Home | Amazing | Today | Tags | Publishers | Years | Search 
Developing with Couchbase Server
Developing with Couchbase Server

Today’s highly interactive websites pose a challenge for traditional SQL databases—the ability to scale rapidly and serve loads of concurrent users. With this concise guide, you’ll learn how to build web applications on top of Couchbase Server 2.0, a NoSQL database that can handle websites and social media where...

Dynamic Secrets in Communication Security
Dynamic Secrets in Communication Security

Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in...

Computer Vision in Sports (Advances in Computer Vision and Pattern Recognition)
Computer Vision in Sports (Advances in Computer Vision and Pattern Recognition)

The first book of its kind devoted to this topic, this comprehensive text/reference presents state-of-the-art research and reviews current challenges in the application of computer vision to problems in sports. Opening with a detailed introduction to the use of computer vision across the entire life-cycle of a sports event, the text then...

Mastering Manga Studio 5
Mastering Manga Studio 5

An extensive, fun, and practical guide to streamlining your comic-making workflow using Manga Studio 5

Overview

  • Make Manga Studio 5 your own personalized software by creating your own workspace, tools, page layouts, and materials
  • Explore using 3D models, actions, ruler tools, and creating...
Monitoring with Opsview
Monitoring with Opsview

Once you've learnt Opsview monitoring, you can keep watch over your whole IT environment, whether physical, virtual, or private cloud. This book is the perfect introduction, featuring lots of screenshots and examples for fast learning.

Overview

  • Add plugins to Windows and Linux agents
  • ...
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
Nietzsche's Protestant Fathers: A Study in Prodigal Christianity
Nietzsche's Protestant Fathers: A Study in Prodigal Christianity

Nietzsche was famously an atheist, despite coming from a strongly Protestant family. This heritage influenced much of his thought, but was it in fact the very thing that led him to his atheism? This work provides a radical re-assessment of Protestantism by documenting and extrapolating Nietzsche’s view that Christianity dies...

Nuclear Medicine in Infectious Diseases
Nuclear Medicine in Infectious Diseases

This book is designed as a reference manual that is exceptional in systematically discussing every aspect of nuclear medicine imaging of infections, with careful explanation of the most up-to-date concepts and recent guidelines on diagnostic flowcharts as shared between the EANM, ESR, ESNR, ESCMID, ESC, EACVI, ECCO, ESGAR and EBJIS....

Rating Professors Online: How Culture, Technology, and Consumer Expectations Shape Modern Student Evaluations (Marketing and Communication in Higher Education)
Rating Professors Online: How Culture, Technology, and Consumer Expectations Shape Modern Student Evaluations (Marketing and Communication in Higher Education)

This book explores the emerging trends and patterns in online student evaluations of teaching and how online reviews have transformed the teacher-student relationship as developments in technology have altered consumer behaviors. While consumers at large rely more and more on web-based platforms to purchase commercial products and...

Quantifying and Processing Biomedical and Behavioral Signals (Smart Innovation, Systems and Technologies)
Quantifying and Processing Biomedical and Behavioral Signals (Smart Innovation, Systems and Technologies)

The book is based on interdisciplinary research on various aspects and dynamics of human multimodal signal exchanges. It discusses realistic application scenarios where human interaction is the focus, in order to

  • identify new methods for data processing and data flow coordination through synchronization, and...
Python Deep Learning Projects: 9 projects demystifying neural network and deep learning models for building intelligent systems
Python Deep Learning Projects: 9 projects demystifying neural network and deep learning models for building intelligent systems

Insightful projects to master deep learning and neural network architectures using Python and Keras

Key Features

  • Explore deep learning across computer vision, natural language processing (NLP), and image processing
  • Discover best practices for the training of deep neural...
Visual Six Sigma: Making Data Analysis Lean (Wiley and SAS Business Series)
Visual Six Sigma: Making Data Analysis Lean (Wiley and SAS Business Series)
Streamline data analysis with an intuitive, visual Six Sigma strategy

Visual Six Sigma provides the statistical techniques that help you get more information from your data. A unique emphasis on the visual allows you to take a more active role in data-driven decision making, so you can leverage your contextual...

Result Page: 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy