Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Multi-Sensor Image Fusion and Its Applications (Signal Processing and Communica)
Multi-Sensor Image Fusion and Its Applications (Signal Processing and Communica)
Imaging sensors are an important resource in today’s world. Further, a single sensor cannot provide a complete view of the environment in many applications. Just as humans use all five senses to great advantage, computers use image fusion algorithms to gain similar advantages. The resulting fused image, if suitably obtained from a set of...
Programming Entity Framework: Building Data Centric Apps with the ADO.NET Entity Framework
Programming Entity Framework: Building Data Centric Apps with the ADO.NET Entity Framework

Get a thorough introduction to ADO.NET Entity Framework 4 -- Microsoft's core framework for modeling and interacting with data in .NET applications. The second edition of this acclaimed guide provides a hands-on tour of the framework latest version in Visual Studio 2010 and .NET Framework 4. Not only will you learn how to use EF4...

Java For Dummies
Java For Dummies

Java is good stuff. I’ve been using it for years. I like Java because it’s very orderly. Almost everything follows simple rules. The rules can seem intimidating at times, but this book is here to help you figure them out. So, if you want to use Java and want an alternative to the traditional techie, softcover book, sit...

Getting Started with Backbone Marionette
Getting Started with Backbone Marionette

Build largescale JavaScript applications with Backbone Marionette quickly and efficiently

About This Book

  • Create scalable and highly interactive web applications using one of the best frameworks for Backbone.js
  • Learn about controllers, views, modules, events, commands, and regions
  • ...
Learning Penetration Testing with Python
Learning Penetration Testing with Python

Utilize Python scripting to execute effective and efficient penetration tests

About This Book

  • Understand how and where Python scripts meet the need for penetration testing
  • Familiarise yourself with the process of highlighting a specific methodology to exploit an environment to fetch...
Cryptographic Security Architecture: Design and Verification
Cryptographic Security Architecture: Design and Verification
This book describes various aspects of cryptographic security architecture design, with a
particular emphasis on the use of rigorous security models and practices in the design. The
first portion of the book presents the overall architectural basis for the design, providing a
general overview of features such as the object model and
...
The Common Language Infrastructure Annotated Standard
The Common Language Infrastructure Annotated Standard

The Common Language Infrastructure Annotated Standard is the definitive guide to understanding the annotated specification for the Common Language Infrastructure (CLI) standard. With annotations and code samples from both the ECMA standards committee and the Microsoft Common Language Runtime (CLR) team, this book goes...

Doing Objects in Visual Basic 2005 (The Addison-Wesley Microsoft Technology Series)
Doing Objects in Visual Basic 2005 (The Addison-Wesley Microsoft Technology Series)
Welcome to the latest in the series of Doing Objects books. This series started in 1995 with Visual Basic 4.0, when VB could first do objects. At that time, little had been discussed about using object-oriented design and development techniques with Visual Basic. To help improve that situation, almost half of each book in the series was...
MPEG-4 Beyond Conventional Video Coding: Object Coding, Resilience and Scalability
MPEG-4 Beyond Conventional Video Coding: Object Coding, Resilience and Scalability
MPEG-4 (with a formal ISO/IEC designation ISO/IEC 14496) standardization was initiated in 1994 to address the requirements of the rapidly converging telecommunication, computer, and TV/film industries. MPEG-4 had a mandate to standardize algorithms for audiovisual coding in multimedia applications, digital television, interactive graphics, and...
Clean Code: A Handbook of Agile Software Craftsmanship (Robert C. Martin Series)
Clean Code: A Handbook of Agile Software Craftsmanship (Robert C. Martin Series)

Even bad code can function. But if code isn’t clean, it can bring a development organization to its knees. Every year, countless hours and significant resources are lost because of poorly written code. But it doesn’t have to be that way.

Noted software expert Robert C. Martin presents a revolutionary paradigm with
...

Multi-Camera Networks: Principles and Applications
Multi-Camera Networks: Principles and Applications
This book is the definitive reference in multi-camera networks. It gives clear guidance on the conceptual and implementation issues involved in the design and operation of multi-camera networks, as well as presenting the state-of-the-art in hardware, algorithms and system development. The book is broad in scope, covering smart camera architectures,...
Documentum Content Management Foundations: EMC Proven Professional Certification Exam E20-120 Study Guide
Documentum Content Management Foundations: EMC Proven Professional Certification Exam E20-120 Study Guide

This is a complete study guide including study material and practice questions to prepare for the EMC Proven Professional certification Exam E20-120. It can also serve Documentum beginners and practitioners as a handy guide and quick reference to the technical fundamentals that is fully up to date for Documentum 5.3. Beginners are introduced to...

unlimited object storage image
Result Page: 189 188 187 186 185 184 183 182 181 180 179 178 177 176 175 174 173 172 171 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy