Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
C++ How to Program (8th Edition)
C++ How to Program (8th Edition)

Welcome to the C++ computer programming language and C++ How to Program, Eighth Edition! This book presents leading-edge computing technologies, and is particularly appropriate for inroductory course sequences based on the curriculum recommendations of two key professional organizations—the ACM and the IEEE.

The new...

C+ + for Programmers (Deitel Developer Series)
C+ + for Programmers (Deitel Developer Series)
The professional programmer’s DEITEL® guide to C++ and object-oriented application development

Written for programmers with a background in high-level language programming, this book applies the Deitel signature live-code approach to teaching programming and explores the C++ language and C++ Standard
...
Biometric Image Discrimination Technologies (Computational Intelligence and Its Applications Series)
Biometric Image Discrimination Technologies (Computational Intelligence and Its Applications Series)
Personal identification and verification both play a critical role in our society.
Today, more and more business activities and work practices are computerized. Ecommerce
applications, such as e-banking, or security applications, such as building
access, demand fast, real-time and accurate personal identification. Traditional
...
Machine Vision : Theory, Algorithms, Practicalities
Machine Vision : Theory, Algorithms, Practicalities
In the last 40 years, machine vision has evolved into a mature field embracing a wide range of applications including surveillance, automated inspection, robot assembly, vehicle guidance, traffic monitoring and control, signature verification, biometric measurement, and analysis of remotely sensed images. While researchers and industry specialists...
Pattern Recognition Technologies and Applications: Recent Advances (Premier Reference Source)
Pattern Recognition Technologies and Applications: Recent Advances (Premier Reference Source)
The nature of handwriting in our society has significantly altered over the ages due to the introduction of new technologies such as computers and the World Wide Web. With increases in the amount of signature verification needs, state of the art internet and paper-based automated recognition methods are necessary.

Pattern Recognition...

Visual Basic .NET Power Tools
Visual Basic .NET Power Tools

We can ask heretical questions such as why OOP should be used in all programming situations as many of its proponents insist. We can question the wisdom of allowing C programmers to write the narratives and code examples for the Help system in VB.NET. We can wonder why structures are included in VB.NET if OOP experts insist that you should...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Advanced Nutrition and Human Metabolism
Advanced Nutrition and Human Metabolism

Current, comprehensive, and designed to maximize clarity of the concepts you need to know, longtime best seller ADVANCED NUTRITION AND HUMAN METABOLISM, SIXTH EDITION delivers its signature quality content in a student-friendly presentation. This text is accessible, with relevant examples, illustrations, applications, tables, and figures to...

J2EE Security for Servlets, EJBs, and Web Services
J2EE Security for Servlets, EJBs, and Web Services

J2EE developers have an extraordinary array of powerful options for securing their Web services, Web applications, EJB components and RMI objects. Now, expert Java architect Pankaj Kumar helps developers make sense of Java's increasingly rich security APIs, tools, patterns, and best practices-showing how to use each of them in the right place,...

The Compatibility Gene: How Our Bodies Fight Disease, Attract Others, and Define Our Selves
The Compatibility Gene: How Our Bodies Fight Disease, Attract Others, and Define Our Selves

This is the story of a few human genes and how we discovered what these genes do. We each have around 25,000 genes, but the genes in this story are those that vary the most from person to person. These genes--called compatibility genes--are, in effect, a molecular signature that distinguishes each of us as individuals. Davis tells the...

Serial Violence: Analysis of Modus Operandi and Signature Characteristics of Killers
Serial Violence: Analysis of Modus Operandi and Signature Characteristics of Killers
Written by renowned experts Bob Keppel and William Birnes, this book focuses on analyzing crimes of violence to unveil common characteristics that might prove useful in the successful identification, apprehension, and conviction of murderers. It details the historical origins of modus operandi as an investigative tool and discusses modern...
Network Infrastructure Security
Network Infrastructure Security
Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure...
unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy