Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Multimedia Information Extraction: Advances in Video, Audio, and Imagery Analysis for Search, Data Mining, Surveillance and Authoring
Multimedia Information Extraction: Advances in Video, Audio, and Imagery Analysis for Search, Data Mining, Surveillance and Authoring

The advent of increasingly large consumer collections of audio(e.g., iTunes), imagery (e.g., Flickr), and video (e.g., YouTube)is driving a need not only for multimedia retrieval but alsoinformation extraction from and across media. Furthermore,industrial and government collections fuel requirements for stockmedia access, media preservation,...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Getting Started with RFID: Identify Objects in the Physical World with Arduino
Getting Started with RFID: Identify Objects in the Physical World with Arduino
The process of identifying physical objects is such a fundamental part of our experience that we seldom think about how we do it. We use our senses, of course: we look at, feel, pick up, shake and listen to, smell, and taste objects until we have a reference for them—then we give them a label. The whole...
Ethics of Big Data: Balancing Risk and Innovation
Ethics of Big Data: Balancing Risk and Innovation

What are your organization’s policies for generating and using huge datasets full of personal information? This book examines ethical questions raised by the big data phenomenon, and explains why enterprises need to reconsider business decisions concerning privacy and identity. Authors Kord Davis and Doug Patterson provide...

ASP.NET MVC with Entity Framework and CSS
ASP.NET MVC with Entity Framework and CSS

Get up and running quickly with Microsoft ASP.NET MVC and Entity Framework as you build and deploy complex websites. By using a fully working example retail website you will learn solutions to real-world issues that developers frequently encounter.

Whether you are a novice developer or an experienced .NET developer...

Hands-on with ASP.NET MVC Covering MVC 6
Hands-on with ASP.NET MVC Covering MVC 6

MVC (Model-View-Controller) is the popular Microsoft technology which enables you to build dynamic, data-driven, mobile websites, TDD site. Hands-On with ASP.NET MVC is not only written for those who are going to have affair with MVC for the 1st time, rather it is written in such a way that even experienced professional will love reading this...

CompTIA Security+ Guide to Network Security Fundamentals (with CertBlaster Printed Access Card) (MindTap Course List)
CompTIA Security+ Guide to Network Security Fundamentals (with CertBlaster Printed Access Card) (MindTap Course List)

This best-selling guide provides a complete, practical, up-to-date introduction to network and computer security. SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, Fifth Edition, maps to the new CompTIA Security+ SY0-401 Certification Exam, providing thorough coverage of all domain objectives to help readers prepare for professional...

Blockchain: Blueprint for a New Economy
Blockchain: Blueprint for a New Economy

Bitcoin is starting to come into its own as a digital currency, but the blockchain technology behind it could prove to be much more significant. This book takes you beyond the currency ("Blockchain 1.0") and smart contracts ("Blockchain 2.0") to demonstrate how the blockchain is in position to become the fifth...

Kali Linux Social Engineering
Kali Linux Social Engineering

Effectively perform effi cient and organized social engineering tests and penetration testing using Kali Linux

Overview

  • Learn about various attacks and tips and tricks to avoid them
  • Get a grip on efficient ways to perform penetration testing.
  • Use advanced techniques to bypass...
Seven Concurrency Models in Seven Weeks: When Threads Unravel (The Pragmatic Programmers)
Seven Concurrency Models in Seven Weeks: When Threads Unravel (The Pragmatic Programmers)

Your software needs to leverage multiple cores, handle thousands of users and terabytes of data, and continue working in the face of both hardware and software failure. Concurrency and parallelism are the keys, and Seven Concurrency Models in Seven Weeks equips you for this new world. See how emerging technologies such as actors and...

Protecting SQL Server Data
Protecting SQL Server Data

For as long as there has been something to communicate between two persons there has been data. Today, vast volumes of it are gathered about almost every individual and business. It is the information that we provide when we sign up for an account at our favorite website, fill out a job application, or apply for a mortgage.

These...

Portrait of a Killer: Jack the Ripper -- Case Closed
Portrait of a Killer: Jack the Ripper -- Case Closed

The number-one New York Times-bestselling novelist Patricia Cornwell is known the world over for her brilliant storytelling, the courage of her characters, and the state-of-the-art forensic methods they employ.

In this headline-making new work of nonfiction, Cornwell turns her trademark skills for meticulous research
...

Result Page: 31 30 29 28 27 26 25 24 23 22 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy