 |
|
|
|
 Machine Learning and Robot Perception (Studies in Computational Intelligence)This book presents some of the most recent research results in the area of machine learning and robot perception. The book contains eight chapters.
Relevant progress has been done, within the Robotics field, in mechanical systems, actuators, control and planning. This fact, allows a wide application of industrial robots, where... |  |  CCIE Self-Study: CCIE Security Exam Certification Guide, Second EditionThe Cisco authorized self-study test preparation guide for CCIE Security 2.0 350-018 written exam The only official, Cisco endorsed study guide for the CCIE Security 2.0 written exam Includes best-of-breed self-assessment series features, including a CD-ROM test engine, "Do I Know This Already?" quizzes, topic lists/foundation... |  |  Programming Microsoft SQL Server 2000 with Microsoft Visual Basic .NETLearn how to turn data into solutions with SQL Server 2000, Visual Basic .NET, and XML. Get a fundamental grasp of SQL Server 2000 data access, data manipulation, and data definition T-SQL programming techniques, Visual Basic .NET language enhancements, Microsoft Visual Studio .NET integrated development environment advances, and the... |
|
 Professional Java, JDK 5 EditionJava continues to be the dominant language for building server applications, and the latest update to the Java platform—JDK 5—boasts many new features, including a metadata facility, generics, autoboxing, and improved user interface performance. Building upon Ivor Horton's Beginning Java, this book provides insight into these... |  |  |  |  Master Your Mac: Simple Ways to Tweak, Customize, and Secure OS X
OS X is a lot more than just a pretty face. Sure, the basics are easy, but beneath that gorgeous surface lie countless powerful features.
If you want to go beyond the basics, Master Your Mac will take you there. With tips on everything from organizing your workspace to strengthening your computer's security,... |
|
|
 Wireless Networks and Security: Issues, Challenges and Research Trends (Signals and Communication Technology)
“Wireless Networks and Security” provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in... |  |  PHP Essentials, Second EditionPHP Essentials will allow you to quickly use the power of PHP to develop successful, dynamic Web sites.
Learn Faster
- Start with PHP basics like parsing, working with arrays, and displaying dynamic content
- Use PHP to plan and display an e-commerce product catalog and to ensure safe and secure...
|  |  Skype Hacks: Tips & Tools for Cheap, Fun, Innovative Phone ServiceIf you've heard about Skype--and who hasn't with all the recent media attention devoted to internet telephone services--chances are you've been mighty tempted to try it out. Skype Hacks tells you what all the Skype hype is about, explains the basics, and shows you more than 100 clever tips and... |
|
|
Result Page: 142 141 140 139 138 137 136 135 134 133 |