Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Simulation-Based Algorithms for Markov Decision Processes (Communications and Control Engineering)
Simulation-Based Algorithms for Markov Decision Processes (Communications and Control Engineering)
Markov decision process (MDP) models are widely used for modeling sequential decision-making problems that arise in engineering, economics, computer science, and the social sciences.  Many real-world problems modeled by MDPs have huge state and/or action spaces, giving an opening to the curse of dimensionality and so making practical...
Mastering Go: Create Golang production applications using network libraries, concurrency, and advanced Go data structures
Mastering Go: Create Golang production applications using network libraries, concurrency, and advanced Go data structures

Exploring the major features and packages of Go, along with its types and data-structures, enabling the reader to write threadsafe, concurrent cloud, and network applications

Key Features

  • Not your typical introduction to the Golang programming language
  • Exploring Golang...
Distributed Computing with Go: Practical concurrency and parallelism for Go applications
Distributed Computing with Go: Practical concurrency and parallelism for Go applications

A tutorial leading the aspiring Go developer to full mastery of Golang's distributed features.

Key Features

  • This book provides enough concurrency theory to give you a contextual understanding of Go concurrency
  • It gives weight to synchronous and asynchronous data...
Hands-On Design Patterns with C# and .NET Core: Write clean and maintainable code by using reusable solutions to common software design problems
Hands-On Design Patterns with C# and .NET Core: Write clean and maintainable code by using reusable solutions to common software design problems

Apply design patterns to solve problems in software architecture and programming using C# 7.x and .NET Core 2

Key Features

  • Enhance your programming skills by implementing efficient design patterns for C# and .NET
  • Explore design patterns for functional and reactive...
Analysis of Correlated Data with SAS and R
Analysis of Correlated Data with SAS and R
Previously known as Statistical Methods for Health Sciences, this bestselling resource is one of the first books to discuss the methodologies used for the analysis of clustered and correlated data. While the fundamental objectives of its predecessors remain the same, Analysis of Correlated Data with SAS and R, Third Edition incorporates...
Evolutionary Computation 1: Basic Algorithms and Operators
Evolutionary Computation 1: Basic Algorithms and Operators
The original Handbook of Evolutionary Computation (Back et a1 1997) was designed to fulfil1 the need for a broad-based reference book reflecting the important role that evolutionary computation plays in a variety of disciplinesranging from the natural sciences and engineering to evolutionary biology and computer...
Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Ever wonder how easy it is to hack into someone’s bank account info while surfing the net at your local Starbucks? Learning how to hack is one of the best preventative measures you can take when protecting yourself from other hackers. Hacking is often misunderstood and that is for good reason. Many people use hacking as...
The Astronaut Maker: How One Mysterious Engineer Ran Human Spaceflight for a Generation
The Astronaut Maker: How One Mysterious Engineer Ran Human Spaceflight for a Generation
One of the most elusive and controversial figures in NASA’s history, George W. S. Abbey was called “the Dark Lord,” “the Godfather,” and “UNO”—short for unidentified NASA official. He was said to be secretive, despotic, a Space Age Machiavelli. Yet Abbey had more influence...
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
Flask By Example
Flask By Example

Unleash the full potential of the Flask web framework by creating simple yet powerful web applications

About This Book

  • The most up-to-date book on Flask on the market
  • Create your own world-class applications and master the art of Flask by unravelling its enigma through this journey
  • ...
Art and Form: From Roger Fry to Global Modernism (Refiguring Modernism)
Art and Form: From Roger Fry to Global Modernism (Refiguring Modernism)

This important new study reevaluates British art writing and the rise of formalism in the visual arts from 1900 to 1939. Taking Roger Fry as his starting point, Sam Rose rethinks how ideas about form influenced modernist culture and the movement’s significance to art history today.

In the context of modernism,...

Teach Yourself VISUALLY MacBook (Tech)
Teach Yourself VISUALLY MacBook (Tech)
Teach Yourself Visually

Are you a visual learner? Do you prefer instructions that show you how to do something — and skip the long-winded explanations? If so, then this book is for you. Open it up and you'll find clear, step-by-step screen shots that show you how to tackle more than 160 MacBook tasks. Each task-based...

Result Page: 86 85 84 83 82 81 80 79 78 77 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy