Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
OpenCV By Example
OpenCV By Example

Enhance your understanding of Computer Vision and image processing by developing real-world projects in OpenCV 3

About This Book

  • Get to grips with the basics of Computer Vision and image processing
  • This is a step-by-step guide to developing several real-world Computer Vision projects...
Learning Behavior-driven Development with JavaScript
Learning Behavior-driven Development with JavaScript

Create powerful yet simple-to-code BDD test suites in JavaScript using the most popular tools in the community

About This Book

  • Master the most popular testing tools in the JavaScript ecosystem, such as CucumberJS, Mocha, SinonJS, and more.
  • Learn how Behavior-driven development can help...
68: Optimizing Hemoglobin Levels and Beyond: Strength for Living and Meaningful Survival
68: Optimizing Hemoglobin Levels and Beyond: Strength for Living and Meaningful Survival
Significant advances in the treatment of patients with cancer have occurred over the last decade, as evidenced by steadily improving cure rates and extended durations of survival. There is often a critical trade-off, however, because more intense cytotoxic regimens may result in increased adverse events, including an...
Learning DevOps: Continuously Deliver Better Software
Learning DevOps: Continuously Deliver Better Software

Learn to use some of the most exciting and powerful tools to deliver world-class quality software with continuous delivery and DevOps

About This Book

  • Get to know the background of DevOps so you understand the collaboration between different aspects of an IT organization and a software developer
  • ...
Temporal Type Theory: A Topos-Theoretic Approach to Systems and Behavior (Progress in Computer Science and Applied Logic)
Temporal Type Theory: A Topos-Theoretic Approach to Systems and Behavior (Progress in Computer Science and Applied Logic)
This innovative monograph explores a new mathematical formalism in higher-order temporal logic for proving properties about the behavior of systems. Developed by the authors, the goal of this novel approach is to explain what occurs when multiple, distinct system components interact by using a category-theoretic description of behavior...
Design Automation Techniques for Approximation Circuits: Verification, Synthesis and Test
Design Automation Techniques for Approximation Circuits: Verification, Synthesis and Test

This book describes reliable and efficient design automation techniques for the design and implementation of an approximate computing system. The authors address the important facets of approximate computing hardware design - from formal verification and error guarantees to synthesis and test of approximation systems. They provide...

MCSA/MCSE Managing and Maintaining a Windows Server 2003 Environment: Exam 70-290 Study Guide and DVD Training System
MCSA/MCSE Managing and Maintaining a Windows Server 2003 Environment: Exam 70-290 Study Guide and DVD Training System
This book’s primary goal is to help you prepare to take and pass Microsoft’s exam number
70-290, Managing and Maintaining a Microsoft Windows Server 2003 Environment. Our secondary
purpose in writing this book is to provide exam candidates with knowledge and
skills that go beyond the minimum requirements for passing the
...
PostgreSQL: The comprehensive guide to building, programming, and administering PostgreSQL databases, Second Edition
PostgreSQL: The comprehensive guide to building, programming, and administering PostgreSQL databases, Second Edition

The second edition of the best-selling PostgreSQL has been updated to completely cover new features and capabilities of the 8.0 version of PostgreSQL. You will be lead through the internals of the powerful PostgreSQL open source database chapter, offering an easy-to-read, code-based approach...

.NET System Management Services
.NET System Management Services

.NET System Management Services is a detailed and practical overview of the enterprise system management facilities, available as part of the Framework Class Library (FCL) of the .NET Framework. While Windows Management Instrumentation (WMI), which is a centerpiece of Microsoft's enterprise management technology, is a fairly well...

Cisco Security Professional's Guide to Secure Intrusion Detection Systems
Cisco Security Professional's Guide to Secure Intrusion Detection Systems

This book presents a combination of intrusion detection systems (IDS) and security theory, Cisco security models, and detailed information regarding specific Cisco-based IDS solutions. Cisco Security Professional’s Guide to Secure Intrusion Detection Systems also serves as a guide for security administrators studying for the Cisco...

Solaris Operating Environment Boot Camp
Solaris Operating Environment Boot Camp
The aim of this book is not to be just another "Guide for System Administrators," but rather a workshop manual that describes the tasks that need to be performed to build a complex network using the standard components delivered with the system.

We present the chapters in the same chronological order that the system administrator...

Security Assessment: Case Studies for Implementing the NSA IAM
Security Assessment: Case Studies for Implementing the NSA IAM
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or...
unlimited object storage image
Result Page: 613 612 611 610 609 608 607 606 605 604 603 602 601 600 599 598 597 596 595 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy