Spacehunter: Adventures in the Forbidden Zone (1983) | Gintama Season 4 ... | Welcome to Marwen (2018)
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mathematical Statistics with Applications
Mathematical Statistics with Applications
This textbook is of an interdisciplinary nature and is designed for a two- or one-semester course in probability and statistics, with basic calculus as a prerequisite. The book is primarily written to give a sound theoretical introduction to statistics while emphasizing applications. If teaching statistics is the main purpose of a...
Face Biometrics for Personal Identification: Multi-Sensory Multi-Modal Systems (Signals and Communication Technology)
Face Biometrics for Personal Identification: Multi-Sensory Multi-Modal Systems (Signals and Communication Technology)

From time immemorial, the security realm and personal identification task had shown progress by employing technological means like secret knowledge as passwords and Personal Identification Numbers, and by using personal possessions as identity cards and Radio Frequency Identification chips. As opposed to these means which are...

Foundations and Advances in Data Mining
Foundations and Advances in Data Mining
With the growing use of information technology and the recent advances in web systems, the amount of data available to users has increased exponentially. Thus, there is a critical need to understand the content of the data. As a result, data-mining has become a popular research topic in recent years for the treatment of the “data rich and...
Game Theory: Introduction and Applications
Game Theory: Introduction and Applications
This textbook is primarily aimed at students undertaking advanced undergraduate courses or introductory postgraduate courses, which incorporate economic applications of game theory. Following the widespread use of game theory in economics such courses are now common in many universities. Although quite a number of textbooks have recently been...
Foundations and Novel Approaches in Data Mining (Studies in Computational Intelligence)
Foundations and Novel Approaches in Data Mining (Studies in Computational Intelligence)
Data-mining has become a popular research topic in recent years for the treatment of the "data rich and information poor" syndrome. Currently, application oriented engineers are only concerned with their immediate problems, which results in an ad hoc method of problem solving. Researchers, on the other hand, lack an understanding of the...
SOA Modeling Patterns for Service Oriented Discovery and Analysis
SOA Modeling Patterns for Service Oriented Discovery and Analysis

One of the most challenging tasks in today’s business and information technology (IT) environments is to communicate a solution to an organizational problem in a simple manner that can be easily understood by business and IT personnel alike. Is it also arduous to explain in simple words how a remedy to an enterprise concern can be...

Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

The Alexander Technique
The Alexander Technique
Nobel Prize-winner Nikolaas Tinbergen hailed the discovery of the. technique. With "growing amazement" he and his family noted "very striking improvements" in high blood pressure, depth of sleep, overall cheerfulness and mental alertness. Tinbergen concluded that the technique may often produce "profound and beneficial...
Core J2EE Patterns: Best Practices and Design Strategies
Core J2EE Patterns: Best Practices and Design Strategies

Over the last few years, Java 2 Platform, Enterprise Edition (J2EE) technology has emerged and matured as a standard platform for building enterprise applications. While the platform has matured into a solid offering for developing and deploying enterprise applications, it does offer its challenges. As developers, often we confuse learning the...

19 Deadly Sins of Software Security (Security One-off)
19 Deadly Sins of Software Security (Security One-off)

This essential book for all software developers--regardless of platform, language, or type of application--outlines the “19 deadly sins” of software security and shows how to fix each one. Best-selling authors Michael Howard and David LeBlanc, who teach Microsoft employees how to secure code, have partnered with John Viega, the man...

Use Case Modeling
Use Case Modeling
Developers who effectively employ use cases deliver better applications--on time and under budget. The concept behind use cases is perhaps as old as software itself; they express the behavior of systems in terms of how users will ultimately interact with them. Despite this inherent simplicity, the use case approach is frequently misapplied,...
Canning Spam: You've Got Mail (That You Don't Want)
Canning Spam: You've Got Mail (That You Don't Want)
We've all seen it — the e-mails that come to us from a sender we don't know and promise a frog that jumps across our screen, a low mortgage rate or a medical miracle pill. These e-mails are otherwise known as spam. Your inbox gets cluttered or worse, your computer is infected with a virus as you scratch your head, wondering how it ever...
Result Page: 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy