Home | Amazing | Today | Tags | Publishers | Years | Search 
OpenCL Parallel Programming Development Cookbook
OpenCL Parallel Programming Development Cookbook

OpenCL (Open Computing Language) is the first royalty-free standard for cross platform, parallel programming of modern processors found in personal computers, servers, mobiles, and embedded devices. OpenCL greatly improves speed and responsiveness for a wide spectrum of applications in numerous market categories, from gaming and entertainment...

Radar and ARPA Manual, Third Edition: Radar, AIS and Target Tracking for Marine Radar Users
Radar and ARPA Manual, Third Edition: Radar, AIS and Target Tracking for Marine Radar Users

Radar and ARPA Manual provides essential information for professional mariners and seagoing marine engineers, including those undertaking electronic navigation system courses and marine operations qualifications internationally.

This fully revised new edition serves as the most comprehensive reference on equipment and techniques...

Molecular Genetics of Pancreatic Cancer
Molecular Genetics of Pancreatic Cancer

Pancreatic cancer is a formidable disease, and advances in early detection and improved therapeutics have been slow to come forth. With new advances in molecular genetics in the field of pancreatic tumorigenesis, it is an opportune time to use these recent discoveries to enhance our understanding of pancreatic cancer biology and to improve...

Fish Physiology: Organic Chemical Toxicology of Fishes, Volume 33: Fish Physiology Volume 33
Fish Physiology: Organic Chemical Toxicology of Fishes, Volume 33: Fish Physiology Volume 33

Fish Physiology: Organic Chemical Toxicology of Fishes discusses the different types of organic chemical contaminants and their respective toxic effects in fish. The book also covers the detection of dissolved organic compounds and methods to assess organic toxicity. Substances addressed in this book include organometallics,...

Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning

Nmap Network Scanning is the official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book by Nmap's...

Anti-Hacker Tool Kit, Fourth Edition
Anti-Hacker Tool Kit, Fourth Edition

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best...

Machine Learning and Security: Protecting Systems with Data and Algorithms
Machine Learning and Security: Protecting Systems with Data and Algorithms

Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you’ll explore ways to apply machine learning to security...

Feature Engineering for Machine Learning: Principles and Techniques for Data Scientists
Feature Engineering for Machine Learning: Principles and Techniques for Data Scientists

Feature engineering is a crucial step in the machine-learning pipeline, yet this topic is rarely examined on its own. With this practical book, you’ll learn techniques for extracting and transforming features—the numeric representations of raw data—into formats for machine-learning models. Each chapter guides you...

Windows Security Monitoring: Scenarios and Patterns
Windows Security Monitoring: Scenarios and Patterns

Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security

Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...

Python Social Media Analytics: Analyze and visualize data from Twitter, YouTube, GitHub, and more
Python Social Media Analytics: Analyze and visualize data from Twitter, YouTube, GitHub, and more

Leverage the power of Python to collect, process, and mine deep insights from social media data

About This Book

  • Acquire data from various social media platforms such as Facebook, Twitter, YouTube, GitHub, and more
  • Analyze and extract actionable insights from your social data using various...
PMI-ACP Project Management Institute Agile Certified Practitioner Exam Study Guide
PMI-ACP Project Management Institute Agile Certified Practitioner Exam Study Guide

The ultimate study package for the new PMI-ACP exam

The PMI-ACP Project Management Institute Agile Certified Practitioner Exam Study Guide is an all-in-one package for comprehensive exam preparation. This up-to-date guide is fully aligned with the latest version of the exam, featuring coverage of 100 percent of the...

Tika in Action
Tika in Action

Summary

Tika in Action is a hands-on guide to content mining with Apache Tika. The book's many examples and case studies offer real-world experience from domains ranging from search engines to digital asset management and scientific data processing.

About the Technology

Tika is an...

Result Page: 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy