Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Numerical Techniques in Electromagnetics with MATLAB
Numerical Techniques in Electromagnetics with MATLAB

Despite the dramatic growth in the availability of powerful computer resources, the EM community lacks a comprehensive text on the computational techniques used to solve EM problems. The first edition of Numerical Techniques in Electromagnetics filled that gap and became the reference of choice for thousands of engineers,...

Hands-On Automated Machine Learning: A beginner's guide to building automated machine learning systems using AutoML and Python
Hands-On Automated Machine Learning: A beginner's guide to building automated machine learning systems using AutoML and Python

Automate data and model pipelines for faster machine learning applications

Key Features

  • Build automated modules for different machine learning components
  • Understand each component of a machine learning pipeline in depth
  • Learn to use different open source...
Essential SNMP
Essential SNMP
The Simple Network Management Protocol (SNMP) is an Internet-standard protocol for managing hosts on an IP network. Devices that typically support SNMP include routers, switches, servers, workstations, printers, modem racks, UPSs, and more.

Essential SNMP is a practical introduction to SNMP for network and system
...
Phpeclipse: A User Guide
Phpeclipse: A User Guide
The PHP language has come a long way from its humble roots as a set of Perl scripts written by
Rasmus Lerdorf. Today, PHP enjoys enormous market share and the latest release, PHP 5, sports a
robust object-oriented programming model. Naturally, development practices have also matured.
Those of us who taught ourselves PHP in the late
...
Hack I.T.: Security Through Penetration Testing
Hack I.T.: Security Through Penetration Testing
Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from...
Learning XSLT
Learning XSLT
Learning XSLT moves smoothly from the simple to complex, illustrating all aspects of XSLT 1.0 through step-by-step examples that you'll practice as you work through the book. Thorough in its coverage of the language, the book makes few assumptions about what you may already know. You'll learn about XSLT's...
Natural Language Generation: Third International Conference, INLG 2004, Brockenhurst, UK, July 14-16, 2004, Proceedings (Lecture Notes in Computer Science)
Natural Language Generation: Third International Conference, INLG 2004, Brockenhurst, UK, July 14-16, 2004, Proceedings (Lecture Notes in Computer Science)
This book constitutes the refereed proceedings of the Third International Conference on Natural Language Generation, INLG 2004, held in Brockenhurst, UK in July 2004.

The 18 revised full papers presented together with an invited keynote paper and 4 student papers reporting ongoing PhD research work were carefully reviewed and selected from 46...

MySpace for Musicians
MySpace for Musicians
MySpace is one of the most popular websites on the Internet today, with millions of pages of user-generated content. This makes MySpace an ideal tool for musicians interested in promoting their music to the widest possible audience. Many acts have gone from the garage to a recording contract by using MySpace as their launching pad. MySpace for...
Beginning Java EE 6 Platform with GlassFish 3: From Novice to Professional
Beginning Java EE 6 Platform with GlassFish 3: From Novice to Professional
While Java EE 5 is considered by everyone to be the most important enterprise release, Java EE 6 has a lot in store for you and every server-side Java developer. The most widely spread technology to write enterprise-class applications just got better with enhanced EJB 3.1, Java Persistence API (JPA) 2.0, the new, yet already very successful, Java...
ASP.NET 4 Social Networking
ASP.NET 4 Social Networking

Social networking has become a driving force on the Internet. Many people are part of at least one social network, while more often people are members of many different communities. For this reason many business people are trying to capitalize on this movement and are in a rush to put up their own social network. As the growth of social...

Getting StartED with Netbooks
Getting StartED with Netbooks

Getting StartED with Netbooks broadly targets consumers at a pivotal moment in the explosive growth of the MID/Netbook/UMPC market. We intend to create value for this group by providing an indispensable, "Consumer Reports Meets Whole Earth Catalog" sort of information aggregation.

For this project, timing and tone...

Advanced Web Services
Advanced Web Services

Web services and Service-Oriented Computing (SOC) have become thriving areas of academic research, joint university/industry research projects, and novel IT products on the market. SOC is the computing paradigm that uses Web services as building blocks for the engineering of composite, distributed applications out of the reusable application...

unlimited object storage image
Result Page: 165 164 163 162 161 160 159 158 157 156 155 154 153 152 151 150 149 148 147 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy