Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Windows Server 2016 Hyper-V
Mastering Windows Server 2016 Hyper-V

Build a seamless, flexible, full-service datacenter solution

Microsoft Windows Server 2016 Hyper-V is the IT administrator's guide to this rising datacenter solution. Hyper-V has already surpassed VMWare in datacenter management, identity service for multiple devices, and more; this book shows you how to harness...

Legitimate Applications of Peer-to-Peer Networks
Legitimate Applications of Peer-to-Peer Networks
Peer-to-peer computing has gained a lot of prominence and publicity in the past years. Several start-up companies offer software packages that can be used for building peer-to-peer overlay networks for applications such as file sharing and music swapping. However, the legal and ethical questions associated with swapping copyrighted material on the...
iPhoto '11: The Macintosh iLife Guide to using iPhoto with OS X Lion and iCloud
iPhoto '11: The Macintosh iLife Guide to using iPhoto with OS X Lion and iCloud

iPhoto '11 helps you organize, edit, and share your photos. With iPhoto '11 it's easy to organize and manage the thousands (maybe tens of thousands) of photos on your Mac by Faces, Places, and Events. iPhoto '11 also comes with editing and enhancement tools that rival those in expensive photo software. And finally Share what...

Black Hat Python: Python Programming for Hackers and Pentesters
Black Hat Python: Python Programming for Hackers and Pentesters

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?

In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's...

Windows 2000 Performance Guide
Windows 2000 Performance Guide
The load your users place on your Windows 2000 servers may increase approximately linearly over time, but that's no guarantee that the servers' performance will degrade smoothly and predictably. Rather--and this is the crux of Windows 2000 Performance Guide--a modest increase in workload can often cause a significant, even catastrophic,...
3D Shape: Its Unique Place in Visual Perception
3D Shape: Its Unique Place in Visual Perception
The uniqueness of shape as a perceptual property lies in the fact that it is both complex and structured. Shapes are perceived veridically—perceived as they really are in the physical world, regardless of the orientation from which they are viewed. The constancy of the shape percept is the sine qua non of shape perception; you are...
Artificial Intelligence and Literary Creativity: Inside the Mind of Brutus, A Storytelling Machine
Artificial Intelligence and Literary Creativity: Inside the Mind of Brutus, A Storytelling Machine

Now that IBM's Deep Blue computer beat the world's greatest human chess player, Gary Kasparov, this book will see if a story can be written better by a human or a machine.

This book marks the marriage of logic and creativity.

While it may be true that incompatible humans often wed, there are doubtless unions of a less palpable...

Biologically Inspired Artificial Intelligence for Computer Games
Biologically Inspired Artificial Intelligence for Computer Games
As game developers a few years from now, we may look back at current generation AI with astonishment and possibly with a hint of nostalgia. We will notice the extreme simplicity of the systems and behaviours we created, asking ourselves whether it was in fact by design or more by necessity. More importantly, we will be surprised by the amount of...
How Computers Work: Processor and Main Memory
How Computers Work: Processor and Main Memory
The book is as simple as possible and aimed at a non-technical audience with absolutely no knowledge of computers or electronics, but it is an electrical engineering text. A typical page consists of a circuit diagram (or program) and a paragraph or two of explanation. The book begins with a VERY simple circuit and continues to a very complex...
Applying Computational Intelligence: How to Create Value
Applying Computational Intelligence: How to Create Value

The flow of academic ideas in the area of computational intelligence is impacting industrial practice at considerable speed. Practitioners face the challenge of tracking, understanding and applying the latest techniques, which often prove their value even before the underlying theories are fully understood. This book offers realistic guidelines...

Computer Vision Systems: 8th International Conference, ICVS 2011, Sophia Antipolis, France, September 20-22, 2011, Proceedings
Computer Vision Systems: 8th International Conference, ICVS 2011, Sophia Antipolis, France, September 20-22, 2011, Proceedings
Computer Vision is the science and technology of machines that see. The dominant scientific conferences in computer vision, such as ICCV, CVPR and ECCV, concentrate on theories and models for obtaining information from images and image sequences. The intensely competitive nature of these conferences leaves little room to...
Extending Docker
Extending Docker

Key Features

  • Get the first book on the market that shows you how to extend the capabilities of Docker using plugins and third-party tools
  • Master the skills of creating various plugins and integrating great tools in order to enhance the functionalities of Docker
  • A practical and learning guide...
unlimited object storage image
Result Page: 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy