Home | Amazing | Today | Tags | Publishers | Years | Search 
Oxford American Handbook of Sports Medicine
Oxford American Handbook of Sports Medicine

Written by leading American practitioners, the Oxford American Handbooks of Medicine each offer a pocket-sized overview of an entire specialty, featuring instant access to guidance on the conditions that are most likely to be encountered. Precise and prescriptive, the handbooks offer up-to-date advice on examination, investigations, common...

Design Methodologies for Secure Embedded Systems: Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss
Design Methodologies for Secure Embedded Systems: Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss

This Festschrift is dedicated to Mr. Sorin A. Huss by his friends and his Ph.D. students to honor him duly on the occasion of his 60th birthday.

Mr. Sorin A. Huss was born in Bukarest, Romania on May 21, 1950. He attended a secondary school with emphasis on mathematic and scientific topics in Dachau near Munich and after his Abitur...

Optimisation in Signal and Image Processing
Optimisation in Signal and Image Processing

This book describes the optimization methods most commonly encountered in signal and image processing: artificial evolution and Parisian approach; wavelets and fractals; information criteria; training and quadratic programming; Bayesian formalism; probabilistic modeling; Markovian approach; hidden Markov models; and metaheuristics (genetic...

High-Throughput Image Reconstruction and Analysis (Bioinformatics & Biomedical Imaging)
High-Throughput Image Reconstruction and Analysis (Bioinformatics & Biomedical Imaging)

Progress in biology is dependent on the ability to observe, measure, and model the behavior of organisms at multiple levels of abstraction, from the microscopic to the macroscopic. There has been a tremendous growth recently in the techniques to probe the structure and workings of cellular and organ-level mechanisms. Significant advances have...

A Guide to Kernel Exploitation: Attacking the Core
A Guide to Kernel Exploitation: Attacking the Core

The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop...

BackTrack 4: Assuring Security by Penetration Testing
BackTrack 4: Assuring Security by Penetration Testing

BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered in the target network environment. Applying appropriate testing methodology with defined business objectives and a scheduled test plan will result in robust penetration testing of your...

Computer Vision - ACCV 2010: 10th Asian Conference on Computer Vision, Queenstown, New Zealand
Computer Vision - ACCV 2010: 10th Asian Conference on Computer Vision, Queenstown, New Zealand

The 2010 Asian Conference on Computer Vision took place in the southern hemisphere, in “The Land of the Long White Cloud” in Maori language, also known as New Zealand, in the beautiful town of Queenstown. If we try to segment the world we realize that New Zealand does not belong officially to any continent. Similarly, in computer...

BlackBerry Enterprise Server 5 Implementation Guide
BlackBerry Enterprise Server 5 Implementation Guide

BlackBerry Enterprise Server is a platform that extends corporate messaging and collaboration services to BlackBerry devices. It supports management and administration of devices, and also supports deployment of third-party applications on the BlackBerry device platform. The basics of installing BlackBerry Enterprise Server are familiar for...

Security Risk Management: Building an Information Security Risk Management Program from the Ground Up
Security Risk Management: Building an Information Security Risk Management Program from the Ground Up

The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain...

Asterisk Cookbook
Asterisk Cookbook

Asterisk has a wealth of features to help you customize your PBX to fill very specific business needs. This short cookbook offers recipes for tackling dialplan fundamentals, making and controlling calls, and monitoring channels in your PBX environment. Each recipe includes a simple code solution you can put to work immediately, along...

Evolving Fuzzy Systems - Methodologies, Advanced Concepts and Applications
Evolving Fuzzy Systems - Methodologies, Advanced Concepts and Applications

In today’s real-world applications, there is an increasing demand of integrating new information and knowledge on-demand into model building processes to account for changing system dynamics, new operating conditions, varying human behaviors or environmental influences.

Evolving fuzzy systems (EFS) are a powerful tool...

Ultimate Game Programming with DirectX
Ultimate Game Programming with DirectX

Make your own games using DirectX 10 and C++ with Ultimate Game Programming with DirectX, Second Edition. Written for experienced programmers who want to learn DirectX 10 and how to apply it to game creation, this book goes in-depth with DirectX 10 and each of its subsystems. Every part of the gamedevelopment process is covered and you'll...

Result Page: 892 891 890 889 888 887 886 885 884 883 882 881 880 879 878 877 876 875 874 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy