Home | Amazing | Today | Tags | Publishers | Years | Search 
Knowledge and Information Visualization: Searching for Synergies (Lecture Notes in Computer Science)
Knowledge and Information Visualization: Searching for Synergies (Lecture Notes in Computer Science)
This book presents current research and development work in the fields of knowledge visualization and information visualization. In addition to revised reviewed papers presented at an international workshop on Visual Artefacts for the Organization of Information and Knowledge held in Tübingen, Germany in May 2004, invited papers from leading...
Nortel Guide to VPN Routing for Security and VoIP
Nortel Guide to VPN Routing for Security and VoIP
Here's your handbook to Nortel VPN Router

If you're a beginning-to-intermediate-level networking professional, this guide lays the groundwork you need to establish and manage your network with VPN Router. Everything is here—hardware, software, laboratory set-ups, real-world examples, and, most importantly, advice gleaned from the...

DotNetNuke For Dummies (Computer/Tech)
DotNetNuke For Dummies (Computer/Tech)
Get up to speed on DotNetNuke 4.4

Get down to business and create a site your customers can use

Power to the people who aren't programmers! That's what DotNetNuke is all about, and this book gets you plugged in. You'll find out how you can create and manage a flexible, versatile Web site with all the advantages an open-source...

Fault-Tolerant Systems
Fault-Tolerant Systems
There are many applications in which the reliability of the overall system must be far higher than the reliability of its individual components. In such cases, designers devise mechanisms and architectures that allow the system to either completely mask the effects of a component failure or recover from it so quickly that the application is not...
The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference
The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference
The TCP/IP Guide is both an encyclopedic and comprehensible guide to the TCP/IP protocol suite that will appeal to newcomers and the seasoned professional. It details the core protocols that make TCP/IP internetworks function, and the most important classical TCP/IP applications. Its personal, easy-going writing style lets anyone...
Dreamweaver CS3 For Dummies (Computer/Tech)
Dreamweaver CS3 For Dummies (Computer/Tech)
Packed with the latest Dreamweaver tips and techniques

Get up to speed fast and start creating dynamite Web sites!

Do you want to create a sophisticated Web site that's easy to develop and maintain? Whether you're a beginner or an experienced Web developer, this friendly guide shows you how to...

Theory of Neural Information Processing Systems
Theory of Neural Information Processing Systems
Theory of Neural Information Processing Systems provides an explicit, coherent, and up-to-date account of the modern theory of neural information processing systems. It has been carefully developed for graduate students from any quantitative discipline, including mathematics, computer science, physics, engineering or biology, and has been...
SAS(R) Add-In 2.1 for Microsoft Office: Getting Started with Data Analysis
SAS(R) Add-In 2.1 for Microsoft Office: Getting Started with Data Analysis
Provides step-by-step instructions for analyzing data in Microsoft Excel. You will be guided through several SAS tasks and shown how you can harness the power of SAS in Microsoft Excel. The scenarios in the book use sample data that is provided with Base SAS software, so you can follow the instructions to perform this analysis.

The SAS
...
Physical and Logical Security Convergence: Powered By Enterprise Security Management
Physical and Logical Security Convergence: Powered By Enterprise Security Management
Security in the post 9/11 world is about much more than just guns, guards and gates. The authors make a tremendous contribution to today's security debate by offering thoughtful and sensible recommendations that will help any reader understand the challenges of the networked world we now live in.- Roger Cresser, NBC News terrorism analyst
...
Image Analysis, Random Fields and Dynamic Monte Carlo Methods: A Mathematical Introduction (Applications of Mathematics, 27)
Image Analysis, Random Fields and Dynamic Monte Carlo Methods: A Mathematical Introduction (Applications of Mathematics, 27)
This second edition of G. Winkler's successful book on random field approaches to image analysis, related Markov Chain Monte Carlo methods, and statistical inference with emphasis on Bayesian image analysis concentrates more on general principles and models and less on details of concrete applications. Addressed to students and scientists from...
Advanced Methods for Knowledge Discovery from Complex Data
Advanced Methods for Knowledge Discovery from Complex Data
This book brings together research articles by active practitioners and leading researchers reporting recent advances in the field of knowledge discovery. An overview of the field, looking at the issues and challenges involved is followed by coverage of recent trends in data mining. This provides the context for the subsequent chapters on methods...
Bioinformatics Research and Development: First International Conference, BIRD 2007, Berlin, Germany, March 12-14, 2007, Proceedings
Bioinformatics Research and Development: First International Conference, BIRD 2007, Berlin, Germany, March 12-14, 2007, Proceedings
This volume contains the papers which were selected for oral presentation at the first Bioinformatics Research and Development (BIRD) conference held in Berlin, Germany during March 12-14, 2007. BIRD covers a wide range of topics related to bioinformatics like microarray data, genomics, single nucleotide polymorphism, sequence analysis, systems...
Result Page: 813 812 811 810 809 808 807 806 805 804 803 802 801 800 799 798 797 796 795 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy