Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Raspberry Pi for Secret Agents - Second Edition
Raspberry Pi for Secret Agents - Second Edition

Turn your Raspberry Pi into your very own secret agent toolbox with this set of exciting projects

About This Book

  • Turn your Raspberry Pi into a multipurpose secret agent gadget for audio/video surveillance, Wi-Fi exploration, or playing pranks on your friends
  • Detect an intruder on camera...
Towards Digital Enlightenment: Essays on the Dark and Light Sides of the Digital Revolution
Towards Digital Enlightenment: Essays on the Dark and Light Sides of the Digital Revolution

This new collection of essays follows in the footsteps of the successful volume Thinking Ahead - Essays on Big Data, Digital Revolution, and Participatory Market Society, published at a time when our societies were on a path to technological totalitarianism, as exemplified by mass surveillance reported by Edward Snowden and...

OpenCV By Example
OpenCV By Example

Enhance your understanding of Computer Vision and image processing by developing real-world projects in OpenCV 3

About This Book

  • Get to grips with the basics of Computer Vision and image processing
  • This is a step-by-step guide to developing several real-world Computer Vision projects...
The Eagle Has Eyes: The FBI Surveillance of César Estrada Chávez of the United Farm Workers Union of America, 1965–1975 (Latinos in the United States)
The Eagle Has Eyes: The FBI Surveillance of César Estrada Chávez of the United Farm Workers Union of America, 1965–1975 (Latinos in the United States)
This book is the first of its kind to bring transparency to the FBI’s attempts to destroy the incipient Chicano Movement of the 1960s. While the activities of the deep state are current research topics, this has not always been the case. The role of the U.S. government in suppressing marginalized racial and ethnic minorities...
OpenCV for Secret Agents
OpenCV for Secret Agents

Use OpenCV in six secret projects to augment your home, car, phone, eyesight, and any photo or drawing

About This Book

  • Build OpenCV apps for the desktop, the Raspberry Pi, Android, and the Unity game engine
  • Learn real-time techniques that can be used to classify images, detecting and...
Introduction to Airborne Radar, Second Edition (Aerospace & Radar Systems)
Introduction to Airborne Radar, Second Edition (Aerospace & Radar Systems)

The completely rewritten and revised Second Edition updates a famous work originally published by the Hughes Aircraft Company. Much more than a simple introduction, the book is actually a history, reference, tech manual, and textbook rolled into one beautiful illustrated volume, packed with full color photos, drawings, tables and charts, plus...

Scientific Methods in Mobile Robotics: Quantitative Analysis of Agent Behaviour
Scientific Methods in Mobile Robotics: Quantitative Analysis of Agent Behaviour
Mobile robots are widely applied in a range of applications from transportation, surveillance through to health care. In all these applications it is clearly important to be able to analyse and control the performance of the mobile robot and it is therefore surprising that formalised methods to achieve this are not readily available. This book...
15 Dangerously Mad Projects for the Evil Genius
15 Dangerously Mad Projects for the Evil Genius

UNLEASH YOUR INNER MAD SCIENTIST!

"Wonderful. I learned a lot reading the detailed but easy to understand instructions."--BoingBoing

This wickedly inventive guide explains how to design and build 15 fiendishly fun electronics projects. Filled with photos and illustrations, 15 Dangerously Mad Projects for...

RFID Handbook: Applications, Technology, Security, and Privacy
RFID Handbook: Applications, Technology, Security, and Privacy
Radio Frequency Identification (RFID) tagging is now used by the department of defense and many of the worlds largest retailers including Wal-Mart. As RFID continues to infiltrate industries worldwide, organizations must harness a clear understanding of this technology in order to maximize its potential and protect against the potential risks it...
Intelligent Network Video: Understanding Modern Video Surveillance Systems
Intelligent Network Video: Understanding Modern Video Surveillance Systems
This is the first resource to provide detailed coverage of advanced digital networking and intelligent video capabilities and optimization. It addresses general concepts, explains why IP-based systems provide better image quality and more scalable and flexible systems at a lower cost, and provides current information on cameras and DVRs. It also...
Privacy at Risk: The New Government Surveillance and the Fourth Amendment
Privacy at Risk: The New Government Surveillance and the Fourth Amendment
"The discussion of surveillance techniques is excellent, the legal analysis is sound, and the case for Fourth Amendment reform compelling. Recommended."-Choice (D. E. Smith Choice )

Without our consent and often without our knowledge, the government can constantly...
A Unified Framework for Video Summarization, Browsing & Retrieval: with Applications to Consumer and Surveillance Video
A Unified Framework for Video Summarization, Browsing & Retrieval: with Applications to Consumer and Surveillance Video
Large volumes of video content can only be easily accessed by the use of rapid browsing and retrieval techniques. Constructing a video table of contents (ToC) and video highlights to enable end users to sift through all this data and find what they want, when they want are essential. This reference puts forth a unified framework to integrate these...
unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy