Home | Amazing | Today | Tags | Publishers | Years | Search 
GPU Computing Gems Emerald Edition (Applications of GPU Computing Series)
GPU Computing Gems Emerald Edition (Applications of GPU Computing Series)

We are entering the golden age of GPU computing. Since the introduction of CUDA in 2007, more than 100 million computers with CUDA-capable GPUs have been shipped to end users. Unlike the previous GPGPU shader programming models, CUDA supports parallel programming in C. From my own experience in teaching CUDA programming, C programmers...

Mastering Autodesk Inventor and Autodesk Inventor LT 2011
Mastering Autodesk Inventor and Autodesk Inventor LT 2011

Autodesk Inventor was introduced in 1999 as an ambitious 3D parametric modeler based not on the familiar AutoCAD programming architecture but instead on a separate foundation that would provide the room needed to grow into the fully featured modeler it is now, a decade later. Inventor 2011 continues the development of Inventor with...

Microsoft SQL Server 2008 High Availability
Microsoft SQL Server 2008 High Availability

Every new version of SQL Server brings with it new tools and features for database administrators (DBAs), developers, and architects, for them to be able to provide an effective solution for the end users in a simpler and more efficient manner. The terms effective and efficiency can be measured in a technical perspective as High Availability...

iPad & iPhone Administrator's Guide: Enterprise Deployment Strategies and Security Solutions
iPad & iPhone Administrator's Guide: Enterprise Deployment Strategies and Security Solutions

Securely deploy iPads and iPhones on corporate networks

Seamlessly integrate iPads and iPhones into your company's IT systems using the detailed instructions contained in this practical book. iPad & iPhone Administrator's Guide shows you how to use iPads and iPhones as business devices and manage them tightly...

Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition

This book has been developed by and for security professionals who are dedicated to working in an ethical and responsible manner to improve the overall security posture of individuals, corporations, and nations.

THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS

Thwart malicious network intrusion...

Software and Patents in Europe (Cambridge Intellectual Property and Information Law)
Software and Patents in Europe (Cambridge Intellectual Property and Information Law)

The computer program exclusion from Article 52 of the European Patent Convention (EPC) proved impossible to uphold as industry moved over to digital technology, and the Boards of Appeal of the European Patent Organisation (EPO) felt emboldened to circumvent the EPC in Vicom by creating the legal fiction of 'technical effect'. This...

Jenkins: The Definitive Guide
Jenkins: The Definitive Guide

This book is aimed at relatively technical readers, though no prior experience with Continuous Integration is assumed. You may be new to Continuous Integration, and would like to learn about the benefits it can bring to your development team. Or, you might be using Jenkins or Hudson already, and want to discover how you can...

Representations and Techniques for 3D Object Recognition & Scene Interpretation
Representations and Techniques for 3D Object Recognition & Scene Interpretation

3D scene understanding and object recognition are among the grandest challenges in computer vision. A wide variety of techniques and goals, such as structure from motion, optical flow, stereo, edge detection, and segmentation, could be viewed as subtasks within scene understanding and recognition. Many of these applicable methods are...

Windows Phone 7 Silverlight Cookbook
Windows Phone 7 Silverlight Cookbook

I am delighted that Jonathan and Robb undertook the task of writing this book. Both Jonathan and Robb have been involved in the .NET community for a number of years and developed a passion for the Windows Phone. With this book, they have decided to share their knowledge and experience with their readers to help developers dive into doing more...

Security Strategy: From Requirements to Reality
Security Strategy: From Requirements to Reality

Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and...

Intelligent Tutoring Systems: 10th International Conference, ITS 2010, Pittsburgh, PA
Intelligent Tutoring Systems: 10th International Conference, ITS 2010, Pittsburgh, PA

The 10th International Conference on Intelligent Tutoring Systems, ITS 2010, continued the bi-annual series of top-flight international conferences on the use of advanced educational technologies that are adaptive to users or groups of users. These highly interdisciplinary conferences bring together researchers in the learning sciences,...

Marketing Strategy
Marketing Strategy

Thoroughly revised and updated, MARKETING STRATEGY, 5e continues with one primary goal: to teach students to think and act like marketers. Packed with cutting-edge coverage, current examples, new cases, and--for the first time--photographs, the fifth edition delivers a practical, straightforward approach to analyzing, planning, and...

Result Page: 203 202 201 200 199 198 197 196 195 194 193 192 191 190 189 188 187 186 185 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy