Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Introduction to Image Processing Using R: Learning by Examples (SpringerBriefs in Computer Science)
Introduction to Image Processing Using R: Learning by Examples (SpringerBriefs in Computer Science)

This book introduces the statistical software R to the image processing community in an intuitive and practical manner. R brings interesting statistical and graphical tools which are important and necessary for image processing techniques. Furthermore, it has been proved in the literature that R is among the most reliable, accurate and...

Windows Security Monitoring: Scenarios and Patterns
Windows Security Monitoring: Scenarios and Patterns

Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security

Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...

Basic Security Testing with Kali Linux
Basic Security Testing with Kali Linux

With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take a more active stance in securing their computer systems. Kali Linux is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use so they can find issues with their...

Pro Continuous Delivery: With Jenkins 2.0
Pro Continuous Delivery: With Jenkins 2.0
Follow this step-by-step guide for creating a continuous delivery pipeline using all of the new features in Jenkins 2.0 such as Pipeline as a Code, multi-branch pipeline, and more. You will learn three crucial elements for achieving a faster software delivery pipeline: a fungible build/test environment, manageable and reproducible...
Fundamental Data Compression
Fundamental Data Compression
Fundamental Data Compression provides all the information students need to be able to use this essential technology in their future careers. A huge, active research field, and a part of many people's everyday lives, compression technology is an essential part of today's Computer Science and Electronic Engineering courses.
...
Cells and Robots: Modeling and Control of Large-Size Agent Populations (Springer Tracts in Advanced Robotics)
Cells and Robots: Modeling and Control of Large-Size Agent Populations (Springer Tracts in Advanced Robotics)
From the reviews:

"This interesting monograph is devoted to the study of multi-agent, populations of biological cells and robot teams. … The main objective of the approach is to provide solutions to the problem of how dynamics of an individual agent propagates to the population dynamics. … This original monograph has a wide...

Apache Spark 2.x Cookbook: Cloud-ready recipes for analytics and data science
Apache Spark 2.x Cookbook: Cloud-ready recipes for analytics and data science

Key Features

  • This book contains recipes on how to use Apache Spark as a unified compute engine
  • Cover how to connect various source systems to Apache Spark
  • Covers various parts of machine learning including supervised/unsupervised learning & recommendation engines

Book...

Fundamentals of Deep Learning: Designing Next-Generation Machine Intelligence Algorithms
Fundamentals of Deep Learning: Designing Next-Generation Machine Intelligence Algorithms

With the reinvigoration of neural networks in the 2000s, deep learning has become an extremely active area of research, one that’s paving the way for modern machine learning. In this practical book, author Nikhil Buduma provides examples and clear explanations to guide you through major concepts of this complicated field.

...
Traffic Engineering and QoS Optimization of Integrated Voice & Data Networks
Traffic Engineering and QoS Optimization of Integrated Voice & Data Networks
This book describes, analyzes, and recommends traffic engineering (TE) and quality of service (QoS) optimization methods for integrated voice/data dynamic routing networks. These functions control a network's response to traffic demands and other stimuli, such as link failures or node failures. TE and QoS optimization is concerned with measurement,...
Pragmatic Version Control Using Git (Pragmatic Starter Kit)
Pragmatic Version Control Using Git (Pragmatic Starter Kit)
Whether you're making the switch from a traditional centralized version control system or are a new programmer just getting started, this book prepares you to start using Git in your everyday programming.

Pragmatic Version Control Using Git starts with an overview of version control systems, and shows how being distributed enables...

Domain Driven Data Mining
Domain Driven Data Mining

In the present thriving global economy a need has evolved for complex data analysis to enhance an organization’s production systems, decision-making tactics, and performance. In turn, data mining has emerged as one of the most active areas in information technologies. Domain Driven Data Mining offers state-of the-art research and...

Avanti! (Italian)
Avanti! (Italian)

Informed by second-language acquisition research and supported by cutting-edge digital tools, the complete Avanti! program creates a dynamic learning environment that fosters communication and motivates students to succeed. With Connect and LearnSmart, Avanti's learning platform gives instructors...

Result Page: 113 112 111 110 109 108 107 106 105 104 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy