Home | Amazing | Today | Tags | Publishers | Years | Search 
Filtering, Segmentation and Depth (Lecture Notes in Computer Science)
Filtering, Segmentation and Depth (Lecture Notes in Computer Science)

Computer vision seeks a process that starts with a noisy, ambiguous signal from a TV camera and ends with a high-level description of discrete objects located in 3-dimensional space and identified in a human classification. In this book we address this process at several levels. We first treat the low-level image-processing issues of...

Windows Azure Step by Step
Windows Azure Step by Step

Windows Azure is the Microsoft cloud computing platform that lets developers leverage its powerful, scalable, and fault-tolerant infrastructure to build successful applications.

Windows Azure Step by Step provides an organized walkthrough of the Windows Azure platform and its related technologies. The text is...

Google App Inventor
Google App Inventor

Google App Inventor is from the Internet giant Google, home of the famous search engine. Google also develops the Android operating system found on smartphones and tablet computers from many manufacturers including HTC, Motorola, Samsung, and a growing host of others.

In late breaking news as this book goes to press, Google and...

Network Defense: Perimeter Defense Mechanisms
Network Defense: Perimeter Defense Mechanisms

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Windows Azure Platform
Windows Azure Platform
In the past couple of years, cloud computing has emerged as a disruptive force in the information technology (IT) industry. Its impact is of the same magnitude as the Internet and offshoring. Gartner Research has identified cloud computing as one of the “top 10 disruptive technologies 2008–2012.” According to...
Microsoft Silverlight 5 Building Rich Enterprise Dashboards
Microsoft Silverlight 5 Building Rich Enterprise Dashboards
Welcome, to the exciting world of building Rich Enterprise Dashboards with Silverlight. Throughout this book, you will learn how to harness the power of the Silverlight 5.0 platform to build amazing Dashboards. This book goes beyond just showing the nuts and bolts of learning Silverlight and showcases how to create amazing...
LEGO MINDSTORMS NXT: Mars Base Command (Technology in Action)
LEGO MINDSTORMS NXT: Mars Base Command (Technology in Action)

Congratulations! You’re on Mars Base Alpha, the first human outpost on the red planet. Don’t relax, though. It’s not all roses and unicorns up here. Mars isn’t called "The Bringer of War" for nothing! You’ve just been rained on by a meteor shower and it’s up to you—you!—to put your...

The Tangled Web: A Guide to Securing Modern Web Applications
The Tangled Web: A Guide to Securing Modern Web Applications
Just fifteen years ago, the Web was as simple as it was unimportant: a quirky mechanism that allowed a handful of students, plus a bunch of asocial, basementdwelling geeks, to visit each other’s home pages dedicated to science, pets, or poetry. Today, it is the platform of choice for writing...
Light It, Shoot It, Retouch It: Learn Step by Step How to Go from Empty Studio to Finished Image (Voices That Matter)
Light It, Shoot It, Retouch It: Learn Step by Step How to Go from Empty Studio to Finished Image (Voices That Matter)
FOR THE FIRST TIME EVER, YOU’LL LEARN ALL THREE ASPECTS OF WHAT IT TAKES TO CREATE STUNNING PORTRAITS
(HINT: IT’S NOT JUST THE LIGHTING)

Scott Kelby, the world’s #1 best-selling author of photography books, Editor-in-Chief and Publisher of Photoshop User...

Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Penetration testers are faced with a combination of firewalls, intrusion detection systems, host-based protection, hardened systems, and teams of knowledgeable analysts that pour over data collected by their security information management systems. In an environment such as this, simply running automated tools will typically...
Managing Data and Media in Silverlight 4: A Mashup of Chapters from Packt's Bestselling Silverlight Books
Managing Data and Media in Silverlight 4: A Mashup of Chapters from Packt's Bestselling Silverlight Books
A Packt Compendium is a book formed by drawing existing content from several related Packt titles. In other words, it is a mashup of published Packt content – Professional Expertise Distilled in the true sense. Such a compendium of Packt's content allows you to learn from each of the chapters' unique styles and Packt...
OpenNebula 3 Cloud Computing
OpenNebula 3 Cloud Computing

OpenNebula is one of the most advanced and highly-scalable open source cloud computing toolkits. If you ever wanted to understand what Cloud Computing is and how to realize it, or if you need a handy way to manage your messy infrastructure in a simple and coherent manner, this is your way.

OpenNebula 3 Cloud Computing guides you...

Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy