 |
|
|
|
 Computer and Machine Vision, Fourth Edition: Theory, Algorithms, Practicalities
Computer and Machine Vision: Theory, Algorithms, Practicalities (previously entitled Machine Vision) clearly and systematically presents the basic methodology of computer and machine vision, covering the essential elements of the theory while emphasizing algorithmic and practical design constraints. This fully revised fourth edition has... |  |  Windows 8 Secrets
Tips, tricks, treats, and secrets revealed on Windows 8
Microsoft is introducing a major new release of its Windows operating system, Windows 8, and what better way for you to learn all the ins and outs than from two internationally recognized Windows experts and Microsoft insiders, authors Paul Thurrott and Rafael... |  |  Jitter, Noise, and Signal Integrity at High-Speed
State-of-the-art JNB and SI Problem-Solving: Theory, Analysis, Methods, and Applications
Jitter, noise, and bit error (JNB) and signal integrity (SI) have become today‘s greatest challenges in high-speed digital design. Now, there’s a... |
|
 Municipal Solid Waste Incinerator Residues (Studies in Environmental Science)
The International Ash Working Group (IAWG) was established in 1989 to conduct an
in-depth review of the existing scientific data and develop a state-of-knowledge treatise
on MSW incinerator residue characterisation, disposal, treatment and utilisation. The
topics of operator and worker health and safety, and health risk assessment... |  |  Information Security For The Little Guy
Being secure in an insecure world is a tough nut to crack. There are so
many ways that our personal information can be stolen and duplicated
today it is a very serious situation and should be taken very seriously.
From our surfing the Internet to just the simplicity of speaking on a
cell phone to our friends can... |  |  Virtualization Security: Protecting Virtualized Environments
Securing virtual environments for VMware, Citrix, and Microsoft hypervisors
Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and deployment life cycles. What's more, the technologies, best practices,... |
|
| Result Page: 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 |