Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Visual Six Sigma: Making Data Analysis Lean (Wiley and SAS Business Series)
Visual Six Sigma: Making Data Analysis Lean (Wiley and SAS Business Series)
Streamline data analysis with an intuitive, visual Six Sigma strategy

Visual Six Sigma provides the statistical techniques that help you get more information from your data. A unique emphasis on the visual allows you to take a more active role in data-driven decision making, so you can leverage your contextual...

The Rails 5 Way (4th Edition) (Addison-Wesley Professional Ruby Series)
The Rails 5 Way (4th Edition) (Addison-Wesley Professional Ruby Series)

The “Bible” for Rails Development: Fully Updated for Rails 5

 

“When I read The Rails Way for the first time, I felt like I truly understood Rails for the first time.”

...
Field Guide to Lidar (SPIE Field Guide FG36)
Field Guide to Lidar (SPIE Field Guide FG36)
This Field Guide covers the various components and types of active electro-optical sensors referred to as lidars in the text from simple 2D direct-detection lidars to multiple subaperture synthetic aperture lidars. Other topics covered include receivers, apertures, atmospheric effects, and appropriate processing of different lidars....
Fundamentals of Deep Learning: Designing Next-Generation Machine Intelligence Algorithms
Fundamentals of Deep Learning: Designing Next-Generation Machine Intelligence Algorithms

With the reinvigoration of neural networks in the 2000s, deep learning has become an extremely active area of research, one that’s paving the way for modern machine learning. In this practical book, author Nikhil Buduma provides examples and clear explanations to guide you through major concepts of this complicated field.

...
Database Management Systems
Database Management Systems
DATABASE MANAGEMENT SYSTEMS is designed for use in a course in databases. This book is distinctive in its emphasis on the practical side of databases. This means that it has unique coverage of database design, uses SQL throughout the book to demonstrate different concepts, and has an emphasis on query evaluation and optimization. In this revision...
Windows Security Monitoring: Scenarios and Patterns
Windows Security Monitoring: Scenarios and Patterns

Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security

Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...

Samsung Galaxy S7 For Dummies (For Dummies (Computer/tech))
Samsung Galaxy S7 For Dummies (For Dummies (Computer/tech))
Your fun and accessible user's guide to the Samsung Galaxy S 7

Technology alone can be intimidating, and the printed documentation and online support that come with a new smartphone can be just as baffling. Thankfully, Samsung Galaxy S 7 For Dummies is here to give you easy-to-follow guidance on all the features...

Windows Sysinternals Administrator's Reference
Windows Sysinternals Administrator's Reference

The Sysinternals Suite is a set of over 70 advanced diagnostic and troubleshooting utilities for the Microsoft Windows platform written by me—Mark Russinovich—and Bryce Cogswell. Since Microsoft’s acquisition of Sysinternals in 2006, these utilities have been available for free download from...

Practical IPv6 for Windows Administrators
Practical IPv6 for Windows Administrators

Practical IPv6 for Windows Administrators is a handy guide to implementing IPv6 in a Microsoft Windows environment. This is the book you need if you are a Microsoft Windows Administrator confronted with IPv6 and in need of a quick resource to get up and going. The book covers the current state of IPv6 and its support in Microsoft...

Multivariate Public Key Cryptosystems (Advances in Information Security)
Multivariate Public Key Cryptosystems (Advances in Information Security)

Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes have increasingly been seen as a possible alternative to number theoretic-based cryptosystems such as RSA, as they are generally more efficient in terms of computational effort. As quantum computers are developed, MPKC...

Programming Languages: An Active Learning Approach
Programming Languages: An Active Learning Approach
Programming Languages: An Active Learning Approach introduces students to three programming paradigms: object-oriented/imperative languages using C++ and Ruby, functional languages using Standard ML, and logic programming using Prolog. This interactive textbook is intended to be used in and outside of class. Each chapter follows a pattern of...
Optical Fiber Telecommunications V A, Fifth Edition: Components and Subsystems (Optics and Photonics Series)
Optical Fiber Telecommunications V A, Fifth Edition: Components and Subsystems (Optics and Photonics Series)
Optical Fiber Telecommunications V (A&B) is the fifth in a series that has chronicled the progress in the research and development of lightwave communications since the early 1970s. Written by active authorities from academia and industry, this edition not only brings a fresh look to many essential topics but also focuses on network...
Result Page: 114 113 112 111 110 109 108 107 106 105 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy