Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Multispectral Image Analysis Using the Object-Oriented Paradigm
Multispectral Image Analysis Using the Object-Oriented Paradigm
Bringing a fresh new perspective to remote sensing, object-based image analysis is a paradigm shift from the traditional pixel-based approach. Featuring various practical examples to provide understanding of this new modus operandi, Multispectral Image Analysis Using the Object-Oriented Paradigm reviews the current image analysis methods and...
An Introduction To The Theory Of Spatial Object Modelling For GIS (Research Monographs in GIS)
An Introduction To The Theory Of Spatial Object Modelling For GIS (Research Monographs in GIS)

In 1983 I left the International Institute for Aerospace Survey and Earth Sciences (ITC) and went to Wageningen Agricultural University, where I took the chair of “Land Surveying and Teledetection”. Up to that time I had been active mainly in geodesy and photogrammetry, but at Wageningen it soon became...

Learning Apache Karaf
Learning Apache Karaf

Develop and deploy applications using the OSGi-based runtime container, Apache Karaf

Overview

  • Understand Apache Karaf's commands and control capabilities
  • Gain familiarity with its provisioning features
  • Explore various application deployments targets experientially
  • ...
RestKit for iOS
RestKit for iOS

Link your apps and web services using RestKit

Overview

  • A step-by-step guide that goes beyond theory and into practice
  • Learn how to overcome hurdles that might pop up along the way when using RestKit
  • Learn how to integrate new frameworks into an existing app

...

Secrets of the iPod
Secrets of the iPod
Everyone loves the iPod (though for a lot of us it's a fairly abstract love, given the gizmo's sticker price). In Secrets of the iPod, Christopher Breen--you may know him from TechTV--does a brain-dump on the latest version of the iPod. His coverage is complete, easy to read, and clearly reflects the personal experience of a man who likes...
The International Handbook of Computer Security
The International Handbook of Computer Security
This book is a one-stop resource to help executives and computer professionals protect their systems and data from a myriad of internal and external threats. Addressing a wide range of security issues, it provides practical guidance on topics such as: physical security procedures * data preservation and protection * hardware and software protection...
Robot Builder's Bonanza (Tab Electronics)
Robot Builder's Bonanza (Tab Electronics)
Library Journal : The author of The Robot Builder's Sourcebook ... offers a series of easy-to-do projects ranging from adapting common toys to walking robots to giving your robot sound capabilities. He includes new information on LEGO(R) Mindstorms(tm), microcontrollers, robotics programming, and other technological developments....
Windows Server 2008 Unleashed
Windows Server 2008 Unleashed
Windows Server 2008 Unleashed covers the planning, design, prototype testing, implementation, migration, administration, and support of a Windows 2008 and Active Directory environment, based on more than three and a half years of early adopter experience in full production environments. This book addresses not only what is new with Windows...
OpenVPN 2 Cookbook
OpenVPN 2 Cookbook

OpenVPN is one of the world's most popular packages for setting up a Virtual Private Network (VPN). OpenVPN provides an extensible VPN framework which has been designed to ease site-specific customization, such as providing the capability to distribute a customized installation package to clients, or supporting alternative authentication...

Maven: A Developer's Notebook
Maven: A Developer's Notebook

Maven is a new project management and comprehension tool which provides an elegant way to share build logic across projects. In terms of capabilities, Maven is an improvement to Apache Ant-thanks to numerous plug-ins and built-in integration with unit testing frameworks such as JUnit. Tired of writing the same build logic for...

Building Secure Wireless Networks with 802.11
Building Secure Wireless Networks with 802.11
An implementer’s guide to setting up, configuring, and managing a secure wireless network

Whether you’re creating wireless networks for the home, small office, or enterprise, this innovative book presents a step-by-step approach to successfully building a wireless LAN that meets all of your security needs. Beginning with a...

Router Security Strategies: Securing IP Network Traffic Planes (Networking Technology: Security)
Router Security Strategies: Securing IP Network Traffic Planes (Networking Technology: Security)
Router Security Strategies: Securing IP Network Traffic Planes provides a compre-hensive approach to understand and implement IP traffic plane separation and protection on IP routers. This book details the distinct traffic planes of IP networks and the advanced techniques necessary to operationally secure them. This includes the data,...
unlimited object storage image
Result Page: 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy