Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microsoft  Windows  XP Inside Out (2nd Edition)
Microsoft Windows XP Inside Out (2nd Edition)
Ed Bott and Carl Siechert have combined their considerable talents for producing user-level documentation in creating Microsoft Windows XP Inside Out. One of the most carefully researched books on Windows XP to date, this large volume has all the information and procedures most everyday users of the operating system will want. With its...
How to Do Everything with Google Tools
How to Do Everything with Google Tools
Nearly twenty years ago I was introduced to a fascinating new technology that has now become part of our everyday activity. At the time, I thought it was extremely cool to log into a distant server and read stuff. At the time, that stuff came at a hefty price—Internet time was over $2.00 per hour, connection speeds were measured in bauds, and...
Data Fusion: Concepts and Ideas
Data Fusion: Concepts and Ideas

This textbook provides a comprehensive introduction to the concepts and idea of multisensor data fusion.
It is an extensively revised second edition of the author's successful book: "Multi-Sensor Data Fusion:
An Introduction" which was originally published by Springer-Verlag in 2007.
The main changes in
...

Linux in the Workplace
Linux in the Workplace
The Sacramento Bee
"If you've got a Linux computer you'd like to use, this will show you how to get the job done."

Slashdot
"A useful and freindly KDE-centric introduction to Linux for nongeeks."

...
Beginning POJOs: Lightweight Java Web Development Using Plain Old Java Objects in Spring, Hibernate, and Tapestry
Beginning POJOs: Lightweight Java Web Development Using Plain Old Java Objects in Spring, Hibernate, and Tapestry
This book targets beginning to intermediate Java developers looking to build enterprise Web applications with the latest offerings from the open source Java community. In this book you’ll explore different approaches to building a Java Web application using a step-by-step approach.

Java’s history is a thorny and convoluted
...
Decision Support: An Examination of the DSS Discipline (Annals of Information Systems)
Decision Support: An Examination of the DSS Discipline (Annals of Information Systems)

The origin of this volume came while planning the 2009 International Conference on Decision Support Systems. The theme of that 2-day conference was “Assessing Today and Envisioning Tomorrow.” We wanted to summarize where the field had been and generate ideas regarding where it was going. The meeting brought together...

Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Gray Hat Python: Python Programming for Hackers and Reverse Engineers

Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through...

Data Mining: Practical Machine Learning Tools and Techniques, Second Edition
Data Mining: Practical Machine Learning Tools and Techniques, Second Edition
This book presents this new discipline in a very accessible form: both as a text to train the next generation of practitioners and researchers, and to inform lifelong learners like myself. Witten and Frank have a passion for simple and elegant solutions. They approach each topic with this mindset, grounding all concepts in concrete examples,...
Gray Hat Hacking, Second Edition
Gray Hat Hacking, Second Edition
Uncover, plug, and ethically disclose security flaws

Prevent catastrophic network attacks by exposing security flaws, fixing them, and ethically reporting them to the software author. Fully expanded to cover the hacker's latest devious methods, Gray Hat Hacking: The Ethical Hacker's Handbook, Second Edition lays out...

Encyclopedia of Data Warehousing and Mining
Encyclopedia of Data Warehousing and Mining
How can a data-flooded manager get out of the “mire”? How can a confused decision maker pass through a “maze”?
How can an over-burdened problem solver clean up a “mess”? How can an exhausted scientist decipher a “myth”?
The answer is an interdisciplinary subject and a powerful tool known as
...
Digital Video and DSP: Instant Access
Digital Video and DSP: Instant Access
Although there are many variations and implementation techniques, video signals are just a way of transferring visual information from one point to another. The information may be from a VCR, DVD player, a channel on the local broadcast, cable television, or satellite system, the Internet, cell phone, MP3 player, or one of many other sources....
The Best Damn Cybercrime and Forensics Book Period
The Best Damn Cybercrime and Forensics Book Period
As is often the case with security compromises, it’s not a matter of if your company will be compromised, but when.

If I had known the employee I hired was going to resign, break into my offi ce, and damage my computers in the span of three days, hindsight being 20/20, I would have sent notifi cation to the security guards at the
...
unlimited object storage image
Result Page: 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy