Home | Amazing | Today | Tags | Publishers | Years | Search 
Face Biometrics for Personal Identification: Multi-Sensory Multi-Modal Systems (Signals and Communication Technology)
Face Biometrics for Personal Identification: Multi-Sensory Multi-Modal Systems (Signals and Communication Technology)

From time immemorial, the security realm and personal identification task had shown progress by employing technological means like secret knowledge as passwords and Personal Identification Numbers, and by using personal possessions as identity cards and Radio Frequency Identification chips. As opposed to these means which are...

MySQL Troubleshooting: What To Do When Queries Don't Work
MySQL Troubleshooting: What To Do When Queries Don't Work

I have worked since May 2006 as a principal technical support engineer in the Bugs Verification Group of the MySQL Support Group for MySQL AB, then Sun, and finally Oracle. During my daily job, I often see users who are stuck with a problem and have no idea what to do next. Well-verified methods exist to find the cause of the problem...

Oracle Essbase 11 Development Cookbook
Oracle Essbase 11 Development Cookbook

Oracle Essbase 11 Development Cookbook will help you learn the tools necessary for the development of Essbase databases in Oracle Essbase version 11.1.2.1. Here you will find over 90 recipes that explain everything from how to use a relational data model to building and loading an Essbase database in Essbase Studio. The book also goes over...

Blender For Dummies
Blender For Dummies

Welcome to Blender For Dummies, 2nd Edition, your introduction to one of the most well-known free programs for creating 3D computer graphics. With Blender, you can create characters, props, environments, and nearly anything else your imagination can generate. You can then take those creations and use them in Blender to tell a story in an...

The Chief Information Security Officer
The Chief Information Security Officer

The role of the Chief Information Security Officer has evolved enormously in recent years in response to security threats and a challenging business environment. Instead of being primarily a master technician, today s CISO has to be a trusted advisor to senior management. Read this pocket guide and ...

  • Learn how the role...
Enterprise Information Systems: Concepts, Methodologies, Tools and Applications (3 Volumes)
Enterprise Information Systems: Concepts, Methodologies, Tools and Applications (3 Volumes)

The data collected by organizations is growing in volume and complexity. As such, businesses are abandoning traditional methods and relying more heavily on enterprise information systems to aid in the analysis and utilization of time-sensitive data and organizational knowledge. Enterprise information systems have gained in popularity...

Digital Piracy (Cybersafety)
Digital Piracy (Cybersafety)

The Internet has had and will continue to have a profound effect on society. It is hard to imagine life without such technologies as computers, cell phones, gaming devices, and so on. The Internet, World Wide Web, and their associated technologies have altered our social and personal experience of the world. In no other time in...

Anticipatory Optimization for Dynamic Decision Making (Operations Research/Computer Science Interfaces Series)
Anticipatory Optimization for Dynamic Decision Making (Operations Research/Computer Science Interfaces Series)

Anticipatory optimization for dynamic decision making relies on a number of different scientific disciplines. On a general level, the foundations of the field may be localized at the intersection of operations research, computer science and decision theory. Closer inspection reveals the important role of branches such as simulation,...

Geospatial Semantics and the Semantic Web: Foundations, Algorithms, and Applications (Semantic Web and Beyond)
Geospatial Semantics and the Semantic Web: Foundations, Algorithms, and Applications (Semantic Web and Beyond)

The availability of geographic and geo-spatial information and services, especially on the openWeb, has become abundant in the last several yearswith the proliferation of online maps, geo-coding services, geospatial Web services and geospatially enabled applications. Concurrently, the need for geo-spatial reasoning has significantly...

Exploring Adobe InDesign CS5 (Design Exploration Series)
Exploring Adobe InDesign CS5 (Design Exploration Series)

This book is intended for designers who are serious about their craft. It is ideal for students who desire an approach to instruction that focuses on software proficiency. It is an excellent choice for instructors and industry trainers who have been looking for a comprehensive textbook that includes handouts, projects, syllabi, and...

Managing and Using Information Systems: A Strategic Approach (Wiley Series in Probability and Statistics)
Managing and Using Information Systems: A Strategic Approach (Wiley Series in Probability and Statistics)

Managers do not have the luxury of abdicating participation in information systems decisions.Managers who choose to do so risk limiting their future business options. Information systems are at the heart of virtually every business interaction, process, and decision, especially when one considers the vast penetration of the Web in the...

LPIC-2 Linux Professional Institute Certification Study Guide: Exams 201 and 202
LPIC-2 Linux Professional Institute Certification Study Guide: Exams 201 and 202

Why should you learn about Linux? It’s a fast-growing operating system, and it’s inexpensive and flexible. Linux is also a major player in the small and mid-sized server field, and it’s an increasingly viable platform for workstation and desktop use as well. By understanding Linux, you’ll...

Result Page: 629 628 627 626 625 624 623 622 621 620 619 618 617 616 615 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy