Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python Interviews: Discussions with Python Experts
Python Interviews: Discussions with Python Experts

Mike Driscoll takes you on a journey talking to a hall-of-fame list of truly remarkable Python experts. You'll be inspired every time by their passion for the Python language, as they share with you their experiences, contributions, and careers in Python.

Key Features

  • Hear from these...
Theories of Programming and Formal Methods: Essays Dedicated to Jifeng He on the Occasion of His 70th Birthday (Lecture Notes in Computer Science)
Theories of Programming and Formal Methods: Essays Dedicated to Jifeng He on the Occasion of His 70th Birthday (Lecture Notes in Computer Science)

This Festschrift volume, dedicated to He Jifeng on the occasion of his 70th birthday in September 2013, includes 24 refereed papers by leading researchers, current and former colleagues, who congratulated at a celebratory symposium held in Shanghai, China, in the course of the 10th International Colloquium on Theoretical Aspects of Computing,...

Calculus Workbook For Dummies (Dummies Series)
Calculus Workbook For Dummies (Dummies Series)
From differentiation to integration — solve problems with ease

Got a grasp on the terms and concepts you need to know, but get lost halfway through a problem or, worse yet, not know where to begin? Have no fear! This hands-on guide focuses on helping you solve the many types of calculus problems you encounter in a...

Real-Life Math: Everyday Use of Mathematical Concepts
Real-Life Math: Everyday Use of Mathematical Concepts
"What does this have to do with real life?" is a question that plagues mathematics teachers across America, as students are confronted with abstract topics in their high school mathematics courses. The National Council of Teachers of Mathematics emphasizes the importance of making real world connections in teaching mathematics so that...
Ethical Hacking and Countermeasures: Attack Phases (EC-Council Press)
Ethical Hacking and Countermeasures: Attack Phases (EC-Council Press)

The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan,...

Designing Embedded Processors: A Low Power Perspective
Designing Embedded Processors: A Low Power Perspective
As we embrace the world of personal, portable, and perplexingly complex digital systems, it has befallen upon the bewildered designer to take advantage of the available transistors to produce a system which is small, fast, cheap and correct, yet possesses increased functionality.

Increasingly, these systems have to consume little energy....

Wireless and Mobile All-IP Networks
Wireless and Mobile All-IP Networks
Here's your all-IP network handbook for 3G and beyond

Experts forecast a future in which all telephone services will be delivered over the economical, efficient IP network. In this follow-up to Wireless and Mobile Network Architecture, the bestselling guide to wireless network engineering, Yi-Bing Lin and Ai-Chun Pang delve...

Bioinformatics: Converting Data to Knowledge, Workshop Summary
Bioinformatics: Converting Data to Knowledge, Workshop Summary
In 1993 the National Research Council’s Board on Biology established a series of forums on biotechnology. The purpose of the discussions is to foster open communication among scientists, administrators, policy-makers, and others engaged in biotechnology research, development, and commercialization. The neutral setting offered by the National...
Documentary in the Digital Age
Documentary in the Digital Age
If you want to learn from the leading lights of today's revolution in documentary filmmaking Maxine Baker has written the guide you need to own. You'll discover the many different and innovative approaches to documentary form and style arising from the use of innovative new technology. A tribute to the mavericks of creativity, inside you will find...
Source Code China: The New Global Hub of IT (Information Technology) Outsourcing
Source Code China: The New Global Hub of IT (Information Technology) Outsourcing
Source Code China

The New Global Hub of IT Outsourcing

Welcome to the new technology outsourcing services industry reality: China!

The factors that point to a country's potential and success as an outsourcing destination inevitably lead to the one country that is rapidly becoming the new hub for IT...

Cells and Robots: Modeling and Control of Large-Size Agent Populations (Springer Tracts in Advanced Robotics)
Cells and Robots: Modeling and Control of Large-Size Agent Populations (Springer Tracts in Advanced Robotics)
From the reviews:

"This interesting monograph is devoted to the study of multi-agent, populations of biological cells and robot teams. … The main objective of the approach is to provide solutions to the problem of how dynamics of an individual agent propagates to the population dynamics. … This original monograph has a wide...

Innovation in Information Technology
Innovation in Information Technology
The health of the computer science field and related disciplines has
been an enduring concern of the National Research Council’s Computer  cience and Telecommunications Board (CSTB). From its first reports in the late 1980s, CSTB has examined the nature, conduct, scope, and directions of the research that drives innovation in
...
Result Page: 17 16 15 14 13 12 11 10 9 8 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy