Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Randomized Algorithms
Randomized Algorithms
For many applications, a randomized algorithm is either the simplest or the fastest algorithm available, and sometimes both. This book introduces the basic concepts in the design and analysis of randomized algorithms. The first part of the text presents basic tools such as probability theory and probabilistic analysis that are frequently used in...
Statistical Analysis of Financial Data in R (Springer Texts in Statistics)
Statistical Analysis of Financial Data in R (Springer Texts in Statistics)

Although there are many books on mathematical finance, few deal with the statistical aspects of modern data analysis as applied to financial problems. This textbook fills this gap by addressing some of the most challenging issues facing financial engineers. It shows how sophisticated mathematics and modern statistical techniques can...

Hands-On Machine Learning with Scikit-Learn and TensorFlow: Concepts, Tools, and Techniques to Build Intelligent Systems
Hands-On Machine Learning with Scikit-Learn and TensorFlow: Concepts, Tools, and Techniques to Build Intelligent Systems

Graphics in this book are printed in black and white.

Through a series of recent breakthroughs, deep learning has boosted the entire field of machine learning. Now, even programmers who know close to nothing about this technology can use simple, efficient tools to implement programs capable of learning from data....

Reactive Design Patterns
Reactive Design Patterns

Summary

Reactive Design Patterns is a clearly written guide for building message-driven distributed systems that are resilient, responsive, and elastic. In this book you'll find patterns for messaging, flow control, resource management, and concurrency, along with practical issues like test-friendly...

Simple Steps to Data Encryption: A Practical Guide to Secure Computing
Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who...

Advanced Microservices: A Hands-on Approach to Microservice Infrastructure and Tooling
Advanced Microservices: A Hands-on Approach to Microservice Infrastructure and Tooling

Use the many types of tools required to navigate and maintain a microservice ecosystem. This book examines what is normally a complex system of interconnected services and clarifies them one at a time, first examining theoretical requirements then looking at concrete tools, configuration, and workflows.

Building out these systems...

Entity Framework 6 Recipes
Entity Framework 6 Recipes

Entity Framework 6 Recipes provides an exhaustive collection of ready-to-use code solutions for Entity Framework, Microsoft's model-centric, data-access platform for the .NET Framework and ASP.NET development. With this book, you will learn the core concepts of Entity Framework through a broad range of clear and concise...

Risk and Portfolio Analysis: Principles and Methods (Springer Series in Operations Research and Financial Engineering)
Risk and Portfolio Analysis: Principles and Methods (Springer Series in Operations Research and Financial Engineering)

Investment and risk management problems are fundamental problems for  financial institutions and involve both speculative and hedging decisions. A structured approach to these problems naturally leads one to the field of applied mathematics in order to translate subjective probability beliefs and attitudes towards risk and reward into...

Dns in Action: A Detailed And Practical Guide to Dns Implementation, Configuration, And Administration
Dns in Action: A Detailed And Practical Guide to Dns Implementation, Configuration, And Administration
Recently, while driving to my work, I listened to radio as usual. Because of the establishment of the new EU (European Union) domain, there was an interview with a representative of one of the Internet Service Providers. For some time the interview went on, boringly similar to other common radio interviews, but suddenly the presswoman started to...
Supplier Relationship Management: How to Maximize Vendor Value and Opportunity
Supplier Relationship Management: How to Maximize Vendor Value and Opportunity

There’s a new buzz phrase in the air: Supplier Relationship Management (SRM). Corporate executives know it’s necessary, but there’s only one problem. Nobody yet knows how to do it. Or they think it’s all about bashing your vendors over the head until they reduce the price another 4%. Supplier Relationship...

Design for Hackers: Reverse Engineering Beauty
Design for Hackers: Reverse Engineering Beauty

The smash hit introductory design book that debuted at #18 on Amazon
Hackers are able to accomplish so much in so little time because they come from a community that's built upon sharing knowledge. When it comes to programming, they can learn whatever they need to learn by reading manuals, or simply typing in a Google
...

Art of Computer Programming/Sorting and Searching (Computer Science and Information Processing)
Art of Computer Programming/Sorting and Searching (Computer Science and Information Processing)

For the first time in more than 20 years, Knuth has revised all three books to reflect more recent developments in the field. His revisions focus specifically on those areas where knowledge has converged since publication of the last editions, on problems that have been solved, on problems that have changed. In
...
Result Page: 37 36 35 34 33 32 31 30 29 28 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy