Home | Amazing | Today | Tags | Publishers | Years | Search 
Harley Hahn's Guide to Unix and Linux
Harley Hahn's Guide to Unix and Linux

The objective of AutoCAD 2010 Instructor is to provide you the best possible printed medium for learning AutoCAD, whether you are a professional or student learning AutoCAD on your own or whether you are attending an instructor-led course.

"Harley Hahn's Guide to Unix and Linux" is a modern, comprehensive text for...

Professional Plone 4 Development
Professional Plone 4 Development

I suspect Martin plied me to write this foreword while out one evening during the 2010 Plone Conference in Bristol. Full from an excellent dinner and even better conversation, beer in hand, who could say no?

I've long envied Martin's ability to write. Text and code flow from his fingers at a rate that I can't even begin...

Cryptography and Network Security: Principles and Practice (5th Edition)
Cryptography and Network Security: Principles and Practice (5th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Node Web Development
Node Web Development

Welcome to the world of developing web software using Node (also known as Node.js). Node is a newly-developed software platform that liberates JavaScript from the web browser, enabling it to be used as a general software development platform in server-side applications. It runs atop the ultra-fast JavaScript engine from the Chrome browser,...

Methods for Mining and Summarizing Text Conversations (Synthesis Lecture on Data Management)
Methods for Mining and Summarizing Text Conversations (Synthesis Lecture on Data Management)

Before the invention of the Internet and the creation of the Web, the vast majority of human conversations were in spoken form, with the only notable, but extremely limited, exception being epistolary exchanges. Some important spoken conversations, such as criminal trials and political debates (e.g., Hansard, the transcripts of...

Grid and Cloud Database Management
Grid and Cloud Database Management

Since the 1960s, database systems have been playing a relevant role in the information technology field. By the mid-1960s, several systems were also available for commercial purposes. Hierarchical and network database systems provided two different perspectives and data models to organize data collections. In 1970, E. Codd wrote a...

Bridging the Gap Between Graph Edit Distance and Kernel Machines (Series in Machine Perception and Artifical Intelligence)
Bridging the Gap Between Graph Edit Distance and Kernel Machines (Series in Machine Perception and Artifical Intelligence)

When we rst started working on the problem of making the kernel machine approach applicable to the classi cation of graphs a couple of years ago, our e orts were mainly driven by the fact that kernel methods had led to impressive performance results on many data sets. It didn't take us long to appreciate the sheer elegance of how...

UML in Practice: The Art of Modeling Software Systems Demonstrated through Worked Examples and Solutions
UML in Practice: The Art of Modeling Software Systems Demonstrated through Worked Examples and Solutions

For several years now, there has been a constant increase in the number of works on UML and object modelling. However, my practical experience of training (more than a thousand or so people trained in OMT, then UML since 1993…) convinced me that there is still another need that is not tended to by the multitude of books...

Pattern Recognition From Classical to Modern Approaches
Pattern Recognition From Classical to Modern Approaches

Recognizing patterns is at the core of man's attempts to understand the universe that we inhabit. Through the development of sensors and instruments, we have extended our ability to gather data far beyond the range and scale of man's natural senses. As a result we are now able to gather data on phenomena occurring in the far reaches...

Selected Works of A.N. Kolmogorov: Volume III: Information Theory and the Theory of Algorithms
Selected Works of A.N. Kolmogorov: Volume III: Information Theory and the Theory of Algorithms

This volume is the last of three volumes devoted to the work of one of the most prominent 20th century mathematicians. Throughout his mathematical work, A.N. Kolmogorov (1903-1987) showed great creativity and versatility and his wide-ranging studies in many different areas, led to the solution of conceptual and fundamental problems and the...

Natural Language Processing and Information Systems: 16th International Conference on Applications of Natural Language to Information Systems
Natural Language Processing and Information Systems: 16th International Conference on Applications of Natural Language to Information Systems

The 16th International Conference on Applications of Natural Language to Information Systems (NLDB 2011) was held during June 28–30, 2011, at the University of Alicante, Spain. Since the first NLDB conference in 1995, the main goal has been to provide a forum for the discussion and dissemination of research on the integration of...

CCNP Security VPN 642-647 Official Cert Guide
CCNP Security VPN 642-647 Official Cert Guide

This book is designed to help you prepare for the Cisco VPN certification exam. The VPN exam is one in a series of exams required for the Cisco Certified Network Professional - Security (CCNP - Security) certification. This exam focuses on the application of security principles with regard to Cisco IOS routers,...

Result Page: 87 86 85 84 83 82 81 80 79 78 77 76 75 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy