Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Imbalanced Learning: Foundations, Algorithms, and Applications
Imbalanced Learning: Foundations, Algorithms, and Applications

The first book of its kind to review the current status and future direction of the exciting new branch of machine learning/data mining called imbalanced learning

Imbalanced learning focuses on how an intelligent system can learn when it is provided with imbalanced data. Solving imbalanced learning problems is critical in...

The Networked Supply Chain: Applying Breakthrough BPM Technology to Meet Relentless Customer Demands
The Networked Supply Chain: Applying Breakthrough BPM Technology to Meet Relentless Customer Demands
This cutting-edge book illustrates how to implement a new breakthrough BPM technology that makes the vision of the networked enterprise a reality. BPM is changing the competitive business landscape. This breakthrough technology provides businesses with the means to manage processes across systems, people, and organizations, providing...
A Practical Introduction to Enterprise Network and Security Management
A Practical Introduction to Enterprise Network and Security Management

Computer networking and cybersecurity are challenging subjects, partly because of the constant rise and fall of related technologies and IT paradigms. As the title implies, much focus of this book is on providing the audience with practical, as well as, theoretical knowledge necessary to build a solid ground for a successful...

XML and Web Services Unleashed
XML and Web Services Unleashed
The Extensible Markup Language is changing the way that information is being stored and exchanged. It is also changing the very way that we think about data. XML Unleashed allows you to unlock this new power and get you well on your way towards developing XML applications and systems that enable your most important business processes, or your...
Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits (Uncovered series)
Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits (Uncovered series)

Uncovering the development of the hacking toolset under Linux, this book teaches programmers the methodology behind hacker programming techniques so that they can think like an attacker when developing a defense. Analyses and cutting-edge programming are provided of aspects of each hacking item and its source code—including ping...

Cross Site Scripting Attacks: Xss Exploits and Defense
Cross Site Scripting Attacks: Xss Exploits and Defense
Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they...
Prokaryotic Symbionts in Plants (Microbiology Monographs)
Prokaryotic Symbionts in Plants (Microbiology Monographs)

Endophytic prokaryotes can invade the tissue of the host plant without triggering defense reactions or disease symptoms. Instead, they promote the growth of the host plant due to their ability to fix atmospheric dinitrogen and/or to produce plant growth-promoting substances.

This Microbiology Monographs volume presents...

Learning Geospatial Analysis with Python - Second Edition
Learning Geospatial Analysis with Python - Second Edition

An effective guide to geographic information systems and remote sensing analysis using Python 3

About This Book

  • Construct applications for GIS development by exploiting Python
  • This focuses on built-in Python modules and libraries compatible with the Python Packaging Index distribution...
Nuclear Weapons: A Very Short Introduction
Nuclear Weapons: A Very Short Introduction
Despite not having been used in anger since Hiroshima and Nagasaki, nuclear weapons are still the biggest threat that faces us in the 21st century. Indeed, for all the effort to reduce nuclear stockpiles to zero and to keep other nations (such as Iran) from developing nuclear capability, it seems that the Bomb is here to stay. In this gripping Very...
Juniper(r) Networks Secure Access SSL VPN Configuration Guide
Juniper(r) Networks Secure Access SSL VPN Configuration Guide
Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for...
Self-Defense Nerve Centers and Pressure Points for Karate, Jujitsu and Atemi-Waza
Self-Defense Nerve Centers and Pressure Points for Karate, Jujitsu and Atemi-Waza
A modern definition of self-defense is in order. One way of defining self-defense is to explain what it is not. Personal self-defense is not warfare; it is not vengeance; it is not an art; it is not a sporting event; it is not a movie or television fight scene.

Self-defense is preparation to minimize the possibility of assault. It is
...
Ew 103, Tactical Battlefield communications Electronic Warfare
Ew 103, Tactical Battlefield communications Electronic Warfare
This is the third book in the EW 100 series. Like the two earlier books, it is based on the EW 101 series of tutorial articles in the Journal of Electronic Defense. However, this book focuses on the practical aspects of electronic warfare against enemy communications signals

The target audiences for this book, like the earlier two, are
...
unlimited object storage image
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy