Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Introduction to Biometrics
Introduction to Biometrics
A number of crucial societal applications like international border crossing, electronic commerce, and welfare disbursement require reliable person recognition systems. Traditional person authentication methods based on passwords and identity documents often fail to meet the stringent security and performance demands of these...
Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Surface Acoustic Wave Devices and Their Signal Processing Applications
Surface Acoustic Wave Devices and Their Signal Processing Applications
The suggestion for writing this book came from my long-time friend, Professor Colin diCenzo, FIEEE, to whom I owe many thanks for his encouragement. The outline of the book was started many years ago, as a somewhat sparse series o f lecture notes that I used in support of an electrical engineering graduate course at McMaster...
Logic Pro X For Dummies (For Dummies (Computer/Tech))
Logic Pro X For Dummies (For Dummies (Computer/Tech))

Crank your sound up to X with Apple's premier recording software and Logic Pro X For Dummies!

Apple's Logic Pro X levels the playing field, making high-quality studio recordings accessible for any musician. It's a professional-level tool with a user-friendly interface and loads of new features to keep you...

Submarine Mass Movements and their Consequences: 7th International Symposium
Submarine Mass Movements and their Consequences: 7th International Symposium

This book is a comprehensive collection of state-of-the-art studies of seafloor slope instability and their societal implications. The volume captures the most recent and exciting scientific progress made in this research field.

As the world’s climate and energy needs change, the conditions under which slope instability...

Younger Next Year: The Exercise Program: Use the Power of Exercise to Reverse Aging and Stay Strong, Fit, and Sexy
Younger Next Year: The Exercise Program: Use the Power of Exercise to Reverse Aging and Stay Strong, Fit, and Sexy
The definitive exercise book that the one-million-plus readers of the Younger Next Year® series have been waiting for—and the exercise book that takes the intimidation out of starting a workout routine. Based on the science that shows how we can turn back our biological clocks by a combination of aerobics and strength fitness,...
Agglomeration in Metallurgy (Topics in Mining, Metallurgy and Materials Engineering)
Agglomeration in Metallurgy (Topics in Mining, Metallurgy and Materials Engineering)
This book gives details on the processes of agglomeration and its role in modern metal production processes. It starts with a chapter on sinter production, also discussing the quality of sinter and environmental aspects involved on the process. The following chapters focus on pellet production and briquetting of natural and anthropogenic raw...
Computational Aesthetics (SpringerBriefs in Applied Sciences and Technology)
Computational Aesthetics (SpringerBriefs in Applied Sciences and Technology)
The essence of natural computing is aesthetics; for example, in cooking, one of the most common forms of natural computation, the decision to add salt, and how much, is based on the aesthetics of taste. Because touch perception is instinctively related to a sense of beauty, the aesthetics of tactile sense are considered as algorithms by using...
The Mythical Man-Month: Essays on Software Engineering, 20th  Anniversary Edition
The Mythical Man-Month: Essays on Software Engineering, 20th Anniversary Edition
The classic book on the human elements of software engineering. Software tools and development environments may have changed in the 21 years since the first edition of this book, but the peculiarly nonlinear economies of scale in collaborative work and the nature of individuals and groups has not changed an epsilon. If you write code or...
Aggressive Network Self-Defense
Aggressive Network Self-Defense
I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
  • Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
  • Follow the travails of eight system administrators who take cyber law into their own hands.
  • ...
Schaum's Outline of Electric Circuits
Schaum's Outline of Electric Circuits
Students love Schaum's Outlines because they produce results. Each year, hundreds of thousands of students improve their test scores and final grades with these indispensable study guides.

Get the edge on your classmates. Use Schaum's!

If you don't have a lot of time but want to excel in class, this book helps you:

...
Mobile Commerce Application Development
Mobile Commerce Application Development
The explosive growth in the demand for mobile and wireless products and services, from both businesses and consumers in the recent years, indicates that mobile commerce is starting to take off. As more and more companies begin to realize the compelling value offered by mobile and wireless technologies and start to explore mobile business...
Result Page: 405 404 403 402 401 400 399 398 397 396 395 394 393 392 391 390 389 388 387 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy