Home | Amazing | Today | Tags | Publishers | Years | Search 
Linux Multimedia Hacks
Linux Multimedia Hacks

The fact that Linux has more multimedia application choices than Mac OS X and Windows combined may come as a surprise to many, but not to those who know Linux well. In Linux Multimedia Hacks, author Kyle Rankin showcases the best available multimedia tools so you can maximize the entertainment...

Understanding Linux Network Internals
Understanding Linux Network Internals

If you've ever wondered how Linux carries out the complicated tasks assigned to it by the IP protocols -- or if you just want to learn about modern networking through real-life examples -- Understanding Linux Network Internals is for you.

Like the popular O'Reilly...

Windows Server 2003 Security Cookbook
Windows Server 2003 Security Cookbook
In the last few years, security has become a hot-button issue for IT organizations of all sizes. Accordingly, many of the security features that were either optional or suspect in Windows 2000 have become solid, effective fixtures in Windows Server 2003-making it the most secure operating system Microsoft has ever produced. That is, if you know...
Head First HTML with CSS & XHTML
Head First HTML with CSS & XHTML

Tired of reading HTML books that only make sense after you're an expert? Then it's about time you picked up Head First HTML with CSS & XHTML and really learned HTML. You want to learn HTML so you can finally create those web pages you've always wanted, so you can communicate more effectively with friends, family,...

Enterprise Service Oriented Architectures: Concepts, Challenges, Recommendations
Enterprise Service Oriented Architectures: Concepts, Challenges, Recommendations

Conventional wisdom of the "software stack" approach to building applications may no longer be relevant. Enterprises are pursuing new ways of organizing systems and processes to become service oriented and event-driven. Leveraging existing infrastructural investments is a critical aspect to the success of companies both large and...

Knowledge Mining: Proceedings of the NEMIS 2004 Final Conference
Knowledge Mining: Proceedings of the NEMIS 2004 Final Conference
This book contains the papers presented during the 3rd International Workshop on Text Mining and its Applications held in Athens, Greece. This workshop is the final event of the activities of a network of excellence in the area of text mining and its applications. Knowledge Mining includes contributions in the areas of: Document processing,...
Gaussian Processes for Machine Learning (Adaptive Computation and Machine Learning)
Gaussian Processes for Machine Learning (Adaptive Computation and Machine Learning)
Gaussian processes (GPs) provide a principled, practical, probabilistic approach to learning in kernel machines. GPs have received increased attention in the machine-learning community over the past decade, and this book provides a long-needed systematic and unified treatment of theoretical and practical aspects of GPs in machine learning. The...
Perioperative Transfusion Medicine
Perioperative Transfusion Medicine
Thoroughly updated for its Second Edition, this volume is the most comprehensive, current reference on perioperative transfusion medicine and coagulation. It provides complete information on all current blood products and transfusion risks, transfusion and coagulation issues during the preoperative, intraoperative, and postoperative periods, and...
Multimedia Fingerprinting Forensics for Traitor Tracing (EURASIP Book Series on Signal Processing and Communications)
Multimedia Fingerprinting Forensics for Traitor Tracing (EURASIP Book Series on Signal Processing and Communications)
The popularity of multimedia content has led to the widespread distribution and consumption of digital multimedia data. As a result of the relative ease with which individuals may now alter and repackage digital content, ensuring that media content is employed by authorized users for its intended purpose is becoming an issue of eminent importance...
Introduction to Data Compression, Third Edition (Morgan Kaufmann Series in Multimedia Information and Systems)
Introduction to Data Compression, Third Edition (Morgan Kaufmann Series in Multimedia Information and Systems)

The second edition of Introduction to Data Compression builds on the features that made the first the logical choice-for practitioners who need a comprehensive guide to compression for all types of multimedia and instructors who want to equip their students with solid foundations in these increasingly important and diverse...

Fuzzy and Neutrosophic Analysis of Periyars Views on Untouchability
Fuzzy and Neutrosophic Analysis of Periyars Views on Untouchability
For the first time, the social problem of untouchability, which is peculiar to India, is being studied mathematically.

We have used Fuzzy Cognitive Maps and Neutrosophic Cognitive Maps to analyze the views of the revolutionary Periyar E. V. Ramasamy (17.09.1879 – 24.12.1973) who relentlessly worked for more than five decades to secure the...

Math You Can't Use: Patents, Copyright, and Software
Math You Can't Use: Patents, Copyright, and Software
The field of software is awash in disputes. Market participants and analysts routinely disagree on how computer programs should be produced, marketed, regulated, and sold. On one subject, however, just about everyone can agree: the current intellectual property protection regime for software is a mess. At present, all of the traditional means...
Result Page: Previous 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy