Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computing with Instinct: Rediscovering Artificial Intelligence
Computing with Instinct: Rediscovering Artificial Intelligence

Simplicity in nature is the ultimate sophistication. The world's magnificence has been enriched by the inner drive of instincts, the profound drive of our everyday life. Instinct is an inherited behavior that responds to environmental stimuli. Instinctive computing is a computational simulation of biological and cognitive instincts, which...

Project Management for Construction: Fundamental Concepts for Owners, Engineers, Architects, and Builders
Project Management for Construction: Fundamental Concepts for Owners, Engineers, Architects, and Builders

This book is provided on the worldwide web as a service to the community of practitioners and students. Reproduction for educational purposes is permitted with appropriate citation. If you find this work helpful or have suggestions for additions or corrections, please email Chris Hendrickson: cth@cmu.edu. A hardcopy Instructor's Manual with...

Think and Grow Rich
Think and Grow Rich
...During our ten-year association, I learned the missing number to my combination for worldwide successful achievement. The Master Mind Principle: two or more persons working together in complete harmony toward a mutual goal or goals...Napoleon Hill's philosophy teaches you what you were never taught. Specifically: How to Recognize, Relate,...
Spoken Language Processing: A Guide to Theory, Algorithm and System Development
Spoken Language Processing: A Guide to Theory, Algorithm and System Development
Our primary motivation in writing this book is to share our working experience to bridge the gap between the knowledge of industry gurus and newcomers to the spoken language processing community. Many powerful techniques hide in conference proceedings and academic papers for years before becoming widely recognized by the research community or the...
UNIX and Linux Forensic Analysis DVD Toolkit
UNIX and Linux Forensic Analysis DVD Toolkit
The only Forensic Analysis book covering UNIX, which runs 37% of network servers worldwide.

This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account
...
Light Detectors, Photoreceptors, and Imaging Systems in Nature
Light Detectors, Photoreceptors, and Imaging Systems in Nature
"The book is of value . . . as a source of inspiration for biologists who are intrigued by the subject, as well as for engineers who are looking to biological structures for new ideas."--The Quarterly Review of Biology

"Wolken has synthesized information from physics, chemistry, biology, and engineering to provide an
...
Advanced CISSP Prep Guide: Exam Q & A
Advanced CISSP Prep Guide: Exam Q & A

Get ready to pass the CISSP exam and earn your certification with this advanced test guide

Used alone or as an in-depth supplement to the bestselling The CISSP Prep Guide, this book provides you with an even more intensive preparation for the CISSP exam. With the help of more than 300 advanced questions and detailed answers,...

Multithreading Applications in Win32: The Complete Guide to Threads
Multithreading Applications in Win32: The Complete Guide to Threads

Multithreading is supported under Windows NT and Windows 95 and later through the Win32 API, but coverage of this important topic has been sporadic and incomplete until now. In Multithreading Applications in Win32, with just enough theory and lots of sample code, Jim Beveridge and Bob Wiener show developers when, where, and how to use...

PPP Design, Implementation, and Debugging (2nd Edition)
PPP Design, Implementation, and Debugging (2nd Edition)
Extensively revised and expanded to cover the latest developments in PPP and network technology, this second edition addresses such current topics as:
  • PPP in today's telecommunications infrastructure
  • PPP and telephony
  • Optical (SONET/SDH) PPP links
  • The relationship between PPP and...
J2EE Technology in Practice: Building Business Applications with the Java 2 Platform
J2EE Technology in Practice: Building Business Applications with the Java 2 Platform

Since its introduction, The Java 2 Platform, Enterprise Edition (J2EE) has achieved remarkable success among application server providers and their customers. More than a dozen leading application server companies have announced J2EE compatible products, and over one million developers have downloaded the J2EE SDK from Sun's J2EE Web site (...

Practical Data Science with R
Practical Data Science with R

Summary

Practical Data Science with R lives up to its name. It explains basic principles without the theoretical mumbo-jumbo and jumps right to the real use cases you'll face as you collect, curate, and analyze the data crucial to the success of your business. You'll apply the R programming language...

The CISSP Prep Guide: Mastering the Ten Domains of Computer Security
The CISSP Prep Guide: Mastering the Ten Domains of Computer Security
A one-stop source of information covering everything you’ll need to know in order to pass the CISSP examination

The CISSP Prep Guide

From stolen intellectual proprietary and denial of service attacks to unauthorized use of critical resources and computer viruses, e-business companies face numerous threats each day that can...

Result Page: 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy