Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Character Recognition Systems: A Guide for Students and Practitioners
Character Recognition Systems: A Guide for Students and Practitioners
"Much of pattern recognition theory and practice, including methods such as Support Vector Machines, has emerged in an attempt to solve the character recognition problem. This book is written by very well-known academics who have worked in the field for many years and have made significant and lasting contributions. The book will no doubt be...
The Complete Idiot's Guide to Statistics, 2nd Edition
The Complete Idiot's Guide to Statistics, 2nd Edition
Statistics, statistics everywhere, but not a single word can we understand! Actually, understanding statistics is a critically important skill that we all need to have in this day and age. Every day, we are inundated with data about politics, sports, business, the stock market, health issues, financial matters, and many other topics....
Beginning Game Development with Python and Pygame: From Novice to Professional
Beginning Game Development with Python and Pygame: From Novice to Professional
Like music and movies, video games are rapidly becoming an integral part of our lives. Over the years, you've yearned for every new gaming console, mastered each blockbuster within weeks after its release, and have even won a local gaming competition or two. But lately you've been spending a lot of time thinking about a game idea of your own, or...
Calculus (Stewart's Calculus Series)
Calculus (Stewart's Calculus Series)

Success in your calculus course starts here! James Stewart's CALCULUS texts are world-wide best-sellers for a reason: they are clear, accurate, and filled with relevant, real-world examples. With CALCULUS, Sixth Edition, Stewart conveys not only the utility of calculus to help you develop technical competence, but also gives you an...

Preparing for the Worst: A Comprehensive Guide to Protecting Your Family from Terrorist Attacks, Natural Disasters, and Other Catastrophes
Preparing for the Worst: A Comprehensive Guide to Protecting Your Family from Terrorist Attacks, Natural Disasters, and Other Catastrophes

Preparing for the Worst details the best practices in antiterrorism tactics and preparing for disaster. This book is for typical American families, business travelers, corporate executive management personnel, emergency first responders, school administrators, and local government officials responsible for public safety and emergency...

Spatial Interpolation for Climate Data: The Use of GIS in Climatology and Meterology
Spatial Interpolation for Climate Data: The Use of GIS in Climatology and Meterology
The COST 719 European research program (“The use of GIS in climatology and meteorology”) began in 2001 and ended in 2006. 20 European countries participated. Its main objective was to establish interfaces between GIS and data in climatology and meteorology and in order to reach this objective, three working groups were defined:
...
Windows PowerShell in Action
Windows PowerShell in Action
PowerShell replaces cobbled-together assemblies of third-party management tools with an elegant programming language and a powerful scripting shell for the Windows environment. In the tradition of Manning's ground breaking "In Action" series, this book comes from right from the source. Written by Bruce Payette, one of principal creators...
Urinary Stone Disease: The Practical Guide to Medical and Surgical Management (Current Clinical Urology)
Urinary Stone Disease: The Practical Guide to Medical and Surgical Management (Current Clinical Urology)

This practical guide is a compendium of contemporary views on the development, treatment, and prevention of urinary stone disease. Emphasis is placed on utilizing current research to highlight areas of potential discovery and inspire novel approaches to easing the burden of urinary stone disease.

...
Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)
Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)
David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software.
  • Learn about the various firewall models, user interfaces,...
Securing Biometrics Applications
Securing Biometrics Applications
Biometrics is becoming increasingly common in establishments that require high security such as state security and financial sectors. The increased threat to national security by terrorists has led to the explosive popularity of biometrics. A number of biometric devices are now available to capture biometric measurements such as fingerprints, palm,...
Oracle Database 11g: New Features for DBAs and Developers (Expert's Voice in Oracle)
Oracle Database 11g: New Features for DBAs and Developers (Expert's Voice in Oracle)
Oracle Database 11g: New Features for DBAs and Developers is a comprehensive, example–laden review of the most significant new features and improvements offered by the latest release of Oracle Corporation’s flagship database product.
  • Learn what’s new in Oracle that really counts.
  • See actual...
The Myths of Innovation
The Myths of Innovation
How do you know whether a hot technology will succeed or fail? Or where the next big idea will come from? The best answers come not from the popular myths we tell about innovation, but instead from time-tested truths that explain how we've made it this far. This book shows the way.

In The Myths of Innovation, bestselling
...
Result Page: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy