Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Watermarking Systems Engineering
Watermarking Systems Engineering
The growth of the Internet has fueled the demand for enhanced watermarking and data hiding technologies and has stimulated research into new ways to implement watermarking systems in the real world. Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications presents the principles of watermarking system design and...
The Handbook of Information and Computer Ethics
The Handbook of Information and Computer Ethics
This handbook provides an accessible overview of the most important issues in information and computer ethics. It covers: foundational issues and methodological frameworks; theoretical issues affecting property, privacy, anonymity, and security; professional issues and the information-related professions; responsibility issues and risk assessment;...
Be a Successful Green Builder
Be a Successful Green Builder
Increase Profits by Incorporating Sustainable Practices into Your Building Operations

Filled with environmentally friendly methods that reduce the impact of housing on natural areas, Be a Successful Green Builder contains everything needed to get started in the green building business and...

Generalizations of Cyclostationary Signal Processing: Spectral Analysis and Applications
Generalizations of Cyclostationary Signal Processing: Spectral Analysis and Applications

The relative motion between the transmitter and the receiver modifies the nonstationarity properties of the transmitted signal. In particular, the almost-cyclostationarity property exhibited by almost all modulated signals adopted in communications, radar, sonar, and telemetry can be transformed into more general kinds of nonstationarity. A...

Due Diligence and the Business Transaction: Getting a Deal Done
Due Diligence and the Business Transaction: Getting a Deal Done

Due Diligence and the Business Transaction: Getting a Deal Done  is a practical guide to due diligence for anyone buying or selling a privately held business or entering into a major agreement with another company. 

When you’re buying a business, it’s wise to conduct due
...

Languages for System Specification: Selected Contributions on UML, SystemC, System Verilog, Mixed-Signal Systems, and Property Specifications from FDL'03
Languages for System Specification: Selected Contributions on UML, SystemC, System Verilog, Mixed-Signal Systems, and Property Specifications from FDL'03
Contributions on UML address the application of UML in the specification of embedded HW/SW systems. C-Based System Design embraces the modeling of operating systems, modeling with different models of computation, generation of test patterns, and experiences from case studies with SystemC. Analog and Mixed-Signal Systems covers rules for solving...
Coding Freedom: The Ethics and Aesthetics of Hacking
Coding Freedom: The Ethics and Aesthetics of Hacking

Who are computer hackers? What is free software? And what does the emergence of a community dedicated to the production of free and open source software--and to hacking as a technical, aesthetic, and moral project--reveal about the values of contemporary liberalism? Exploring the rise and political significance of the free and open source...

Pro JavaFX 2: A Definitive Guide to Rich Clients with Java Technology
Pro JavaFX 2: A Definitive Guide to Rich Clients with Java Technology

In Pro JavaFX 2: A Definitive Guide to Rich Clients with Java Technology, Jim Weaver, Weiqi Gao, Stephen Chin, Dean Iverson, and Johan Vos show you how you can use the JavaFX platform to create rich-client Java applications. You'll see how JavaFX provides a powerful Java-based UI platform capable...

MATLAB Graphics and Data Visualization Cookbook
MATLAB Graphics and Data Visualization Cookbook

MATLAB's customizable graphics elements allow you to tailor your visualizations for exactly what you need to present; alter the figure and axis properties, lighting, transparency and camera position. Use MATLAB to apply volume visualizations to your data as well as interactivity and animation, or to plot your data in 1, 2, 3 and higher...

Privacy, Security and Trust within the Context of Pervasive Computing
Privacy, Security and Trust within the Context of Pervasive Computing
Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the second international conference on Pervasive Computing. The workshop was held April18-23, 2004, in Vienna, Austria. The goal of the workshop was not to focus on specific, even novel mechanisms, but rather on the interfaces...
Software Engineering 1: Abstraction and Modelling (Texts in Theoretical Computer Science. An EATCS Series)
Software Engineering 1: Abstraction and Modelling (Texts in Theoretical Computer Science. An EATCS Series)
From the reviews:

"The book under review is the first one from a series of three volumes that provides a compelling framework for a more comprehensive understanding of both formal and practical concerns of software engineering. The major feature distinguishing these textbooks from other current ones is the natural manner in which...

Getting Acquainted With Fractals
Getting Acquainted With Fractals
The first instance of pre-computer fractals was noted by the French mathematician Gaston Julia. He wondered what a complex polynomial function would look like, such as the ones named after him (in the form of z2 + c, where c is a complex constant with real and imaginary parts). The idea behind this formula is that one takes the x and y coordinates...
unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy