Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Image Processing Handbook, Sixth Edition
The Image Processing Handbook, Sixth Edition

Image processing is used in a wide variety of applications, for two somewhat different purposes:

1. improving the visual appearance of images to a human observer, including their printing and transmission, and

2. preparing images for the measurement of the features and structures which they reveal.

The...

Systems Analysis and Design (Shelly Cashman Series)
Systems Analysis and Design (Shelly Cashman Series)

Systems Analysis and Design, Eighth Edition offers a practical, visually appealing approach to information systems development.

As the Dilbert cartoon suggests, it is always a good idea to know whether a project fits the company’s overall strategy. You will learn more about the relationship between systems projects and...

Data Mining and Machine Learning in Cybersecurity
Data Mining and Machine Learning in Cybersecurity

In the emerging era of Web 3.0, securing cyberspace has gradually evolved into a critical organizational and national research agenda inviting interest from a multidisciplinary scientific workforce. There are many avenues into this area, and, in recent research, machine-learning and data-mining techniques have been applied to design,...

Beginning BlackBerry 7 Development
Beginning BlackBerry 7 Development

Are you interested in creating BlackBerry apps using the latest BlackBerry 7 and BlackBerry Java Plug-in for Eclipse? Then this is the book for you. Beginning BlackBerry 7 Development offers a hands-on approach to learning how to build and deploy sophisticated BlackBerry apps using the latest tools...

Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA
Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every type of crime now...
Security and Privacy for Microsoft Office 2010 Users
Security and Privacy for Microsoft Office 2010 Users
SECURITY AND PRIVACY issues with computers and computer networks are constantly in the news these days, and everyone seems to be concerned about them to some degree. Businesses everywhere are worried about having sensitive customer information such as credit card numbers or email addresses stolen,...
Next Generation Excel: Modeling in Excel for Analysts and MBAs (Wiley Finance)
Next Generation Excel: Modeling in Excel for Analysts and MBAs (Wiley Finance)

Rutgers professor, Dr. Isaac Gottlieb demonstrates an array of advanced financial and accounting functions in this practical Excel modeling book. He shows how to quickly create models that deliver accurate, relevant information related to efficiency, forecasting, and a host of other business and reporting issues. This book describes how Excel...

Using Information Technology
Using Information Technology
If there is anything we have learned from our 25 years of writing computer concepts books, it is this: the landscape of computer education can change quickly, and it's our responsibility to try to anticipate it.

The third edition of this text retains its comprehensive coverage, while decreasing the length, adding a separate...

Building Engaged Team Performance: Align Your Processes and People to Achieve Game-Changing Business Results
Building Engaged Team Performance: Align Your Processes and People to Achieve Game-Changing Business Results

Harness the Power of Your Most Valuable Resource—Your Workforce!

Process improvement approaches like Six Sigma and Lean Enterprise have worked wonders for countless organizations, but in the drive for true excellence, these approaches are only one important part of the formula.

Building Engaged...

Learn BlackBerry 10 App Development: A Cascades-Driven Approach
Learn BlackBerry 10 App Development: A Cascades-Driven Approach

Learn how to leverage the BlackBerry 10 Cascades framework to create rich native applications. Learn BlackBerry 10 App Development gives you a solid foundation for creating BlackBerry 10 apps efficiently. Along the way, you will learn how to use QML and JavaScript for designing your app’s UI, and C++/Qt for the application...

LiveCode Mobile Development Hotshot
LiveCode Mobile Development Hotshot

Create your own exciting applications with 10 fantastic projects

Overview

  • Create your own mobile games and apps using LiveCode
  • Develop user interfaces for mobile devices
  • Use databases and advanced features of LiveCode

In Detail

There are...

Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the...

unlimited object storage image
Result Page: 906 905 904 903 902 901 900 899 898 897 896 895 894 893 892 891 890 889 888 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy