Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Behavioral Biometrics: A Remote Access Approach
Behavioral Biometrics: A Remote Access Approach

With the advent of the internet as a medium for performing business transactions, the need for a secure communication channel has never been more paramount. The study of behavioral biometrics - the verification and/or identification of individuals based on the way they provide information to an authentication system - originated from the need...

Building Machine Learning Systems with Python
Building Machine Learning Systems with Python

As the Big Data explosion continues at an almost incomprehensible rate, being able to understand and process it becomes even more challenging. With Building Machine Learning Systems with Python, you'll learn everything you need to tackle the modern data deluge - by harnessing the unique capabilities of Python and its extensive range of...

Human Ear Recognition by Computer (Advances in Pattern Recognition)
Human Ear Recognition by Computer (Advances in Pattern Recognition)

Biometrics deals with recognition of individuals based on their physiological or behavioral characteristics. The human ear is a new feature in biometrics that has several merits over the more common face, fingerprint and iris biometrics. Unlike the fingerprint and iris, it can be easily captured from a distance without a fully cooperative...

Guide to Intelligent Data Analysis: How to Intelligently Make Sense of Real Data (Texts in Computer Science)
Guide to Intelligent Data Analysis: How to Intelligently Make Sense of Real Data (Texts in Computer Science)

The main motivation to write this book came from all our problems to find suitable material for a textbook that would really help us to teach the practical aspects of data analysis together with the needed theoretical underpinnings. Many books out there tackle either one or the other of these aspects (and, especially for the latter, there are...

Handbook of Remote Biometrics: for Surveillance and Security (Advances in Pattern Recognition)
Handbook of Remote Biometrics: for Surveillance and Security (Advances in Pattern Recognition)
This comprehensive and innovative handbook covers aspects of biometrics from the perspective of recognizing individuals at a distance, in motion, and under a surveillance scenario. Features: Starts with a thorough introductory chapter; Provides topics from a range of different perspectives offered by an international collection of leading...
Opengl Superbible: The Complete Guide to Opengl Programming for Windows Nt and Windows 95
Opengl Superbible: The Complete Guide to Opengl Programming for Windows Nt and Windows 95

Welcome to OpenGL SuperBible! The first time I ever heard of OpenGL was at the 1992 Win32 Developers Conference in San Francisco. Windows NT 3.1 was in early beta (or late alpha) and many vendors were present, pledging their future support for this exciting new platform. Among them was a company called Silicon Graphics, Inc. (SGI)....

Biometrics for Network Security
Biometrics for Network Security

The complete guide to implementing biometric security solutions for your network

Network security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate." Newspaper headlines are routinely peppered with incidents of hackers thwarting the security put forth by...

Programming the Semantic Web
Programming the Semantic Web
With this book, the promise of the Semantic Web -- in which machines can find, share, and combine data on the Web -- is not just a technical possibility, but a practical reality. Programming the Semantic Web demonstrates several ways to implement semantic web applications, using existing and emerging standards and technologies. You'll learn how to...
Programming with GNU Software: Tools from Cygnus Support (Nutshell Handbooks)
Programming with GNU Software: Tools from Cygnus Support (Nutshell Handbooks)

The promise of having control over their environment draws programmers to UNIX. It offers powerful tools for the initiated within an operating system that can be customized and tuned in almost unlimited ways. Programmers use UNIX because it lets them do what they want. And they like to see the source code for the software they work...

Biometrics: Theory, Methods, and Applications (IEEE Press Series on Computational Intelligence)
Biometrics: Theory, Methods, and Applications (IEEE Press Series on Computational Intelligence)

An in-depth examination of the cutting edge of biometrics

This book fills a gap in the literature by detailing the recent advances and emerging theories, methods, and applications of biometric systems in a variety of infrastructures. Edited by a panel of experts, it provides comprehensive coverage of:

Advances in Biometrics: Sensors, Algorithms and Systems
Advances in Biometrics: Sensors, Algorithms and Systems

Biometrics technology continues to stride forward with its wider acceptance and its real need in various new security facets of modern society. From simply logging on to a laptop to crossing the border of a country, biometrics is being called upon to meet the growing challenges of identity management.

With contributions from academia and...

Photoshop CS6 and Lightroom 4: A Photographer's Handbook
Photoshop CS6 and Lightroom 4: A Photographer's Handbook

Adobe Photoshop is central to almost all photography workflows and Lightroom has rapidly been adopted as well. Each new version of the software is a milestone in the development of these vital imaging tools, and the 2012 releases are no exception.

Photographers often feel overwhelmed when starting with Photoshop;
...

unlimited object storage image
Result Page: 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy