Search

Search Results

Results 1-10 of 10 (Search time: 0.06 seconds).
  • Previous
  • 1
  • Next
Item hits:
  • Sách/Book


  • Authors: Bernd Jähne (2005)

  • Firstly, the whole textbook is now clearly partitioned into basic and advanced material in order to cope with the ever-increasing field of digital image processing. The most important equations are put into framed boxes. The advanced sections are located in the second part of each chapter and are marked by italic headlines and by a smaller typeface. In this way, you can first work your way through the basic principles of digital image processing without getting overwhelmed by the wealth of the material. You can extend your studies later to selected topics of interest.

  • Sách/Book


  • Authors: Nancy L. Leech (2005)

  • Designed to help students learn to analyze and interpret research data using intermediate statistics, this new edition features SPSS 12.0 for Windows, but can also be used with earlier versions. Each chapter introduces several related statistics and provides instructions on how to run them and interpret the outputs. The authors describe the use and interpretation of these statistics in user-friendly, non-technical language. The authors demonstrate how to choose the appropriate statistic based on the research design, how to use SPSS to answer research questions, and how to interpret and write about SPSS outputs. SPSS for Intermediate Statistics, 2/e provides unique learning tools.

  • Sách/Book


  • Authors: Joseph Migga Kizza (2005)

  • A comprehensive survey of computer network security concepts, methods, and practices. This authoritative volume provides an optimal description of the principles and applications of computer network security in particular, and cyberspace security in general. The book is thematically divided into three segments: Part I describes the operation and security conditions surrounding computer networks; Part II builds from there and exposes readers to the prevailing security situation based on a constant security threat; and Part III - the core - presents readers with most of the best practices and solutions currently in use. It is intended as both a teaching tool and reference. This broad-ranging text/reference comprehensively surveys computer network security concepts, methods, and practi...

  • Sách/Book


  • Authors: Barry Wilkinson (2005)

  • The book covers the timely topic of cluster programming, interesting to many programmers due to the recent availability of low-cost computers. Uses MPI pseudocodes to describe algorithms and allows different programming tools to be implemented, and provides readers with thorough coverage of shared memory programming, including Pthreads and OpenMP. Useful as a professional reference for programmers and system administrators.

  • Sách/Book


  • Authors: Thomas, David (2005)

  • This is the definitive reference manual for Ruby, including a description of all the standard library modules, a complete reference to all built-in classes and modules (including more than 250 significant changes since the First Edition). Coverage of other features has grown tremendously, including details on how to harness the sophisticated capabilities of irb, so you can dynamically examine and experiment with your running code

  • Sách/Book


  • Authors: Kathy Sierra (2005)

  • You'll see why people say it's unlike any other Java book you've ever read. By exploiting how your brain works, Head First Java compresses the time it takes to learn and retain--complex information. Its unique approach not only shows you what you need to know about Java syntax, it teaches you to think like a Java programmer.

  • Sách/Book


  • Authors: Trần Công Hùng (2005)

  • Lịch sử ra đời mạng riêng ảo. Những khái niệm cơ bản, tính năng nghiệp vụ, quản lí mạng. Cước phí và chính sách kinh doanh nghiệp vụ mạng riêng ảo. Một số nét tình hình ứng dụng mạng riêng ảo ở Mĩ, Trung Quốc... ứng dụng mạng riêng ảo ở Việt Nam