Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Anonymous Communication Networks: Protecting Privacy on the Web
Anonymous Communication Networks: Protecting Privacy on the Web

In today’s interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.

Addressing the demand for authoritative information on
...

Learning Data Mining with Python
Learning Data Mining with Python

Harness the power of Python to analyze data and create insightful predictive models

About This Book

  • Learn data mining in practical terms, using a wide variety of libraries and techniques
  • Learn how to find, manipulate, and analyze data using Python
  • Step-by-step instructions...
Inside SQLite
Inside SQLite

SQLite is a small, zero-configuration, custom-tailored, embeddable, threadsafe, easily maintainable, transactionoriented, SQL-based, relational database management system. There is no separate install or setup procedure to initialize SQLite before using it. There is no configuration file.

SQLite is open source, and...

QoS and QoE Management in UMTS Cellular Systems
QoS and QoE Management in UMTS Cellular Systems
This comprehensive volume provides state-of-the art guidance on Quality of Service (QoS) and Quality of end-user Experience (QoE) management in UMTS cellular systems, tackling planning, provisioning, monitoring and optimisation issues in a single accessible resource. In addition, a detailed discussion is provided on service applications, QoS...
CUDA Fortran for Scientists and Engineers: Best Practices for Efficient CUDA Fortran Programming
CUDA Fortran for Scientists and Engineers: Best Practices for Efficient CUDA Fortran Programming

CUDA Fortran for Scientists and Engineers shows how high-performance application developers can leverage the power of GPUs using Fortran, the familiar language of scientific computing and supercomputer performance benchmarking. The authors presume no prior parallel computing experience, and cover the basics along with best practices...

Introduction to Information Theory and Data Compression, Second Edition
Introduction to Information Theory and Data Compression, Second Edition
An effective blend of carefully explained theory and practical applications, this text imparts the fundamentals of both information theory and data compression. Although the two topics are related, this unique text allows either topic to be presented independently, and it was specifically designed so that the data compression section requires...
PySide GUI Application Development
PySide GUI Application Development

Newbies to GUI programming in Python will find this book indispensable. As well as the basic concepts, you'll be taught PySide in detail through practical instructions and create your own applications with customized widgets and dialogs.

Overview

  • Designed for beginners to help them get started with...
Peer-to-Peer : Harnessing the Power of Disruptive Technologies
Peer-to-Peer : Harnessing the Power of Disruptive Technologies

The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and...

CherryPy Essentials: Rapid Python Web Application Development
CherryPy Essentials: Rapid Python Web Application Development
This book covers the CherryPy library for Python web development from its history and installation through its main features and core concepts to its integration with Python and other products to construct, test, and deploy a sample photoblog application. The author Sylvain Hellegouarch is dedicated to the development of free software projects and...
VPNs Illustrated : Tunnels, VPNs, and IPsec
VPNs Illustrated : Tunnels, VPNs, and IPsec

Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually...

Learning Docker - Second Edition: Build, ship, and scale faster
Learning Docker - Second Edition: Build, ship, and scale faster

Docker lets you create, deploy, and manage your applications anywhere at anytime – flexibility is key so you can deploy stable, secure, and scalable app containers across a wide variety of platforms and delve into microservices architecture

About This Book

  • This up-to-date edition...
Statistics and Data with R: An applied approach through examples
Statistics and Data with R: An applied approach through examples
R, an Open Source software, has become the de facto statistical computing environment. It has an excellent collection of data manipulation and graphics capabilities. It is extensible and comes with a large number of packages that allow statistical analysis at all levels – from simple to advanced – and in numerous fields...
unlimited object storage image
Result Page: 67 66 65 64 63 62 61 60 59 58 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy