Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced Image Processing in Magnetic Resonance Imaging (Signal Processing and Communications)
Advanced Image Processing in Magnetic Resonance Imaging (Signal Processing and Communications)
Magnetic Resonance (MR) imaging produces images of the human tissues in a noninvasive manner, revealing the structure, metabolism, and function of tissues and organs. The impact of this image technique in diagnostic radiology is impressive, due to its versatility and flexibility in joining high-quality anatomical images with functional...
OAuth 2.0 Identity and Access Management Patterns
OAuth 2.0 Identity and Access Management Patterns

Want to learn the world’s most widely used authorization framework? This tutorial will have you implementing secure Oauth 2.0 grant flows without delay. Written for practical application and clear instruction, it’s the complete guide.

Overview

  • Build web, client-side, desktop, and server-side...
Guide to Computational Geometry Processing: Foundations, Algorithms, and Methods
Guide to Computational Geometry Processing: Foundations, Algorithms, and Methods

This book reviews the algorithms for processing geometric data, with a practical focus on important techniques not covered by traditional courses on computer vision and computer graphics. Features: presents an overview of the underlying mathematical theory, covering vector spaces, metric space, affine spaces, differential geometry, and finite...

Remote Sensing (SpringerBriefs in Space Development)
Remote Sensing (SpringerBriefs in Space Development)

Remote Sensing provides information on how remote sensing relates to the natural resources inventory, management, and monitoring, as well as environmental concerns. It explains the role of this new technology in current global challenges. "Remote Sensing" will discuss remotely sensed data application payloads and...

Blockchain: Blueprint for a New Economy
Blockchain: Blueprint for a New Economy

Bitcoin is starting to come into its own as a digital currency, but the blockchain technology behind it could prove to be much more significant. This book takes you beyond the currency ("Blockchain 1.0") and smart contracts ("Blockchain 2.0") to demonstrate how the blockchain is in position to become the fifth...

Sams Teach Yourself Django in 24 Hours
Sams Teach Yourself Django in 24 Hours
In just 24 lessons of one hour or less, you will be able to build full-featured production websites using Django, the powerful web development framework based on Python.

 

Designed for experienced website developers who have at least some familiarity with the Python programming language,...

Computer Vision-Guided Virtual Craniofacial Surgery: A Graph-Theoretic and Statistical Perspective
Computer Vision-Guided Virtual Craniofacial Surgery: A Graph-Theoretic and Statistical Perspective
The monograph deals with an important application of computer vision and pattern recognition in the area of medical science, more specifically reconstructive craniofacial surgery. Craniofacial fractures are encountered very frequently in today’s fastpaced society; the major causes being gunshot wounds, motor vehicle...
Building Solutions with Microsoft Commerce Server 2002
Building Solutions with Microsoft Commerce Server 2002

No matter what your organization sells, a well-executed commerce solution can extend your business globally, boost profitability, and help you seize new opportunities faster. Drawing from their extensive, in-the-field experience, online business experts Clayton Peddy and Derek Armentrout teach you to quickly build and deploy a scalable,...

Human Ear Recognition by Computer (Advances in Pattern Recognition)
Human Ear Recognition by Computer (Advances in Pattern Recognition)

Biometrics deals with recognition of individuals based on their physiological or behavioral characteristics. The human ear is a new feature in biometrics that has several merits over the more common face, fingerprint and iris biometrics. Unlike the fingerprint and iris, it can be easily captured from a distance without a fully cooperative...

Protecting Your Mobile App IP: The Mini Missing Manual
Protecting Your Mobile App IP: The Mini Missing Manual

Learn four cost-effective ways to protect the applications you develop for mobile devices. The methods described in this Mini Missing Manual won't stop people from misappropriating your secrets, stealing your name, and copying your code. But if any of those things do...

JBoss RichFaces 3.3
JBoss RichFaces 3.3
JBoss RichFaces is a rich component library for JavaServer Faces and an AJAX framework that allows easy integration of AJAX capabilities into complex business applications. Do you wish to eliminate the time involved in writing JavaScript code and managing JavaScript-compatibility between browsers to build an AJAX web application quickly?
...
A+ Certification Study Guide, Fifth Edition (Certification Press)
A+ Certification Study Guide, Fifth Edition (Certification Press)
Get the book that shows you not only what--but how--to study
  • 100% complete coverage of all official objectives for the A+ Core Hardware and Operating System Technologies exams
  • Exam Readiness checklist at the front of the book--you're ready for the exam when...
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy