Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Bandwidth Efficient Coding (IEEE Series on Digital & Mobile Communication)
Bandwidth Efficient Coding (IEEE Series on Digital & Mobile Communication)

This book addresses coding, a new solution to the major challenge of communicating more bits of information in the same radio spectrum.

  • Explores concepts and new transmission methods that have arisen in the last 15 years
  • Discusses the method of faster than Nyquist signaling
  • ...
Practical LPIC-1 Linux Certification Study Guide
Practical LPIC-1 Linux Certification Study Guide
This book is your complete guide to studying for the Linux Professional Institute's Server Professional (LPIC-1) certification. Every concept, principle, process, and resource that might make an appearance on the exam is fully represented. You will understand every concept by rolling up your sleeves, opening up a terminal,...
Modern Data Science with R (Chapman & Hall/CRC Texts in Statistical Science)
Modern Data Science with R (Chapman & Hall/CRC Texts in Statistical Science)

Modern Data Science with R is a comprehensive data science textbook for undergraduates that incorporates statistical and computational thinking to solve real-world problems with data. Rather than focus exclusively on case studies or programming syntax, this book illustrates how statistical programming in the...

JavaScript Absolute Beginner's Guide
JavaScript Absolute Beginner's Guide

JavaScript Absolute Beginner's Guide

No experience necessary!

 

Make the most of JavaScript -- even if you've never programmed anything before. This book is the fastest way to learn JavaScript and use it...

The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that...
Mobile Forensics: Advanced Investigative Strategies
Mobile Forensics: Advanced Investigative Strategies

Key Features

  • A straightforward guide to address the roadblocks face when doing mobile forensics
  • Simplify mobile forensics using the right mix of methods, techniques, and tools
  • Get valuable advice to put you in the mindset of a forensic professional, regardless of your career...
SQL Server 2017 Integration Services Cookbook: Powerful ETL techniques to load and transform data from almost any source
SQL Server 2017 Integration Services Cookbook: Powerful ETL techniques to load and transform data from almost any source

Harness the power of SQL Server 2017 Integration Services to build your data integration solutions with ease

About This Book

  • Acquaint yourself with all the newly introduced features in SQL Server 2017 Integration Services
  • Program and extend your packages to enhance their...
Data Structures & Algorithms in Swift: Implementing practical data structures with Swift 4
Data Structures & Algorithms in Swift: Implementing practical data structures with Swift 4

Learn data structures and algorithms in Swift! Understanding how data structures and algorithms work in code is crucial for creating efficient and scalable apps. Swift’s Standard Library has a small set of general purpose collection types, yet they definitely don’t cover every case! In this book, you’ll learn how to...

Probability and Statistics for Computer Scientists
Probability and Statistics for Computer Scientists

Student-Friendly Coverage of Probability, Statistical Methods, Simulation, and Modeling Tools
Incorporating feedback from instructors and researchers who used the previous edition, Probability and Statistics for Computer Scientists, Second Edition helps students understand general methods of stochastic
...

Agile Model-Based Development Using UML-RSDS
Agile Model-Based Development Using UML-RSDS

This book describes the concepts and application of model-based development (MBD), model transformations, and Agile MBD to a wide range of software systems. It covers systems requirements engineering, system specification and design, verification, reuse, and system composition in the context of Agile MBD. Examples of applications in...

A Practical Introduction to Enterprise Network and Security Management
A Practical Introduction to Enterprise Network and Security Management

Computer networking and cybersecurity are challenging subjects, partly because of the constant rise and fall of related technologies and IT paradigms. As the title implies, much focus of this book is on providing the audience with practical, as well as, theoretical knowledge necessary to build a solid ground for a successful...

DevOps for Digital Leaders: Reignite Business with a Modern DevOps-Enabled Software Factory
DevOps for Digital Leaders: Reignite Business with a Modern DevOps-Enabled Software Factory
Learn to design, implement, measure, and improve DevOps programs that are tailored to your organization. This concise guide assists leaders who are accountable for the rapid development of high-quality software applications.

In DevOps for Digital Leaders, deep collective experience on both...
Result Page: Previous 2 3 4 5 6 7 8 9 10 11 12 13 14 Next 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy