|
|
Knowledge-Based Intelligent Techniques in Character RecognitionKnowledge-Based Intelligent Techniques in Character Recognition presents research results on intelligent character recognition techniques, reflecting the tremendous worldwide interest in the applications of knowledge-based techniques in this challenging field. This resource will interest anyone involved in computer science, computer engineering,... | | Cisco IOS EssentialsWho cares about configuring network routers? Network routers are a major part of the glue that holds all computer networks together. Routers are supposed to configure themselves right? Not really. Routers aren’t to the point of being able to configure themselves, yet. They have no artificial intelligence agent so almost everything on them... | | Focus on Advanced English: CAE Grammar Practice With Pull-Out KeyThis workbook is designed to accompany "Focus on Advanced English CAE", providing thorough grammar practice, supplementary vocabulary exercises and regular progress tests. The 14 units in the workbook correspond to each unit in the parent text, providing students with further practice in the grammar and vocabulary necessary at this level.... |
|
Microsoft Press Computer Dictionary, 4th EditionA comprehensive dictionary for people who work with microcomputers but aren't computer professionals. Some 5,000 entries define both basic and more advanced terms, and include phonetic pronunciations where appropriate. Some definitions are accompanied by drawings, diagrams, or other graphics. Annotation copyright Book News, Inc. Portland, Or. ... | | | | Running Microsoft Office 2000 Small BusinessThe book you now hold is an insider's guide to Microsoft Office 2000, an exciting collection of application programs and accessories that every business and home can use. We have designed this guidebook with the practical goal of making you an expert in Office 2000 commands, procedures, and techniques. When you're finished, you'll have all... |
|
|
Cisco Security ArchitecturesCisco Security Architectures demystifies access lists, the PIX Firewall, and how to secure a Cisco based network.
In today's age of remote users and widespread Internet access, security continues to be of utmost importance to network administrators and engineers. This important, comprehensive guide shows you how to avoid common mistakes... | | Business Process Implementation for IT Professionals and ManagersThe King is dead; long live the King! That famous cry sums up most aspects of modern business practice. The previously existing competitive environment, scope, internal structures, and automation support needs of an enterprise have disappeared and been replaced by other sets of conditions and requirements. In time, those needs, too, will... | | Sams Teach Yourself Data Structures and Algorithms in 24 HoursSams Teach Yourself Data Structures and Algorithms in 24 Hours presents data structures and algorithms in an easy-to-read, easy-to-understand style, allowing you to grasp the concepts quickly and apply the knowledge to your programs. The very popular C++ programming language is used for examples and code samples.
This book is about data... |
|
Result Page: Previous 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 Next |