Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Digital Privacy and Security Using Windows: A Practical Guide
Digital Privacy and Security Using Windows: A Practical Guide

Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques.

This book teaches you how to secure your online identity and personal...

Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems
Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems
As the field of communications networks continues to evolve, a very interesting and challenging area — wireless sensor networks — is rapidly coming of age. A wireless sensor network consists of a large number of sensor nodes that may be randomly and densely deployed. Sensor nodes are small electronic components capable of sensing many...
Effective Software Testing: 50 Specific Ways to Improve Your Testing
Effective Software Testing: 50 Specific Ways to Improve Your Testing

Effective Software Testing explores fifty critically important best practices, pitfalls, and solutions. Gleaned from the author's extensive practical experience, these concrete items will enable quality assurance professionals and test managers to immediately enhance their understanding and skills, avoid costly...

Computer Vision, Imaging and Computer Graphics – Theory and Applications: 12th International Joint Conference, VISIGRAPP 2017, Porto, Portugal, ... in Computer and Information Science, 983)
Computer Vision, Imaging and Computer Graphics – Theory and Applications: 12th International Joint Conference, VISIGRAPP 2017, Porto, Portugal, ... in Computer and Information Science, 983)

This book constitutes thoroughly revised and selected papers from the 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, VISIGRAPP 2017, held in Porto, Portugal, February 27 - March 1, 2017. The 18 thoroughly revised and extended papers presented in this volume...

Computer Vision in Human-Computer Interaction: ECCV 2004 Workshop on HCI, Prague, Czech Republic, May 16, 2004
Computer Vision in Human-Computer Interaction: ECCV 2004 Workshop on HCI, Prague, Czech Republic, May 16, 2004
Human-Computer Interaction (HCI) lies at the crossroads of many scientific areas including artificial intelligence, computer vision, face recognition, motion tracking, etc. In order for HCI systems to interact seamlessly with people, they need to understand their environment through vision and auditory input. Moreover, HCI systems should learn how...
Project 2010 Project Management: Real World Skills for Certification and Beyond (Exam 70-178)
Project 2010 Project Management: Real World Skills for Certification and Beyond (Exam 70-178)

The ideal on-the-job reference guide for project managers who use Microsoft Project 2010

This must-have guide to using Microsoft Project 2010 is written from a real project manager's perspective and is packed with information you can use on the job. The book explores using Project 2010 during phases of project...

Lobbyists at Work
Lobbyists at Work

"Lobbyists at Work is a must-read for anyone interested in the serious business of government. Leech's probing questions reflect her years of research tracking the real impact of money and influence on policy."  —Thomas Hale Boggs, Jr. (Chairman, Patton Boggs LLP) 

Received...

Big Data: Understanding How Data Powers Big Business
Big Data: Understanding How Data Powers Big Business

Leverage big data to add value to your business

Social media analytics, web-tracking, and other technologies help companies acquire and handle massive amounts of data to better understand their customers, products, competition, and markets. Armed with the insights from big data, companies can improve customer experience and...

Image Processing: Principles and Applications
Image Processing: Principles and Applications
Image processing—from basics to advanced applications

Learn how to master image processing and compression with this outstanding state-of-the-art reference. From fundamentals to sophisticated applications, Image Processing: Principles and Applications covers multiple topics and provides a fresh perspective on future directions and...

ASP.NET at Work: Building 10 Enterprise Projects with CDROM
ASP.NET at Work: Building 10 Enterprise Projects with CDROM
Improve your ASP.NET know-how by building 10 ready-to-use applications

ASP.NET provides developers with more functionality and flexibility to develop dynamic Web applications while at the same time writing less code. If you’re an ASP developer familiar with ASP.NET and Visual Studio .NET basics but unsure of how to connect all of these...

Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.

Linux Firewalls discusses the...

Plunkett's Wireless, Wi-Fi, RFID & Cellular Industry Almanac 2011
Plunkett's Wireless, Wi-Fi, RFID & Cellular Industry Almanac 2011

Rapid development of new technologies is leading to ever more versatile, multipurpose mobile devices, including 3G and 4G Internet-enabled cell phones. Wireless networking and wireless Internet access are developing and expanding on a global basis at a rapid rate. Meanwhile, RFID (radio frequency identification) will revolutionize wireless...

unlimited object storage image
Result Page: 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy