Home | Amazing | Today | Tags | Publishers | Years | Search 
IPTV Security: Protecting High-Value Digital Contents
IPTV Security: Protecting High-Value Digital Contents

Television was one of the inventions that shaped the way society and culture evolved over the second half of the twentieth century. It had the powerful effect of shrinking the world which creating a unified view of how things were. There continues to be an evolution of television and a migration towards a fully interactive and ubiquitous IPTV....

Introduction to Numerical Analysis: Second Edition
Introduction to Numerical Analysis: Second Edition
Well-known, respected introduction, updated to integrate concepts and procedures associated with computers. Computation, approximation, interpolation, numerical differentiation and integration, smoothing of data, other topics in lucid presentation. Includes 150 additional problems in this edition. Bibliography.

This volume is intended to
...
Classical And Quantum Dissipative Systems
Classical And Quantum Dissipative Systems
This book discusses issues associated with the quantum mechanical formulation of dissipative systems. It begins with an introductory review of phenomenological damping forces, and the construction of the Lagrangian and Hamiltonian for the damped motion. It is shown, in addition to these methods, that classical dissipative forces can also be derived...
Absolute Beginner's Guide to Corel WordPerfect 10
Absolute Beginner's Guide to Corel WordPerfect 10
In recent news, Corel announced that HP, the world's largest PC manufacturer, Dell, the second-largest, and Sony have all agreed to preinstall WordPerfect 10 and Quattro Pro 10 on some of their computer lines. Cost differential between Microsoft's Office and Works Suites, as well as Microsoft's Office licensing terms is helping fuel the trend to...
Multimedia Forensics and Security
Multimedia Forensics and Security
As information technology is rapidly progressing, an enormous amount of media can be easily exchanged through Internet and other communication networks. Increasing amounts of digital image, video, and music have created numerous information security issues and is now taken as one of the top research and development agendas for researchers,...
Essential CG Lighting Techniques with 3ds Max, Second Edition (Focal Press Visual Effects and Animation)
Essential CG Lighting Techniques with 3ds Max, Second Edition (Focal Press Visual Effects and Animation)

Lighting is the one thing that makes or breaks any CG environment. This inspirational book and DVD give you everything you need to create convincing CG lightin; from the concepts and theoretical aspects to the techniques and tricks that are essential in a production environment. The stunning color illustrations throughout the book illustrate...

The Verilog PLI Handbook: A User's Guide  and Comprehensive Reference on the Verilog Programming Language Interface
The Verilog PLI Handbook: A User's Guide and Comprehensive Reference on the Verilog Programming Language Interface
The Verilog Programming Language Interface is a powerful feature of the Verilog standard. Through this interface, a Verilog simulator can be customized to perform virtually any engineering task desired, such as adding custom design debug utilities, adding proprietary file read/write utilities, and interfacing bus functional C language models to a...
Elementary Number Theory with Applications, Second Edition
Elementary Number Theory with Applications, Second Edition
or over two thousand years, number theory has fascinated and inspired both Famateurs and mathematicians alike. A sound and fundamental body of knowledge, it has been developed by the untiring pursuits of mathematicians all over the world. Today, number theorists continue to develop some of the most sophisticated mathematical tools ever devised and...
Engineering Optics With Matlab
Engineering Optics With Matlab

This invaluable textbook serves two purposes. The first is to introduce some traditional topics such as matrix formalism of geometrical optics, wave propagation and diffraction, and some fundamental background on fourier optics. The second is to present the essentials of acousto-optics and electro-optics, and provide the students with...

Humane Interfaces (Human Factors in Information Technology)
Humane Interfaces (Human Factors in Information Technology)
Ever since the first successful International Cognitive Technology (CT) Conference in Hong Kong in August 1995, a growing concern about the dehumanising potential of machines, and the machining potential of the human mind, has pervaded the organisers' thinking. When setting up the agenda for the Second International CT Conference in Aizu, Japan, in...
Installing and Administering Linux, Second Edition
Installing and Administering Linux, Second Edition
An indispensable working resource for IT professionals moving to Linux-based network systems

More and more companies are now using Linux as their server operating system of choice. That’s because the costs are lower, there’s a greater amount of flexibility, and the code is much more reliable. As a result, there is a bigger demand...

Crypto Anarchy, Cyberstates, and Pirate Utopias
Crypto Anarchy, Cyberstates, and Pirate Utopias

In Crypto Anarchy, Cyberstates, and Pirate Utopias, Peter Ludlow extends the approach he used so successfully in High Noon on the Electronic Frontier, offering a collection of writings that reflects the eclectic nature of the online world, as well as its tremendous energy and creativity. This time the subject is the emergence...

Result Page: 303 302 301 300 299 298 297 296 295 294 293 292 291 290 289 288 287 286 285 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy