Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Algorithms in C, Parts 1-4: Fundamentals, Data Structures, Sorting, Searching (3rd Edition) (Pts. 1-4)
Algorithms in C, Parts 1-4: Fundamentals, Data Structures, Sorting, Searching (3rd Edition) (Pts. 1-4)

 

Robert Sedgewick has thoroughly rewritten and substantially expanded his popular work to provide current and comprehensive coverage of important algorithms and data structures. Many new algorithms are presented, and the explanations of each...

Python Algorithms: Mastering Basic Algorithms in the Python Language
Python Algorithms: Mastering Basic Algorithms in the Python Language

Python Algorithms, Second Edition explains the Python approach to algorithm analysis and design. Written by Magnus Lie Hetland, author of Beginning Python, this book is sharply focused on classical algorithms, but it also gives a solid understanding of fundamental algorithmic problem-solving techniques.

The book...

Developing Analytic Talent: Becoming a Data Scientist
Developing Analytic Talent: Becoming a Data Scientist

Learn what it takes to succeed in the the most in-demand tech job

Harvard Business Review calls it the sexiest tech job of the 21st century. Data scientists are in demand, and this unique book shows you exactly what employers want and the skill set that separates the quality data scientist from other talented IT...

Practical Methods of Financial Engineering and Risk Management: Tools for Modern Financial Professionals
Practical Methods of Financial Engineering and Risk Management: Tools for Modern Financial Professionals

Risk control, capital allocation, and realistic derivative pricing and hedging are critical concerns for major financial institutions and individual traders alike. Events from the collapse of Lehman Brothers to the Greek sovereign debt crisis demonstrate the urgent and abiding need for statistical tools...

Information Security Science: Measuring the Vulnerability to Data Compromises
Information Security Science: Measuring the Vulnerability to Data Compromises

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically...

SAP HANA Starter
SAP HANA Starter

SAP HANA is SAP's in-memory database technology, and the focal point of their next generation strategy. Using column-based storage to provide highly compressed and rapidly accessed data, a SAP HANA application can be several hundred times faster than the same application on previous generation database technology.

SAP HANA...

Mastering Data Warehouse Design: Relational and Dimensional Techniques
Mastering Data Warehouse Design: Relational and Dimensional Techniques
At last, a balanced approach to data warehousing that leverages the techniques pioneered by Ralph Kimball and Bill Inmon

Since its groundbreaking inception, the approach to understanding data warehousing has been split into two mindsets: Ralph Kimball, who pioneered the use of dimensional modeling techniques for building the data warehouse, and...

ABAP Development for SAP HANA
ABAP Development for SAP HANA

With SAP HANA, even the most seasoned ABAP developers have some learning to do. Newbie or not, this book can help: install the Eclipse IDE, brush up your database programming skills, perform runtime and error analysis, transport old ABAP applications to HANA and more. Once you've mastered the tasks in this book, it will be full speed...

Principles of Sequencing and Scheduling
Principles of Sequencing and Scheduling

An up-to-date and comprehensive treatment of the fundamentals of scheduling theory, including recent advances and state-of-the-art topics

Principles of Sequencing and Scheduling strikes a unique balance between theory and practice, providing an accessible introduction to the concepts, methods, and results of scheduling theory and...

Introduction to the Mathematics of Medical Imaging, Second Edition
Introduction to the Mathematics of Medical Imaging, Second Edition
At the heart of every medical imaging technology is a sophisticated mathematical model of the measurement process and an algorithm to reconstruct an image from the measured data. This book provides a firm foundation in the mathematical tools used to model the measurements and derive the reconstruction algorithms used in most imaging modalities in...
Verification of Computer Codes in Computational Science and Engineering
Verification of Computer Codes in Computational Science and Engineering
How can one be assured that computer codes that solve differential equations are correct? Standard practice using benchmark testing no longer provides full coverage because today's production codes solve more complex equations using more powerful algorithms. By verifying the order-of-accuracy of the numerical algorithm implemented in the code, one...
Introduction to Numerical Ordinary and Partial Differential Equations Using MATLAB
Introduction to Numerical Ordinary and Partial Differential Equations Using MATLAB
Learn how to solve complex differential equations using MATLAB®

Introduction to Numerical Ordinary and Partial Differential Equations Using MATLAB® teaches readers how to numerically solve both ordinary and partial differential equations with ease. This innovative publication brings together a skillful treatment of MATLAB...

Result Page: 15 14 13 12 11 10 9 8 7 6 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy