تبلیغات
Computer Book - مطالب ابر Computer

COLLECTION OF VIDEO COMPUTER, IT, INTERNET, VIDEO GAME, HACKING AND FILE-SHARING FULL

نوشته شده در تاریخ : شنبه 26 آذر 1390   05:01 ب.ظ


Collection of video Computer, IT, Internet, Video Game, Hacking and File-Sharing Full
Language: English
AVI | XviD 1191kbps | 624 x 336 25fps | MP3 128kbps | 5.08 GB

Genre: e-Learning

A collection of 54 computer, IT, internet, video game, hacking, file sharing and related documentaries.
These are all encoded as Xvid avi’s with mostly MP3 audio but at different bitrates.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: COMPUTER، IT، INTERNET، VIDEO GAME، HACKING AND FILE-SHARING FULL،

(Interactive Computer Graphics: A Top-Down Approach with Shader-Based OpenGL (6th Edition

نوشته شده در تاریخ : جمعه 8 مهر 1390   07:45 ب.ظ

 Interactive Computer Graphics: A Top Down Approach with Shader Based OpenGL (6th Edition)
Add ison We sley | 2011 | ISBN: 0132545233 | 768 pages | PDF | 12,5 MB

This book is suitable for undergraduate students in computer science and engineering, for students in other disciplines who have good programming skills, and for professionals.
Computer animation and graphics–once rare, complicated, and comparatively expensive–are now prevalent in everyday life from the computer screen to the movie screen. Interactive Computer Graphics: A Top-Down Approach with Shader-Based OpenGL®, 6e, is the only introduction to computer graphics text for undergraduates that fully integrates OpenGL 3.1 and emphasizes application-based programming. Using C and C++, the top-down, programming-oriented approach allows for coverage of engaging 3D material early in the text so readers immediately begin to create their own 3D graphics. Low-level algorithms (for topics such as line drawing and filling polygons) are presented after readers learn to create graphics.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: 3D، Computer، Graphics،

Complete Web Monitoring

نوشته شده در تاریخ : شنبه 8 مرداد 1390   04:18 ب.ظ

نوع مطلب :توسعه وب ،Cloud ،

1599835598 Complete Web Monitoring

Book Description
Do you really understand your  presence? Are you confident that visitors can use your website? Do you know their motivations? How do  communities perceive your company? To innovate and adapt your  quickly, you must know the answers to these questions. Complete  Monitoring demonstrates how to measure every aspect of your  presence — including analytics, backend performance, usability, communities, customer feedback, and competitive analysis — whether you’re running an e-commerce site, a community, a media property, or a Software-as-a-Service company. This book’s concrete examples, clear explanations, and practical recommendations make it essential for anyone who runs a website. With this book you will:


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: administrator، Business، Cloud، Computer، Data، How to، internet، LinkedIn، Linux، Management، Music، Online، optimization، social، Testing، Twitter، web،

Computer Vision: Detection, Recognition and Reconstruction

نوشته شده در تاریخ : پنجشنبه 6 مرداد 1390   06:58 ب.ظ

1848146096 Computer Vision: Detection, Recognition and Reconstruction

Book Description
 is the science and technology of making machines that see. It is concerned with the theory, design and implementation of algorithms that can automatically process visual data to recognize objects, track and recover their shape and spatial layout. The International  Summer School – ICVSS was established in 2007 to provide both an objective and clear overview and an in-depth analysis of the state-of-the-art research in . The courses are delivered by world renowned experts in the field, from both academia and industry, and cover both theoretical and practical aspects of real  problems. The school is organized every year by University of Cambridge ( and Robotics Group) and University of Catania (Image Processing Lab). Different topics are covered each year. A summary of the past  Summer Schools can be found at:http://www.dmi.unict.it/icvss This edited volume contains a selection of articles covering some of the talks and tutorials held during the first two editions of the school on topics such as Recognition, Registration and Reconstruction. The chapters provide an in-depth overview of these challenging areas with key references to the existing literature.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: Computer Vision، Computer،

Computer Vision: Algorithms and Applications

نوشته شده در تاریخ : پنجشنبه 6 مرداد 1390   06:02 ب.ظ

نوع مطلب :الگریتم | محاسبات  ،

1691850850 Computer Vision: Algorithms and Applications

Book Description
Humans perceive the three-dimensional structure of the world with apparent ease. However, despite all of the recent advances incomputer vision research, the dream of having a computerinterpret an image at the same level as a two-year old remains elusive. Why is computer vision such a challenging problem and what is the current state of the art?

Computer VisionAlgorithms and Applications explores the variety of techniques commonly used to analyze and interpret images. It also describes challenging real-world applications where vision is being successfully used, both for specialized applications such as medical imaging, and for fun, consumer-level tasks such as image editing and stitching, which students can apply to their own personal photos and videos.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: Algorithm، apps، Computer، Computer Vision، Networking،

(Guide to Computer Forensics and Investigations (3rd Edition

نوشته شده در تاریخ : پنجشنبه 9 تیر 1390   10:32 ق.ظ

نوع مطلب :سخت افزار ،

001c2f0d medium Guide to Computer Forensics and Investigations (3rd Edition)Guide to  Forensics and Investigations (3rd Edition)

Course Technology | ISBN : 1435498836 | September 28, 2009 | 715 pages | PDF | 19MB
This resource guides readers through conducting a high-tech investigation, from acquiring digital evidence to reporting its findings. Updated coverage includes new software and technologies as well as up-to-date reference sections, and content includes how to set up a forensics lab, how to acquire the proper and necessary tools, and how to conduct the investigation and subsequent digital analysis. It is appropriate for students new to the field, or as a refresher and technology update for professionals in law enforcement, investigations, or computer security.

ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: Computer،