Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Check Point Next Generation Security Administration
Check Point Next Generation Security Administration
Check Point NG aims to teach its readers how to install and set up VPN-1/FireWall-1 Next Generation, the latest version of the highly respected firewall software from Check Point. Its authors--all with significant network and security certifications--accomplish their objective: it seems likely that this book will travel with a lot of Check...
Atlas of Egyptian Art
Atlas of Egyptian Art

This enchanted tour of Egyptian art by one of its early explorers is one of the most beautiful modern works on ancient Egyptian art. Prisse d'Avennes' monumental work, first published in Paris over a ten-year period between 1868 and 1878, includes the only surviving record of many lost artifacts.

The author of this...

Adaptive Learning of Polynomial Networks: Genetic Programming, Backpropagation and Bayesian Methods
Adaptive Learning of Polynomial Networks: Genetic Programming, Backpropagation and Bayesian Methods

This book delivers theoretical and practical knowledge for developing algorithms that infer linear and non-linear multivariate models, providing a methodology for inductive learning of polynomial neural network models (PNN) from data. The text emphasizes an organized model identification process by which to discover models that generalize and...

Visual Lunar and Planetary Astronomy (The Patrick Moore Practical Astronomy Series)
Visual Lunar and Planetary Astronomy (The Patrick Moore Practical Astronomy Series)

With the advent of CCDs and webcams, the focus of amateur astronomy has to some extent shifted from science to art. Visual work in astronomy has a rich history. Today, imaging is now more prominent. However there is still much for the visual amateur astronomer to do, and visual work is still a valid component of amateur astronomy. Paul...

Agent Intelligence Through Data Mining (Multiagent Systems, Artificial Societies, and Simulated Organizations)
Agent Intelligence Through Data Mining (Multiagent Systems, Artificial Societies, and Simulated Organizations)

Knowledge, hidden in voluminous data repositories routinely created and maintained by today’s applications, can be extracted by data mining. The next step is to transform this discovered knowledge into the inference mechanisms or simply the behavior of agents and multi-agent systems. Agent Intelligence Through Data Mining addresses this...

IEEE Recommended Practice for the Design of Reliable Industrial and Commercial Power Systems
IEEE Recommended Practice for the Design of Reliable Industrial and Commercial Power Systems
The design of reliable industrial and commercial power systems is of considerable interest to many people. Prior to 1962, a qualitative viewpoint was taken when attempting to achieve this objective. The need for a quantitative approach was first recognized in the early 1960s when a small group of pioneers led by W. H. Dickinson...
Learning Cocoa with Objective-C: Developing for the Mac and iOS App Stores
Learning Cocoa with Objective-C: Developing for the Mac and iOS App Stores

Get up to speed on Cocoa and Objective-C, and start developing applications on the iOS and OS X platforms. If you don’t have experience with Apple’s developer tools, no problem! From object-oriented programming to storing app data in iCloud, the fourth edition of this book covers everything you need to build apps for the...

Queueing Theory with Applications to Packet Telecommunication
Queueing Theory with Applications to Packet Telecommunication
Soon after Samuel Morse’s telegraphing device led to a deployed electrical
telecommunications system in 1843, waiting lines began to form by those
wanting to use the system. At this writing queueing is still a significant factor in
designing and operating communications services, whether they are provided
over the Internet
...
Introduction to Electronic Defense Systems, Second Edition (Artech House Radar Library)
Introduction to Electronic Defense Systems, Second Edition (Artech House Radar Library)
In my government position I am responsible for military research and technology for the Italian armed forces. During my coordination work with the Western European Armament Group: Panel I1 (Research and Technology), discussions have often been of a highly technical nature. It is certainly easier to make management decisions with an adequate...
Cisco Router Configuration, Second Edition
Cisco Router Configuration, Second Edition
The objective of this book is to help you, the novice Cisco users, with the basic administration of your internetworking devices. Using straightforward case studies and practical examples, Cisco Router Configuration, 2E teaches IOS fundamentals for configuring, operating, and maintaining internetworking devices....
Semantic Models for Multimedia Database Searching and Browsing (Advances in Database Systems)
Semantic Models for Multimedia Database Searching and Browsing (Advances in Database Systems)
Semantic Models for Multimedia Database Searching and Browsing begins with the introduction of multimedia information applications, the need for the development of the multimedia database management systems (MDBMSs), and the important issues and challenges of multimedia systems. The temporal relations, the spatial relations, the spatio-temporal...
Mastering Xcode 4: Develop and Design
Mastering Xcode 4: Develop and Design
This book is an intermediate-level introduction to Xcode 4, Apple’s integrated development environment. It assumes you have some development experience and are familiar with the Cocoa API. It won’t teach you how to write code or much at all about Cocoa. There are other books for that. This one is strictly focused on...
unlimited object storage image
Result Page: 77 76 75 74 73 72 71 70 69 68 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy