 |
|
|
 Mastering Microsoft VirtualizationThe first in-depth, comprehensive guide to Microsoft's suite of virtualization products
Virtualization is a hot topic for IT because of the potential it offers for serious economic benefits. While other books treat server virtualization alone, this comprehensive guide provides a complete virtual strategy.
You will learn how to... |  |  IP Design for Mobile NetworksAs the cellular world and the Internet converge, mobile networks are transitioning from circuit to packet and the Internet Protocol (IP) is now recognized as the fundamental building block for all next-generation communication networks. The all-IP vision provides the flexibility to deliver cost-effective services and... |  |  |
|
 |  |  Object Categorization: Computer and Human Vision Perspectives
The recognition of object categories has a rich history in computer vision. In the 1970s, generic object recognition systems sought to model and recognize objects based on their coarse, prototypical shape. These early systems employed complex 3-D models, which offered invariance to viewpoint (including image translation, rotation, and scale),... |  |  Millionaire Migrants: Trans-Pacific Life Lines (RGS-IBG Book Series)
Based on extensive interviewing and access to a wide range of databases, this is an examination of the migration career of wealthy migrants who left East Asia and relocated to Canada, Australia, New Zealand, and the United States, in the 1980s and 1990s.
-
An interdisciplinary project based on over 15 years of research in...
|
|
 Principles of Social Psychiatry
This second edition of Principles of Social Psychiatry appears more than 15 years after the first one, and even a cursory comparison between the contents of the two editions clearly documents that the scope and the impact of the social component of our discipline and profession have remarkably increased during the past few years.
... |  |  Spring Security 3
Security is of critical importance to all web applications. Vulnerable applications are easy prey for hackers. This book is the perfect tool for Java developers looking to repel attacks against their web applications using the proven Spring Security library to achieve this.
A comprehensive guide to Spring Security 3. You will learn... |  |  Introducing Silverlight 4
Introducing Silverlight 4 brings you up to speed with the latest version of Silverlight quickly and efficiently. The book builds off your understanding of the basics of .NET coding and WPF, allowing your journey to Silverlight 4 proficiency to be as quick and painless as possible. The text highlights where coding techniques are... |
|
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 |