Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Introduction to Biometrics
Introduction to Biometrics
A number of crucial societal applications like international border crossing, electronic commerce, and welfare disbursement require reliable person recognition systems. Traditional person authentication methods based on passwords and identity documents often fail to meet the stringent security and performance demands of these...
Murach's ADO.NET 4 Database Programming with C# 2010 (Murach: Training & Reference)
Murach's ADO.NET 4 Database Programming with C# 2010 (Murach: Training & Reference)

Now in its 4th Edition, this book shows C# developers how to use Visual Studio and ADO.NET to develop database applications the way the best professionals do. You'll learn how to:

  • quickly create Windows and web applications by dragging-and-dropping data controls in Visual Studio 2010
  • code your own...
Keep It Simple: A Guide to Assistive Technologies
Keep It Simple: A Guide to Assistive Technologies

Keep it Simple: A Guide to Assistive TechnologieS≪/i> provides a basic tutorial on common assistive computer applications and commonly available, inexpensive hardware and software to help librarians incorporate such aids into the library's current infrastructure.

Focusing on applications commonly available on...

Arduino Robotics (Technology in Action)
Arduino Robotics (Technology in Action)

This book will show you how to use your Arduino to control a variety of different robots, while providing step-by-step instructions on the entire robot building process. You'll learn Arduino basics as well as the characteristics of different types of motors used in robotics. You also discover controller methods and failsafe...

Using MIS (4th Edition)
Using MIS (4th Edition)

An engaging introduction to how people use IS to solve business problems.

 

Using MIS explains why MIS is the most important course in the business school by showing readers how businesses use information systems and technology to accomplish their...

Deficit: Why Should I Care?
Deficit: Why Should I Care?

At the turn of this century, the American national debt stood at just under $6 trillion and the deficit at a "mere" $86 billion. Today, the national debt has topped $14 trillion, and the yearly deficit for 2011 is projected at a whopping $1.4 trillion.

According to the U.S. Treasury Department's Annual...

Mac OS X Lion: Visual Quickstart Guide
Mac OS X Lion: Visual Quickstart Guide
Mac OS X Lion—or also simply called OS X Lion—is the latest version of the computer operating system that put the phrase graphic user interface in everyone’s vocabulary. With Mac OS, you can point, click, and drag to work with files, applications, and utilities. Because the same intuitive interface...
Linux+ Guide to Linux Certification
Linux+ Guide to Linux Certification
As Eric S. Raymond reminds us, Open Source Software will continue to shape the dynamics of the computer software industry for the next long while, just as it has for the last decade. Coined and perpetuated by hackers, the term “Open Source Software” refers to software in which the source code is freely available to...
Computer Games as Educational and Management Tools: Uses and Approaches
Computer Games as Educational and Management Tools: Uses and Approaches

Though once considered purely for their entertainment value, computer and online games have applications as learning tools in learning in a variety of different environments.

Computer Games as Educational and Management Tools: Uses and Approaches considers the many uses of games and simulations, focusing specifically on...

Differential Geometry: Bundles, Connections, Metrics and Curvature (Oxford Graduate Texts in Mathematics, Vol. 23)
Differential Geometry: Bundles, Connections, Metrics and Curvature (Oxford Graduate Texts in Mathematics, Vol. 23)

Bundles, connections, metrics and curvature are the 'lingua franca' of modern differential geometry and theoretical physics. This book will supply a graduate student in mathematics or theoretical physics with the fundamentals of these objects.

Many of the tools used in differential topology are introduced and the
...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Legislative XML for the Semantic Web: Principles, Models, Standards for Document Management
Legislative XML for the Semantic Web: Principles, Models, Standards for Document Management

The Internet already is the broadest and most used source of legal information: in the web one can find most statutory texts (all in some jurisdictions), a vast amount of case law, huge repertoires of doctrinal contributions, many blogs and fora discussing different legal issues. Moreover, as legal activities (legislative,...

Result Page: Previous 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 Next 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy