Home | Amazing | Today | Tags | Publishers | Years | Search 
Multimedia Encryption and Authentication Techniques and Applications (Internet and Communications)
Multimedia Encryption and Authentication Techniques and Applications (Internet and Communications)

Recent advances in digital communications and storage technologies have brought major changes for consumers. High-capacity hard disks and DVDs can store large amounts of audiovisual data. In addition, faster Internet connection speeds and the emerging high bitrate DSL connections provide sufficient bandwidth for entertainment...

RF System Design of Transceivers for Wireless Communications
RF System Design of Transceivers for Wireless Communications

This book is for RF Engineers and, in particular, those engineers focusing mostly on RF systems and RFIC design. The author develops systematic methods for RF systems design, complete with a comprehensive set of design formulas. Its focus on mobile station transmitter and receiver system design also applies to transceiver design of other...

Bipolar Depression: A Comprehensive Guide
Bipolar Depression: A Comprehensive Guide

Although depression is the most common presentation of bipolar disorder, correct diagnosis generally requires a history of mania and thus presents a formidable challenge. This book provides clinicians with the necessary guidance to distinguish this illness and pursue an appropriate therapeutic course. It brings together a team of clinical...

Getting Started With SAS Enterprise Miner 5.2
Getting Started With SAS Enterprise Miner 5.2
SAS defines data mining as the process of uncovering hidden patterns in large amounts of data. Many industries use data mining to address business problems and opportunities such as fraud detection, risk and affinity analyses, database marketing, householding, customer churn, bankruptcy prediction, and...
Colossus: The Secrets of Bletchley Park's Code-breaking Computers (Popular Science)
Colossus: The Secrets of Bletchley Park's Code-breaking Computers (Popular Science)
"An excellent, ground breaking book, highly recommended."--Books-On-Line

The American ENIAC is customarily regarded as having been the starting point of electronic computation. This book rewrites the history of computer science, arguing that in reality Colossus--the giant computer built by the British secret service during
...
Autonomous Mobile Robots: Sensing, Control, Decision Making and Applications (Control Engineering)
Autonomous Mobile Robots: Sensing, Control, Decision Making and Applications (Control Engineering)
It has long been the goal of engineers to develop tools that enhance our ability to do work, increase our quality of life, or perform tasks that are either beyond our ability, too hazardous, or too tedious to be left to human efforts. Autonomous mobile robots are the culmination of decades of research and development, and their potential is...
2012: The Return of Quetzalcoatl
2012: The Return of Quetzalcoatl

The acclaimed metaphysical epic that binds together the cosmological phenomena of our time, ranging from crop circles to quantum theory to the resurgence of psychedelic drugs, to support the contention of the Mayan calendar that the year 2012 portends a global shift-in consciousness, culture, and way of living-of unprecedented...

Infection and Inflammation: Impacts on Oncogenesis (Contributions to Microbiology, Vol. 13)
Infection and Inflammation: Impacts on Oncogenesis (Contributions to Microbiology, Vol. 13)

The last two decades have shown that the local microenvironment plays a pivotal role in cancer progression. Cancer is not the result of mutation events in single cells, but of a complex interplay of tumor cells, inflammatory cells, stem cells, growth factors, cytokines, chemokines and DNA-damaging agents. This book provides an up-to-date...

Skype(TM): The Definitive Guide
Skype(TM): The Definitive Guide

Learn how to make free phone calls to more than 75 million people, and dirt-cheap phone calls to practically everyone else, anywhere on Earth! You can do it with Skype. This book will help you get started fast, with any computer: Windows, Mac, Linux, even Pocket PC. Then, take Skype to the limit, with SkypeIn, SkypeOut,...

Defeating the Hacker: A non-technical guide to computer security
Defeating the Hacker: A non-technical guide to computer security
This is a book about hackers, crackers, phishing, pharming, spammers, scammers, virus-writers, Trojan horses, malware and spyware, and how to keep them out of your company's computer systems. By which I mean the private computers on your employees' desks in the office and at home, and the servers which look after your company's email, file storage...
.NET Test Automation Recipes: A Problem-Solution Approach (Expert's Voice in .Net)
.NET Test Automation Recipes: A Problem-Solution Approach (Expert's Voice in .Net)
This book presents practical techniques for writing lightweight software test automation in a
.NET environment. If you develop, test, or manage .NET software, you should find this book
useful. Before .NET, writing test automation was often as difficult as writing the code for the
application under test itself. With .NET, you can
...
The MPEG-21 Book
The MPEG-21 Book
Understand the MPEG-21 Multimedia Framework, the standard for the creation, delivery and consumption of multimedia.

This text is the comprehensive guide to MPEG-21, the technology that provides an open framework for multimedia applications. Whereas previous MPEG standards defined compression techniques, MPEG-21...

Result Page: Previous 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy