Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Intelligent Network Video: Understanding Modern Video Surveillance Systems
Intelligent Network Video: Understanding Modern Video Surveillance Systems
This is the first resource to provide detailed coverage of advanced digital networking and intelligent video capabilities and optimization. It addresses general concepts, explains why IP-based systems provide better image quality and more scalable and flexible systems at a lower cost, and provides current information on cameras and DVRs. It also...
Perimeter Security
Perimeter Security
Perimeter Security has taken on a new level of importance since 9/11. Whether insuring the safety of government buildings, hospitals, residences, or bio-research labs, the safety of workers and materials can only be ensured by outfitting all points of entry with the appropriate alarm and surveillance equipment. This comprehensive hands-on resource...
Diagnosis and Surgical Management of Renal Tumors
Diagnosis and Surgical Management of Renal Tumors
Renal cell carcinoma (RCC) is the most common primary malignancy of the kidney, with an estimated 64,000 new cases diagnosed each year in the United States. Worldwide, this figure approaches 270,000 annual incident cases. At the time of initial presentation, 80% of patients with RCC will be diagnosed with a tumor localized the kidney. The...
Cybersecurity Law
Cybersecurity Law

A definitive guide to cybersecurity law

Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information...

The Kock Pouch
The Kock Pouch

This book is about the recently revived technique of Kock pouch in inflammatory bowel disease. It discusses the Kock pouch as an alternative to patients not suitable for a pelvic pouch or where the pelvic pouch has failed. It provides clinicians with all the necessary information on patient guidance and surgical revisions after a...

Fiber Optic Sensors (Optical Science and Engineering)
Fiber Optic Sensors (Optical Science and Engineering)

This reference presents a comprehensive account of the recent advances and research in fiber optic sensor technology. It offers a progressive history of each sensor type as well as basic principles and fundamental building blocks for practical applications in the electrical aerospace, defense and manufacturing, smart structure, undersea...

Intelligent Projects Using Python: 9 real-world AI projects leveraging machine learning and deep learning with TensorFlow and Keras
Intelligent Projects Using Python: 9 real-world AI projects leveraging machine learning and deep learning with TensorFlow and Keras

Implement machine learning and deep learning methodologies to build smart, cognitive AI projects using Python

Key Features

  • A go-to guide to help you master AI algorithms and concepts
  • 8 real-world projects tackling different challenges in healthcare, e-commerce, and...
Information, Technology and Control in a Changing World: Understanding Power Structures in the 21st Century (International Political Economy Series)
Information, Technology and Control in a Changing World: Understanding Power Structures in the 21st Century (International Political Economy Series)
This book explores the interconnected ways in which the control of knowledge has become central to the exercise of political, economic, and social power. Building on the work of International Political Economy scholar Susan Strange, this multidisciplinary volume features experts from political science, anthropology, law, criminology,...
2600: The Hacker Quarterly, Summer 2002
2600: The Hacker Quarterly, Summer 2002
2600: The Hacker Quarterly, Summer 2002:

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet protocols and services, as well as
...
Firewalls Don’t Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies
Firewalls Don’t Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies

Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself?step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't really know....

Information Security and Ethics: Social and Organizational Issues
Information Security and Ethics: Social and Organizational Issues
Information Security and Ethics: Social and Organizational Issues brings together examples of the latest research from a number of international scholars addressing a wide range of issues significant to this important and growing field of study. These issues are relevant to the wider society, as well as to the individual, citizen, educator, student...
Distributed Source Coding
Distributed Source Coding

Everything a signal and image processing engineer needs to know about distributed source coding - theorems, practical algorithms for design and the latest applications.

The advent of wireless sensor technology and ad-hoc networks has made DSC a major field of interest. Edited and written by the leading players in the field,
...

Result Page: 14 13 12 11 10 9 8 7 6 5 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy