Deep Learning for Multimedia Processing Applications is a comprehensive guide that explores the revolutionary impact of deep learning techniques in the field of multimedia processing.
Focusing on the electronic media-television, radio, and the Internet-Audience Economics bridges a substantial gap in the literature by providing an integrated framework for understanding the various businesses involved in generating and selling audiences to advertisers.
Create modular scalable enterprise-grade applications with JBoss Enterprise Application Platform 7About This BookLeverage the power of JBoss EAP 7 along with Java EE 7 to create professional enterprise grade applications.
An in-depth guide to configuring NGINX for your everyday server needsAbout This BookGet tips, tricks, and master insight to help you configure NGINX for any server situationIntegrate NGINX into your applications architecture with is, using hands-on guidance and practical code samples that are free to useTroubleshoot configuration problems before and as they arise, for a seamless NGINX server experienceWho This Book Is ForThis book is for system administrators and engineers who want to personalize NGINX, and design a robust configuration module to solve their hosting problems.
Like it or not, the internet has become integral to every aspect of our lives, with smart phones, tablet computers and wifi enabling us to communicate easily and instantly.
In today's digitally interconnected world, the threat landscape has evolved to include not just sophisticated technical exploits but also the art of human manipulation.
In einer Welt, in der der digitale Raum immer mehr an Bedeutung gewinnt, ist die Fähigkeit, sich als einzigartige Marke zu etablieren, zu einem unverzichtbaren Erfolgsfaktor geworden.
In the digital age, where web applications form the crux of our interconnected existence, Web Hacking Arsenal: A Practical Guide To Modern Web Pentesting emerges as an essential guide to mastering the art and science of web application pentesting.
Big Data and Blockchain Technology for Secure IoT Applications presents a comprehensive exploration of the intersection between two transformative technologies: big data and blockchain, and their integration into securing Internet of Things (IoT) applications.
Embark on a Digital Detox and Revitalize Your LifeImagine liberating yourself from the ever-present pull of the smartphone, breaking free from the chains of endless scrolling.
Whether you're already in the cloud, or determining whether or not it makes sense for your organization, Cloud Computing and Software Services: Theory and Techniques provides the technical understanding needed to develop and maintain state-of-the-art cloud computing and software services.
Bestselling CompTIA A+ author Mike Meyers provides hands-on, step-by-step labs-updated for the 2012 release of Exam 220-802-so you can practice the IT skills essential for your successMike Meyers CompTIA A+ Guide to Managing and Troubleshooting Operating Systems Lab Manual, Fourth Edition contains more than 80 labs that challenge you to solve real-world problems with key concepts.
This book explores the significance of new information technology for socio-cultural change and provides ethnographic insight into the early days of remote working.
Mucho se ha escrito en los últimos tiempos sobre monedas digitales, tanto en libros, blogs, redes y prensa, sin dejar de contar los cientos de videos que circulan en internet.
Si pudiéramos retrotraernos al origen de las redes sociales, ese momento en el cual por primera vez dos usuarios compartieron la foto de un gato dormido en el regazo de un perro, nos resultaría difícil imaginar el mundo político-mediático que habitamos hoy.
Hace mucho que sabemos que vivimos en un mundo muy complejo en donde cada cosa que se hace surge influenciada por todas las demás y, al mismo tiempo, las afecta.
In bits we marvel, in bytes we travel, this is a book written by a techie, Lin Hsin Hsin, which describes, navigates and encapsulates life in the cyberspace in five chapters: Net Life, Net.
This book captures the essence of the current state of research in active media technology and identifies the new changes and opportunities - both current and future - in the field.
This review volume introduces the novel intelligent Web theory called computational Web intelligence (CWI) based on computational intelligence (CI) and Web technology (WT).
Web-based learning involves the use of appropriate technology with the corresponding pedagogical approaches managed in the context of today's educational setting.
As became apparent after the tragic events of September 11, 2001, terrorist groups are increasingly using the Internet as a communication and propaganda tool where they can safely communicate with their affiliates, coordinate action plans, raise funds, and introduce new supporters to their networks.
The book covers the recent advances in web technologies and applications such as web data management, web information integration, web services, web data warehousing and web data mining, which rapidly changed our life in various ways.
The evolution and popularity of the Internet and computing GRID has brought the cooperative computing research discipline to the Internet, for which we coined the term Cooperative Internet Computing (CIC).
Focusing on resource optimization for distributed video and multimedia communications, this book examines four applications in optimal resource allocations with distributed algorithms, including problem formulation, theoretical analysis, and simulation results.
Trading floors in the 60s and 70s involved hundreds of people shouting bids and offers in multi-coloured jackets standing next to each other in different pits, gesticulating with their hands.