DevOps for Developers
DevOps for Developers delivers a practical, thorough introduction to approaches, processes and tools to foster collaboration between software development and operations. Efforts of Agile software development often end at the transition phase from development to operations. This book covers the delivery of software, this means...
Digital Signal Processing for Medical Imaging Using Matlab
This book describes medical imaging systems, such as X-ray, Computed tomography, MRI, etc. from the point of view of digital signal processing. Readers will see techniques applied to medical imaging such as Radon transformation, image reconstruction, image rendering, image enhancement and restoration, and more.
This book also...
Data Visualization: a successful design process
This book will benefit anyone who wants to discover effective, attractive ways to visually analyze and communicate data. With no special knowledge required, it's an inspirational guide that teaches through examples and illustration.
A portable, versatile and flexible data visualization design approach that will help...
Action Analysis for Animators
Action Analysis is one of the fundamental princples of animation that underpins all types of animation: 2d, 3d, computer animation, stop motion, etc. This is a fundamental skill that all animators need to create polished, believable animation. An example of Action Analysis would be Shrek's swagger in the film, Shrek. The animators clearly...
The art of teaching, Mark Van Doren said, is the art of assisting discovery. I have tried to
write a book that assists students in discovering calculus—both for its practical power and
its surprising beauty. In this edition, as in the first six editions, I aim to convey to the student
a sense of the utility of calculus and... Metasploit Penetration Testing Cookbook
Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...
|Result Page: Previous 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 Next |