![](https://www.pdfchm.net/pic/empty.gif) |
|
![](https://pic.pdfchm.net/empty.gif) Machine Learning and Robot Perception (Studies in Computational Intelligence)This book presents some of the most recent research results in the area of machine learning and robot perception. The book contains eight chapters.
Relevant progress has been done, within the Robotics field, in mechanical systems, actuators, control and planning. This fact, allows a wide application of industrial robots, where... | ![](https://www.pdfchm.net/pic/empty.gif) | ![](https://pic.pdfchm.net/empty.gif) SIP TrunkingThe first complete guide to planning, evaluating, and implementing high-value SIP trunking solutions
Most large enterprises have switched to IP telephony, and service provider backbone networks have largely converted to VoIP transport. But there’s a... | ![](https://www.pdfchm.net/pic/empty.gif) | ![](https://pic.pdfchm.net/empty.gif) Windows Server 2008 How-ToReal Solutions for Windows Server 2008 Administrators
Need fast, reliable, easy-to-implement solutions for Microsoft Windows Server 2008? This book delivers exactly what you’re looking for. You’ll find tested, step-by-step procedures for... |
|
![](https://pic.pdfchm.net/empty.gif) | ![](https://www.pdfchm.net/pic/empty.gif) | ![](https://pic.pdfchm.net/empty.gif) Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance (2nd Edition)For organizations of all sizes, the Cisco ASA product family offers powerful new tools for maximizing network security. Cisco ASA: All-in-One Firewall, IPS, Anti-X and VPN Adaptive Security Appliance, Second Edition, is Cisco's authoritative practitioner's guide to planning, deploying, managing, and troubleshooting... | ![](https://www.pdfchm.net/pic/empty.gif) | ![](https://pic.pdfchm.net/empty.gif) |
|
|
![](https://pic.pdfchm.net/empty.gif) Pro Entity Framework 4.0 (Expert's Voice in .Net)
Previously, SQL developers have been able to almost entirely ignore the SQLCLR and treat it as a peripheral technology—almost an extension to the main product. With the advent of LINQ and the Entity Framework, this is no longer the case, and the SQLCLR is moving to the center stage. It’s a powerful product but, for many, it is an... | ![](https://www.pdfchm.net/pic/empty.gif) | ![](https://pic.pdfchm.net/empty.gif) Seven Deadliest Web Application Attacks (Syngrass Seven Deadlest Attacks)
Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover... | ![](https://www.pdfchm.net/pic/empty.gif) | ![](https://pic.pdfchm.net/empty.gif) Protecting Games: A Security Handbook for Game Developers and PublishersThis book is intended to infect its readers with an interest and concern for game protection. My goal is not to preach to the ”security converted,” but to convince game designers, developers, programmers, managers, marketeers, and artists that they should care about the security of their games and give them confidence that there are... |
|
Result Page: 142 141 140 139 138 137 136 135 134 133 |