Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Complex Valued Nonlinear Adaptive Filters: Noncircularity, Widely Linear and Neural Models
Complex Valued Nonlinear Adaptive Filters: Noncircularity, Widely Linear and Neural Models

This book was written in response to the growing demand for a text that provides a unified treatment of linear and nonlinear complex valued adaptive filters, and methods for the processing of general complex signals (circular and noncircular). It brings together adaptive filtering algorithms for feedforward (transversal) and feedback...

Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence

Investigate crimes involving cryptocurrencies and other blockchain technologies

Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their...

The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)

Actionable guidance and expert perspective for real-world cybersecurity

The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world...

The Art of War in the Network Age: Back to the Future (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)
The Art of War in the Network Age: Back to the Future (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)

Previous studies have looked at the contribution of information technology and network theory to the art of warfare as understood in the broader sense. This book, however, focuses on an area particularly important in understanding the significance of the information revolution; its impact on strategic theory. The purpose of the book is to...

Kernel Smoothing: Principles, Methods and Applications
Kernel Smoothing: Principles, Methods and Applications

Comprehensive theoretical overview of kernel smoothing methods with motivating examples

Kernel smoothing is a flexible nonparametric curve estimation method that is applicable when parametric descriptions of the data are not sufficiently adequate. This book explores theory and methods of kernel smoothing in a variety of...

Calculus, Vol. 2: Multi-Variable Calculus and Linear Algebra with Applications to Differential Equations and Probability
Calculus, Vol. 2: Multi-Variable Calculus and Linear Algebra with Applications to Differential Equations and Probability

Volume I presents one-variable calculus with an introduction to linear algebra and volume II presents multi-variable calculus and linear algebra, with applications to differential equations and probability

...
Cybersecurity Law
Cybersecurity Law

A definitive guide to cybersecurity law

Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information...

Unstructured Data Analytics: How to Improve Customer Acquisition, Customer Retention, and Fraud Detection and Prevention
Unstructured Data Analytics: How to Improve Customer Acquisition, Customer Retention, and Fraud Detection and Prevention

Turn unstructured data into valuable business insight

Unstructured Data Analytics provides an accessible, non-technical introduction to the analysis of unstructured data. Written by global experts in the analytics space, this book presents unstructured data analysis (UDA) concepts in a practical way, highlighting...

Performance Management: Integrating Strategy Execution, Methodologies, Risk, and Analytics
Performance Management: Integrating Strategy Execution, Methodologies, Risk, and Analytics

Praise for Praise for Performance Management: Integrating Strategy Execution, Methodologies, Risk, and Analytics

"A highly accessible collection of essays on contemporary thinking in performance management. Readers will get excellent overviews on the Balanced Scorecard, strategy maps, incentives, management...

Digital Signal Processing and Applications with the OMAP - L138 eXperimenter
Digital Signal Processing and Applications with the OMAP - L138 eXperimenter

Teaches digital signal processing concepts via hands-on examples

The OMAP-L138 eXperimenter is the latest inexpensive DSP development system to be adopted by the Texas Instruments University Program. The OMAP-L138 processor contains both ARM and DSP cores and is aimed at portable and mobile multimedia applications. This book...

The One-Page Project Manager for Execution: Drive Strategy and Solve Problems with a Single Sheet of Paper
The One-Page Project Manager for Execution: Drive Strategy and Solve Problems with a Single Sheet of Paper

Drive Strategy With Simplicity–On A Single Sheet Of Paper!

The One-Page Project Manager set a new standard as an understandable and easy-to-apply organizational tool, allowing managers to summarize complex projects on a single information-rich page. This book, third in the OPPM series, describes how to combine...

Mathematics of Shape Description: A Morphological Approach to Image Processing and Computer Graphics
Mathematics of Shape Description: A Morphological Approach to Image Processing and Computer Graphics
Image processing problems are often not well defined because real images are contaminated with noise and other uncertain factors. In Mathematics of Shape Description, the authors take a mathematical approach to address these problems using the morphological and set-theoretic approach to image processing and computer graphics by presenting...
Result Page: 310 309 308 307 306 305 304 303 302 301 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy