Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Multimedia Signals and Systems (The Springer International Series in Engineering and Computer Science)
Multimedia Signals and Systems (The Springer International Series in Engineering and Computer Science)

Multimedia Signals and Systems is primarily a technical introductory level multimedia textbook, including problems, examples, and MATLAB® codes. It will be a stepping-stone for readers who want to research in audio processing, image and video processing, and data compression.

This book will also be useful to readers who...

CCNA Practical Studies
CCNA Practical Studies

Understanding the concepts covered on the Cisco Certified Network Associate exam is no longer sufficient to succeed on the test. With the release of CCNA exam #640-607, Cisco has introduced performance-based testing elements to measure your ability to perform hands-on tasks in a time critical environment. In order to be completely prepared...

Object-Oriented Programming with Visual Basic .NET
Object-Oriented Programming with Visual Basic .NET

This book is not a reference. That needs to be said right off the bat. It was written to be read cover to cover; it tells a story. It's an interwoven tale about object-oriented programming in the .NET world: building objects, moving them, and using them around the world. This is not just a how-to book; it's a why-to and a when-to...

Introducing UNIX and Linux (Grassroots)
Introducing UNIX and Linux (Grassroots)
UNIX is an operating system which has seen substantial growth in its popularity over the last few years and is used by many universities and colleges, as well as in industry. Linux is a UNIX-like operating system for PCs which is freely available and has become a serious alternative to proprietary systems such as Windows. This book is a...
Embedded Software Development with eCos
Embedded Software Development with eCos

In 1997. there were over 100 commercially supported embedded operating systems, none of which had more than a minority share of the overall embedded OS market, not to mention countless thousands of others developed for specific projects (cell phones, radar arrays, networking equipment, etc.) that had no application developer base beyond that...

Programming with Microsoft Visual C++ .NET, Sixth Edition (Core Reference)
Programming with Microsoft Visual C++ .NET, Sixth Edition (Core Reference)

The release of the Microsoft Visual Studio .NET (and Visual C++ .NET in particular) has underscored Microsoft’s increasing focus on Internet technologies, which are at the heart of the Microsoft .NET architecture. In addition to supporting the .NET initiative, Visual C++ .NET keeps all the productivity-boosting features...

Halting the Hacker: A Practical Guide to Computer Security (With CD-ROM)
Halting the Hacker: A Practical Guide to Computer Security (With CD-ROM)
Halting the Hacker: A Practical Guide to Computer Security, Second Edition combines unique insight into the mind of the hacker with practical, step-by-step countermeasures for protecting any HP-UX, Linux, or UNIX system. Fully updated for today's key threats, tools, and solutions, this book shows you how hackers...
The Alignment Effect: How to Get Real Business Value Out of Technology
The Alignment Effect: How to Get Real Business Value Out of Technology
The Alignment Effect offers managers a systematic blueprint for demanding real accountability and bottom-line business results from their IT investments. Using actual case studies, Faisal Hoque introduces Business Technology Management, a comprehensive approach to aligning technology with business objectives,...
C Pocket Reference
C Pocket Reference

C is one of the oldest programming languages and still one of the most widely used. Whether you're an experienced C programmer or you're new to the language, you know how frustrating it can be to hunt through hundreds of pages in your reference books to find that bit of information on a certain function, type or other syntax element....

Cryptography: A Very Short Introduction
Cryptography: A Very Short Introduction

We are surrounded by cryptography, from the ATM, where we withdraw cash, mobile phones, and the Internet, to workplace security systems that protect business secrets, and the civil and military codes that protect the skies above us.

In this fascinating introduction to how cryptography actually works, Fred Piper and Sean Murphy highlight...

Microsoft Windows 2000 Server Administrator's Companion, Second Edition
Microsoft Windows 2000 Server Administrator's Companion, Second Edition

When the first edition of this book was published in 2000 coinciding with the release of the Microsoft Windows 2000 family of operating systems, we were extremely gratified by the positive reception from network administrators and others interested in Windows 2000 Server. We're very proud of the book and think it's a worthwhile resource for...

Hack Proofing Your Wireless Network
Hack Proofing Your Wireless Network
When the concept of a network without wires was first suggested more than two
decades ago, it sparked the imagination of scientists, product vendors, and users
around the globe eager for the convenience and flexibility of a free roaming connection.
Unfortunately, as the variety of wireless solutions began to emerge, anticipation...
unlimited object storage image
Result Page: Previous 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy