Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Big Nine: How the Tech Titans and Their Thinking Machines Could Warp Humanity
The Big Nine: How the Tech Titans and Their Thinking Machines Could Warp Humanity
A call-to-arms about the broken nature of artificial intelligence, and the powerful corporations that are turning the human-machine relationship on its head.

We like to think that we are in control of the future of "artificial" intelligence. The reality, though, is that we--the everyday...
Bash Cookbook: Leverage Bash scripting to automate daily tasks and improve productivity
Bash Cookbook: Leverage Bash scripting to automate daily tasks and improve productivity

Create simple to advanced shell scripts and enhance your system functionality with effective recipes

Key Features

  • Automate tedious and repetitive tasks
  • Create several novel applications ranging from a simple IRC logger to a Web Scraper
  • Manage your system...
Acting Lessons for Teachers
Acting Lessons for Teachers
We love teaching. Both your authors and you, the readers, love the classroom experience. We accept that the students don’t always learn as much or as readily as we might have hoped, and we accept that we might not have executed a planned lesson as smoothly as we had hoped. But we still love the excitement of the first day, the thrill of...
Private Debt: Opportunities in Corporate Direct Lending (Wiley Finance)
Private Debt: Opportunities in Corporate Direct Lending (Wiley Finance)

The essential resource for navigating the growing direct loan market

Private Debt: Opportunities in Corporate Direct Lending provides investors with a single, comprehensive resource for understanding this asset class amidst an environment of tremendous growth. Traditionally a niche asset class pre-crisis,...

Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen...

Electro-Optics Handbook
Electro-Optics Handbook

It’s often difficult to predict which areas of a field will become rejuvenated and grow rapidly or spin off to fit with another to form something new. The field of electro-optics is also unpredictable, but currently it has numerous forces acting on it. First is the development of new optical sources such as ultrafast lasers and fiber...

Hands-On Oracle Application Express Security: Building Secure Apex Applications
Hands-On Oracle Application Express Security: Building Secure Apex Applications
AT RECX we’ve been involved in the world of IT Security for more than a decade. We were involved in some of the fi rst penetration tests performed in the UK, where large organizations and government departments allowed ethical hackers into their networks to determine the risk they faced from what are now known as cyber attacks....
Targeting Treatment of Soft Tissue Sarcomas (Cancer Treatment and Research)
Targeting Treatment of Soft Tissue Sarcomas (Cancer Treatment and Research)
The last decade we have witnessed a major change in the development of new techniques and agents for the treatment of cancer in general, and for soft tissue sarcomas in particular. The important achievements of molecular biology research have changed the landscape markedly. Increasingly subtypes of soft tissue sarcomas are shown...
Modeling of Curves and Surfaces with MATLAB®
Modeling of Curves and Surfaces with MATLAB®

This text on geometry modeling is devoted to a number of central geometrical topics— graphs of functions, transformations, (non-)Euclidean geometries, curves and surfaces— and presents some elementary methods for analytical modeling and visualization of them.

In 1872 F. Klein proposed his Erlangen Programme in...

Legislative XML for the Semantic Web: Principles, Models, Standards for Document Management
Legislative XML for the Semantic Web: Principles, Models, Standards for Document Management

The Internet already is the broadest and most used source of legal information: in the web one can find most statutory texts (all in some jurisdictions), a vast amount of case law, huge repertoires of doctrinal contributions, many blogs and fora discussing different legal issues. Moreover, as legal activities (legislative,...

Mites: Ecology, Evolution & Behaviour: Life at a Microscale
Mites: Ecology, Evolution & Behaviour: Life at a Microscale

More than 40,000 species of mites have been described, and up to 1 million may exist on earth. These tiny arachnids play many ecological roles including acting as vectors of disease, vital players in soil formation, and important agents of biological control. But despite the grand diversity of mites, even trained biologists are often unaware...

Signals and Boundaries: Building Blocks for Complex Adaptive Systems
Signals and Boundaries: Building Blocks for Complex Adaptive Systems

Complex adaptive systems (cas), including ecosystems, governments, biological cells, and markets, are characterized by intricate hierarchical arrangements of boundaries and signals. In ecosystems, for example, niches act as semi-permeable boundaries, and smells and visual patterns serve as signals; governments have departmental hierarchies...

Result Page: 14 13 12 11 10 9 8 7 6 5 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy