Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Artificial Intelligence By Example: Develop machine intelligence from scratch using real artificial intelligence use cases
Artificial Intelligence By Example: Develop machine intelligence from scratch using real artificial intelligence use cases

Be an adaptive thinker that leads the way to Artificial Intelligence

Key Features

  • AI-based examples to guide you in designing and implementing machine intelligence
  • Develop your own method for future AI solutions
  • Acquire advanced AI, machine learning, and...
Blockchain for Business 2019: A user-friendly introduction to blockchain technology and its business applications
Blockchain for Business 2019: A user-friendly introduction to blockchain technology and its business applications

Your one-stop guide to blockchain technology and its business applications

Key Features

  • Assimilate blockchain services such as Ethereum and Hyperledger to transform industrial applications
  • Know in and out of blockchain technology to understand various business use...
Practical Data Mining
Practical Data Mining

Used by corporations, industry, and government to inform and fuel everything from focused advertising to homeland security, data mining can be a very useful tool across a wide range of applications. Unfortunately, most books on the subject are designed for the computer scientist and statistical illuminati and leave the reader largely...

Telecosmos: The Next Great Telecom Revolution
Telecosmos: The Next Great Telecom Revolution
An insider's guide to the exciting future of telecommunications

The last great telecommunications revolution brought us fiber optics, mobile phones, videoconferencing, and a host of other innovations that improved life and business and connected individuals in ways never imagined. Now emerging technologies such as Voice over Internet Protocol...

The Mobile Application Hacker's Handbook
The Mobile Application Hacker's Handbook

See your app through a hacker's eyes to find the real sources of vulnerability

The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward...

Handbook of IPv4 to IPv6 Transition: Methodologies for Institutional and Corporate Networks
Handbook of IPv4 to IPv6 Transition: Methodologies for Institutional and Corporate Networks
In 2005, the U.S. Government Accountability Office recommended that all agencies begin planning a coherent transition to IPv6. IPv6 will solve the problem of limited IP addresses and improve internetworking capabilities. This promising protocol is gaining momentum and it is only a matter of time before the transition will have to occur globally....
Financial Modeling in Excel For Dummies
Financial Modeling in Excel For Dummies

Make informed business decisions with the beginner's guide to financial modeling using Microsoft Excel

Financial Modeling in Excel For Dummies is your comprehensive guide to learning how to create informative, enlightening financial models today. Not a math whiz or an Excel power-user? No problem! All you need is...

Building the Agile Enterprise: With SOA, BPM and MBM (The MK/OMG Press)
Building the Agile Enterprise: With SOA, BPM and MBM (The MK/OMG Press)
In the last ten years IT has brought fundamental changes to the way the world works. Not only has it increased the speed of operations and communications, but it has also undermined basic assumptions of traditional business models and increased the number of variables. Today, the survival of major corporations is challenged by a world-wide...
Towards the Semantic Web: Ontology-Driven Knowledge Management
Towards the Semantic Web: Ontology-Driven Knowledge Management
Generating huge interest and backed by the global WorldWideWeb consortium the semantic web is the key initiative driving the future of the World Wide Web. Towards the Semantic Web focuses on the application of Semantic Web technology and ontologies in particular to electronically available information to improve the quality of knowledge management...
Telecom Crash Course, Second Edition
Telecom Crash Course, Second Edition
THE DEFINITIVE TELECOM RESOURCE -- COMPLETELY REVISED AND UPDATED

Get a thorough introduction to the telecommunications industry -- from the technologies involved to the complex business, market, and regulatory relationships. This new edition of the acclaimed telecom guide provides a framework for understanding the concepts,...

Architecting the Cloud: Design Decisions for Cloud Computing Service Models (SaaS, PaaS, and IaaS)
Architecting the Cloud: Design Decisions for Cloud Computing Service Models (SaaS, PaaS, and IaaS)

An expert guide to selecting the right cloud service model for your business

Cloud computing is all the rage, allowing for the delivery of computing and storage capacity to a diverse community of end-recipients. However, before you can decide on a cloud model, you need to determine what the ideal cloud service model is for...

Mission-Critical Network Planning
Mission-Critical Network Planning
I wrote this book in the aftermath of the terrorist attacks that took place on September
11, 2001. Until then, I was planning to write this book at a much later time. But
the events of that day compelled me to immediately begin this work. As we have
seen, those events have had far-reaching repercussions in the information
...
Result Page: 31 30 29 28 27 26 25 24 23 22 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy