Home | Amazing | Today | Tags | Publishers | Years | Search 
The Microsoft Data Warehouse Toolkit: With SQL Server 2008 R2 and the Microsoft Business Intelligence Toolset
The Microsoft Data Warehouse Toolkit: With SQL Server 2008 R2 and the Microsoft Business Intelligence Toolset

In the five years since the first edition was published, Microsoft has made impressive progress in building out its data warehousing and business intelligence tools suite. It is gratifying to those of us who work in this space to see the steady commitment that Microsoft has made to provide usable, professional quality tools. During...

Programming with POSIX® Threads
Programming with POSIX® Threads

This book is about "threads" and how to use them. Thread" is just a name for a basic software "thing" that can do work on a computer. A thread is smaller, faster, and more maneuverable than a traditional process. In fact, once threads have been added to an operating system, a "process" becomes just...

Filtering, Segmentation and Depth (Lecture Notes in Computer Science)
Filtering, Segmentation and Depth (Lecture Notes in Computer Science)

Computer vision seeks a process that starts with a noisy, ambiguous signal from a TV camera and ends with a high-level description of discrete objects located in 3-dimensional space and identified in a human classification. In this book we address this process at several levels. We first treat the low-level image-processing issues of...

Xcode 4 (Developer Reference)
Xcode 4 (Developer Reference)

After a few years with Xcode 3, my first impressions of Xcode 4 were mixed. At first, I thought the redesign was unnecessarily rigid and proscriptive. I missed Interface Builder's floating windows and object palettes, and I couldn't find a convincing reason for the enforced three-way window split in the editor.

Over time, I...

Introduction to Embedded Systems: A Cyber-Physical Systems Approach
Introduction to Embedded Systems: A Cyber-Physical Systems Approach

The most visible use of computers and software is processing information for human consumption. We use them to write books (like this one), search for information on the web, communicate via email, and keep track of financial data. The vast majority of computers in use, however, are much less visible. They run the engine, brakes,...

Handbook of Open Source Tools
Handbook of Open Source Tools

The constant and speedy progress made by humankind in the industrial revolution, and more recently in the information technology era can be directly attributed to sharing of knowledge between various disciplines, reuse of the knowledge as science and technology advanced, and inclusion of this knowledge in the curriculum. The phrases...

Graphical Models for Machine Learning and Digital Communication (Adaptive Computation and Machine Learning)
Graphical Models for Machine Learning and Digital Communication (Adaptive Computation and Machine Learning)

A variety of problems m machine learning and digital communication deal with complex but structured natural or artificial systems. Natural patterns mat we wish to automatically classify' are a consequence of a hierarchical causal physical process. Learning about the world m which we live requires mat we extract useful sensor)'...

Document Security: Protecting Physical and Electronic Content
Document Security: Protecting Physical and Electronic Content

Several electronic layers exist in most documents, a fact overlooked by many writers. Probing these sublayers often reveals information not intended for release by the author. Documents in electronic formats create a “palimpsest” that even semiskilled investigators can probe for sensitive data.

Palimpsest seems...

The Oracle Universal Content Management Handbook
The Oracle Universal Content Management Handbook

Enterprise Content Management (ECM) is getting a lot of attention in corporations around the world today. Corporations create a large amount of unstructured content in the form of documents, scanned content, videos, audio, photos, images, and so on. Some statistics show that more than 80 percent of a corporation's intellectual property...

Learning Cocos2D: A Hands-On Guide to Building iOS Games with Cocos2D, Box2D, and Chipmunk
Learning Cocos2D: A Hands-On Guide to Building iOS Games with Cocos2D, Box2D, and Chipmunk

So you want to be a game developer?

Developing games for the iPhone or iPad can be a lot of fun. It is one of the few things we can do to feel like a kid again. Everyone, it seems, has an idea for a game, and what better platform to develop for than the iPhone and iPad?

What stops most people from actually developing...

Modeling of Curves and Surfaces with MATLAB®
Modeling of Curves and Surfaces with MATLAB®

This text on geometry modeling is devoted to a number of central geometrical topics— graphs of functions, transformations, (non-)Euclidean geometries, curves and surfaces— and presents some elementary methods for analytical modeling and visualization of them.

In 1872 F. Klein proposed his Erlangen Programme in...

Penetration Tester's Open Source Toolkit, Third Edition
Penetration Tester's Open Source Toolkit, Third Edition

Penetration testing is often considered an art as much as it is a science, but even an artist needs the right brushes to do the job well. Many commercial and open source tools exist for performing penetration testing, but it’s often hard to ensure that you know what tools are available and which ones to use for a certain task....

Result Page: 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 96 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy