Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Image Processing Handbook, Sixth Edition
The Image Processing Handbook, Sixth Edition

Image processing is used in a wide variety of applications, for two somewhat different purposes:

1. improving the visual appearance of images to a human observer, including their printing and transmission, and

2. preparing images for the measurement of the features and structures which they reveal.

The...

Architects of Intelligence: The truth about AI from the people building it
Architects of Intelligence: The truth about AI from the people building it

Financial Times Best Books of the Year 2018

TechRepublic Top Books Every Techie Should Read

Book Description

How will AI evolve and what major innovations are on the horizon? What will its impact be on the job market, economy, and society? What is the path toward human-level...

Parallel Scientific Computing in C++ and MPI: A Seamless Approach to Parallel Algorithms and their Implementation
Parallel Scientific Computing in C++ and MPI: A Seamless Approach to Parallel Algorithms and their Implementation
This book provides a seamless approach to numerical algorithms, modern programming techniques and parallel computing. These concepts and tools are usually taught serially across different courses and different textbooks, thus observing the connection between them. The necessity of integrating these subjects usually comes after such courses are...
Linux+ Guide to Linux Certification
Linux+ Guide to Linux Certification
As Eric S. Raymond reminds us, Open Source Software will continue to shape the dynamics of the computer software industry for the next long while, just as it has for the last decade. Coined and perpetuated by hackers, the term “Open Source Software” refers to software in which the source code is freely available to...
Introduction to RF Equipment and System Design
Introduction to RF Equipment and System Design
Applies theoretical fundamentals to real-world issues, heavily relying on examples from recent design projects. Key discussions include system design schemes, circuits and components for system evaluations and design.

An excellent resource for engineers and technicians alike, this practical design guide offers a comprehensive and
...
Computer Vision with OpenCV 3 and Qt5: Build visually appealing, multithreaded, cross-platform computer vision applications
Computer Vision with OpenCV 3 and Qt5: Build visually appealing, multithreaded, cross-platform computer vision applications

Blend the power of Qt with OpenCV to build cross-platform computer vision applications

Key Features

  • Start creating robust applications with the power of OpenCV and Qt combined
  • Learn from scratch how to develop cross-platform computer vision applications
  • ...
Software Test Automation (ACM Press)
Software Test Automation (ACM Press)
You can't just buy an automated testing tool and expect to improve your organization's testing process without some real effort, at least that is what the authors of Software Test Automation argue. Written for any test manager or engineer, this practical-minded guide shows the right way to automate testing to bring down costs and improve...
The Job Interview Phrase Book: The Things to Say to Get You the Job You Want
The Job Interview Phrase Book: The Things to Say to Get You the Job You Want

"In today's marketplace it is critical that you stand out in a crowd."
--Eric Winegardener, Vice President, Monster Worldwide

In today's tightening job market, the interview is a key stage. But too often in job interviews, candidates freeze and can't find the words they need to make...

Perimeter Security
Perimeter Security
Perimeter Security has taken on a new level of importance since 9/11. Whether insuring the safety of government buildings, hospitals, residences, or bio-research labs, the safety of workers and materials can only be ensured by outfitting all points of entry with the appropriate alarm and surveillance equipment. This comprehensive hands-on resource...
Computer Viruses: from theory to applications (Collection IRIS)
Computer Viruses: from theory to applications (Collection IRIS)
This book deals with computer viruses envisaged from three different points of view, namely the theoretical fundamentals of computer virology, algorithmic and practical aspects of viruses and their potential applications to various areas. The theoretical formalization by means of Turing machines, self-reproducing automata and recursive functions...
Practical Information Security Management: A Complete Guide to Planning and Implementation
Practical Information Security Management: A Complete Guide to Planning and Implementation

Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information...

Jenkins Continuous Integration Cookbook
Jenkins Continuous Integration Cookbook
Jenkins is a Java-based Continuous Integration (CI) server that supports the discovery of defects early in the software cycle. Thanks to over 400 plugins, Jenkins communicates with many types of systems, building and triggering a wide variety of tests.

CI involves making small changes to software, and then building and
...
Result Page: 154 153 152 151 150 149 148 147 146 145 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy