Home | Amazing | Today | Tags | Publishers | Years | Search 
Computer Vision - ACCV 2010: 10th Asian Conference on Computer Vision, Queenstown, New Zealand
Computer Vision - ACCV 2010: 10th Asian Conference on Computer Vision, Queenstown, New Zealand

The 2010 Asian Conference on Computer Vision took place in the southern hemisphere, in “The Land of the Long White Cloud” in Maori language, also known as New Zealand, in the beautiful town of Queenstown. If we try to segment the world we realize that New Zealand does not belong officially to any continent. Similarly, in computer...

BackTrack 4: Assuring Security by Penetration Testing
BackTrack 4: Assuring Security by Penetration Testing

BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered in the target network environment. Applying appropriate testing methodology with defined business objectives and a scheduled test plan will result in robust penetration testing of your...

GIMP 2.6 for Photographers: Image Editing with Open Source Software
GIMP 2.6 for Photographers: Image Editing with Open Source Software

Image editing has become a crucial element in the photographic workflow. Image editing tools, most notably Photoshop, are usually sophisticated and deep applications, and are fairly expensive. The only open source tool in this market is the GIMP, which has developed into a powerful, multiplatform system running on Linux, Mac OS X,...

The Elements of MATLAB Style
The Elements of MATLAB Style

In 2002, I wrote a brief set of observations and thoughts on MATLAB style for my coworkers. Other programmers found it useful, so I posted the “MATLAB Programming Style Guidelines” document on my website datatool.com. It has since been downloaded more than 40,000 times.

This book responds to that encouraging...

Drupal 7: Visual QuickStart Guide
Drupal 7: Visual QuickStart Guide

Visual QuickStart Guides, designed in an attractive tutorial and reference format, are the quickest, easiest, and most thorough way to learn applications, tasks, and technologies. The Visual QuickStart Guides are a smart choice and guide the learner in a friendly and respectful tone. Visually presented with copious screenshots, the focused...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Digital Collage and Painting, Second Edition: Using Photoshop and Painter to Create Fine Art
Digital Collage and Painting, Second Edition: Using Photoshop and Painter to Create Fine Art

If you already know your way around Photoshop and Painter and want to use these amazing programs to take your skills further, this book is for you! Much more than a simple "how-to" guide, Susan Ruddick Bloom takes you on a full-fledged journey of the imagination and shows you how to create incredible works of fine art. Supplemented...

IT Security Management: IT Securiteers - Setting up an IT Security Function (Lecture Notes in Electrical Engineering)
IT Security Management: IT Securiteers - Setting up an IT Security Function (Lecture Notes in Electrical Engineering)

In 1862, the gardener James Bateman sent several specimens of the Christmas orchid to Charles Darwin. This orchid was first planted in Britain in 1855 and it did not blossom until 1857. It had been discovered several decades before by the French botanist Louis-Marie Aubert du Petit-Thouars in Madagascar in 1822. The most significant...

VMware vSphere 5 Clustering Technical Deepdive
VMware vSphere 5 Clustering Technical Deepdive

** Black & White edition ** VMware vSphere 5 Clustering Technical Deepdive zooms in on three key components of every VMware based infrastructure and is by no means a "how to" guide. It covers the basic steps needed to create a vSphere HA and vSphere DRS cluster and to implement vSphere Storage DRS. Even more important, it...

Simulating Humans: Computer Graphics Animation and Control
Simulating Humans: Computer Graphics Animation and Control

The decade of the 80's saw the dramatic expansion of high performance computer graphics into domains previously able only to irt with the technology. Among the most dramatic has been the incorporation of real-time interactive manipulation and display for human gures. Though actively pur- sued by several research groups, the...

CWSP Certified Wireless Security Professional Official Study Guide: Exam PW0-204 (CWNP Official Study Guides)
CWSP Certified Wireless Security Professional Official Study Guide: Exam PW0-204 (CWNP Official Study Guides)

If you have purchased this book or if you are even thinking about purchasing this book, you probably have some interest in taking the CWSP ® (Certifi ed Wireless Security Professional) certifi cation exam or in learning what the CWSP certifi cation exam is about. The authors would like to congratulate you on this fi rst step, and we...

Guide to Computer Forensics and Investigations
Guide to Computer Forensics and Investigations

The rapid advance of technology has changed and influenced how we think about gathering digital evidence. Soon after the attacks on the World Trade Center in New York City on September 11, 2001, many young men and women volunteered to serve their country in different ways. For those who did not choose the military, options included...

Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy