Home | Amazing | Today | Tags | Publishers | Years | Search 
Unsupervised Signal Processing: Channel Equalization and Source Separation
Unsupervised Signal Processing: Channel Equalization and Source Separation

Unsupervised Signal Processing: Channel Equalization and Source Separation provides a unified, systematic, and synthetic presentation of the theory of unsupervised signal processing. Always maintaining the focus on a signal processing-oriented approach, this book describes how the subject has evolved and assumed a wider scope...

jBPM5 Developer Guide
jBPM5 Developer Guide

jBPM5 is a well known open source Business Process Management System (BPMS) used for defining and executing business processes. Java developers can use jBPM5 to analyze, improve, and maintain business processes, which are integral to an organization's management. This book guides you through each level of the jBPM5 platform, allowing you...

Ace the Programming Interview: 160 Questions and Answers for Success
Ace the Programming Interview: 160 Questions and Answers for Success

Be prepared to answer the most relevant interview questions and land the job

Programmers are in demand, but to land the job, you must demonstrate knowledge of those things expected by today's employers. This guide sets you up for success. Not only does it provide 160 of the most commonly asked interview questions...

Reversible Computing
Reversible Computing
The present book is dedicated to Dr. Rolf Landauer, whose early work on the subject of reversible computing inspired me to begin more than 15 years of research in this special corner of computer science. Twice I had the privilege to meet him personally: once inWest Berlin (1992) and once in Boston (1996). Twice he encouraged me...
Design Patterns for Embedded Systems in C: An Embedded Software Engineering Toolkit
Design Patterns for Embedded Systems in C: An Embedded Software Engineering Toolkit
The predominate language for the development of embedded systems is clearly C. Other languages certainly have their allure, but over 80% of all embedded systems are developed in this classic language. Many of the advances in the industry assume the use of object-oriented languages, web clients, and technologies that are either...
Beginning R: An Introduction to Statistical Programming
Beginning R: An Introduction to Statistical Programming

Beginning R: An Introduction to Statistical Programming is a hands-on book showing how to use the R language, write and save R scripts, build and import data files, and write your own custom statistical functions. R is a powerful open-source implementation of the statistical language S, which was developed by AT&T. R has eclipsed...

Microsoft Access 2013: Illustrated Brief (Illustrated (Course Technology))
Microsoft Access 2013: Illustrated Brief (Illustrated (Course Technology))
Welcome to Microsoft Access 2013—Illustrated Brief. This book has a unique design: each skill is presented on two facing pages, with steps on the left and screens on the right. The layout makes it easy to learn a skill without having to read a lot of text and flip pages to see an illustration.

Praised by instructors for its...

Guide to Network Defense and Countermeasures
Guide to Network Defense and Countermeasures
This book is intended to provide students and professionals with a solid foundation in the fundamentals of advanced network security. The previous edition of this book placed significant emphasis on intrusion detection, but this edition aims to provide a more balanced approach to the topic of network defense and countermeasures. As...
MCSD Certification Toolkit (Exam 70-483): Programming in C# (Wrox Programmer to Programmer)
MCSD Certification Toolkit (Exam 70-483): Programming in C# (Wrox Programmer to Programmer)

A perfectly crafted prep guide that prepares you for the MCSD 70-483

The MCSD 70-483 exam is the entry-level Microsoft certification exam for C# developers and this must-have resource offers essential coverage of the exam that will test your competency in C# programming. Each chapter covers one of the core subject domains...

Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization
Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization

The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a...

Systems and Software Engineering with Applications
Systems and Software Engineering with Applications

By way of this book, Norman Schneidewind has officially bridged the gap between the two disparate fields. Filled with many real-world examples drawn from industry and government, Systems and Software Engineering with Applications provides a new perspective for systems and software engineers to consider when developing optimal solutions. This...

Managing Business Risk: A Practical Guide to Protecting Your Business
Managing Business Risk: A Practical Guide to Protecting Your Business
The balance between risk and reward is the very essence of business: you have to take risks in order to generate returns and, generally speaking, higher returns involve greater risks. However, there is a difference between risks taken as a result of careful judgement and those taken unwittingly.

In a world of
...
Result Page: 534 533 532 531 530 529 528 527 526 525 524 523 522 521 520 519 518 517 516 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy