Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Internet of Things and Data Analytics Handbook
Internet of Things and Data Analytics Handbook

This book examines the Internet of Things (IoT) and Data Analytics from a technical, application, and business point of view.

Internet of Things and Data Analytics Handbook describes essential technical knowledge, building blocks, processes, design principles, implementation, and marketing...

Programming the Raspberry Pi: Getting Started with Python
Programming the Raspberry Pi: Getting Started with Python

Program your own Raspberry Pi projects

Create innovative programs and fun games on your tiny yet powerful Raspberry Pi. In this book, electronics guru Simon Monk explains the basics of Raspberry Pi application development, while providing hands-on examples and ready-to-use scripts. See how to set up hardware and...

New Perspectives HTML5 and CSS3: Comprehensive
New Perspectives HTML5 and CSS3: Comprehensive
Now you can master Web page design as you learn from the unique, hands-on approach found in NEW PERSPECTIVES HTML5 AND CSS3: COMPREHENSIVE, 7E. Each tutorial in this complete book challenges you to put into practice the concepts you have just learned. Every tutorial includes a basic statement of the problem, the goals you should achieve, and a...
MongoDB in Action: Covers MongoDB version 3.0
MongoDB in Action: Covers MongoDB version 3.0

Summary

MongoDB in Action, Second Edition is a completely revised and updated version. It introduces MongoDB 3.0 and the document-oriented database model. This perfectly paced book gives you both the big picture you'll need as a developer and enough low-level detail to satisfy system engineers.

...
Hacker Disassembling Uncovered
Hacker Disassembling Uncovered
This text shows how to analyze programs without its source code, using a debugger and a disassembler, and covers hacking methods including virtual functions, local and global variables, branching, loops, objects and their hierarchy, and more.

This book is dedicated to the basics of hacking—methods of analyzing programs using a...

Microsoft System Center Cloud Management with App Controller (Introducing)
Microsoft System Center Cloud Management with App Controller (Introducing)

Part of a series of specialized guides on System Center - this book focuses on using AppController to manage virtual machines and services across private and public clouds. Series editor Mitch Tulloch and a team of System Center experts provide concise technical guidance as they step you through key configuration and management tasks.

...
Get Programming with JavaScript
Get Programming with JavaScript

Summary

Get Programming with JavaScript is a hands-on introduction to programming for readers who have never programmed. You'll be writing your own web apps, games, and programs in no time! Foreword by Remy Sharp.

Purchase of the print book includes a free eBook in PDF,...

Knowledge-Based Neurocomputing
Knowledge-Based Neurocomputing
Neurocomputing methods are loosely based on a model of the brain as a network of simple interconnected processing elements corresponding to neurons. These methods derive their power from the collective processing of artificial neurons, the chief advantage being that such systems can learn and adapt to a changing environment. In knowledge-based...
Mathematica by Example
Mathematica by Example
Mathematica bv Example is intended to bridge the gap which has existed between the very elementary handbooks available on Mathematica and those reference books written for the more advanced Mathematica users. This book is an extension of a manuscript which was developed to quickly introduce enough Mathematica commands to a group of...
Computational Complexity: A Conceptual Perspective
Computational Complexity: A Conceptual Perspective
This book offers a comprehensive perspective to modern topics in complexity theory, which is a central field of the theoretical foundations of computer science. It addresses the looming question of what can be achieved within a limited amount of time with or without other limited natural computational resources. Can be used as an introduction for...
Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The wide variety of methods used in terrorism informatics are...
Electric Power Transformer Engineering, Second Edition
Electric Power Transformer Engineering, Second Edition

It is appropriate that I first acknowledge my appreciation to Professor Leo Grigsby for inviting me to prepare the chapter on power transformers for the first edition (2001) of his now very popular Electric Power Engineering Handbook. From this evolved the recognition that two chapters from the 2001 Handbook, those for (1) substations...

Result Page: 137 136 135 134 133 132 131 130 129 128 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy