Home | Amazing | Today | Tags | Publishers | Years | Search 
Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond
Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond
In the 1990s, a new type of learning algorithm was developed, based on results from statistical learning theory: the Support Vector Machine (SVM). This gave rise to a new class of theoretically elegant learning machines that use a central concept of SVMs—-kernels--for a number of learning tasks. Kernel machines provide a modular framework...
MCSE in a Nutshell: The Windows 2000 Exams
MCSE in a Nutshell: The Windows 2000 Exams
Microsoft's MCSE (Microsoft Certified Systems Engineer) candidates in the Windows 2000 track are required to pass five core exams and two elective exams. These exams are designed to provide a valid and reliable measure of competency for experienced IT professionals working in the typically complex computing environment of medium to large...
Information Security Management Handbook, Fifth Edition
Information Security Management Handbook, Fifth Edition

Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated...

Wireless Programming with J2ME: Cracking the Code (With CD-ROM)
Wireless Programming with J2ME: Cracking the Code (With CD-ROM)
Part of the new Cracking the Code Series, Wireless Programming with J2ME provides a look at the code behind wireless Java applications.

Think of J2ME as a tiny version of Java specifically for mobile devices -- perfect for bringing powerful, robust applications to mobile phone, pagers, PDAs, and other handhelds. Writing applications...

Microsoft Office FrontPage 2003 Step by Step
Microsoft Office FrontPage 2003 Step by Step
This practical, hands-on tutorial expertly builds your skills with Microsoft Office FrontPage 2003—one step at a time! With STEP BY STEP, you work at your own pace through easy-to-follow lessons and practice exercises to learn exactly the tools and techniques you need. Master the core skills needed to construct a new site, organizing pages...
Windows Vista in a Nutshell: A Desktop Quick Reference
Windows Vista in a Nutshell: A Desktop Quick Reference

This unique reference thoroughly documents every important setting and feature in Microsoft's new operating system, with alphabetical listings for hundreds of commands, windows, menus, listboxes, buttons, scrollbars and other elements of Windows Vista. With this book's simple organization, you'll easily find any setting,...

Wireless Communications and Mobile Commerce
Wireless Communications and Mobile Commerce

Addressing the special issues associated with the emergent technology of mobile commerce, this book collects the writings of 46 m-commerce or wireless communications experts from academia and industry.


Mobile Commerce is an emerging phenomenon based on quickly growing applications of wireless technologies and mobile...

Hacker Web Exploitation Uncovered
Hacker Web Exploitation Uncovered

Written from both from the attacker's and security specialist's perspective, this thorough guide uncovers how attackers can benefit from the hosted target and why an apparently normal-working application might be vulnerable.

A description and analysis of the vulnerabilities caused by programming errors in Web applications, this book is...

Advanced Topics in Types and Programming Languages
Advanced Topics in Types and Programming Languages
Work in type systems for programming languages now touches many parts
of computer science, from language design and implementation to software
engineering, network security, databases, and analysis of concurrent and distributed
systems. The aim of this book, together with its predecessor, Types
and Programming Languages (Pierce
...
Internetworking IPv6 with Cisco Routers (Communications Series)
Internetworking IPv6 with Cisco Routers (Communications Series)
IPv6 is the Internet protocol of the future. Learn how to use it today. From a world expert on global internetworking, here is the authoritative yet accessible guide to IPv6, the network-layer protocol that will power the Internet and intranets in the next millennium. Packed with precise and detailed information derived from the final international...
Special Edition Using Microsoft Office Outlook 2003
Special Edition Using Microsoft Office Outlook 2003

This is the ONLY book you need to achieve maximum productivity when using this messaging and groupware application! Special Edition Using Microsoft Office Outlook 2003 is a business-focused guide to Microsoft Outlook. It focuses on maximizing user productivity with real-world techniques in real-world environments. Topics covered include using...

Sams Teach Yourself EJB in 21 Days
Sams Teach Yourself EJB in 21 Days
With the introduction of Java in the mid-1990s, its portability was obvious on the client
side. Java has quickly become the language of choice for writing applications. Most
browsers support Java, and Java applets and Java applications can run on any machine or
operating system. But this is not enough for enterprise applications,
...
Result Page: 2270 2269 2268 2267 2266 2265 2264 2263 2262 2261 2260 2259 2258 2257 2256 2255 2254 2253 2252 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy