Home | Amazing | Today | Tags | Publishers | Years | Search 
Image Processing Using Pulse-Coupled Neural Networks
Image Processing Using Pulse-Coupled Neural Networks
Humans have an outstanding ability to recognise, classify and discriminate
objects with extreme ease. For example, if a person was in a large classroom
and was asked to find the light switch it would not take more than a second or
two. Even if the light switch was located in a different place than the human
expected or it was
...
Openvpn: Building And Integrating Virtual Private Networks
Openvpn: Building And Integrating Virtual Private Networks
OpenVPN is an outstanding piece of software that was invented by James Yonan in the year 2001 and has steadily been improved since then. No other VPN solution offers a comparable mixture of enterprise-level security, usability, and feature richness. We have been working with OpenVPN for many years now, and it has always proven to be the best...
Agent-oriented Methodologies
Agent-oriented Methodologies
Building software to solve contemporary business problems is no easy task.
Over the last decade there has been an increasing focus on object-oriented
notations and modelling languages, perhaps at the expense of a full methodological
approach to solving the problem and giving software developers the
tools they need to
...
Encyclopedia of Multimedia Technology and Networking
Encyclopedia of Multimedia Technology and Networking
The purpose of the Encyclopedia of Multimedia Technology and Networking is to offer a written
compendium of human knowledge related to the emerging multimedia digital metamarket.

Multimedia technology, networks and online interactive multimedia services are taking advantage of a
series of radical innovations in converging
...
The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks
The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks
In many ways, this is almost the hardest chapter to pen in this book; in writing
this, I am forced to relive the many occasions on which I have stood in
a bookstore leafing through a technical book, trying to determine its value
to the technical “excursion” I am currently embarked on. I generally start
with the
...
Building And Integrating Virtual Private Networks With Openswan
Building And Integrating Virtual Private Networks With Openswan
With the widespread use of wireless networking and the integration of VPN capabilities in most
modern laptops, PDAs, and even cellular phones, there is a growing desire for encrypting more
and more communications to prevent eavesdropping. Can you trust the coffee shop's wireless
network? Is your neighbor snooping on your WiFi
...
Delivering Utility Computing: Business-driven IT Optimization
Delivering Utility Computing: Business-driven IT Optimization
Learn how to design and deploy utility computing systems to save costs and improve the value that IT delivers.

The economic downturn that occurred after the .com boom and bust has put the cost of IT in the spotlight.  By following the principles of utility computing, also known as on-demand computing, real-time...

CWNA: Certified Wireless Network Administrator Study Guide (Exam PW0-100)
CWNA: Certified Wireless Network Administrator Study Guide (Exam PW0-100)
One of the fastest-growing certifications on the market, CWNA is rapidly becoming the premier professional wireless certification for network administrators. It is also the foundation-level exam for the complete Certified Wireless Network Professional program. Now you can join the move to Wi-Fi and prepare for your certification with this...
Ubuntu Unleashed
Ubuntu Unleashed
Incorporating an advanced approach to presenting information about Ubuntu, Ubuntu Unleashed aims to provide the best and latest information that intermediate to advanced Linux users need to know about installation, configuration, system administration, server operations, and security. Written by renowned open source...
Handbook of Nature-Inspired and Innovative Computing: Integrating Classical Models with Emerging Technologies
Handbook of Nature-Inspired and Innovative Computing: Integrating Classical Models with Emerging Technologies

As computing devices proliferate, demand increases for an understanding of emerging computing paradigms and models based on natural phenomena. Neural networks, evolution-based models, quantum computing, and DNA-based computing and simulations are all a necessary part of modern computing analysis and systems development. Vast literature exists on...

MCSE Exam 70-296 Study Guide and DVD Training System
MCSE Exam 70-296 Study Guide and DVD Training System
So you want to be a Microsoft Certified Systems Engineer for Windows Server 2003? Not a bad idea.To stay competitive in today’s competitive IT world, you must not only possess the knowledge necessary to do your job, but you must also be able to prove to your employer (or potential employer) that you have the abilities and knowledge.The best...
CCSP SECUR Exam Certification Guide (CCSP Self-Study, 642-501)
CCSP SECUR Exam Certification Guide (CCSP Self-Study, 642-501)
Prepare for the new CCSP SECUR 642-501 exam with the only Cisco authorized SECUR preparation guide available
  • The only SECUR guide developed in conjunction with Cisco, providing the most accurate and up-to-date topical coverage
  • Electronic testing engine on CD-ROM provides flexible assessment features and feedback on...
Result Page: 243 242 241 240 239 238 237 236 235 234 233 232 231 230 229 228 227 226 225 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy