Home | Amazing | Today | Tags | Publishers | Years | Search 
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking

This book provides an overview of steganography and digital watermarking, two areas of research which are generally referred to as "information hiding." Steganography studies ways to make communication invisible by hiding secrets in innocuous messages, whereas watermarking originated from the need for copyright protection of...

Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data (Data-Centric Systems and Applications)
Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data (Data-Centric Systems and Applications)

The rapid growth of the Web in the past two decades has made it the largest publicly accessible data source in the world. Web mining aims to discover useful information or knowledge from Web hyperlinks, page contents, and usage logs. Based on the primary kinds of data used in the mining process, Web mining tasks can be categorized...

Mac OS X: The Complete Reference
Mac OS X: The Complete Reference

This book is complete: my checklists and FileMaker databases have cross-indexed features, preferences, and the applications that ship with Mac OS X, to make certain that everything shows up somewhere in the book. It has been revised against the second update—Mac OS X 10.0.2. We have tried to include screen shots of almost every feature,...

Getting Started with Roo
Getting Started with Roo

This is my first book with O’Reilly, and I’m very grateful for their help and encouragement. Their editorial team is first class, and efficient. It was great working with you.

I, like many of you, have been using Spring for a long, long time. I wasn’t initially convinced I needed Spring Roo (to be honest). It...

Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques

This volume contains the papers presented at the 14th International Workshop on Approximation Algorithms for Combinatorial Optimization Problems (APPROX 2011) and the 15th International Workshop on Randomization and Computation (RANDOM 2011), which took place concurrently in Princeton University, USA, during August 17–19,...

Engineering Chemistry (as Per VTU)
Engineering Chemistry (as Per VTU)

The objective of this book is to present a substantial introduction to the ideas, phenomena and methods of the problems that are frequently observed in mathematics, mathematical physics and engineering technology. The book can be appreciated at a considerable number of levels and is designed for everyone from amateurs to research workmen.

...
Knowledge Processing and Data Analysis: First International Conference, KONT 2007, Novosibirsk, Russia
Knowledge Processing and Data Analysis: First International Conference, KONT 2007, Novosibirsk, Russia

This volume collects the proceedings of two related international conferences on foundations and practical applications of mathematical methods of data analysis, of Formal Concept Analysis and of methods for information extraction from natural language texts. The first conference, named Knowledge - Ontology - Theory 2007 (KONT 2007),...

Studies in Complexity and Cryptography: Miscellanea on the Interplay between Randomness and Computation
Studies in Complexity and Cryptography: Miscellanea on the Interplay between Randomness and Computation

This volume contains a collection of studies in the areas of complexity theory and foundations of cryptography. These studies were conducted at different times during the last couple of decades. Although many of these studies have been referred to by other works, none of them was formally published before.

Indeed, this volume...

Windows 7 Inside Out, Deluxe Edition
Windows 7 Inside Out, Deluxe Edition

By some measures, Windows 7 sets a new standard for usability. It needs less out-of-the-box tweaking and troubleshooting than any Windows version we’ve ever used. The arrangement of folders and files in Windows Explorer, basic system security, User Account Control settings, and numerous other default configuration options are...

Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011

On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 8th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2011). Each year DIMVA brings together international experts from academia, industry and government to present and discuss novel security research....

The Image Processing Handbook, Sixth Edition
The Image Processing Handbook, Sixth Edition

Image processing is used in a wide variety of applications, for two somewhat different purposes:

1. improving the visual appearance of images to a human observer, including their printing and transmission, and

2. preparing images for the measurement of the features and structures which they reveal.

The...

iOS 4 in Action: Examples and Solutions for iPhone & iPad
iOS 4 in Action: Examples and Solutions for iPhone & iPad

When I started playing with the first-generation iPhone back in 2008, I was amazed by the simplicity and versatility of the smart phone. With the iPhone in hand, I could take pictures, navigate with GPS, tell time, and of course, play games—especially when I was bored while waiting in line at the DMV for my license plate....

Result Page: 483 482 481 480 479 478 477 476 475 474 473 472 471 470 469 468 467 466 465 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy