Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
OAuth 2.0 Identity and Access Management Patterns
OAuth 2.0 Identity and Access Management Patterns

Want to learn the world’s most widely used authorization framework? This tutorial will have you implementing secure Oauth 2.0 grant flows without delay. Written for practical application and clear instruction, it’s the complete guide.

Overview

  • Build web, client-side, desktop, and server-side...
Accounting for beginners
Accounting for beginners

Basic accounting skills are necessary tools when dealing with finances. Understanding the basic concepts and methods used in accounting is critical for developing organizational skills. This e-Book will help guide you into this fascinating...

Numerical Methods for Image Registration (Numerical Mathematics and Scientific Computation)
Numerical Methods for Image Registration (Numerical Mathematics and Scientific Computation)

Based on the author's lecture notes and research, this well-illustrated and comprehensive text is one of the first to provide an introduction to image registration with particular emphasis on numerical methods in medical imaging. Ideal for researchers in industry and academia, it is also a suitable study guide for graduate mathematicians,...

Advanced Image Processing in Magnetic Resonance Imaging (Signal Processing and Communications)
Advanced Image Processing in Magnetic Resonance Imaging (Signal Processing and Communications)
Magnetic Resonance (MR) imaging produces images of the human tissues in a noninvasive manner, revealing the structure, metabolism, and function of tissues and organs. The impact of this image technique in diagnostic radiology is impressive, due to its versatility and flexibility in joining high-quality anatomical images with functional...
Moments and Moment Invariants in Pattern Recognition
Moments and Moment Invariants in Pattern Recognition

Automatic object recognition has become an established discipline in image analysis. Moments and moment invariants play a very important role as features in invariant recognition. They were introduced to the pattern recognition community almost 50 years ago and the mathematical background they utilized is even older, originating from the...

Guide to Computational Geometry Processing: Foundations, Algorithms, and Methods
Guide to Computational Geometry Processing: Foundations, Algorithms, and Methods

This book reviews the algorithms for processing geometric data, with a practical focus on important techniques not covered by traditional courses on computer vision and computer graphics. Features: presents an overview of the underlying mathematical theory, covering vector spaces, metric space, affine spaces, differential geometry, and finite...

Image Processing Based on Partial Differential Equations: Proceedings of the International Conference
Image Processing Based on Partial Differential Equations: Proceedings of the International Conference
The book contains twenty-two original scientific research articles that address the state-of-the-art in using partial differential equations for image and signal processing. The articles arose from presentations given at the international conference on PDE-Based Image Processing and Related Inverse Problems, held at the Centre of Mathematics for...
Blockchain: Blueprint for a New Economy
Blockchain: Blueprint for a New Economy

Bitcoin is starting to come into its own as a digital currency, but the blockchain technology behind it could prove to be much more significant. This book takes you beyond the currency ("Blockchain 1.0") and smart contracts ("Blockchain 2.0") to demonstrate how the blockchain is in position to become the fifth...

Thermodynamics DeMYSTiFied
Thermodynamics DeMYSTiFied
This book is intended to accompany a text used in the first course in thermodynamics that is required in all mechanical engineering departments, as well as several other departments. It provides a succinct presentation of the material so that the students more easily understand the more difficult concepts. Many thermodynamics texts are over 900...
Building Solutions with Microsoft Commerce Server 2002
Building Solutions with Microsoft Commerce Server 2002

No matter what your organization sells, a well-executed commerce solution can extend your business globally, boost profitability, and help you seize new opportunities faster. Drawing from their extensive, in-the-field experience, online business experts Clayton Peddy and Derek Armentrout teach you to quickly build and deploy a scalable,...

Human Ear Recognition by Computer (Advances in Pattern Recognition)
Human Ear Recognition by Computer (Advances in Pattern Recognition)

Biometrics deals with recognition of individuals based on their physiological or behavioral characteristics. The human ear is a new feature in biometrics that has several merits over the more common face, fingerprint and iris biometrics. Unlike the fingerprint and iris, it can be easily captured from a distance without a fully cooperative...

Protecting Your Mobile App IP: The Mini Missing Manual
Protecting Your Mobile App IP: The Mini Missing Manual

Learn four cost-effective ways to protect the applications you develop for mobile devices. The methods described in this Mini Missing Manual won't stop people from misappropriating your secrets, stealing your name, and copying your code. But if any of those things do...

Result Page: 10 9 8 7 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy