Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Classification and Learning Using Genetic Algorithms: Applications in Bioinformatics and Web Intelligence (Natural Computing Series)
Classification and Learning Using Genetic Algorithms: Applications in Bioinformatics and Web Intelligence (Natural Computing Series)
Genetic algorithms (GAs) are randomized search and optimization techniques guided by the principles of evolution and natural genetics; they have a large amount of implicit parallelism. GAs perform multimodal search in complex landscapes and provide near-optimal solutions for objective or tness func tion of an...
Raspberry Pi For Kids For Dummies
Raspberry Pi For Kids For Dummies
Getting acquainted with your Raspberry Pi has never been sweeter

Raspberry Pi For Kids For Dummies makes it easy for kids to set-up, operate, and troubleshoot like a Pi pro! Introducing you to Pi through a series of entertaining and inspiring projects, this handy, step-by-step guide shows you how to write computer...

Global Networking, Communication and Culture: Conflict or Convergence?: Spread of ICT, Internet Governance, Superorganism Humanity and Global Culture (Studies in Systems, Decision and Control)
Global Networking, Communication and Culture: Conflict or Convergence?: Spread of ICT, Internet Governance, Superorganism Humanity and Global Culture (Studies in Systems, Decision and Control)
Pursuing an interdisciplinary approach, this book offers detailed insights into the empirical relationships between overall social key figures of states and cultures in the fields of information and communication technology (ICT) (digital divide/inequality), the economy, education and religion. Its goal is to bridge the ‘cultural...
The Thirteen Books of Euclid's Elements, Volume 3
The Thirteen Books of Euclid's Elements, Volume 3
This is a reproduction of a book published before 1923. This book may have occasional imperfections such as missing or blurred pages, poor pictures, errant marks, etc. that were either part of the original artifact, or were introduced by the scanning process. We believe this work is culturally important, and despite the imperfections, have...
Mastering Windows Server 2016
Mastering Windows Server 2016
The IT pro's must-have guide to Windows Server 2016

Mastering Windows Server 2016 is a complete resource for IT professionals needing to get quickly up to date on the latest release. Designed to provide comprehensive information in the context of real-world usage, this book offers expert guidance through the new...

Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools
Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools

Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how to use the tools and how to interpret them. Network Performance...

Object-Oriented JavaScript: Learn everything you need to know about object-oriented JavaScript (OOJS), 3rd Edition
Object-Oriented JavaScript: Learn everything you need to know about object-oriented JavaScript (OOJS), 3rd Edition

Learn everything you need to know about object-oriented JavaScript with this comprehensive guide. Enter the world of cutting-edge development!

Key Features

  • This book has been updated to cover all the new object-oriented features introduced in ECMAScript 6
  • It makes object-oriented...
Java 9 Revealed: For Early Adoption and Migration
Java 9 Revealed: For Early Adoption and Migration
Explore the new Java 9 modules, SDK, JDK, JVM, JShell and more in this comprehensive book that covers what’s new in Java 9 and how to use these new features. Java 9 Revealed is for experienced Java programmers looking to migrate to Java 9.  Author Kishori Sharan begins by covering how to develop Java...
Practical Information Security Management: A Complete Guide to Planning and Implementation
Practical Information Security Management: A Complete Guide to Planning and Implementation

Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information...

Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a
Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a

Do you want to learn ethical hacking/ penetration testing but not sure where to begin? Does the amount of information on the web make you feel overwhelmed and confused? Or maybe your looking to start a career as an ethical hacker and want to further your skills? How about step by step, methodical, literally foolproof approaches to be...

Circuits, Systems and Signal Processing: A Tutorials Approach
Circuits, Systems and Signal Processing: A Tutorials Approach

This book is a collection of tutorial-like chapters on all core topics of signals and systems and the electronic circuits. All the topics dealt with in the book are parts of the core syllabi of standard programs in Electrical Engineering, Electrical and Computer Engineering, and Electronics and Telecommunication Engineering domains. This book...

JAVA DESIGN PATTERNS
JAVA DESIGN PATTERNS
If a problem occurs over and over again, a solution to that problem has been used effectively. That solution is described as a pattern. The design patterns are languageindependent strategies for solving common object-oriented design problems. When you make a design, you should know the names of some common solutions. Learning design...
Result Page: Previous 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 Next 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy