|
|
|
|
Computer-Aided Intelligent Recognition Techniques and ApplicationsIntelligent recognition methods have recently proven to be indispensable in a variety of modern industries, including computer vision, robotics, medical imaging, visualization and the media. Furthermore, they play a critical role in the traditional fields such as character recognition, natural language processing and personal identification.
... | | Security Sage's Guide to Hardening the Network InfrastructureWith the proliferation of wireless access points (WAPs), virtual private networks (VPNs), and extranets, it’s becoming increasingly difficult to determine where your network begins and ends. Add this complexity to common economic factors, such as company mergers and acquisitions, and now you have a tangled web of... | | Linux on IBM eserver zSeries and S/390: Best Security PracticesThis IBM® Redbook discusses best security practices for running Linux as a z/VM® guest on IBM Eserver® zSeries® and S/390® machines. This publication is intended for system administrators and IT architects responsible for deploying secure Linux servers running under z/VM. We consider both z/VM and Linux security topics.
... |
|
Virtual Teams: Projects, Protocols and ProcessesVirtual teams are a relatively new phenomenon and by definition work across time, distance, and organizations through the use of information and communications technology. Virtual Teams: Projects, Protocols and Processes gathers the best of academic research on real work-based virtual teams into one book. It offers a series of chapters... | | Science Teaching with Moodle 2.0
Moodle is becoming increasingly popular in schools worldwide due to its ease of use and flexibility. Science is the perfect subject to benefit from the features of Moodle as students will find it the easiest to learn with the help of interactive content, rather than reading textbooks. This book will teach you how to create quizzes, start... | | Operating Systems In Depth: Design and Programming
The goal of this book is to bring together and explain current practice in operating systems.
This includes much of what is traditionally covered in operating-system textbooks: concurrency,
scheduling, linking and loading, storage management (both real and virtual), fi le systems,
and security. However, I also cover issues that come up... |
|
|
Getting Started with Citrix XenApp 6
XenApp 6 is the leader in application hosting and virtualization delivery, allowing
users from different platforms such as Windows, Mac, Linux, and mobile devices to
connect to their business applications. It reduces resources and costs for application
distribution and management. Using Citrix XenApp 6, you can deploy secure... | | Managing and Optimizing VMware vSphere Deployments
In our experience as consultants, VMware vSphere is the most robust virtualization
solution on the market. The technology is proven and the user base is large.
Although the benefits of virtualization using vSphere are many, proper planning is
required to gain these benefits from a vSphere ... | | Spark for Python Developers
Key Features
-
Set up real-time streaming and batch data intensive infrastructure using Spark and Python
-
Deliver insightful visualizations in a web app using Spark (PySpark)
-
Inject live data using Spark Streaming with real-time events
Book Description
Looking... |
|
|
Result Page: 104 103 102 101 100 99 98 97 96 95 94 93 92 91 90 89 |