Home | Amazing | Today | Tags | Publishers | Years | Search 
Handbook of Geometric Computing: Applications in Pattern Recognition, Computer Vision, Neuralcomputing, and Robotics
Handbook of Geometric Computing: Applications in Pattern Recognition, Computer Vision, Neuralcomputing, and Robotics
Many computer scientists, engineers, applied mathematicians, and physicists use geometry theory and geometric computing methods in the design of perception-action systems, intelligent autonomous systems, and man-machine interfaces. This handbook brings together the most recent advances in the application of geometric computing for building such...
Fuzzy Chaotic Systems: Modeling, Control, and Applications (Studies in Fuzziness and Soft Computing)
Fuzzy Chaotic Systems: Modeling, Control, and Applications (Studies in Fuzziness and Soft Computing)
Bringing together the two seemingly unrelated concepts, fuzzy logic and chaos theory, is primarily motivated by the concept of soft computing (SC), initiated by Lotfi A. Zadeh, the founder of fuzzy set theory. The principal constituents of SC are fuzzy logic (FL), neural network theory (NN) and probabilistic reasoning (PR), with the latter...
Spread Spectrum and CDMA: Principles and Applications
Spread Spectrum and CDMA: Principles and Applications
Spread spectrum and CDMA are cutting-edge technologies widely used in operational radar, navigation and telecommunication systems and play a pivotal role in the development of the forthcoming generations of systems and networks.

This comprehensive resource presents the spread spectrum concept as a product of the advancements in wireless IT,...

Network Protocols Handbook
Network Protocols Handbook
We are living in the IT(Information Technologies) times. The IT provides us many powerful tools that have significantly changed our way of life, work and business operations. Among all the IT advancements, Internet has the most impact in every aspect of our society for the past 20 years. From Internet, people can get instant news, communicate with...
An Introduction to Quantum Computing
An Introduction to Quantum Computing
This concise, accessible text provides a thorough introduction to quantum computing - an exciting emergent field at the interface of the computer, engineering, mathematical and physical sciences. Aimed at advanced undergraduate and beginning graduate students in these disciplines, the text is technically detailed and is clearly illustrated...
Hacking Exposed 5th Edition
Hacking Exposed 5th Edition
“The seminal book on white-hat hacking and countermeasures... Should be required reading for anyone with a server or a network to secure.” --Bill Machrone, PC Magazine

"The definitive compendium of intruder practices and tools." --Steve Steinke, Network Magazine

"For almost any computer book, you can find a...

802.1X Port-Based Authentication
802.1X Port-Based Authentication
Written to appeal to a broad audience, 802.1X Port-Based Authentication seeks to define this complex concept in accessible terms and to explore its various applications to today's computer networks using this particular network protocol. This text assumes that the reader may have little or no prior knowledge and only a general understanding of...
Handbook of Critical Information Systems Research: Theory And Application
Handbook of Critical Information Systems Research: Theory And Application
This important Handbook provides a unique overview of information systems (IS) research by focusing on the increasing interest in critical-related issues. Representing a significant step forward in the development of critical perspectives on the IS field, the Handbook draws together original contributions from leading authors who offer alternatives...
Administering Windows Vista Security: The Big Surprises
Administering Windows Vista Security: The Big Surprises
An Inside Look at Windows Vista Security for Systems Administrators

Get an early start on Windows Vista security and the technology shifts you'll need to know as a systems administrator. From leading Windows expert Mark Minasi comes this "just-in-time" book to get you there. This targeted, hands-on...

Mastering Windows Network Forensics and Investigation
Mastering Windows Network Forensics and Investigation

Conduct Cutting-Edge Forensic Investigations of Computer Crimes.

Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age.

Now you can get the training you need in this...

Mac OS X Server 10.4 Tiger: Visual QuickPro Guide
Mac OS X Server 10.4 Tiger: Visual QuickPro Guide
Offering Apple's legendary ease of use plus everything you would expect from a Unix-based operating system--preemptive multitasking, symmetric multiprocessing, and support for networking and security standards--Mac OS X Server has revolutionized the world of network administration. Mac OS X Tiger server continues that tradition by offering more...
Developing Multi-Agent Systems with JADE (Wiley Series in Agent Technology)
Developing Multi-Agent Systems with JADE (Wiley Series in Agent Technology)

Learn how to employ JADE to build multi-agent systems!

JADE (Java Agent DEvelopment framework) is a middleware for the development of applications, both in the mobile and fixed environment, based on the Peer-to-Peer intelligent autonomous agent approach. JADE enables developers to implement and...

Result Page: 229 228 227 226 225 224 223 222 221 220 219 218 217 216 215 214 213 212 211 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy