 |
|
|
|
 Osgi in Action: Creating Modular Applications in Java
When I started working with OSGi technology back in 2000, I would’ve never guessed I’d still be working with it a decade later. Back then, OSGi was targeting the embedded market niche, but that wasn’t my area of interest. I wanted to create highly dynamic, modular applications, and OSGi gave me the possibility of... |  |  |  |  Bayesian Artificial Intelligence, Second Edition
Updated and expanded, Bayesian Artificial Intelligence, Second Edition provides a practical and accessible introduction to the main concepts, foundation, and applications of Bayesian networks. It focuses on both the causal discovery of networks and Bayesian inference procedures. Adopting a causal interpretation of Bayesian... |
|
 Introduction to Genetic Algorithms
The origin of evolutionary algorithmswas an attempt tomimic some of the processes taking place in natural evolution. Although the details of biological evolution are not completely understood (even nowadays), there exist some points supported by strong experimental evidence:
• Evolution is a process operating over chromosomes... |  |  Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.
The Information Security... |  |  |
|
Result Page: 549 548 547 546 545 544 543 542 541 540 539 538 537 536 535 534 533 532 531 |