Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Digital People: From Bionic Humans to Androids
Digital People: From Bionic Humans to Androids
Robots, androids, and bionic people pervade popular culture, from classics like Frankenstein and R.U.R. to modern tales such as The Six Million Dollar Man, The Terminator, and A.I. Our fascination is obvious – and the technology is quickly moving from books and films to real life.

In a lab at MIT, scientists and technicians have created...

Routing TCP/IP, Volume II (CCIE Professional Development)
Routing TCP/IP, Volume II (CCIE Professional Development)

The complexities of exterior gateway protocols, including TCP connections, message states, path attributes, interior routing protocol interoperation, and setting up neighbor connections, require a comprehensive understanding of router operations in order to manage network growth. Routing TCP/IP, Volume II, provides you with the...

GO! with Microsoft Office 2003 Brief (2nd Edition)
GO! with Microsoft Office 2003 Brief (2nd Edition)
Teach the course YOU want in LESS TIME! The primary goal of the GO! Series, aside from teaching computer applications, is ease of implementation, with an approach that is based on clearly-defined projects for students and a one of a kind supplements package.

The goals of the ...
Scattering of Electromagnetic Waves: Theories and Applications
Scattering of Electromagnetic Waves: Theories and Applications
A timely and authoritative guide to the state of the art of wave scattering

Scattering of Electromagnetic Waves offers in three volumes a complete and up-to-date treatment of wave scattering by random discrete scatterers and rough surfaces. Written by leading scientists who have made important contributions to wave scattering over
...
Modern Cryptography: Theory and Practice
Modern Cryptography: Theory and Practice
Leading HP security expert Wenbo Mao explains why "textbook" crypto schemes, protocols, and systems are profoundly vulnerable by revealing real-world-scenario attacks. Next, he shows how to realize cryptographic systems and protocols that are truly "fit for application"--and formally demonstrates their fitness. Mao presents...
The Circuit Designer's Companion, Second Edition
The Circuit Designer's Companion, Second Edition
A unique masterclass in the design of optimized, reliable electronic circuits
Beyond the lab a guide to electronic design for production, where cost-effective design is imperative
Tips and know-how provide a whole education for the novice, with something to offer the most seasoned professional

Tim Williams' Circuit
...
Smart Graphics: 4th International Symposium, SG 2004, Banff, Canada, May 23-25, 2004, Proceedings
Smart Graphics: 4th International Symposium, SG 2004, Banff, Canada, May 23-25, 2004, Proceedings
The International Symposium on Smart Graphics 2004 was held on May 23–25, 2004 in Banff, Canada. It was the fifth event in a series which originally started in 2000 as a AAAI Spring Symposium. In response to the overwhelming success of the 2000 symposium, its organizers decided to turn it into a self-contained event in 2001. With the support...
Neural Networks: Computational Models and Applications (Studies in Computational Intelligence)
Neural Networks: Computational Models and Applications (Studies in Computational Intelligence)

Artificial neural networks, or simply called neural networks, refer to the various mathematical models of human brain functions such as perception, computation and memory. It is a fascinating scientific challenge of our time to understand how the human brain works. Modeling neural networks facilitates us in investigating the...

Machine Learning and Security: Protecting Systems with Data and Algorithms
Machine Learning and Security: Protecting Systems with Data and Algorithms

Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you’ll explore ways to apply machine learning to security...

MCSE Training Kit Microsoft Windows 2000 Professional
MCSE Training Kit Microsoft Windows 2000 Professional
This official Microsoft training kit teaches IT professionals how to install, configure, and administer the Windows 2000 Professional desktop operating system-as they prepare for the corresponding MCP exam. Topics include setting up and troubleshooting the software; monitoring and optimizing system resources such as files, printers, and...
Optical Microresonators: Theory, Fabrication, and Applications (Springer Series in Optical Sciences)
Optical Microresonators: Theory, Fabrication, and Applications (Springer Series in Optical Sciences)
Optical Micro-Resonators are an exciting new field of research that has gained prominence in the past few years due to the emergence of new fabrication technologies. This book is the first detailed text on the theory, fabrication, and applications of optical micro-resonators, and will be found useful by both graduate students and researchers in the...
Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, Second Edition
Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, Second Edition
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Master the tools and techniques of mobile forensic investigations

...
unlimited object storage image
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy