Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Blind Image Deconvolution: Theory and Applications
Blind Image Deconvolution: Theory and Applications
Blind image deconvolution is constantly receiving increasing attention from the academic as well the industrial world due to both its theoretical and practical implications. The field of blind image deconvolution has several applications in different areas such as image restoration, microscopy, medical imaging, biological imaging, remote sensing,...
Universe (Britannica Illustrated Science Library)
Universe (Britannica Illustrated Science Library)

There was a time when people believed that the stars were bonfires lit by other tribes in the sky, that the universe was a flat plate resting on the shell of a giant turtle, and that the Earth, according to the Greek astronomer Ptolemy, was at the center of the universe. From the most remote of times, people have been curious...

Peer-To-Peer Storage: Security and Protocols (Computer Science, Technology and Applications)
Peer-To-Peer Storage: Security and Protocols (Computer Science, Technology and Applications)
Peer-to-peer (P2P) has proven as a most successful way to produce large scale, reliable, and cost-effective applications, as illustrated for file sharing or VoIP. P2P storage is an emerging field of application which allows peers to collectively leverage their resources towards ensuring the reliability and availability of user...
PC Magazine Windows XP Security Solutions
PC Magazine Windows XP Security Solutions
Think you're safe?

Guess what?

Studies have estimated that up to 90 percent of computers are infected by some security threat or another. There's a good chance yours is among them, but any computer can be easily secured to a high level-if you know what you're doing.

They're out there. Trust PC Magazine to...

Practical MythTV: Building a PVR and Media Center PC
Practical MythTV: Building a PVR and Media Center PC
MythTV is a powerful open source personal video recorder (PVR) application that runs on Linux. Developed for several years by volunteers, it offers a stable and extensible platform for automating all of the things you would expect from a PVR, and much more.

Practical MythTV: Building a PVR and Media Center PC takes a project-based...

IBM Xseries 455 Planning And Installation Guide
IBM Xseries 455 Planning And Installation Guide
The IBM eServer xSeries 455 is the second-generation Enterprise X-Architecture server using the 64-bit IBM XA-64 chipset and the Intel Itanium 2 processor. Unlike the x450, its predecessor, the x455 supports the merging of four server chassis to form a single 16-way image, providing even greater expandability and investment protection.
...
The Tunguska Fireball: Solving One of the Great Mysteries of the 20th Century
The Tunguska Fireball: Solving One of the Great Mysteries of the 20th Century
On 30th June 1908 a mysterious fireball exploded in the Siberian sky and flattened 2000 square kilometres of the remote Tunguska forest. As no crater and no material from outer space were ever found, a meteorite could not have caused this explosion. so what did? This book discusses all theories and then analyses the evidence.

The
...
Windows Server 2008 How-To
Windows Server 2008 How-To

Real Solutions for Windows Server 2008 Administrators

 

Need fast, reliable, easy-to-implement solutions for Microsoft Windows Server 2008? This book delivers exactly what you’re looking for. You’ll find tested, step-by-step procedures for...

MCSA/MCSE Self-Paced Training Kit (Exam 70-291)
MCSA/MCSE Self-Paced Training Kit (Exam 70-291)

Welcome to MCSA/MCSE Self−Paced Training Kit (Exam 70−291): Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure, Second Edition. This book prepares you for the 70-291 exam by teaching you how to configure, manage, and troubleshoot various aspects of a Microsoft Windows Server 2003 Service...

ModSecurity Handbook
ModSecurity Handbook

ModSecurity Handbook is the definitive guide to ModSecurity, a popular open source web application firewall. Written by Ivan Ristic, who designed and wrote much of ModSecurity, this book will teach you everything you need to know to monitor the activity on your web sites and protect them from attack. Situated between your web sites and the...

CCSP CSVPN Exam Cram 2 (Exam Cram 642-511)
CCSP CSVPN Exam Cram 2 (Exam Cram 642-511)

The Exam Cram method of study focuses on exactly what you need to get certified now.

In this book you'll learn how to:

  • Develop a solid foundation of VPN technologies and apply them to Cisco's VPN hardware and software...

PHP and PostgreSQL Advanced Web Programming
PHP and PostgreSQL Advanced Web Programming
Sams' PHP and MySQL Web Development, by Luke Welling and Laura Thomson, showed that there is a strong demand for books that describe how to use PHP together with a specific open-source database to develop Web applications.

While MySQL is very popular, PostgreSQL is widely considered to be the more powerful of the two open-source databases. And...

unlimited object storage image
Result Page: 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy