Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Twitter Bootstrap Web Development How-To
Twitter Bootstrap Web Development How-To

A hands-on introduction to building websites with Twitter Bootstrap's powerful front-end development framework

Overview

  • Conquer responsive website layout with Bootstrap’s flexible grid system
  • Leverage carefully-built CSS styles for typography, buttons, tables, forms, and...
Digital Watermarking and Steganography, 2nd Ed. (The Morgan Kaufmann Series in Multimedia Information and Systems)
Digital Watermarking and Steganography, 2nd Ed. (The Morgan Kaufmann Series in Multimedia Information and Systems)
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties...
Nikon D7000: From Snapshots to Great Shots
Nikon D7000: From Snapshots to Great Shots

This book is for anyone upgrading from their Nikon D90 or current DSLR to the highly anticipated Nikon D7000. There's the manual, of course, as well as competing books, and while they all explain, often in 400+ pages, what the camera can do, none of them shows exactly how to use the camera to create great images!

This
...

Mastering Responsive Web Design
Mastering Responsive Web Design

Push your HTML and CSS skills to the limit and build professional grade, responsive websites

About This Book

  • Take your RWD skills to the next level with HTML5 and CSS3 best practices that will give you a solid foundation to build out from
  • Harness the power of the CSS pre-processor Sass to...
Augmented Reality with Kinect
Augmented Reality with Kinect

If you know C/C++ programming, then this book will give you the ability to develop augmented reality applications with Microsoft’s Kinect. By the end of the course you will have created a complete game.

Overview

  • Understand all major Kinect API features including image streaming, skeleton tracking...
Sensors: Theory, Algorithms, and Applications (Springer Optimization and Its Applications)
Sensors: Theory, Algorithms, and Applications (Springer Optimization and Its Applications)
In recent years, technological advances have resulted in the rapid development of a new exciting research direction – the interdisciplinary use of sensors for data collection, systems analysis, and monitoring. Application areas include military surveillance, environmental screening, computational neuroscience,...
Mastering Microsoft Exchange Server 2003
Mastering Microsoft Exchange Server 2003
All the Documentation You Need for Successfully Deploying Exchange Server 2003

Author Barry Gerber shares his extensive real-world experience in...

Sams Teach Yourself Adobe Photoshop CS3 in 24 Hours
Sams Teach Yourself Adobe Photoshop CS3 in 24 Hours
You can master Photoshop® CS3 faster than you ever thought possible–even if you have no Photoshop or image editing experience at all! In just 24 hands-on, step-by-step lessons, this book will teach you all the core Photoshop skills you need to get great results–in digital photography, graphic design, painting, or anything else! ...
Biometric User Authentication for IT Security: From Fundamentals to Handwriting (Advances in Information Security)
Biometric User Authentication for IT Security: From Fundamentals to Handwriting (Advances in Information Security)
Biometric user authentication techniques have evoked an enormous interest by science, industry and society in the recent past. Scientists and developers have constantly pursued the technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans. Many biometric...
Multimedia Forensics and Security
Multimedia Forensics and Security
As information technology is rapidly progressing, an enormous amount of media can be easily exchanged through Internet and other communication networks. Increasing amounts of digital image, video, and music have created numerous information security issues and is now taken as one of the top research and development agendas for researchers,...
Interactive Co-segmentation of Objects in Image Collections (SpringerBriefs in Computer Science)
Interactive Co-segmentation of Objects in Image Collections (SpringerBriefs in Computer Science)

The authors survey a recent technique in computer vision called Interactive Co-segmentation, which is the task of simultaneously extracting common foreground objects from multiple related images. They survey several of the algorithms, present underlying common ideas, and give an overview of applications of object co-segmentation.

We
...
Embedded Signal Processing with the Micro Signal Architecture
Embedded Signal Processing with the Micro Signal Architecture
Embedded systems are usually part of larger and complex systems and are usually implemented on dedicated hardware with associated software to form a computational engine that will effi ciently perform a specifi c function. The dedicated hardware (or embedded processor) with the associated software is embedded into many...
unlimited object storage image
Result Page: 107 106 105 104 103 102 101 100 99 98 97 96 95 94 93 92 91 90 89 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy