Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
MCSA/MCSE Self-Paced Training Kit (Exam 70-350): Implementing Microsoft Internet Security and Acceleration Server 2004 (Pro-Certification)
MCSA/MCSE Self-Paced Training Kit (Exam 70-350): Implementing Microsoft Internet Security and Acceleration Server 2004 (Pro-Certification)
Welcome to MCSA/MCSE Self-Paced Training Kit (Exam 70-350): Implementing Microsoft Internet Security and Acceleration (ISA) Server 2004. This training kit is designed to provide the knowledge you need to pass the 70-350 certification exam. More importantly, this training kit also provides you with the knowledge and skills required to implement,...
Microsoft Small Business Server 2003 Unleashed
Microsoft Small Business Server 2003 Unleashed

If you are new to the world of Microsoft Small Business Server 2003, Microsoft Small Business Server 2003 Unleashed can provide you with real-world support experience as you get started or explore your upgraded server. Written and reviewed by Small Business Server MVPs, this book provides...

Image Processing Using Pulse-Coupled Neural Networks
Image Processing Using Pulse-Coupled Neural Networks
Humans have an outstanding ability to recognise, classify and discriminate
objects with extreme ease. For example, if a person was in a large classroom
and was asked to find the light switch it would not take more than a second or
two. Even if the light switch was located in a different place than the human
expected or it was
...
Error Correction Coding: Mathematical Methods and Algorithms
Error Correction Coding: Mathematical Methods and Algorithms
An unparalleled learning tool and guide to error correction coding

Error correction coding techniques allow the detection and correction of errors occurring during the transmission of data in digital communication systems. These techniques are nearly universally employed in modern communication systems, and are thus an important component of...

Linux Network Security (Administrator's Advantage Series)
Linux Network Security (Administrator's Advantage Series)

Linux networks are becoming more and more common, but security is often an overlooked issue. Unfortunately, in today’s environment all networks are potential hacker targets, from top-secret military research networks to small home LANs. Linux Network Security focuses on securing Linux in a networked environment, where the security...

Cryptography in C and C++, Second Edition
Cryptography in C and C++, Second Edition

This book covers all that is needed to write professional-level cryptographic code. An expanded and improved version of the very well received first edition, it includes approximately 100 pages of new material as well as numerous improvements in the original text.

Text focusing on the practical aspects of cryptography in C and C++,
...
Genetic Programming IV: Routine Human-Competitive Machine Intelligence
Genetic Programming IV: Routine Human-Competitive Machine Intelligence

Genetic Programming IV: Routine Human-Competitive Machine Intelligence presents the application of GP to a wide variety of problems involving automated synthesis of controllers, circuits, antennas, genetic networks, and metabolic pathways. The book describes fifteen instances where GP has created an entity that either...

Articulation and Intelligibility (Synthesis Lectures on Speech and Audio Processing)
Articulation and Intelligibility (Synthesis Lectures on Speech and Audio Processing)
This lecture is a review of what is known about modeling human speech recognition (HSR). A model is proposed, and data are tested against the model.

There seem to be a large number of theories, or points of view, on how human speech recognition functions, yet few of these theories are comprehensive. What is needed is a set of models that are...

The Secret History of the World: And How to Get Out Alive
The Secret History of the World: And How to Get Out Alive
I suspected something was wrong with the “facts of life” as they were presented to me when I was a kid. Sure, I then spent a little over thirty years trying to be “normal” and make that square peg fit the round hole, “looking for a reason to believe.” But then there was a memorable day when I finally grew up and...
User Interface Design and Evaluation (Interactive Technologies)
User Interface Design and Evaluation (Interactive Technologies)

Whether you are a professional new to the user-centered design field, or an experienced designer who needs to learn the fundamentals of user interface design and evaluation, this book can lead the way.

What will you get from this book? Based on a course from the Open University, UK which has been taught to over a thousand
...

The Aging Spine
The Aging Spine

The "Bone and Joint Decade" draws our attention with increased intensity to the problem of the changes related to aging of our musculoskeletal system and the associated socioeconomic implications. In view of the increasing age of the worldwide population the impact seems to be tremendous. The editors of The Aging Spine pick up this...

68: Optimizing Hemoglobin Levels and Beyond: Strength for Living and Meaningful Survival
68: Optimizing Hemoglobin Levels and Beyond: Strength for Living and Meaningful Survival
Significant advances in the treatment of patients with cancer have occurred over the last decade, as evidenced by steadily improving cure rates and extended durations of survival. There is often a critical trade-off, however, because more intense cytotoxic regimens may result in increased adverse events, including an...
unlimited object storage image
Result Page: Previous 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy