Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Audio Watermark: A Comprehensive Foundation Using MATLAB
Audio Watermark: A Comprehensive Foundation Using MATLAB

This book illustrates the commonly used and novel approaches of audio watermarking for copyrights protection. The author examines the theoretical and practical step by step guide to the topic of data hiding in audio signal such as music, speech, broadcast. The book covers new techniques developed by the authors are fully explained and MATLAB...

Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT (SpringerBriefs in Electrical and Computer Engineering)
Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT (SpringerBriefs in Electrical and Computer Engineering)
This book gives a comprehensive and systematic review of secure compressive sensing (CS) for applications in various fields such as image processing, pattern recognition, Internet of things (IoT), and cloud computing. It will help readers grasp the knowledge of secure CS and its applications, and stimulate more readers to work on the research...
Intellectual Property Rights in a Networked World: Theory and Practice
Intellectual Property Rights in a Networked World: Theory and Practice
Intellectual Property Rights in a Networked World is a collection of recent essays offering fresh perspectives on the scope and future of intellectual property rights. The tripartite division of the book is designed to make this inter-disciplinary topic more accessible and intelligible to readers of diverse backgrounds. Part I consists of a single...
Protection of Industrial Power Systems, Second Edition
Protection of Industrial Power Systems, Second Edition
"The book covers the most important aspects of industrial system protection."

The protection which is installed on an industrial power system is likely to be subjected to more difficult conditions than the protection on any other kind of power system. Starting with the many simple devices which are employed and covering the
...
Conflicted American Landscapes
Conflicted American Landscapes
How conflicting ideas of nature threaten to fracture America's identity.

Amber waves of grain, purple mountain majesties: American invest much of their national identity in sites of natural beauty. And yet American lands today are torn by conflicts over science, religion, identity, and politics. Creationists
...
The MPEG-21 Book
The MPEG-21 Book
Understand the MPEG-21 Multimedia Framework, the standard for the creation, delivery and consumption of multimedia.

This text is the comprehensive guide to MPEG-21, the technology that provides an open framework for multimedia applications. Whereas previous MPEG standards defined compression techniques, MPEG-21...

Asianization of Migrant Workers in the Gulf Countries
Asianization of Migrant Workers in the Gulf Countries

This edited volume contains sixteen chapters by eminent scholars on one of the largest migration corridors in the world i.e., between South and South-East Asia and the Gulf region. Asia’s trade and cultural contact with the Gulf date back to ancient historical times. Since the 1970s, the economic rise of the Gulf Cooperation...

Microsoft Azure Security Center (IT Best Practices - Microsoft Press)
Microsoft Azure Security Center (IT Best Practices - Microsoft Press)
Welcome to Azure Security Center, Third Edition—a book that was developed together with the Azure Security Center product group to provide in-depth information about Azure Security Center and Azure Defender, to demonstrate best practices based on real-life experience with the product in different environments.
...
Ruling the Root: Internet Governance and the Taming of Cyberspace
Ruling the Root: Internet Governance and the Taming of Cyberspace

In Ruling the Root, Milton Mueller uses the theoretical framework of institutional economics to analyze the global policy and governance problems created by the assignment of Internet domain names and addresses. “The root” is the top of the domain name hierarchy and the Internet address space. It is the only point of...

Computer Viruses For Dummies
Computer Viruses For Dummies

Build up your defenses against online germ warfare

Discover how viruses work and how to outsmart the cyber-thugs who create them

Viruses, worms, and Trojan horses create a serious health problem for your PC, but this handy little book has the antidote! It’ll help you exterminate those nasty bugs and protect your...

Mastering Autodesk Revit MEP 2011 (Autodesk Official Training Guides)
Mastering Autodesk Revit MEP 2011 (Autodesk Official Training Guides)

Master all the core concepts and functionality of Revit MEP

Revit MEP has finally come into its own, and this perfectly paced reference covers all the core concepts and functionality of this fast-growing mechanical, electrical, and plumbing software. The authors collate all their years of experience to develop this...

Guarding Your Business: A Management Approach to Security (Modern Approaches in Geophysics)
Guarding Your Business: A Management Approach to Security (Modern Approaches in Geophysics)

Guarding Your Business outlines the organizational elements that must be in place to protect the information and physical assets of typical businesses and organizations. The book recognizes the need for an architecture integrated within the organizational environment for systematic protection. Such an architecture is offered...

unlimited object storage image
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy