Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Loading
Data Mining: Foundations and Intelligent Paradigms: VOLUME 2: Statistical, Bayesian, Time Series and other Theoretical Aspects
Data Mining: Foundations and Intelligent Paradigms: VOLUME 2: Statistical, Bayesian, Time Series and other Theoretical Aspects

There are many invaluable books available on data mining theory and applications. However, in compiling a volume titled “DATA MINING: Foundations and Intelligent Paradigms: Volume 2: Core Topics including Statistical, Time-Series and Bayesian Analysis” we wish to introduce some of the latest developments to a broad audience of...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Black & Decker The Complete Guide to Wiring, 5th Edition: Current with 2011-2013 Electrical Codes
Black & Decker The Complete Guide to Wiring, 5th Edition: Current with 2011-2013 Electrical Codes
The world of wiring tends to move in cycles, so to speak. The basic science that causes your blender to whir when you plug the cord into a wall outlet doesn’t change, but the ways we harness and manage electrical power are constantly improving—always with an eye toward safety. The Complete Guide to Wiring changes, too....
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

With the increasing focus on IT Security comes a higher demand for identity management in the modern business. This requires a flexible, scalable, and secure authentication method. Identity control is made mandatory by many public standards, such as PCI, and PKI is an essential component to set up authentication in many technologies,...

PostGIS in Action
PostGIS in Action
Whether you're canvassing a congressional district, managing a sales region, mapping city bus schedules, or analyzing local cancer rates, thinking spatially opens up limitless possibilities for database users. PostGIS, a freely available open-source spatial database extender, can help you answer questions that you could not answer using...
The Software IP Detective's Handbook: Measurement, Comparison, and Infringement Detection
The Software IP Detective's Handbook: Measurement, Comparison, and Infringement Detection

This book is generally about software intellectual property and specifically about the field of software forensics. While you may never testify in a courtroom, attempt to deduce the true owner of a valuable program, or measure the intellectual property (IP) value of software source code, if you are at all involved with software you...

Java: An Introduction to Problem Solving and Programming (6th Edition)
Java: An Introduction to Problem Solving and Programming (6th Edition)

Java: An Introduction to Problem Solving and Programming, 6e, is ideal for introductory Computer Science courses using Java, and other introductory programming courses in departments of Computer Science, Computer Engineering, CIS, MIS, IT, and Business. Students are introduced to object-oriented programming and important...

How to Master the Art of Selling from SmarterComics
How to Master the Art of Selling from SmarterComics

After failing during the first six months of his career in sales, Tom Hopkins discovered and applied the very best sales techniques, then earned more than one million dollars in just three years. What turned Tom Hopkins around? The answers are revealed in How to Master the Art of Selling from SmarterComics, as Tom explains to readers what the...

Computer Processing of Remotely-Sensed Images: An Introduction
Computer Processing of Remotely-Sensed Images: An Introduction

Environmental remote sensing is the measurement, from a distance, of the spectral features of the Earth’s surface and atmosphere. These measurements are normally made by instruments carried by satellites or aircraft, and are used to infer the nature and characteristics of the land or sea surface, or of the atmosphere, at the...

Scaling up Machine Learning: Parallel and Distributed Approaches
Scaling up Machine Learning: Parallel and Distributed Approaches

This book presents an integrated collection of representative approaches for scaling up machine learning and data mining methods on parallel and distributed computing platforms. Demand for parallelizing learning algorithms is highly task-specific: in some settings it is driven by the enormous dataset sizes, in others by model complexity or by...

Total English. Intermediate
Total English. Intermediate

* Over 50% new material * New DVD material with Film Bank on the Active Book disc * New Writing Bank which makes writing a fun and engaging activity * Pronunciation Bank gives students phonetic examples of unit vocabulary Active Book is the digital version of the Students' Book with interactive activities * Easy navigation of the...

PMP Certification All-In-One Desk Reference For Dummies
PMP Certification All-In-One Desk Reference For Dummies

Be as prepared as possible to take the PMP certification exam

The PMP certification is the most popular project management certification available, but also a very difficult certification to obtain with very demanding requirements. That's where this All-in-One reference comes in. Packed with valuable information for...

Result Page: Previous 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 Next 
©2017 LearnIT (support@pdfchm.net) - Privacy Policy