Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer-Aided Intelligent Recognition Techniques and Applications
Computer-Aided Intelligent Recognition Techniques and Applications
Intelligent recognition methods have recently proven to be indispensable in a variety of modern industries, including computer vision, robotics, medical imaging, visualization and the media. Furthermore, they play a critical role in the traditional fields such as character recognition, natural language processing and personal identification.

...

Security Sage's Guide to Hardening the Network Infrastructure
Security Sage's Guide to Hardening the Network Infrastructure
With the proliferation of wireless access points (WAPs), virtual private networks
(VPNs), and extranets, it’s becoming increasingly difficult to determine where
your network begins and ends. Add this complexity to common economic factors,
such as company mergers and acquisitions, and now you have a tangled web
of
...
Linux on IBM eserver zSeries and S/390: Best Security Practices
Linux on IBM eserver zSeries and S/390: Best Security Practices
This IBM® Redbook discusses best security practices for running Linux as a z/VM® guest on IBM Eserver® zSeries® and S/390® machines. This publication is intended for system administrators and IT architects responsible for deploying secure Linux servers running under z/VM. We consider both z/VM and Linux security topics.
...
Spring in Action
Spring in Action
Written for enterprise Java developers who have become disillusioned with the complexity and bulk involved with EJB development, this programming tool demonstrates how the Spring framework can make coupled code easy to manage, understand, reuse, and unit-test. Spring's employment of inversion control and aspect-oriented programming techniques...
Space Division Multiple Access for Wireless Local Area Networks (Engineering and Computer Science)
Space Division Multiple Access for Wireless Local Area Networks (Engineering and Computer Science)
The tendency towards more mobility and flexibility favors wireless networks for future broadband services, especially in local area and residential networks. Two major challenges in developing such high data-rate wireless networks are the channel distortion caused by multipath propagation and the limitations on bandwidth usage. In this book,...
Web Services in the Enterprise: Concepts, Standards, Solutions, and Management (Network and Systems Management)
Web Services in the Enterprise: Concepts, Standards, Solutions, and Management (Network and Systems Management)
The emergence of Web services is transforming traditional enterprises. However, the industry hype surrounding these technologies obscures the understanding of their impact and implications to enterprises.

Here the authors take the "big picture" perspective, offering a thorough understanding of the concepts behind Web service...

MCSE Windows 2000 Active Directory Services Infrastructure Exam Cram 2 (Exam 70-217)
MCSE Windows 2000 Active Directory Services Infrastructure Exam Cram 2 (Exam 70-217)
MCSE Windows 2000 Active Directory Services Infrastructure Exam Cram 2 (Exam 70-217) is the perfect study guide to help you pass one of the four core exams in Microsoft's Windows 2000 certification program. This certification exam measures the ability to install, configure, and troubleshoot the Windows 2000 Active Directory components, DNS for...
Security in an IPv6 Environment
Security in an IPv6 Environment
As the number of intelligent systems that require direct access expands to the multiple billions, Internet Protocol Version 6 (IPv6) becomes an institutional imperative. However, questions are being raised about security aspects and subtending apparatuses of IPv6. This book provides a practical and accessible primer on this emerging technology. The...
Web 2.0 Architectures: What entrepreneurs and information architects need to know
Web 2.0 Architectures: What entrepreneurs and information architects need to know

Web 2.0 is more pervasive than ever, with business analysts and technologists struggling to comprehend the opportunity it represents. But what exactly is Web 2.0 -- a marketing term or technical reality? This fascinating book finally puts substance behind the phenomenon by identifying the core patterns of Web 2.0, and by introducing an...

Microsoft SQL Server 2008 Administration with Windows PowerShell (Wrox Programmer to Programmer)
Microsoft SQL Server 2008 Administration with Windows PowerShell (Wrox Programmer to Programmer)

Secure, reliable, and scalable, SQL Server 2008 delivers a dynamic, smart, and productive data platform for all your data-related needs and offers many new features that will change how you administer a database server. Among these new features is the ability to use Windows PowerShell 2.0 scripts to automate and manage various aspects of the...

Advances in Mobile Robotics: Proceedings of the Eleventh International Conference on Climbing and Walking Robots and the Support Technologies
Advances in Mobile Robotics: Proceedings of the Eleventh International Conference on Climbing and Walking Robots and the Support Technologies
This book provides state-of-the-art scientific and engineering research findings and developments in the area of mobile robotics and associated support technologies. It contains peer-reviewed articles presented at the CLAWAR 2008 conference. Robots are no longer confined to industrial manufacturing environments; rather, a great deal of interest is...
Communications Satellites: Global Change Agents (Telecommunications Series)
Communications Satellites: Global Change Agents (Telecommunications Series)

Over the past 40 years, satellites have played a key role in creating a global culture, spreading worldwide entertainment, stimulating technological interchange, and promoting trade around the world. Communications Satellites: Global Change Agents addresses communications satellites not only in terms of the technology and the services...

unlimited object storage image
Result Page: 389 388 387 386 385 384 383 382 381 380 379 378 377 376 375 374 373 372 371 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy