Home | Amazing | Today | Tags | Publishers | Years | Search 
Noise Reduction in Speech Processing (Springer Topics in Signal Processing)
Noise Reduction in Speech Processing (Springer Topics in Signal Processing)

Noise is everywhere and in most applications that are related to audio and speech, such as human-machine interfaces, hands-free communications, voice over IP (VoIP), hearing aids, teleconferencing/telepresence/telecollaboration systems, and so many others, the signal of interest (usually speech) that is picked up by a microphone is generally...

Blackhatonomics: An Inside Look at the Economics of Cybercrime
Blackhatonomics: An Inside Look at the Economics of Cybercrime

Would you be surprised if I say that the essence of cyber-crime comes down to traditional theft of property—be that of funds in accounts, of company data (and the financial harm that can cause), or of personal/confidential information (and the damage that can cause by it winding up in the wrong hands)? As time goes by, hackers, virus...

Successful Lisp: How to Understand and Use Common Lisp
Successful Lisp: How to Understand and Use Common Lisp

This tutorial is written with the professional programmer in mind. Using a hands on approach it introduces the ANSI Common Lisp standard. Practical examples of working code provide an in depth view of Common Lisp programming paradigms. David B. Lamkins explains why this programming language is by far the most powerful industrial strength tool...

Vagrant: Up and Running
Vagrant: Up and Running

Discover why Vagrant is a must-have tool for thousands of developers and ops engineers. This hands-on guide shows you how to use this open source software to build a virtual machine for any purpose—including a completely sandboxed, fully provisioned development environment right on your desktop.

Vagrant creator...

Instant Citrix Security How-to
Instant Citrix Security How-to

With the rise of cloud computing and virtualization comes a whole new threat to business security. When dealing with highly confidential information you need your security to be bulletproof. This book will help you do that.

"Instant Citrix Security: How-to" will allow you to achieve simplicity in security when dealing...

Learning iOS Programming: From Xcode to App Store
Learning iOS Programming: From Xcode to App Store
The arrival of the iPhone changed everything. Or, at the very least, it changed the direction of software development for mobile platforms, which is a pretty big thing. It has spawned an entire generation of copycat devices and brought an entire multibilliondollar industry to its knees. Despite this, it still fits in...
IPv6 in Practice: A Unixer's Guide to the Next Generation Internet
IPv6 in Practice: A Unixer's Guide to the Next Generation Internet
Back in early 2000 I first tried to get seriously started with IPv6. But I couldn’t find any documentation that helped me to understand how to make it work in my usual environment. Being swamped with work at my then job I eventually gave up, frustrated for the first time.

In 2002 Silvia Hagen published the
...
JavaScript for PHP Developers
JavaScript for PHP Developers

If you want to significantly expand your web development skills beyond PHP, this practical, hands-on book teaches you ECMAScript—the core JavaScript language—from the ground up. You’ll discover some similarities between JavaScript and PHP, such as conditions and loops, but the primary focus is on JavaScript’s...

Pro T-SQL 2012 Programmer's Guide
Pro T-SQL 2012 Programmer's Guide

Pro T–SQL 2012 Programmer’s Guide is every developer’s key to making full use of SQL Server 2012’s powerful, built–in Transact–SQL language. Discussing new and existing features, the book takes you on an expert guided tour of Transact–SQL functionality. Fully functioning examples and...

Excel 2013: The Missing Manual
Excel 2013: The Missing Manual

The world’s most popular spreadsheet program is now more powerful than ever, but it’s also more complex. That’s where this Missing Manual comes in. With crystal-clear explanations and hands-on examples, Excel 2013: The Missing Manual shows you how to master Excel so you can easily track, analyze, and chart your...

Introduction to Real Analysis: An Educational Approach
Introduction to Real Analysis: An Educational Approach

An accessible introduction to real analysis and its connection to elementary calculus

Bridging the gap between the development and history of real analysis, Introduction to Real Analysis: An Educational Approach presents a comprehensive introduction to real analysis while also offering a survey of the field. With its...

The Elements of Computing Systems: Building a Modern Computer from First Principles
The Elements of Computing Systems: Building a Modern Computer from First Principles

In the early days of computer science, the interactions of hardware, software, compilers, and operating system were simple enough to allow students to see an overall picture of how computers worked. With the increasing complexity of computer technology and the resulting specialization of knowledge, such clarity is often lost. Unlike other...

Result Page: 263 262 261 260 259 258 257 256 255 254 253 252 251 250 249 248 247 246 245 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy