Computer Exploit

3D Computer Vision: Efficient Methods and Applications (repost)  eBooks & eLearning

Posted by interes at Feb. 14, 2017
3D Computer Vision: Efficient Methods and Applications (repost)

Christian Wöhler, "3D Computer Vision: Efficient Methods and Applications"
English | 2009 | ISBN: 3642017312 | 385 pages | PDF | 23 MB

OpenCV 3 Computer Vision Application Programming Cookbook - Third Edition  eBooks & eLearning

Posted by AlenMiler at Feb. 11, 2017
OpenCV 3 Computer Vision Application Programming Cookbook - Third Edition

OpenCV 3 Computer Vision Application Programming Cookbook - Third Edition by Robert Laganiere
English | 6 Mar. 2017 | ISBN: 1786469715 | 573 Pages | PDF (conv) | 13.14 MB
Marketing Audit Handbook: Tools, Techniques and Checklists to Exploit Your Marketing Resources (repost)

Marketing Audit Handbook: Tools, Techniques and Checklists to Exploit Your Marketing Resources by Aubrey Wilson
English | 15 Apr 2002 | ISBN: 0749437359 | 466 Pages | PDF | 2 MB

This title offers practical assistance to marketing and sales departments. Aubrey Wilson seeks to guide the reader out of long-term, formal strategies and jargon into a more straightforward analysis of how to get the most from the marketing audit.

Dealers of Lightning: XEROX-PARC and the Dawn of the Computer Age  eBooks & eLearning

Posted by FenixN at Nov. 20, 2016
Dealers of Lightning: XEROX-PARC and the Dawn of the Computer Age

Dealers of Lightning: XEROX-PARC and the Dawn of the Computer Age
Audio CDs in MP3 / English: MP3, 56 kb/s (1 ch) | Duration: 14:36:54 | 1999 | ISBN-10: 1598038621 | 145 MB
Genre: Technology

Dealers of Lightning is the riveting story of the legendary Xerox PARC–a collection of eccentric young inventors brought together by Xerox Corporation at a facility in Palo Alto, California, during the mind-blowing intellectual ferment of the seventies and eighties.
TTC Video - How to Program: Computer Science Concepts and Python Exercises [2 Versions]

TTC Video - How to Program: Computer Science Concepts and Python Exercises
Course No. 9151 | .M4V, AVC, 2500 kbps, 640x360 | English, AAC, 256 kbps, 2 Ch | 24x30 mins | + PDF Guidebook | 12.02 GB
Course No. 9151 | .M4V, AVC, 535 kbps, 640x360 | English, AAC, 155 kbps, 2 Ch | 24x30 mins | + PDF Guidebook | 3.14 GB
Lecturer: John Keyser, Ph.D.

OpenCV 2 Computer Vision Application Programming Cookbook (repost)  eBooks & eLearning

Posted by libr at Dec. 23, 2015
OpenCV 2 Computer Vision Application Programming Cookbook (repost)

OpenCV 2 Computer Vision Application Programming Cookbook By Robert Laganière
English | 2011 | 304 Pages | ISBN: 1849513244 | PDF | 6,4 MB

Computer Vision: Models, Learning, and Inference (repost)  eBooks & eLearning

Posted by interes at Dec. 19, 2015
Computer Vision: Models, Learning, and Inference (repost)

Computer Vision: Models, Learning, and Inference by Dr Simon J. D. Prince
English | ISBN: 1107011795 | 2012 | PDF + EPUB | 598 pages | 26 + 35 MB

Quantum Computing for Computer Scientists (Repost)  eBooks & eLearning

Posted by nebulae at Nov. 18, 2015
Quantum Computing for Computer Scientists (Repost)

Noson S. Yanofsky, Mirco A. Mannucci, "Quantum Computing for Computer Scientists"
English | ISBN: 0521879965 | 2008 | PDF | 368 pages | 3,2 MB

Image Processing for Computer Graphics and Vision, 2 edition  eBooks & eLearning

Posted by interes at July 11, 2015
Image Processing for Computer Graphics and Vision, 2 edition

Image Processing for Computer Graphics and Vision, 2 edition (Texts in Computer Science) by Luiz Velho and Alejandro C. Frery
English | 2008 | ISBN: 1848001924, 1447160150 | 463 pages | PDF | 18,7 MB

Computer Forensics: Evidence Collection and Management  eBooks & eLearning

Posted by AlenMiler at June 22, 2015
Computer Forensics: Evidence Collection and Management

Computer Forensics: Evidence Collection and Management by Robert C. Newman
English | 9 Mar. 2007 | ISBN: 0849305616, 142006407X | 432 Pages | AZW4/PDF (True) | 15.12 MB

Computer Forensics: Evidence Collection and Management examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers, and electronic devices.