1.6 ProgrammingWho this book is written for?
This book is intended for developers wishing to utilize Asterisk, system administrators wishing to gain better control over their Asterisk installation, and telephony service providers wishing to deploy Asterisk-based solutions to their infrastructure. You are expected to have some... |  |  Embedded FreeBSD Cookbook (Embedded Technology)*Provides numerous examples of system software with source code and debugging techniques that can provide starting points for your own designs *Covers core operating system components, processes and process scheduling, system booting, virtual memory, device drivers, debugging, and much more *All sample code is provided on the... |
|
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |