Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Algorithms: Design and Analysis (De Gruyter Textbook)
Algorithms: Design and Analysis (De Gruyter Textbook)

Algorithms play a central role both in the theory and in the practice of computing. The goal of the authors was to write a textbook that would not trivialize the subject but would still be readable by most students on their own. The book contains over 120 exercises. Some of them are drills; others make important points about the...

Light in the Darkness: Black Holes, the Universe, and Us
Light in the Darkness: Black Holes, the Universe, and Us

The International Bestseller

On April 10, 2019, award-winning astrophysicist Heino Falcke presented the first image ever captured of a black hole at an international press conference—a turning point in astronomy that Science magazine called the scientific breakthrough of the year. That photo was...

Mfc Black Book
Mfc Black Book
Are you an MFC programmer? Good. There are two types of MFC
programmers. What kind are you? The first kind are the good programmers
who write programs that conform to the way MFC wants you to do things. The
second bunch are wild-eyed anarchists who insist on getting things done their
way. Me, I’m in the second group. If
...
Einstein in Matrix Form: Exact Derivation of the Theory of Special and General Relativity without Tensors
Einstein in Matrix Form: Exact Derivation of the Theory of Special and General Relativity without Tensors

This book is an introduction to the theories of Special and General Relativity. The target audience are physicists, engineers and applied scientists who are looking for an understandable introduction to the topic - without too much new mathematics. The fundamental equations of Einstein's theory of Special and General Relativity are...

The Encyclopedia of Demons and Demonology
The Encyclopedia of Demons and Demonology

The conflict between good and evil can be found in every culture, mythical tradition, and religion throughout history. In many cases, the source of evil has been personified as demons or devils, and in many belief systems, both are considered to be real entities operating outside the boundaries of the physical world to torment people or lead...

Penetration Testing with Perl
Penetration Testing with Perl

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • ...
Fourier Transform Methods in Finance
Fourier Transform Methods in Finance

In recent years, Fourier transform methods have emerged as one of the major methodologies for the evaluation of derivative contracts, largely due to the need to strike a balance between the extension of existing pricing models beyond the traditional Black-Scholes setting and a need to evaluate prices consistently with the market...

Fundamental Models in Financial Theory
Fundamental Models in Financial Theory

This book provides an innovative, integrated, and methodical approach to understanding complex financial models, integrating topics usually presented separately into a comprehensive whole. The book brings together financial models and high-level mathematics, reviewing the mathematical background necessary for understanding these models...

Machine Learning with R - Second Edition
Machine Learning with R - Second Edition

Key Features

  • Harness the power of R for statistical computing and data science
  • Explore, forecast, and classify data with R
  • Use R to apply common machine learning algorithms to real-world scenarios

Book Description

Machine learning, at its core, is concerned...

Fundamentals of Digital Imaging in Medicine
Fundamentals of Digital Imaging in Medicine
There was a time not so long ago, well within the memory of many of us, when medical imaging was an analog process in which X-rays, or reflected ultrasound signals, exiting from a patient were intercepted by a detector, and their intensity depicted as bright spots on a fluorescent screen or dark areas in a photographic film. The...
Black Hat Python: Python Programming for Hackers and Pentesters
Black Hat Python: Python Programming for Hackers and Pentesters

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?

In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's...

Introduction to Probability and Stochastic Processes with Applications
Introduction to Probability and Stochastic Processes with Applications

An easily accessible, real-world approach to probability and stochastic processes

Introduction to Probability and Stochastic Processes with Applications presents a clear, easy-to-understand treatment of probability and stochastic processes, providing readers with a solid foundation they can build upon throughout their...

unlimited object storage image
Result Page: 49 48 47 46 45 44 43 42 41 40 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy