Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Photoshop Darkroom 2: Creative Digital Transformations
The Photoshop Darkroom 2: Creative Digital Transformations

Back in the old days, working in a chemical darkroom, I could only have dreamed of a postprocessing tool as wonderful as Photoshop. But for me that’s exactly what Photoshop is—a tool. It’s a tool that helps me as a professional image creator. The image is what matters, not the tool.

The Photoshop...

Electro-Optics Handbook
Electro-Optics Handbook

It’s often difficult to predict which areas of a field will become rejuvenated and grow rapidly or spin off to fit with another to form something new. The field of electro-optics is also unpredictable, but currently it has numerous forces acting on it. First is the development of new optical sources such as ultrafast lasers and fiber...

Principles of Digital Image Processing: Advanced Methods (Undergraduate Topics in Computer Science)
Principles of Digital Image Processing: Advanced Methods (Undergraduate Topics in Computer Science)

This textbook is the third of three volumes which provide a modern, algorithmic introduction to digital image processing, designed to be used both by learners desiring a firm foundation on which to build, and practitioners in search of critical analysis and concrete implementations of the most important techniques. This volume builds upon the...

Classification and Data Mining (Studies in Classification, Data Analysis, and Knowledge Organization)
Classification and Data Mining (Studies in Classification, Data Analysis, and Knowledge Organization)

This volume contains both methodological papers showing new original methods, and papers on applications illustrating how new domain-specific knowledge can be made available from data by clever use of data analysis methods. The volume is subdivided in three parts: Classification and Data Analysis; Data Mining; and Applications. The selection...

Data Mining: Foundations and Intelligent Paradigms: VOLUME 2: Statistical, Bayesian, Time Series and other Theoretical Aspects
Data Mining: Foundations and Intelligent Paradigms: VOLUME 2: Statistical, Bayesian, Time Series and other Theoretical Aspects

There are many invaluable books available on data mining theory and applications. However, in compiling a volume titled “DATA MINING: Foundations and Intelligent Paradigms: Volume 2: Core Topics including Statistical, Time-Series and Bayesian Analysis” we wish to introduce some of the latest developments to a broad audience of...

Proteomics for Biomarker Discovery: Methods and Protocols (Methods in Molecular Biology, 1959)
Proteomics for Biomarker Discovery: Methods and Protocols (Methods in Molecular Biology, 1959)
This volume presents modern and enhanced methods that detail techniques to perform proteomics analyses dedicated to biomarker discovery for human health. Chapters guide readers through pre/post analytical factors, protocols for the preparation of extracellular vesicles and exosomes, and various analytical pipelines including Data...
Extreme Exploits: Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses...

The IMS: IP Multimedia Concepts and Services
The IMS: IP Multimedia Concepts and Services
The IMS: IP Multimedia Concepts and Services, Second Editionbuilds on the success of the previous best-selling edition, providing comprehensive coverage of IMS – its concepts, architecture, protocols and functionalities with a wealth of new and updated material. Mobile telephony with the current technology has been hugely...
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
"Few false ideas have more firmly gripped the minds of so many intelligent men than the one that, if they just tried, they could invent a cipher that no one could break," writes David Kahn in this massive (almost 1,200 pages) volume. Most of The Codebreakers focuses on the 20th century, especially World War II. But its reach is...
Deploying Cisco Voice over IP Solutions
Deploying Cisco Voice over IP Solutions
If you've got a wide area network (WAN) already, putting interoffice voice traffic on it is an obvious application for it. Voice signals take up so little bandwidth, and the cost savings can be so significant, that Voice over IP (VoIP) deserves serious consideration. However, you can easily throw away years of cost savings by bringing in...
Computational Approaches to Biochemical Reactivity (Understanding Chemical Reactivity)
Computational Approaches to Biochemical Reactivity (Understanding Chemical Reactivity)
This book summarises recent results in the rapidly developing discipline of the computational aspects of biochemical reactivity. It presents a comprehensive and critical treatise on the subject, with numerous references covering practically all relevant and recent work. The chapters, written by eminent experts in the field, deal with quantum...
JavaTM Programming with CORBATM : Advanced Techniques for Building Distributed Applications
JavaTM Programming with CORBATM : Advanced Techniques for Building Distributed Applications
The leading guide for Java developers who build business applications with CORBA Acknowledged experts present advanced techniques and real-world examples for building both simple and complex programs using Java with CORBA. The authors begin with a quick overview of CORBA, Java, object request brokers (ORBs), and EJB components, then quickly move on...
unlimited object storage image
Result Page: 307 306 305 304 303 302 301 300 299 298 297 296 295 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy