Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning Data Science with Python and Jupyter: Use powerful tools to unlock actionable insights from data
Beginning Data Science with Python and Jupyter: Use powerful tools to unlock actionable insights from data

Getting started with data science doesn't have to be an uphill battle. This step-by-step guide is ideal for beginners who know a little Python and are looking for a quick, fast-paced introduction.

Key Features

  • Get up and running with the Jupyter ecosystem and some example datasets
  • ...
Maya Character Creation: Modeling and Animation Controls, First Edition
Maya Character Creation: Modeling and Animation Controls, First Edition

A unique, in-depth approach to creating realistic characters in Maya. Maya Character Creation: Modeling and Animation Controls' author, Chris Maraffi, has expertise in the field and in the classroom that translates to the knowledge and solid teaching skills needed to make this book a...

Knowledge Management and Management Learning:: Extending the Horizons of Knowledge-Based Management
Knowledge Management and Management Learning:: Extending the Horizons of Knowledge-Based Management
Over the last few years, both knowledge management and management
learning (including e-learning) have received sufficient coverage in
publications. I am glad to refer, amongst others, to my own publications
with Gert Van der Linden: The Hybrid Business School: developing
knowledge management through management learning
...
Fundamentals of X Programming: Graphical User Interfaces and Beyond
Fundamentals of X Programming: Graphical User Interfaces and Beyond
This book provides an overview of the X Window System focusing on characteristics that have significant impact on the development of both application programs and widgets. We pay special attention to applications that go beyond graphical user interfaces (GUIs); therefore we discuss issues affecting video games, visualization and imaging programs,...
Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation
Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation
A scientific approach to the new field of critical infrastructure protection

This book offers a unique scientific approach to the new field of critical infrastructure protection: it uses network theory, optimization theory, and simulation software to analyze and understand how infrastructure sectors evolve,...

Linux Network Architecture
Linux Network Architecture

This book deals with the architecture of the network subsystem in the Linux kernel. The idea for this book was born at the Institute of Telematics at the University of Karlsruhe, Germany, where the Linux kernel has been used in many research projects and its network functionality is modified or enhanced, respectively, in a...

Fuzzy Equational Logic (Studies in Fuzziness and Soft Computing)
Fuzzy Equational Logic (Studies in Fuzziness and Soft Computing)
The present book deals with algebras, congruences, morphisms, reasoning about identities, classes of algebras and their axiomatizability, etc., from the point of view of fuzzy logic. We therefore deal with topics traditionally studied in universal algebra. Our approach is the following. In classical universal algebra, one works in bivalent setting....
Developing USB PC Peripherals Using Intel 8X930AX USB Microcontroller
Developing USB PC Peripherals Using Intel 8X930AX USB Microcontroller
Universal Serial Bus (USB) is one of the most important developments in PC peripheral interconnect technology since the introduction of serial and parallel ports in the early 1980's. It is fast becoming the port of choice for many new digital video conferencing cameras, scanners, monitors, PC telephony equipment, and Human Interface Devices such as...
Crimeware: Understanding New Attacks and Defenses (Symantec Press)
Crimeware: Understanding New Attacks and Defenses (Symantec Press)
“This book is the most current and comprehensive analysis of the state of Internet security threats right now. The review of current issues and predictions about problems years away are critical for truly understanding crimeware. Every concerned person should have a copy and use it for reference.”
Moving Objects Databases (The Morgan Kaufmann Series in Data Management Systems)
Moving Objects Databases (The Morgan Kaufmann Series in Data Management Systems)
This book represents a milestone in the synthesis of temporal and spatial database concepts and techniques. It unifies and organizes the existing research into a coherent whole and presents substantial new results and approaches in many areas. In each case it begins with what is known, then it introduces the new concepts in an abstract and...
The Disappearing Computer: Interaction Design, System Infrastructures and Applications for Smart Environments
The Disappearing Computer: Interaction Design, System Infrastructures and Applications for Smart Environments
“The-computer-as-we-know-it” will have no role in our future everyday lives. This is the position taken in this book which elaborates how it will be replaced by a new generation of technologies, moving computing off the desktop and ultimately integrating it with real world objects and everyday environments. Computing becomes thus an...
Rough Sets, Fuzzy Sets, Data Mining and Granular Computing: 11th International Conference, RSFDGrC 2007, Toronto, Canada, May 14-16, 2007
Rough Sets, Fuzzy Sets, Data Mining and Granular Computing: 11th International Conference, RSFDGrC 2007, Toronto, Canada, May 14-16, 2007
This book constitutes the refereed proceedings of the 11th International Conference on Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing, RSFDGrC 2007, held in Toronto, Canada in May 2007 in conjunction with the Second International Conference on Rough Sets and Knowledge Technology, RSKT 2007, both as part of the Joint Rough Set...
unlimited object storage image
Result Page: 529 528 527 526 525 524 523 522 521 520 519 518 517 516 515 514 513 512 511 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy