Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Intelligent Network Video: Understanding Modern Video Surveillance Systems
Intelligent Network Video: Understanding Modern Video Surveillance Systems
This is the first resource to provide detailed coverage of advanced digital networking and intelligent video capabilities and optimization. It addresses general concepts, explains why IP-based systems provide better image quality and more scalable and flexible systems at a lower cost, and provides current information on cameras and DVRs. It also...
Thermodynamics
Thermodynamics
In this classic of modern science, the Nobel Laureate presents a clear treatment of systems, the First and Second Laws of Thermodynamics, entropy, thermodynamic potentials, and much more. Calculus required.

THIS book ori~nated in a course of lectures held at Columbia University, New York, during the summer session of
...
SCJP: Sun Certified Programmer for Java Platform Study Guide: SE6 (Exam CX-310-065)
SCJP: Sun Certified Programmer for Java Platform Study Guide: SE6 (Exam CX-310-065)

The Sun Certifi ed Programmer for Java Platform, Standard Edition 6 (Java SE 6) certifi cation exam is for programmers experienced using the Java programming language. Achieving this certifi cation provides clear evidence that a programmer understands the basic syntax and structure of the Java programming language and can create Java...

Beyond Reason: Eight Great Problems That Reveal the Limits of Science
Beyond Reason: Eight Great Problems That Reveal the Limits of Science
A mind-bending excursion to the limits of science and mathematics
Are some scientific problems insoluble? In Beyond Reason, internationally acclaimed math and science author A. K. Dewdney answers this question by examining eight insurmountable mathematical and scientific roadblocks that have stumped thinkers across the
...
Information Technology and Product Development (Annals of Information Systems)
Information Technology and Product Development (Annals of Information Systems)

Infusing new products into a company or organization’s product is imperative for the growth of that organization. In addition, New Product Development (NPD) does not necessarily happen in one place over a defined period of time. NPD is most often distributed in both space and time across a wide range of entities. Therefore, distributed...

Network Security Essentials: Applications and Standards (4th Edition)
Network Security Essentials: Applications and Standards (4th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Computer Aided And Integrated Manufacturing Systems, Volume 5: Manufacturing Processes
Computer Aided And Integrated Manufacturing Systems, Volume 5: Manufacturing Processes

This is an invaluable five-volume reference on the very broad and highly significant subject of computer aided and integrated manufacturing systems. It is a set of distinctly titled and well-harmonized volumes by leading experts on the international scene.

The techniques and technologies used in computer aided and integrated...

Database Systems: A Practical Approach to Design, Implementation, and Management (International Computer Science Series)
Database Systems: A Practical Approach to Design, Implementation, and Management (International Computer Science Series)

The history of database research over the past 30 years is one of exceptional productivity that has led to the database system becoming arguably the most impor tant development in the field of software engineering- The database is now the underlying framework of the information system, and has fundamentally changed the way many...

CyberForensics: Understanding Information Security Investigations (Springer's Forensic Laboratory Science Series)
CyberForensics: Understanding Information Security Investigations (Springer's Forensic Laboratory Science Series)
The introduction was composed by Jennifer L. Bayuk, the editor of this volume. It briefly describes the history of the cyberforensics field and places the subsequent chapters into context. The last section of the introduction, Expert Explanations, describes the format of the following sections and also how the sections complement...
Joomla! Templates (Joomla! Press)
Joomla! Templates (Joomla! Press)

Joomla! is one of the best known Open Source content management systems with many hundreds of thousands of applications in the most varied areas of use. It offers the best possible conditions for implementing a comprehensive and accessible Web presence. Thousands of extensions for almost any purpose are freely available. The developer and...

Machine vision – applications and systems
Machine vision – applications and systems

Vision plays a fundamental role for living beings by allowing them to interact with the environment in an effective and efficient way. The Machine Vision goal is to endow computing devices, and more generally artificial systems, with visual capabilities in order to cope with not a priori predetermined situations. To this end, we have to take...

Decision Making and Programming
Decision Making and Programming

The problem of selection of alternatives or the problem of decision making in the modern world has become the most important class of problems constantly faced by business people, researchers, doctors and engineers. The fields that are almost entirely focused on conflicts, where applied mathematics is successfully used, are law, military...

unlimited object storage image
Result Page: 798 797 796 795 794 793 792 791 790 789 788 787 786 785 784 783 782 781 780 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy