Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Building Embedded Linux Systems
Building Embedded Linux Systems
There's a great deal of excitement surrounding the use of Linux in embedded systems -- for everything from cell phones to car ABS systems and water-filtration plants -- but not a lot of practical information. Building Embedded Linux Systems offers an in-depth, hard-core guide to putting together embedded systems based on Linux.
...
The Multiplayer Classroom: Designing Coursework as a Game
The Multiplayer Classroom: Designing Coursework as a Game

Discover how to engage your students and raise their grades and attendance in your classroom. THE MULTIPLAYER CLASSROOM: DESIGNING COURSEWORK AS A GAME is your detailed guide to designing any structured learning experience as a game. Written for professional educators or those learning to be educators, here are the tools to engage and excite...

Beyond Constructivism: Models and Modeling Perspectives on Mathematics Problem Solving, Learning, and Teaching
Beyond Constructivism: Models and Modeling Perspectives on Mathematics Problem Solving, Learning, and Teaching
This book evolved out of research that began more than 25 years ago, based on a National Science Foundation-supported project investigating the question: what is needed, beyond having a mathematical idea that enables students to use it in everyday problem-solving situations! (Lesh, Landau, & Hamilton, 1983). Large portions...
Algorithm Design for Networked Information Technology Systems
Algorithm Design for Networked Information Technology Systems

Networked information technology (NIT) systems are synonymous with network-centric or net-centric systems and constitute the cornerstone of the fast-growing information age. NIT systems' field of application ranges from the traditional worldwide telecommunication systems, banking and financial transactions, on-line travel reservation...

Cyberspace Textuality: Computer Technology and Literary Theory
Cyberspace Textuality: Computer Technology and Literary Theory
Computers were once thought of as number-crunching machines; but for most of us it is their ability to create worlds and process words that have made them into a nearly indispensable part of life. As Jacques Leslie puts it, if computers are everywhere, it is because they have grown into "poetry machines." The term "cyberspace"...
Alternative Digital Photography
Alternative Digital Photography
Alternative Digital Photography will lead you through a detailed exploration of alternative techniques in digital photography. Whether you are an amateur photographer, a beginning professional, or an advanced professional looking to add more creativity to your photography, this book will help you develop the skills you need to create unusual,...
Secure Internet Practices: Best Practices for Securing Systems in the Internet and e-Business Age
Secure Internet Practices: Best Practices for Securing Systems in the Internet and e-Business Age
Touches all the bases you need to build a secure enterprise. Drawing on the experience of the world-class METASeS consulting team in building and advising on security programs, this guide shows you how to create a workable security program to protect your organization's internet risk. Softcover.

This report from METASeS is written for
...
Retirementology: Rethinking the American Dream in a New Economy
Retirementology: Rethinking the American Dream in a New Economy

Looking ahead to retirement? Depending on your circumstances and your age, you may no longer have any margin for error. And your emotions and irrational behavior could be perpetuating a dangerous cycle of overspending and rising debt that may shatter whatever vision of retirement you still have. Welcome to the world of...

Visual Basic Game Programming for Teens
Visual Basic Game Programming for Teens

Visual Basic Game Programming for Teens, Third Edition teaches teens and other beginners how to create their own 2D role-playing game (RPG) using the free to download and easy to use Visual Basic 2008 Express. The game is built step-by-step throughout the book as readers learn new skills and build upon them. This new edition features almost...

Cryptography and Network Security: Principles and Practice (5th Edition)
Cryptography and Network Security: Principles and Practice (5th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Natural Language Processing and Computational Linguistics: A practical guide to text analysis with Python, Gensim, spaCy, and Keras
Natural Language Processing and Computational Linguistics: A practical guide to text analysis with Python, Gensim, spaCy, and Keras

Work with Python and powerful open source tools such as Gensim and spaCy to perform modern text analysis, natural language processing, and computational linguistics algorithms.

Key Features

  • Discover the open source Python text analysis ecosystem, using spaCy, Gensim, scikit-learn, and...
The Enchanted Hour: The Miraculous Power of Reading Aloud in the Age of Distraction
The Enchanted Hour: The Miraculous Power of Reading Aloud in the Age of Distraction

A Wall Street Journal writer’s conversation-changing look at how reading aloud makes adults and children smarter, happier, healthier, more successful and more closely attached, even as technology pulls in the other direction.

A miraculous alchemy occurs when one person reads to another, transforming
...

unlimited object storage image
Result Page: 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy