Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Data Mining in Bioinformatics (Advanced Information and Knowledge Processing)
Data Mining in Bioinformatics (Advanced Information and Knowledge Processing)
The aim of this book is to introduce the reader to some of the best techniques for data mining in bioinformatics in the hope that the reader will build on them to make new discoveries on his or her own. The book contains twelve chapters in four parts, namely, overview, sequence and structure alignment, biological...
Remaining Relevant in Your Tech Career: When Change Is the Only Constant
Remaining Relevant in Your Tech Career: When Change Is the Only Constant
Remain relevant in the face of constant change during your career in technology. This book shows you how to proactively plan in anticipation of future changes. 

Many people find technology careers enticing because of the number of job opportunities, the high compensation, or simply because of fascination with
...
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)

Actionable guidance and expert perspective for real-world cybersecurity

The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world...

Computational Intelligence in Bioinformatics (Studies in Computational Intelligence)
Computational Intelligence in Bioinformatics (Studies in Computational Intelligence)
Bioinformatics involve the creation and advancement of algorithms using techniques including computational intelligence, applied mathematics and statistics, informatics, and biochemistry to solve biological problems usually on the molecular level. Major research efforts in the field include sequence analysis, gene finding, genome annotation,...
The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value
The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value

"It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of the product life cycle are on the right track." --The authors of The Privacy Engineer's Manifesto

The Privacy Engineer's Manifesto: Getting...

An Introduction to 3D Computer Vision Techniques and Algorithms
An Introduction to 3D Computer Vision Techniques and Algorithms

Computer vision encompasses the construction of integrated vision systems and the application of vision to problems of real-world importance. The process of creating 3D models is still rather difficult, requiring mechanical measurement of the camera positions or manual alignment of partial 3D views of a scene. However using algorithms, it is...

Connecting the Dots: Aligning Projects with Objectives in Unpredictable Times
Connecting the Dots: Aligning Projects with Objectives in Unpredictable Times

Are you ever going to see the value promised from your company’s project portfolio?

The question is all too familiar. The concern is real and legitimate. Technology and other project initiatives have grown faster than the ability of most companies to manage them—affecting the return on the investment of trillions of dollars...

Learning Machine Translation (Neural Information Processing)
Learning Machine Translation (Neural Information Processing)
The Internet gives us access to a wealth of information in languages we don't understand. The investigation of automated or semi-automated approaches to translation has become a thriving research field with enormous commercial potential. This volume investigates how machine learning techniques can improve statistical machine translation, currently...
Bioinformatics: Problem Solving Paradigms
Bioinformatics: Problem Solving Paradigms
There are fundamental principles for problem analysis and algorithm design that are continuously used in bioinformatics. This book concentrates on a clear presentation of these principles, presenting them in a self-contained, mathematically clear and precise manner, and illustrating them with lots of case studies from main fields of bioinformatics...
The Fearful Rise of Markets: Global Bubbles, Synchronized Meltdowns, and How To Prevent Them in the Future
The Fearful Rise of Markets: Global Bubbles, Synchronized Meltdowns, and How To Prevent Them in the Future

“This enjoyable, fast-moving book is concise, relevant, and perceptive. My bottom line is a simple one: This book should be read by all those interested in the way markets operate, be they investors, analysts, or policy makers.”

From the Foreword by Mohamed A....

Designing the iPhone User Experience: A User-Centered Approach to Sketching and Prototyping iPhone Apps
Designing the iPhone User Experience: A User-Centered Approach to Sketching and Prototyping iPhone Apps

Given the fiercely competitive state of the iPhone app landscape, it has become increasingly challenging for app designers and developers to differentiate their apps. The days are long gone when it was possible to crank out an app over the weekend and refine it after receiving a few not so flattering user reviews....

Data Protection and Information Lifecycle Management
Data Protection and Information Lifecycle Management

The Definitive Guide to Protecting Enterprise Data

Your enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and protect your critical information. In...

Result Page: 11 10 9 8 7 6 5 4 3 2 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy