Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering IPython 4.0
Mastering IPython 4.0

Key Features

  • Most updated book on Interactive computing with IPython 4.0;
  • Detailed, example-rich guide that lets you use the most advanced level interactive programming with IPython;
  • Get flexible interactive programming with IPython using this comprehensive guide
...
Amazing Java: Learn Java Quickly!
Amazing Java: Learn Java Quickly!


Do you know Java is being used worldwide? These days it is difficult to find a platform not running on Java. Their uses begin from commercial e-commerce website to Android apps, from desktop applications to games, from financial applications to scientific applications, from J2ME applications to open source library
...

Computer Age Statistical Inference: Algorithms, Evidence, and Data Science (Institute of Mathematical Statistics Monographs)
Computer Age Statistical Inference: Algorithms, Evidence, and Data Science (Institute of Mathematical Statistics Monographs)
The twenty-first century has seen a breathtaking expansion of statistical methodology, both in scope and in influence. “Big data,” “data science,” and “machine learning” have become familiar terms in the news, as statistical methods are brought to bear upon the enormous data sets of modern science...
High Tech/High Touch: Technology and Our Search for Meaning
High Tech/High Touch: Technology and Our Search for Meaning
The one great megatrend of the new millennium. In this important and timely book encompassing the key trends of our time, John Naisbitt, the world's foremost social forecaster and bestselling author, takes us on a compelling and kaleidoscopic tour of our contemporary 'technology immersion' and our accelerated search for meaning. High...
Ontology Matching
Ontology Matching

Ontologies tend to be found everywhere. They are viewed as the silver bullet for many applications, such as database integration, peer-to-peer systems, e-commerce, semantic web services, or social networks. However, in open or evolving systems, such as the semantic web, different parties would, in general, adopt different ontologies. Thus,...

Cryptographic  Boolean  Functions and Applications
Cryptographic Boolean Functions and Applications
Boolean functions are the building blocks of symmetric cryptographic systems. Symmetrical cryptographic algorithms are fundamental tools in the design of all types of digital security systems (i.e. communications, financial and e-commerce).

Cryptographic Boolean Functions and Applications is a concise reference that shows how Boolean
...
ReactJS by Example- Building Modern Web Applications with React
ReactJS by Example- Building Modern Web Applications with React

Key Features

  • Create pragmatic real-world applications while learning React and its modern developer tools
  • Build sustainable user interfaces by transforming data into components of UI
  • Learn how to generate reusable ReactJS components effectively

Book Description

...

Internet Television
Internet Television
Internet television is the quintessential digital convergence medium, putting together television, telecommunications, the Internet, computer applications, games, and more. It is part of a historic move from individualized narrowband capacity, measured by kilobits per user, to one of broadband with a capacity of megabits per user. This move will...
Mobile Commerce : Opportunities, Applications, and Technologies of Wireless Business
Mobile Commerce : Opportunities, Applications, and Technologies of Wireless Business
This book provides the context, architectures, case studies, and intelligent analysis that will help the reader grasp the rapidly evolving subject of mobile commerce. May explains the technological aspects of mobile commerce to business decision makers and the business models to the technologists who design and build these electronic systems. It...
Professional Financial Computing Using Excel and VBA
Professional Financial Computing Using Excel and VBA

"Professional Financial Computing Using Excel and VBA is an admirable exposition that bridges the theoretical underpinnings of financial engineering and its application which usually appears as a "black-box" software application. The book opens the black-box and reveals the architecture of risk-modeling and financial...

Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics)
Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics)

Master Bayesian Inference through Practical Examples and Computation–Without Advanced Mathematical Analysis

 

Bayesian methods of inference are deeply natural and extremely powerful. However, most discussions of Bayesian inference rely...

Blogger: Beyond the Basics: Customize and promote your blog with original templates, analytics, advertising, and SEO (From Technologies to Solutions)
Blogger: Beyond the Basics: Customize and promote your blog with original templates, analytics, advertising, and SEO (From Technologies to Solutions)
In Detail

Blogger is a blog publishing system from Google with a friendly interface specifically designed for creating and maintaining weblogs.

It allows users to easily create dynamic blogs with great content and many outstanding features including RSS feeds, link-backs, photo slideshows, and integration with...

Result Page: 66 65 64 63 62 61 60 59 58 57 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy