Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
ISA System Architecture (3rd Edition)
ISA System Architecture (3rd Edition)

*ISA System Architecture describes the hardware architecture of ISA (Industry Standard Architecture), providing a clear, concise explanation of an ISA system in detail. The authors provide a comprehensive treatment of the bus including: **-bus cycles *-addressing *-I/O *-RAM, ROM, and cache memory *-cache architectures *-decode and reset...

Sony Clie for Dummies
Sony Clie for Dummies
Put your office and more in the palm of your hand!

Manage contacts, tasks, and appointments, send e-mail, and play games

Your Sony CLIÉ is an amazing gadget, and with this book to guide you, it’ll soon become your best friend. Sure, it keeps your schedule, to-do list, and address book, but did you know it’ll also...

CCSP Flash Cards and Exam Practice Pack (Flash Cards and Exam Practice Packs)
CCSP Flash Cards and Exam Practice Pack (Flash Cards and Exam Practice Packs)

Practice for the CCSP exams with the best-selling late stage exam practice series for Cisco certifications!

  • Prepare for all 5 CCSP exams--SECUR, CSPFA, CSVPN, CSIDS, and CSI--with proven late-stage self-study tools

  • 1000 flashcards in...

Artificial Intelligence (Handbook Of Perception And Cognition)
Artificial Intelligence (Handbook Of Perception And Cognition)
The problem of perception and cognition is understanding how the organism transforms, organizes, stores, and uses information arising from the world in sense data or memory. With this definition of perception and cognition in mind, this handbook is designed to bring together the essential aspects of this very large, diverse, and scattered...
Running Xen: A Hands-On Guide to the Art of Virtualization
Running Xen: A Hands-On Guide to the Art of Virtualization
“This accessible and immediately useful book expertly provides the Xen community with everything it needs to know to download, build, deploy and manage Xen implementations.”

—Ian Pratt, Xen Project Leader VP Advanced Technology, Citrix Systems

Java 8 Pocket Guide
Java 8 Pocket Guide

When you need quick answers for developing or debugging Java programs, this pocket guide provides a handy reference to standard features of the Java programming language and its platform. You’ll find helpful programming examples, tables, figures, and lists, as well as Java 8 features such as Lambda Expressions and the Date and...

Learn Unity ML-Agents - Fundamentals of Unity Machine Learning: Incorporate new powerful ML algorithms such as Deep Reinforcement Learning for games
Learn Unity ML-Agents - Fundamentals of Unity Machine Learning: Incorporate new powerful ML algorithms such as Deep Reinforcement Learning for games

Transform games into environments using machine learning and Deep learning with Tensorflow, Keras, and Unity

Key Features

  • Learn how to apply core machine learning concepts to your games with Unity
  • Learn the Fundamentals of Reinforcement Learning and Q-Learning and apply...
Underland: A Deep Time Journey
Underland: A Deep Time Journey

National Bestseller • New York Times “100 Notable Books of the Year” • NPR “Favorite Books of 2019” • Guardian “100 Best Books of the 21st Century” • Winner of the National Outdoor Book Award

From the best-selling,
...

Distributed Computing with Go: Practical concurrency and parallelism for Go applications
Distributed Computing with Go: Practical concurrency and parallelism for Go applications

A tutorial leading the aspiring Go developer to full mastery of Golang's distributed features.

Key Features

  • This book provides enough concurrency theory to give you a contextual understanding of Go concurrency
  • It gives weight to synchronous and asynchronous data...
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks

Master malware analysis to protect your systems from getting infected

Key Features

  • Set up and model solutions, investigate malware, and prevent it from recurring
  • Learn core concepts relating to dynamic malware analysis, memory forensics, decryption, and much more
  • ...
Arduino Cookbook
Arduino Cookbook
This book was written by Michael Margolis with Nick Weldin to help you explore the amazing things you can do with Arduino. Arduino is a family of microcontrollers (tiny computers) and a software creation environment that makes it easy for you to create programs (called sketches) that can interact with the...
Handbook of the Aging Brain
Handbook of the Aging Brain

Handbook of the Aging Brain brings together diverse scientific disciplines to cover the most recent research findings in an easy-to-read summary. Scientists and clinicians will find a wide spectrum of subjects including gerontology, neurology, psychology, molecular biology, and cellular biology. The book includes general chapters on...

unlimited object storage image
Result Page: 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy