Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Java 9 Programming Blueprints
Java 9 Programming Blueprints

Key Features

  • See some of the new features of Java 9 and be introduced to parts of the Java SDK
  • This book provides a set of diverse, interesting projects that range in complexity from fairly simple to advanced and cover HTTP 2.0
  • Take advantage of Java's new modularity features to write...
Digital Signal Processing: An Introduction with MATLAB and Applications
Digital Signal Processing: An Introduction with MATLAB and Applications

In three parts, this book contributes to the advancement of engineering education and that serves as a general reference on digital signal processing. Part I presents the basics of analog and digital signals and systems in the time and frequency domain. It covers the core topics: convolution, transforms, filters, and random signal analysis....

Big Data Application Architecture Q&A: A Problem - Solution Approach (Expert's Voice in Big Data)
Big Data Application Architecture Q&A: A Problem - Solution Approach (Expert's Voice in Big Data)

Big Data Application Architecture Pattern Recipes provides an insight into heterogeneous infrastructures, databases, and visualization and analytics tools used for realizing the architectures of big data solutions. Its problem-solution approach helps in selecting the right architecture to solve the problem at hand. In the process of...

The Blockchain Alternative: Rethinking Macroeconomic Policy and Economic Theory
The Blockchain Alternative: Rethinking Macroeconomic Policy and Economic Theory

Examine what would happen if we were to deploy blockchain technology at the sovereign level and use it to create a decentralized cashless economy. This book explains how finance and economics work today, and how the convergence of various technologies related to the financial sector can help us find solutions to problems,...

ValueWeb: How Fintech Firms are Using Bitcoin Blockchain and Mobile Technologies to Create the Internet  of Value
ValueWeb: How Fintech Firms are Using Bitcoin Blockchain and Mobile Technologies to Create the Internet of Value

The next generation internet, the Internet of Things, cannot work without an Internet of Value. The Internet of Value ― or ValueWeb, for short ― allows machines to trade with machines and people with people, anywhere on this planet in real-time and for free. The problem is that our old system cannot work that way, as it...

Big Data in Practice: How 45 Successful Companies Used Big Data Analytics to Deliver Extraordinary Results
Big Data in Practice: How 45 Successful Companies Used Big Data Analytics to Deliver Extraordinary Results

The best-selling author of Big Data is back, this time with a unique and in-depth insight into how specific companies use big data.

Big data is on the tip of everyone's tongue. Everyone understands its power and importance, but many fail to grasp the actionable steps and resources required to utilise it effectively. This...

Practical TCP/IP and Ethernet Networking for Industry (Practical Professional Books)
Practical TCP/IP and Ethernet Networking for Industry (Practical Professional Books)
One of the great protocols that has been inherited from the Internet is TCP/IP and this is being used as the open standard today for all network and communications systems. The reasons for this popularity are not hard to find. TCP/IP and Ethernet are truly open standards available to competing manufacturers and providing the user with a common...
Formula One Racing for Dummies
Formula One Racing for Dummies
Formula One racing is the pinnacle of motor racing around the world. These days, the sport is a truly global circus. At almost every race on the calendar, more than 120,000 spectators cram into the grandstands and spectator banking, all vying for a view of the millionaire superstar drivers. At the same time, in 150 countries worldwide, more than...
Understanding Cryptography: A Textbook for Students and Practitioners
Understanding Cryptography: A Textbook for Students and Practitioners

Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a...

Project Managers at Work
Project Managers at Work

Read 25 in-depth, candid interviews with notable project managers. Discover how project managers work, what they do, how they adapt and make decisions, how they inspire and motivate others, what career lessons and advice they can share, and how they landed their current jobs either as project managers or in more senior positions thanks to...

Effective Akka
Effective Akka

Avoid common mistakes when building distributed, asynchronous, high-performance software with the Akka toolkit and runtime. With this concise guide, author Jamie Allen provides a collection of best practices based on several years of using the actor model. The book also includes examples of actor application types and two primary...

Neural Networks
Neural Networks

Neural networks represent a powerful data processing technique that has reached maturity and broad application. When clearly understood and appropriately used, they are a mandatory component in the toolbox of any engineer who wants make the best use of the available data, in order to build models, make predictions, mine data, recognize shapes...

Result Page: 18 17 16 15 14 13 12 11 10 9 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy