Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Blog Theory: Feedback and Capture in the Circuits of Drive
Blog Theory: Feedback and Capture in the Circuits of Drive

The challenge of this book is thinking critically about media practices in a setting where they are fast, fun, and ubiquitous. As an avowedly engaged and political approach to thought, critical theory of any sort encounters challenges. Attempting to analyze and intervene in the present, it nonetheless adopts a backward gaze, an idea G.W.F....

Real World Microsoft Access Database Protection and Security
Real World Microsoft Access Database Protection and Security

Microsoft Access is the most popular desktop database in the world today and its very popularity means that its security measures can be easily compromised. Real World Microsoft Access Database Security takes a different approach to all the other Access books in the market in that it focuses from the start on all the issues that...

Wireless Internet Handbook: Technologies, Standards, and Applications
Wireless Internet Handbook: Technologies, Standards, and Applications

Wireless applications are definitely the next big thing in communications. Millions of people around the world use the Internet every day—to stay in touch with remote locations, follow the stock market, keep up with the news, check the weather, make travel plans, conduct business, shop, entertain themselves, and learn. The logical next...

Closed Circuit Television, Third Edition
Closed Circuit Television, Third Edition

Closed Circuit Television (CCTV) surveillance remains a growing industry in response to increased security threats, and whilst new developments have brought clearer images, digital recording and high speed data transmission, effective security systems still rely upon proper specification and installation by engineers with an in depth...

Color Image Processing: Methods and Applications
Color Image Processing: Methods and Applications
Over the last two decades, we have witnessed an explosive growth in both the diversity of techniques and the range of applications of image processing. However, the area of color image processing is still sporadically covered, despite having become commonplace, with consumers choosing the convenience of color imaging over traditional grayscale...
Secondary Surveillance Radar (Artech House Radar Library)
Secondary Surveillance Radar (Artech House Radar Library)
Starting with a brief precis of the history of radar, this book concentrates on the principles of Secondary Radar, explaining its genesis during the Second World War, and its subsequent development as a significant feature of modern air travel.

This is followed by a comprehensive description of how Secondary Radar functions. It is clearly...

Information Security and Ethics: Social and Organizational Issues
Information Security and Ethics: Social and Organizational Issues
Information Security and Ethics: Social and Organizational Issues brings together examples of the latest research from a number of international scholars addressing a wide range of issues significant to this important and growing field of study. These issues are relevant to the wider society, as well as to the individual, citizen, educator, student...
New Handbook for a Post-Roe America: The Complete Guide to Abortion Legality, Access, and Practical Support
New Handbook for a Post-Roe America: The Complete Guide to Abortion Legality, Access, and Practical Support
A completely new edition--with a new introduction by Amanda Palmer--of Robin Marty's best-selling manual on what to do if/when Roe v. Wade is overturned.

The New Handbook for a Post-Roe America is a comprehensive and user-friendly manual for understanding and preparing for the looming changes to
...
Face Geometry and Appearance Modeling: Concepts and Applications
Face Geometry and Appearance Modeling: Concepts and Applications

Human faces are familiar to our visual systems. We easily recognize a person's face in arbitrary lighting conditions and in a variety of poses; detect small appearance changes; and notice subtle expression details. Can computer vision systems process face images as well as human vision systems can? Face image processing has potential...

Database Nation (Hardback)
Database Nation (Hardback)
Forget the common cold for a moment. Instead, consider the rise of "false data syndrome," a deceptive method of identification derived from numbers rather than more recognizable human traits. Simson Garfinkel couples this idea with concepts like "data shadow" and "datasphere" in Database Nation, offering a...
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and...

Wireless Network Security (Signals and Communication Technology)
Wireless Network Security (Signals and Communication Technology)
Wireless networks technologies have been dramatically improved by the popularity of third generation (3G) wireless networks, wireless LANs, Bluetooth, and sensor networks. However, security is a major concern for wide deployments of such wireless networks. The contributions to this volume identify various vulnerabilities in the physical layer, the...
unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy