Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Epidemics and Rumours in Complex Networks (London Mathematical Society Lecture Note Series)
Epidemics and Rumours in Complex Networks (London Mathematical Society Lecture Note Series)

Information propagation through peer-to-peer systems, online social systems, wireless mobile ad hoc networks and other modern structures can be modelled as an epidemic on a network of contacts. Understanding how epidemic processes interact with network topology allows us to predict ultimate course, understand phase transitions and develop...

Applied Ontology Engineering in Cloud Services, Networks and Management Systems
Applied Ontology Engineering in Cloud Services, Networks and Management Systems

Metadata standards in today’s ICT sector are proliferating at unprecedented levels, while automated information management systems collect and process exponentially increasing quantities of data. With interoperability and knowledge exchange identified as a core challenge in the sector, this book examines the role ontology engineering...

Practical Statistics for Data Scientists: 50 Essential Concepts
Practical Statistics for Data Scientists: 50 Essential Concepts

Statistical methods are a key part of of data science, yet very few data scientists have any formal statistics training. Courses and books on basic statistics rarely cover the topic from a data science perspective. This practical guide explains how to apply various statistical methods to data science, tells you how to avoid their...

Building a 2D Game Physics Engine: Using HTML5 and JavaScript
Building a 2D Game Physics Engine: Using HTML5 and JavaScript
Build your very own 2D physics-based game engine simulation system for rigid body dynamics. Beginning from scratch, in this book you will cover the implementation technologies, HTML5 and JavaScript; assemble a simple and yet complete fundamental mathematics support library; define basic rigid body behaviors; detect and resolve rigid body...
Python Reinforcement Learning Projects: Eight hands-on projects exploring reinforcement learning algorithms using TensorFlow
Python Reinforcement Learning Projects: Eight hands-on projects exploring reinforcement learning algorithms using TensorFlow

Implement state-of-the-art deep reinforcement learning algorithms using Python and its powerful libraries

Key Features

  • Implement Q-learning and Markov models with Python and OpenAI
  • Explore the power of TensorFlow to build self-learning models
  • Eight AI...
Algorithms
Algorithms
This book is intended to survey the most important algorithms in use on
computers today and to teach fundamental techniques to the growing number
of people who are interested in becoming serious computer users. It is appropriate
for use as a textbook for a second, third or fourth course in computer
science: after students have
...
Windows Server 2003 Security : A Technical Reference
Windows Server 2003 Security : A Technical Reference

This book is not designed with the Windows end user, advanced or not, in mind. It is meant for the server administrator, network administrator, security administrator, IT manager, technology specialist, or other individual who must design, implement, troubleshoot, or configure the security of Windows Server 2003 or the...

Getting Started with Camera Raw : How to make better pictures using Photoshop and Photoshop Elements
Getting Started with Camera Raw : How to make better pictures using Photoshop and Photoshop Elements
Not long ago the Raw format was limited to high-end digital SLR cameraswhich meant you pretty much had to be a professional (or at least quite serious) photographer to take advantage of it. Not so today. Now that Raw is included on even the simplest point-and-shoot cameras, shutterbugs of all stripes can start taking advantage of its greater...
Certified Ethical Hacker Exam Prep
Certified Ethical Hacker Exam Prep

The CEH certification shows knowledge of network penetration testing skills. The CEH exam takes three hours and 125 questions, requiring a broad and deep knowledge of network security issues. The CEH Exam Prep is the perfect solution for this challenge, giving you the solid, in-depth coverage...

Microsoft SharePoint: Building Office 2003 Solutions, Second Edition
Microsoft SharePoint: Building Office 2003 Solutions, Second Edition
Almost five years ago, when I completed my sixth book, Scot Hillier’s COM+ Programming with Visual Basic (SAMS, 2000), I thought I was done with technical writing. Since then, I have seen some new technologies emerge, but...
User's Guide To Cryptography And Standards (Artech House Computer Security)
User's Guide To Cryptography And Standards (Artech House Computer Security)
This book is about standards, cryptography, and standards for cryptography. It has been written in the hope that it will
serve a number of purposes, including the following.

◗ Perhaps most importantly, to provide a general introduction
to standardized cryptography for the user of this technology (i.e., a designer or
...
Foundation Actionscript 3.0 Animation: Making Things Move!
Foundation Actionscript 3.0 Animation: Making Things Move!
In this book, you'll learn
  • All the ActionScript 3.0 (including math and trigonometry functions) and Flash rendering techniques you'll need to start animating with code
  • Basic motion principles such as velocity, acceleration, friction, easing, and bouncing
  • How to handle user interaction via the keyboard and...
unlimited object storage image
Result Page: 542 541 540 539 538 537 536 535 534 533 532 531 530 529 528 527 526 525 524 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy