Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python Deep Learning: Exploring deep learning techniques and neural network architectures with PyTorch, Keras, and TensorFlow, 2nd Edition
Python Deep Learning: Exploring deep learning techniques and neural network architectures with PyTorch, Keras, and TensorFlow, 2nd Edition

Learn advanced state-of-the-art deep learning techniques and their applications using popular Python libraries

Key Features

  • Build a strong foundation in neural networks and deep learning with Python libraries
  • Explore advanced deep learning techniques and their applications...
Fashion Supply Chain Management in Asia: Concepts, Models, and Cases (Springer Series in Fashion Business)
Fashion Supply Chain Management in Asia: Concepts, Models, and Cases (Springer Series in Fashion Business)
This book serves as a comprehensive guide to understanding the theories and applications in managing the Asian fashion supply chain, presenting both quantitative and exploratory studies. Providing academicians and practitioners insights into the latest developments and models, it also offers diverse perspectives on areas like strategic...
Pro Windows Phone App Development (Professional Apress)
Pro Windows Phone App Development (Professional Apress)
Windows Phone, updated in Windows Phone 7.5, presents an exciting opportunity for developers to build and monetize mobile applications. It represents a major new investment into mobile computing by Microsoft, and in many ways is a major break from the past. To build applications for Windows Phone, it is important to understand its...
Materials that Change Color: Smart Materials, Intelligent Design
Materials that Change Color: Smart Materials, Intelligent Design

This book presents a design-driven investigation into smart materials developed by chemists, physicists, materials and chemical engineers, and applied by designers to consumer products. Introducing a class of smart materials, that change colors, the book presents their characteristics, advantages, potentialities and difficulties of...

Risk Assessment of Chemicals: An Introduction
Risk Assessment of Chemicals: An Introduction

At last – a second edition of this hugely important text that reflects the progress and experience gained in the last decade and aims at providing background and training material for a new generation of risk assessors. The authors offer an introduction to risk assessment of chemicals as well as basic background information on sources,...

Introduction to Management in the Hospitality Industry
Introduction to Management in the Hospitality Industry

Readers seeking management careers in hospitality will enter a dynamic industry filled with opportunities. The rewards are many, but so are the challenges. Today's hospitality managers must deal with such complex factors as globalization, terrorism threats, ecotourism, internet commerce, new business and financial models, and rapidly...

How to Do Everything with Your iMac, 4th Edition
How to Do Everything with Your iMac, 4th Edition

The original idea of How to Do Everything with Your iMac was a simple one. The iMac is a complete computer with a wonderful bundle of applications that enable you to do just about anything you need a computer to do. So, I wanted my book on the iMac to be as comprehensive as possible, teaching the reader how to be productive while enjoying...

Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters (Expert's Voice in Security)
Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters (Expert's Voice in Security)

"This book is a must have resource guide for anyone who wants to ...  implement TXT within their environments.  I wish we had this guide when our engineering teams were implementing TXT on our solution platforms!”  

John McAuley,EMC Corporation

"This book details innovative technology...

Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance

Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with...

Book: A Futurist's Manifesto: A Collection of Essays from the Bleeding Edge of Publishing
Book: A Futurist's Manifesto: A Collection of Essays from the Bleeding Edge of Publishing

The ground beneath the book publishing industry dramatically shifted in 2007, the year the Kindle and the iPhone debuted. Widespread consumer demand for these and other devices has brought the pace of digital change in book publishing from "it might happen sometime" to "it’s happening right now"—and it...

Symbian OS C++ for Mobile Phones
Symbian OS C++ for Mobile Phones
Programming Symbian OS is a key skill for mass market phone application development. Whether you are developing a
services for shipping mobile phones, or involved in pre-market mobile phone development, this book will help you unde
fundamental theory behind developing Symbian OS C++ code for constrained devices.

• A
...
Digital Futures: Living in a dot.com World
Digital Futures: Living in a dot.com World
Beyond the hype about dot-coms, WAP phones and dot-com entrepreneurs, what impacts will e-commerce have on society? How will it affect jobs and local communities? What will it mean for energy use, transport and the future shape of our cities? How can we ensure that everyone enjoys the benefits of the new digital technologies?

With
...
unlimited object storage image
Result Page: 46 45 44 43 42 41 40 39 38 37 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy