Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Artificial Intelligence for Robotics: Build intelligent robots that perform human tasks using AI techniques
Artificial Intelligence for Robotics: Build intelligent robots that perform human tasks using AI techniques

Bring a new degree of interconnectivity to your world by building your own intelligent robots

Key Features

  • Leverage fundamentals of AI and robotics
  • Work through use cases to implement various machine learning algorithms
  • Explore Natural Language Processing...
SHARKS in the MOAT: How to Create Truly Secure Software
SHARKS in the MOAT: How to Create Truly Secure Software
Believe it or not, there is a striking similarity between medieval castle design and how we protect networks and data in the 21st century. By examining how our ancestors fought off invading armies, it becomes much easier to understand the latest strategies for keeping hackers at-bay. This book is designed for anyone who wants to understand how...
Algorithms: Design and Analysis (De Gruyter Textbook)
Algorithms: Design and Analysis (De Gruyter Textbook)

Algorithms play a central role both in the theory and in the practice of computing. The goal of the authors was to write a textbook that would not trivialize the subject but would still be readable by most students on their own. The book contains over 120 exercises. Some of them are drills; others make important points about the...

Network Control and Engineering for QOS, Security and Mobility, III
Network Control and Engineering for QOS, Security and Mobility, III
This volume contains the proceedings of the Third International Conference on Network Control and Engineering for Quality of Service, Security and Mobility (Net-Con’2004), celebrated in Palma de Mallorca (Illes Balears, Spain) during November 2-5, 2004. This IFIP TC6 Conference was organized by the Universitat de les Illes Balears and...
Check Point Next Generation Security Administration
Check Point Next Generation Security Administration
Check Point NG aims to teach its readers how to install and set up VPN-1/FireWall-1 Next Generation, the latest version of the highly respected firewall software from Check Point. Its authors--all with significant network and security certifications--accomplish their objective: it seems likely that this book will travel with a lot of Check...
Architecture-Independent Programming for Wireless Sensor Networks (Wiley Series on Parallel and Distributed Computing)
Architecture-Independent Programming for Wireless Sensor Networks (Wiley Series on Parallel and Distributed Computing)
New automated, application-independent methodology for designing and deploying sensor networks

Following this book's clear explanations, examples, and illustrations, domain experts can design and deploy nontrivial networked sensing applications without much knowledge of the low-level networking aspects of deployment. This new approach is based...

Legitimate Applications of Peer-to-Peer Networks
Legitimate Applications of Peer-to-Peer Networks
Peer-to-peer computing has gained a lot of prominence and publicity in the past years. Several start-up companies offer software packages that can be used for building peer-to-peer overlay networks for applications such as file sharing and music swapping. However, the legal and ethical questions associated with swapping copyrighted material on the...
Awareness Systems: Advances in Theory, Methodology and Design (Human-Computer Interaction Series)
Awareness Systems: Advances in Theory, Methodology and Design (Human-Computer Interaction Series)

People go about their daily tasks with an in-built awareness of their social and physical environments. This awareness helps them to work cooperatively in groups, coordinate actions, and to maintain and enhance social communication with others. Networked technology has extended the reach of people's awareness to remote and distributed groups and...

Deploying and Troubleshooting Cisco Wireless LAN Controllers
Deploying and Troubleshooting Cisco Wireless LAN Controllers

This is the only complete, all-in-one guide to deploying, running, and troubleshooting wireless networks with Cisco® Wireless LAN Controllers (WLCs) and Lightweight Access Point Protocol (LWAPP)/Control and Provisioning of Wireless Access Points (CAPWAP). Authored by two of the most experienced Cisco wireless support...

HSPA Performance and Evolution: A practical perspective
HSPA Performance and Evolution: A practical perspective

Written from an operator’s viewpoint,  HSPA Performance and Evolution  explores the lessons learned and techniques developed for optimally deploying HSPA (High Speed Packet Access). The essential distinctions between rolling out HSPA compared to earlier UMTS and GSM technologies are explained covering the many issues...

Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet
Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet

WHEN I FIRST MET BARRETT LYON in 2004, I was covering Internet security for the Los Angeles Times from an office in San Francisco. His story was so good—and met a journalistic need so deep—that I had a hard time believing it was true.

For more than a year, I had been grappling with an onslaught of urgent but...

Handbook of Security and Networks
Handbook of Security and Networks
As computing and networking technologies are gradually integrated with every aspect of human lives and activities, computer and network security has become a critical issue. The Handbook of Security and Networks presents a collection of recent advances in computer networking and security areas. These include applied...
unlimited object storage image
Result Page: 234 233 232 231 230 229 228 227 226 225 224 223 222 221 220 219 218 217 216 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy