Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Worst Is Yet to Come: A Post-Capitalist Survival Guide
The Worst Is Yet to Come: A Post-Capitalist Survival Guide
Capitalism is about to commit suicide and is threatening to take us down with it. But will it give way to a grand social utopia or the beginning of a new dark age... albeit WiFi enabled?

The Worst is Yet to Come explores the disturbing possibility that the current crisis of neoliberal capitalism isn’t
...
Financial Modeling in Excel For Dummies
Financial Modeling in Excel For Dummies

Make informed business decisions with the beginner's guide to financial modeling using Microsoft Excel

Financial Modeling in Excel For Dummies is your comprehensive guide to learning how to create informative, enlightening financial models today. Not a math whiz or an Excel power-user? No problem! All you need is...

Quantum Computing and Communications: An Engineering Approach
Quantum Computing and Communications: An Engineering Approach
Quantum computers will revolutionize the way telecommunications networks function.

Quantum computing holds the promise of solving problems that would be intractable with conventional computers, by implementing principles from quantum physics in the development of computer hardware, software and communications equipment....

Feature Engineering for Machine Learning: Principles and Techniques for Data Scientists
Feature Engineering for Machine Learning: Principles and Techniques for Data Scientists

Feature engineering is a crucial step in the machine-learning pipeline, yet this topic is rarely examined on its own. With this practical book, you’ll learn techniques for extracting and transforming features—the numeric representations of raw data—into formats for machine-learning models. Each chapter guides you...

An Introduction to Quantum Computing Algorithms
An Introduction to Quantum Computing Algorithms
In 1994 Peter Shor [65] published a factoring algorithm for a quantum computer that finds the prime factors of a composite integer N more efficiently than is possible with the known algorithms for a classical com­ puter. Since the difficulty of the factoring problem is crucial for the se­ curity of a public key encryption system,...
A Systemic Perspective on Cognition and Mathematics
A Systemic Perspective on Cognition and Mathematics

This book is devoted to the study of human thought, its systemic structure, and the historical development of mathematics both as a product of thought and as a fascinating case analysis. After demonstrating that systems research constitutes the second dimension of modern science, the monograph discusses the yoyo model, a recent...

Mastering UI Development with Unity: An in-depth guide to developing engaging user interfaces with Unity 5, Unity 2017, and Unity 2018
Mastering UI Development with Unity: An in-depth guide to developing engaging user interfaces with Unity 5, Unity 2017, and Unity 2018

Master Game UI system by creating captivating user interface components with Unity 5 through Unity 2018 and C#. Learn about UI texts, images, world space UI, mobile-specific UI and much more.

Key Features

  • Develop a game UI with both technical and aesthetic considerations
  • ...
UNIX® Network Programming Volume 1, Third Edition: The Sockets Networking API
UNIX® Network Programming Volume 1, Third Edition: The Sockets Networking API

Everyone will want this book because it provides a great mix of practical experience, historical perspective, and a depth of understanding that only comes from being intimately involved in the field. I've already enjoyed and learned from reading this book, and surely you will too."
-Sam Leffler

...
Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python
Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python

Become a master at penetration testing using machine learning with Python

Key Features

  • Identify ambiguities and breach intelligent security systems
  • Perform unique cyber attacks to breach robust systems
  • Learn to leverage machine learning algorithms
  • ...
Hacking Product Design: A Guide to Designing Products for Startups
Hacking Product Design: A Guide to Designing Products for Startups

Understand how designing a technology product in a startup environment is markedly different from product design at established companies. This book teaches product designers how to think and frame problems in the dynamic context of startups. You will discover how to enhance your soft skills that are often not taught, but are crucial...

Intelligent Projects Using Python: 9 real-world AI projects leveraging machine learning and deep learning with TensorFlow and Keras
Intelligent Projects Using Python: 9 real-world AI projects leveraging machine learning and deep learning with TensorFlow and Keras

Implement machine learning and deep learning methodologies to build smart, cognitive AI projects using Python

Key Features

  • A go-to guide to help you master AI algorithms and concepts
  • 8 real-world projects tackling different challenges in healthcare, e-commerce, and...
Professional Microsoft SQL Server 2012 Integration Services
Professional Microsoft SQL Server 2012 Integration Services

THE MOST IMPORTANT BUSINESS intelligence tool in the Microsoft Swiss Army knife of tools is SQL Server Integration Services (SSIS). This is because the other tools would be nothing without the cleansing and movement of data into a presentable format. The product can extract, transform, and load (ETL) data astonishingly fast. A 2010 benchmark...

Result Page: 70 69 68 67 66 65 64 63 62 61 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy