Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python Interviews: Discussions with Python Experts
Python Interviews: Discussions with Python Experts

Mike Driscoll takes you on a journey talking to a hall-of-fame list of truly remarkable Python experts. You'll be inspired every time by their passion for the Python language, as they share with you their experiences, contributions, and careers in Python.

Key Features

  • Hear from these...
Real-Life Math: Everyday Use of Mathematical Concepts
Real-Life Math: Everyday Use of Mathematical Concepts
"What does this have to do with real life?" is a question that plagues mathematics teachers across America, as students are confronted with abstract topics in their high school mathematics courses. The National Council of Teachers of Mathematics emphasizes the importance of making real world connections in teaching mathematics so that...
Headache Medicine: Questions and Answers
Headache Medicine: Questions and Answers
Headache is the number one complaint that causes a patient to see a neurologist. Because headaches constitute such a large part of many clinicians practices, the United Council for Neurologic Subspecialties created an annually-administered headache subspecialty exam in 2006.

Headache Medicine: Questions and Answers is the only...

CEH v9: Certified Ethical Hacker Version 9 Practice Tests
CEH v9: Certified Ethical Hacker Version 9 Practice Tests

Master CEH v9 and identify your weak spots

CEH: Certified Ethical Hacker Version 9 Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently and gain...

The Official CHFI Study Guide (Exam 312-49)
The Official CHFI Study Guide (Exam 312-49)
This is the only official, EC-Council-endorsed CHFI (Computer Hacking Forensics Investigator) study guide. It was written for security professionals, systems administrators, IT consultants, legal professionals, IT managers, police and law enforcement personnel studying for the CHFI certification, and professionals needing the skills to identify an...
Encyclopedia of Cybercrime
Encyclopedia of Cybercrime
The first comprehensive encyclopedia to examine all aspects of the mysterious world of cybercrime

There are today no more compelling sets of crime and security threats facing nations, communities, organizations, groups, families and individuals than those encompassed by cybercrime. For over fifty years crime enabled by computing and
...
Handbook of Research on User Interface Design and Evaluation for Mobile Technology
Handbook of Research on User Interface Design and Evaluation for Mobile Technology
In recent years, mobile technology has been one of the major growth areas in computing. Designing the user interface for mobile applications, however, is a very complex undertaking which is made even more challenging by the rapid technological developments in mobile hardware. Mobile human-computer interaction, unlike desktop-based interaction, must...
Source Code China: The New Global Hub of IT (Information Technology) Outsourcing
Source Code China: The New Global Hub of IT (Information Technology) Outsourcing
Source Code China

The New Global Hub of IT Outsourcing

Welcome to the new technology outsourcing services industry reality: China!

The factors that point to a country's potential and success as an outsourcing destination inevitably lead to the one country that is rapidly becoming the new hub for IT...

Cells and Robots: Modeling and Control of Large-Size Agent Populations (Springer Tracts in Advanced Robotics)
Cells and Robots: Modeling and Control of Large-Size Agent Populations (Springer Tracts in Advanced Robotics)
From the reviews:

"This interesting monograph is devoted to the study of multi-agent, populations of biological cells and robot teams. … The main objective of the approach is to provide solutions to the problem of how dynamics of an individual agent propagates to the population dynamics. … This original monograph has a wide...

Innovation in Information Technology
Innovation in Information Technology
The health of the computer science field and related disciplines has
been an enduring concern of the National Research Council’s Computer  cience and Telecommunications Board (CSTB). From its first reports in the late 1980s, CSTB has examined the nature, conduct, scope, and directions of the research that drives innovation in
...
Genetics Databases (Biological Techniques Series)
Genetics Databases (Biological Techniques Series)
Computer access is the only way to retrieve up-to-date nucleic acid and protein sequence and structure information.
This book, edited by Martin Bishop, describes the available information and where to find it, and is essential reading for any researcher puzzled by the wealth of on-line data.
The reader will be guided through the maze of
...
Learning Machine Translation (Neural Information Processing)
Learning Machine Translation (Neural Information Processing)
The Internet gives us access to a wealth of information in languages we don't understand. The investigation of automated or semi-automated approaches to translation has become a thriving research field with enormous commercial potential. This volume investigates how machine learning techniques can improve statistical machine translation, currently...
Result Page: 17 16 15 14 13 12 11 10 9 8 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy