Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Digital Image Forensics: There is More to a Picture than Meets the Eye
Digital Image Forensics: There is More to a Picture than Meets the Eye

Photographic imagery has come a long way from the pinhole cameras of the nineteenth century. Digital imagery, and its applications, develops in tandem with contemporary society’s sophisticated literacy of this subtle medium. This book examines the ways in which digital images have become ever more ubiquitous as legal and medical...

The Object Primer: Agile Model-Driven Development with UML 2.0
The Object Primer: Agile Model-Driven Development with UML 2.0
Completely up-to-date, with all modeling notation rewritten in the just-released UML 2.0, this is the perfect book for any software development professional or student seeking an introduction to the concepts and terminology of object technology.

Scott Ambler, award-winning author of Building Object Applications that Work, Process...

Algorithms and Data Structures: The Basic Toolbox
Algorithms and Data Structures: The Basic Toolbox
Algorithms are at the heart of every nontrivial computer application, and algorithmics is a modern and active area of computer science. Every computer scientist and every professional programmer should know about the basic algorithmic toolbox: structures that allow efficient organization and retrieval of data, frequently used algorithms, and basic...
Bayesian Essentials with R (Springer Texts in Statistics)
Bayesian Essentials with R (Springer Texts in Statistics)

This Bayesian modeling book provides a self-contained entry to computational Bayesian statistics. Focusing on the most standard statistical models and backed up by real datasets and an all-inclusive R (CRAN) package called bayess, the book provides an operational methodology for conducting Bayesian inference, rather than focusing on its...

Encyclopedia of Cybercrime
Encyclopedia of Cybercrime
The first comprehensive encyclopedia to examine all aspects of the mysterious world of cybercrime

There are today no more compelling sets of crime and security threats facing nations, communities, organizations, groups, families and individuals than those encompassed by cybercrime. For over fifty years crime enabled by computing and
...
Optics in Instruments: Applications in Biology and Medicine
Optics in Instruments: Applications in Biology and Medicine

Optics is a science which covers a very large domain and is experiencing indisputable growth. It has enabled the development of a considerable number of instruments, the optical component or methodology of which is often the essential part of portent systems. This book sets out show how optical physical phenomena such as lasers – the...

Handbook of Electrical Design Details (Handbook)
Handbook of Electrical Design Details (Handbook)
A COMPREHENSIVE SOURCE OF TECHNICAL DETAILS ON ELECTRICAL POWER FROM GENERATION TO PRACTICAL APPLICATIONS

Reliable, low-cost electric power is a fundamental requirement for modern society, making possible such vital services as lighting, HVAC, transportation, communication, and data processing, in addition to driving motors of...

Financial Reporting and Analysis: Using Financial Accounting Information
Financial Reporting and Analysis: Using Financial Accounting Information
USERS OF FINANCIAL STATEMENTS INCLUDE A company’s managers, stockholders, bondholders, security analysts, suppliers, lending institutions, employees, labor unions, regulatory authorities, and the general public. They use the financial reports to make decisions. For example, potential investors use the financial...
Hiding in Plain Sight: Steganography and the Art of Covert Communication
Hiding in Plain Sight: Steganography and the Art of Covert Communication
Your hands-on guide to understanding, detecting, and using today’s most potent tool for secret communication–steganography

These days, encryption of confidential data and communications is an increasingly important part of doing business. But steganography can take data confidentiality to a whole new level, since it hides encrypted...

Introduction to Probability Models, Tenth Edition
Introduction to Probability Models, Tenth Edition

Introduction to Probability Models, Tenth Edition, provides an introduction to elementary probability theory and stochastic processes. There are two approaches to the study of probability theory. One is heuristic and nonrigorous, and attempts to develop in students an intuitive feel for the subject that enables him or her to think...

6800 assembly language programming
6800 assembly language programming
Lance Leventhal is a partner in Emulative Systems Company. Inc.. a San Diego-based consulting firm specializing in microprocesors and microprogramming. He is a national lecturer on microprocessors for the IEEE, the author of ten books and more than 60 articles on microprocessors, and a regular contributor to such publications as Simulation and...
Risk and Interdependencies in Critical Infrastructures: A Guideline for Analysis (Springer Series in Reliability Engineering)
Risk and Interdependencies in Critical Infrastructures: A Guideline for Analysis (Springer Series in Reliability Engineering)

Today’s society is completely dependent on critical networks such as  water supply, sewage, electricity, ICT and transportation. Risk and vulnerability analyses are needed to grasp the impact of threats and hazards. However, these become quite complex as there are strong interdependencies both within and between infrastructure...

unlimited object storage image
Result Page: 114 113 112 111 110 109 108 107 106 105 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy