Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Multimedia Information Extraction: Advances in Video, Audio, and Imagery Analysis for Search, Data Mining, Surveillance and Authoring
Multimedia Information Extraction: Advances in Video, Audio, and Imagery Analysis for Search, Data Mining, Surveillance and Authoring

The advent of increasingly large consumer collections of audio(e.g., iTunes), imagery (e.g., Flickr), and video (e.g., YouTube)is driving a need not only for multimedia retrieval but alsoinformation extraction from and across media. Furthermore,industrial and government collections fuel requirements for stockmedia access, media preservation,...

Applied Text Analysis with Python: Enabling Language-Aware Data Products with Machine Learning
Applied Text Analysis with Python: Enabling Language-Aware Data Products with Machine Learning

From news and speeches to informal chatter on social media, natural language is one of the richest and most underutilized sources of data. Not only does it come in a constant stream, always changing and adapting in context; it also contains information that is not conveyed by traditional data sources. The key to unlocking natural...

Information Technology Project Management (with Microsoft Project 2010 60 Day Trial CD-ROM)
Information Technology Project Management (with Microsoft Project 2010 60 Day Trial CD-ROM)

Discover exciting "behind-the-scenes" opportunities and challenges in technology today with Schwalbe's unique INFORMATION TECHNOLOGY PROJECT MANAGEMENT, 7E. This one-of-a-kind book demonstrates the principles distinctive to managing information technology (IT) projects that extend well beyond standard project management...

Basic Security Testing with Kali Linux
Basic Security Testing with Kali Linux

With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take a more active stance in securing their computer systems. Kali Linux is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use so they can find issues with their...

C++ How to Program (8th Edition)
C++ How to Program (8th Edition)

Welcome to the C++ computer programming language and C++ How to Program, Eighth Edition! This book presents leading-edge computing technologies, and is particularly appropriate for inroductory course sequences based on the curriculum recommendations of two key professional organizations—the ACM and the IEEE.

The new...

Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention
Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention

Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support...

Sensors in Biomedical Applications: Fundamentals, Technology and Applications
Sensors in Biomedical Applications: Fundamentals, Technology and Applications
For scientists, engineers, and manufacturers involved in developing, designing, and applying biomedical sensors… surveys sensors that have existing and potential applications in biomedicine.
-Sci Tech Book News, Vol. 25, No. 3, September 2001

While most books contain some information on related sensors topics, they are
...
Intermediate Security Testing with Kali Linux 2
Intermediate Security Testing with Kali Linux 2

With computer hacking attacks making headline news on a frequent occasion, learning ethical hacking has become a priority for those tasked with defending their networks. But in the sea of training material it is hard to find effectual training using the latest tools and techniques. In “Intermediate Security Testing with Kali Linux...

501 Challenging Logic & Reasoning Problems, 2nd Edition
501 Challenging Logic & Reasoning Problems, 2nd Edition

This book—which can be used alone, with other logic and reasoning texts of your choice, or in combination with LearningExpress’s Reasoning Skills Success in 20 Minutes a Day—will give you practice dealing with the types of multiple-choice questions that appear on standardized tests assessing logic, reasoning, judgment, and...

Doing Data Science: Straight Talk from the Frontline
Doing Data Science: Straight Talk from the Frontline

Now that people are aware that data can make the difference in an election or a business model, data science as an occupation is gaining ground. But how can you get started working in a wide-ranging, interdisciplinary field that’s so clouded in hype? This insightful book, based on Columbia University’s Introduction to...

The Network Security Test Lab: A Step-by-Step Guide
The Network Security Test Lab: A Step-by-Step Guide

The ultimate hands-on guide to IT security and proactivedefense

The Network Security Test Lab is a hands-on, step-by-stepguide to ultimate IT security implementation. Covering the fullcomplement of malware, viruses, and other attack technologies, thisessential guide walks you through the security assessment...

Electricity for the Entertainment Electrician & Technician
Electricity for the Entertainment Electrician & Technician
No more sifting through general electrical guides -- this reference is specific to entertainment!

Electricity for the Entertainment Electrician and Technician will reinforce the fundamentals of electricity and explain the principles of power distribution, important safety issues, and discuss techniques and practices around
...
Result Page: 56 55 54 53 52 51 50 49 48 47 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy