Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Probability and Statistics for Computer Scientists
Probability and Statistics for Computer Scientists

Student-Friendly Coverage of Probability, Statistical Methods, Simulation, and Modeling Tools
Incorporating feedback from instructors and researchers who used the previous edition, Probability and Statistics for Computer Scientists, Second Edition helps students understand general methods of stochastic
...

Information Security Science: Measuring the Vulnerability to Data Compromises
Information Security Science: Measuring the Vulnerability to Data Compromises

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically...

Restricted Kalman Filtering: Theory, Methods, and Application (SpringerBriefs in Statistics)
Restricted Kalman Filtering: Theory, Methods, and Application (SpringerBriefs in Statistics)

In this book, I highlight the developments in Kalman filtering subject to general linear constraints. Essentially, the material to be presented is almost entirely based on the results and examples originally developed in Pizzinga et al. (2008a), Cerqueira et al. (2009), Pizzinga (2009, 2010), Souza et al. (2011), Pizzinga et al. (2011), and...

Numerical Methods for Nonlinear Estimating Equations (Oxford Statistical Science, Vol. 29)
Numerical Methods for Nonlinear Estimating Equations (Oxford Statistical Science, Vol. 29)
This book has grown from the authors' investigations into the problem of finding consistent and efficient solutions to estimating equations which admit multiple solutions. While there have been studies of multiple roots in likelihood estimation, most notably by Barnett (1966), we felt that there was a need to incorporate more...
Apple Pro Training Series : Advanced Editing Techniques in Final Cut Pro 5
Apple Pro Training Series : Advanced Editing Techniques in Final Cut Pro 5
In the only Apple-certified guide to advanced video editing techniques, award-winning filmmaker Michael Wohl delivers comprehensive training in the real-world skills that professionals use every day. Working through six hours of superb raw footage on two DVD-9 discs, you'll learn to cut dialogue, action, comedy, chases, fights, interviews,...
97 Things Every Project Manager Should Know: Collective Wisdom from the Experts
97 Things Every Project Manager Should Know: Collective Wisdom from the Experts
If the projects you manage don't go as smoothly as you'd like, 97 Things Every Project Manager Should Know offers knowledge that's priceless, gained through years of trial and error. This illuminating book contains 97 short and extremely practical tips -- whether you're dealing with software or non-IT projects -- from some of...
Software Sizing, Estimation, and Risk Management: When Performance is Measured Performance Improves
Software Sizing, Estimation, and Risk Management: When Performance is Measured Performance Improves

Software Sizing, Estimation, and Risk Management: When Performance is Measured Performance Improves is a practical, hands-on discussion of the software estimation, planning, and control process. This includes critical factors that impact estimates, methods for selecting and applying appropriate measures to projects, proper software sizing, and...

A Methodology for Uncertainty in Knowledge-Based Systems
A Methodology for Uncertainty in Knowledge-Based Systems

In this book the consequent use of probability theory is proposed for handling uncertainty in expert systems. It is shown that methods violating this suggestion may have dangerous consequences (e.g., the Dempster-Shafer rule and the method used in MYCIN). The necessity of some requirements for a correct combining of uncertain information in...

Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

MATLAB Control Systems Engineering
MATLAB Control Systems Engineering

MATLAB is a high-level language and environment for numerical computation, visualization, and programming. Using MATLAB, you can analyze data, develop algorithms, and create models and applications. The language, tools, and built-in math functions enable you to explore multiple approaches and reach a solution faster than with spreadsheets or...

The Lanczos and Conjugate Gradient Algorithms: From Theory to Finite Precision Computations
The Lanczos and Conjugate Gradient Algorithms: From Theory to Finite Precision Computations
"No present book comes near this one in the range and depth of treatment of these two extremely important methods—the Lanczos algorithm and the method of conjugate gradients." Chris Paige, School of Computer Science, McGill University.   The Lanczos and conjugate gradient (CG) algorithms are fascinating numerical...
The Law, In Plain English, For Photographers
The Law, In Plain English, For Photographers
The photographer's definitive business and legal resource is now completely updated and expanded. In this valuable guide, arts attorney Leonard DuBoff takes you step by step though all the legal aspects of the photography business. Here is expert advice for everything from contracts to trademarks, including government licenses, taxes, censorship,...
Result Page: 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy