Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
BRANDchild: Insights into the Minds of Today's Global Kids: Understanding Their Relationship with Brands
BRANDchild: Insights into the Minds of Today's Global Kids: Understanding Their Relationship with Brands

Tweens (8- to 14-year-olds) comprise a new type of audience. An increasingly powerful and smart consumer group, they not only spent US $300 billion but influenced an astounding US $1.88 trillion spend across the globe last year. They are different from previous generations in every way. They are more likely to have a friend on the other side of...

Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast
Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast
Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad...
Multi-Sensor Image Fusion and Its Applications (Signal Processing and Communica)
Multi-Sensor Image Fusion and Its Applications (Signal Processing and Communica)
Imaging sensors are an important resource in today’s world. Further, a single sensor cannot provide a complete view of the environment in many applications. Just as humans use all five senses to great advantage, computers use image fusion algorithms to gain similar advantages. The resulting fused image, if suitably obtained from a set of...
High-Throughput Image Reconstruction and Analysis (Bioinformatics & Biomedical Imaging)
High-Throughput Image Reconstruction and Analysis (Bioinformatics & Biomedical Imaging)

Progress in biology is dependent on the ability to observe, measure, and model the behavior of organisms at multiple levels of abstraction, from the microscopic to the macroscopic. There has been a tremendous growth recently in the techniques to probe the structure and workings of cellular and organ-level mechanisms. Significant advances have...

Multihop Wireless Networks: Opportunistic Routing (Wireless Communications and Mobile Computing)
Multihop Wireless Networks: Opportunistic Routing (Wireless Communications and Mobile Computing)

This book provides an introduction to opportunistic routing an emerging technology designed to improve the packet forwarding reliability, network capacity and energy efficiency of multihop wireless networks

This book presents a comprehensive background to the technological challenges lying behind opportunistic routing. The...

Maven: The Definitive Guide
Maven: The Definitive Guide

For too long, developers have worked on disorganized application projects, where every part seemed to have its own build system, and no common repository existed for information about the state of the project. Now there's help. The long-awaited official documentation to Maven is here.

Written by Maven creator
...

Learning Penetration Testing with Python
Learning Penetration Testing with Python

Utilize Python scripting to execute effective and efficient penetration tests

About This Book

  • Understand how and where Python scripts meet the need for penetration testing
  • Familiarise yourself with the process of highlighting a specific methodology to exploit an environment to fetch...
System Building with APL + WIN
System Building with APL + WIN

Software modernisation or re-engineering as a concept lacksuniversal clarity. System Building with APL + Win seeks toclarify this problem by identifying the solution to the long termsurvival of the APL application as the elimination of APL specificconsiderations in the choice of a development tool. The authorshows how to deploy...

sendmail Desktop Reference
sendmail Desktop Reference
The sendmail program is a Mail Transport Agent (MTA). It accepts mail from Mail User Agents
(MUAs), mail users (humans), and other MTAs. It then delivers that mail to Mail Delivery Agents
(MDAs) on the local machine, or transports that mail to another MTA at another machine. The behavior
of sendmail is determined by its command line
...
CINEMA 4D 10 Workshop
CINEMA 4D 10 Workshop
Model, animate and render with a practical command of all the essential functions and tools in CINEMA 4D 10. Detailed tutorials, suitable for novices and experienced users alike, demonstrate how to navigate the redesigned UI and orient you to the workflow. Next, the author guides you through the creation of a more complex project in which you...
Cognitive Networks: Towards Self-Aware Networks
Cognitive Networks: Towards Self-Aware Networks

Cognitive networks can dynamically adapt their operational parameters in response to user needs or changing environmental conditions. They can learn from these adaptations and exploit knowledge to make future decisions.

Cognitive networks are the future, and they are needed simply because they enable users to focus on things other...

GMPLS: Architecture and Applications (The Morgan Kaufmann Series in Networking)
GMPLS: Architecture and Applications (The Morgan Kaufmann Series in Networking)
"This is a strong author team and they have produced a much-needed and timely book"
--Bruce Davie, Cisco Fellow

"GMPLS technology provides a keystone for next generation integrated optical networks, and this book is the one-stop reference on the subject."
--Kireeti Kompella, Juniper Networks and CCAMP
...
unlimited object storage image
Result Page: 134 133 132 131 130 129 128 127 126 125 124 123 122 121 120 119 118 117 116 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy