Home | Amazing | Today | Tags | Publishers | Years | Search 
The Hellenistic Settlements in Syria, the Red Sea Basin, and North Africa (Hellenistic Culture and Society)
The Hellenistic Settlements in Syria, the Red Sea Basin, and North Africa (Hellenistic Culture and Society)

This is the second of a three-volume study of the Hellenistic settlements. The first, The Hellenistic Settlements in Europe, the Islands, and Asia Minor, dealt with foundations in those regions. The present volume focuses on the Hellenistic settlements of Syria, the Red Sea Basin, and North Africa. The third volume will deal with the...

Chinese Lexicography: A History from 1046 BC to AD 1911
Chinese Lexicography: A History from 1046 BC to AD 1911

This comprehensive account of the history of Chinese lexicography is the first book on the subject to be published in English. It traces the development of Chinese lexicography over three millennia, from the Zhou Dynasty (1046 BC-256 BC) to the Qing Dynasty (1616-1911). Revealing how the emergence of lexicographical culture in ancient China...

APM Best Practices: Realizing Application Performance Management (Books for Professionals by Professionals)
APM Best Practices: Realizing Application Performance Management (Books for Professionals by Professionals)

The objective of APM Best Practices: Realizing Application Performance Management is to establish reliable application performance management (APM) practices—to demonstrate value, to do it quickly, and to adapt to the client circumstances. It's important to balance long-term goals with short-term deliverables, but...

Logic for Programming, Artificial Intelligence, and Reasoning: 16th International Conference
Logic for Programming, Artificial Intelligence, and Reasoning: 16th International Conference

The 16th LPAR event was held in Africa for the very first time, signalling a bright future for a conference with a glowing history. For many years it was a goal of the steering committee to hold LPAR in Africa and the enthusiasm for our presence far exceeded our expectations. With the help of local organiser Waly Faye, LPAR integrated itself...

Learn You a Haskell for Great Good!: A Beginner's Guide
Learn You a Haskell for Great Good!: A Beginner's Guide

It's all in the name: Learn You a Haskell for Great Good! is a hilarious, illustrated guide to this complex functional language. Packed with the author's original artwork, pop culture references, and most importantly, useful example code, this book teaches functional fundamentals in a way you never thought...

Movies Made for Television: 1964-2004 (5 Volume Set)
Movies Made for Television: 1964-2004 (5 Volume Set)
Movies Made for Television in 2004 celebrates 40 full television seasons. As I wrote in the introduction in 1980 to the original (single) volume that chronicled the genre, the range was as esthetically and technically wide at the time as it would remain through the years since as any theatrical offerings – within its restricted...
Object-Oriented Software Engineering: Practical Software Development using UML and Java
Object-Oriented Software Engineering: Practical Software Development using UML and Java

This earliest recorded attempt to regulate the engineering profession reminds us, in the bluntest way possible, that the paramount purpose of engineering and engineering design is to serve the user. One would assume that the engineer’s responsibility to users is so self evident that it goes without saying. Various professional...

Recent Trends and Developments in Social Software: International Conferences on Social Software
Recent Trends and Developments in Social Software: International Conferences on Social Software

From its beginnings, the Internet has fostered communication, collaboration and networking between users. However, the first boom at the turn of the millennium was mainly driven by a rather one-sided interaction: e-commerce, portal sites and the broadcast models of mainstream media were introduced to theWeb. Over the last six or seven...

Machine Learning for Hackers
Machine Learning for Hackers

To explain the perspective from which this book was written, it will be helpful to define the terms machine learning and hackers.

What is machine learning? At the highest level of abstraction, we can think of machine learning as a set of tools and methods that attempt to infer patterns and extract insight from a record of the...

Dissecting the Hack: The F0rb1dd3n Network, Revised Edition
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition

The world of hacking is a world of pain and frustration. Frustration for the hacker as he tries to figure out how to break the latest and greatest security device, and pain for the manufacturer or corporation that made or was relying on that device.

Dissecting the Hack is one heck of a ride! Hackers, IT professional, and...

Peer-to-Peer Computing: Applications, Architecture, Protocols, and Challenges
Peer-to-Peer Computing: Applications, Architecture, Protocols, and Challenges
Peer-to-peer computing, at least on a conceptual level, is a genuine paradigm shift—intelligence is at the edge, computing is completely decentralized, and the network is just there to knit the distributed intelligence together. Indeed, with advancements in hardware technology, proliferation of the open source development...
Machine Learning for Email: Spam Filtering and Priority Inbox
Machine Learning for Email: Spam Filtering and Priority Inbox
To explain the perspective from which this book was written, it will be helpful to define the terms machine learning and hackers.

What is machine learning? At the highest level of abstraction, we can think of machine learning as a set of tools and methods that attempt to infer patterns and extract
...
Result Page: 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy