Home | Amazing | Today | Tags | Publishers | Years | Search 
Fighting Terror in Cyberspace (Series in Machine Perception & Artifical Intelligence)
Fighting Terror in Cyberspace (Series in Machine Perception & Artifical Intelligence)
The Internet, or the ARPANET in its original name, was a remarkable idea. The Net was designed in the late 60's by US ARPA (Advanced Research Projects Agency) to connect distant computers to each other. This was a critical need at a time when each computer was a precious resource of computing power, which, if connected, could be shared among...
Fundamentals of Robotics: Linking Perception to Action (Machine Perception and Artificial Intelligence, 54)
Fundamentals of Robotics: Linking Perception to Action (Machine Perception and Artificial Intelligence, 54)
Tomorrow's robots, which includes the humanoid robot, can perform task like tutoring children, working as tour guides, driving humans to and from work, do the family shopping etc. Tomorrow's robots will enhance lives in ways we never dreamed possible. No time to attend the decisive meeting on Asian strategy? Let your robot go for you and make the...
Monitoring, Security, and Rescue Techniques in Multiagent Systems (Advances in Soft Computing)
Monitoring, Security, and Rescue Techniques in Multiagent Systems (Advances in Soft Computing)
In todays society the issue of security, understood in the widest context, have become a crucial one. The people of the information age, having instant access to the sources of knowledge and information expect the technology to improve their safety in all respects. That, straightforwardly, leads to the demand for methods, technologies, frameworks...
Field and Service Robotics: Recent Advances in Research and Applications (Springer Tracts in Advanced Robotics)
Field and Service Robotics: Recent Advances in Research and Applications (Springer Tracts in Advanced Robotics)
Since its inception in 1996, FSR, the biannual "International Conference on Field and Service Robotics" has published archival volumes of high reference value. This unique collection is the post-conference proceedings of the 4th FSR in Lake Yamanaka, Japan at July 2003. This book edited by Shin’ichi Yuta, Hajime Asama, Sebastian...
Dialogue Editing for Motion Pictures: A Guide to the Invisible Art
Dialogue Editing for Motion Pictures: A Guide to the Invisible Art
Dialogue editing is a crucial yet invisible part of filmmaking. Do it right, and no one notices. Do it wrong, and your film or video sounds messy, distracting, and unrealistic. This is a book for people who need to edit production sound for film, TV, or video but were never taught how to do it. It goes step by step through the process and covers...
Patterns of Agile Practice Adoption
Patterns of Agile Practice Adoption

As more and more people move towards adoption of Agile practices, they are looking for guidance and advice on how to adopt Agile successfully. Unfortunately many of the questions they have such as: "Where do I start?", "What specific practices should I adopt?", "How can I adopt incrementally?" and "Where can...

Hedge Fund Course (Wiley Finance)
Hedge Fund Course (Wiley Finance)
A self-study course that reviews the technical and quantitative knowledge necessary to properly manage a hedge fund Today, traditional asset managers are looking to develop their own hedge funds as alternative offerings to their clients. Hedge Fund Course presents all the technical and quantitative knowledge necessary to run a leveraged investment...
Network Warrior
Network Warrior

Written by networking veteran with 20 years of experience, Network Warrior provides a thorough and practical introduction to the entire network infrastructure, from cabling to the routers. What you need to learn to pass a Cisco certification exam such as CCNA and what you need to know to survive in the real world are two very...

Java Data Mining: Strategy, Standard, and Practice: A Practical Guide for architecture, design, and implementation
Information Security Management Handbook, Fifth Edition, Volume 3
Information Security Management Handbook, Fifth Edition, Volume 3
Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and...
Access Data Analysis Cookbook
Access Data Analysis Cookbook
If you have large quantities of data in a Microsoft Access database, and need to study that data in depth, this book is a data cruncher's dream. Access Data Analysis Cookbook offers practical recipes to solve a variety of common problems that users have with extracting Access data and performing calculations on it. Each recipe includes a...
Excel 2007: Beyond the Manual
Excel 2007: Beyond the Manual
Many experienced users may initially find Excel 2007 rather disorientating. But Excel 2007: Beyond the Manual will introduce those who are already familiar with Excel basics to more advanced features, like consolidation, what-if analysis, PivotTables, sorting and filtering, and some commonly used functions.

You'll learn how to maximize...

Result Page: 720 719 718 717 716 715 714 713 712 711 710 709 708 707 706 705 704 703 702 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy