Home | Amazing | Today | Tags | Publishers | Years | Search 
A Wavelet Tour of Signal Processing, Third Edition: The Sparse Way
A Wavelet Tour of Signal Processing, Third Edition: The Sparse Way

I cannot help but find striking resemblances between scientific communities and schools of fish. We interact in conferences and through articles, and we move together while a global trajectory emerges from individual contributions. Some of us like to be at the center of the school, others prefer to wander around, and a few swim in multiple...

Disappearing Cryptography, Third Edition: Information Hiding: Steganography & Watermarking
Disappearing Cryptography, Third Edition: Information Hiding: Steganography & Watermarking
"Disappearing Cryptography is a witty and entertaining look at the world of information hiding. Peter Wayner provides an intuitive perspective of the many techniques, applications, and research directions in the area of steganography. The sheer breadth of topics is outstanding and makes this book truly unique. A must read for...
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for...
Real-Time Embedded Multithreading Using ThreadX and MIPS
Real-Time Embedded Multithreading Using ThreadX and MIPS
Embedded systems are ubiquitous. These systems are found in most consumer electronics, automotive, government, military, communications, and medical equipment. Most individuals in developed countries have many such systems and use them daily, but relatively few people realize that these systems actually contain embedded computer systems. Although...
Advanced Pattern Recognition Technologies with Applications to Biometrics (Premier Reference Source)
Advanced Pattern Recognition Technologies with Applications to Biometrics (Premier Reference Source)
With the increasing concerns on security breaches and transaction fraud, highly reliable and convenient personal verification and identification technologies are more and more requisite in our social activities and national services. Biometrics, used to recognize the identity of an individual, are gaining ever-growing popularity in an extensive...
Securing PHP Web Applications
Securing PHP Web Applications
If you’re reading this, we know two things about you: First, you write PHP applications that run online. Second, you’re not a hard-core security guru. In fact, you’re probably holding this book right now because other security books left you with more questions than you started with, or because this is the first time you’ve...
Optical Fiber Communications: Principles and Practice (3rd Edition)
Optical Fiber Communications: Principles and Practice (3rd Edition)

Senior is an established core text in a field that is growing fast, and in which technology is constantly evolving. The text succeeds in giving a practical introduction to the fundamentals, problems and techniques of design and utilisation of optical fiber systems. It is respected as the most comprehensive and practical book in the...

Learning JavaScript, 2nd Edition
Learning JavaScript, 2nd Edition

If you're new to JavaScript, or an experienced web developer looking to improve your skills, Learning JavaScript provides you with complete, no-nonsense coverage of this quirky yet essential language for web development. You'll learn everything from primitive data types to complex features, including JavaScript...

Social and Political Implications of Data Mining: Knowledge Management in E-Government
Social and Political Implications of Data Mining: Knowledge Management in E-Government
In recent years, data mining has become a powerful tool in assisting society with its various layers and individual elements useful in obtaining intelligent information for making knowledgeable decisions. In the realm of knowledge discovery, data mining is becoming one of the most popular topics in information technology.

Social...

Flash CS4 Professional for Windows and Macintosh: Visual QuickStart Guide
Flash CS4 Professional for Windows and Macintosh: Visual QuickStart Guide
This book covers Flash CS4, including all the features brand new for Flash users. Flash CS4 introduces motion tweening, a new method for animating objects, such as symbols and text fields. Using a new panel, the Motion Editor, Flash developers will find it easier than ever to create sophisticated, lifelike animations. In addition, inverse...
NHibernate in Action
NHibernate in Action
In the classic style of Manning's "In Action" series, NHibernate in Action shows .NET developers how to use the NHibernate Object/Relational Mapping tool. This book is a translation from Java to .NET, as well as an expansion, of Manning's bestselling Hibernate in Action. All traces of Java have been carefully replaced by their .NET...
iPhone in Action: Introduction to Web and SDK Development
iPhone in Action: Introduction to Web and SDK Development
We’ve both been Apple fans for most of our lives. Shannon fondly recalls early games played on the Apple II and that first Macintosh, which really turned his school newspaper around. Christopher turned his own fandom into a real business with his first entrepreneurial venture, Dreams of the Phoenix, a Mac software company.

Thus,
...
Result Page: Previous 234 235 236 237 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy