Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Business Intelligence: Data Mining and Optimization for Decision Making
Business Intelligence: Data Mining and Optimization for Decision Making

Business intelligence is a broad category of applications andtechnologies for gathering, providing access to, and analyzing datafor the purpose of helping enterprise users make better businessdecisions. The term implies having a comprehensive knowledge of allfactors that affect a business, such as customers, competitors,business partners,...

e-Learning and Social Networking Handbook: Resources for Higher Education
e-Learning and Social Networking Handbook: Resources for Higher Education

Student engagement with digital learning resources and online social networking are strong forces in education today. How can these resources best be utilized by educators and course designers in higher education? This book aims to provide the reader with enough background information to appreciate the value of social networking, especially...

Machine Learning with Python Cookbook: Practical Solutions from Preprocessing to Deep Learning
Machine Learning with Python Cookbook: Practical Solutions from Preprocessing to Deep Learning

This practical guide provides nearly 200 self-contained recipes to help you solve machine learning challenges you may encounter in your daily work. If you’re comfortable with Python and its libraries, including pandas and scikit-learn, you’ll be able to address specific problems such as loading data, handling text or...

Big Data Application Architecture Q&A: A Problem - Solution Approach (Expert's Voice in Big Data)
Big Data Application Architecture Q&A: A Problem - Solution Approach (Expert's Voice in Big Data)

Big Data Application Architecture Pattern Recipes provides an insight into heterogeneous infrastructures, databases, and visualization and analytics tools used for realizing the architectures of big data solutions. Its problem-solution approach helps in selecting the right architecture to solve the problem at hand. In the process of...

NoSQL For Dummies
NoSQL For Dummies

Get up to speed on the nuances of NoSQL databases and what they mean for your organization

This easy to read guide to NoSQL databases provides the type of no-nonsense overview and analysis that you need to learn, including what NoSQL is and which database is right for you. Featuring specific evaluation criteria for NoSQL databases,...

Domain-Specific Modeling: Enabling Full Code Generation
Domain-Specific Modeling: Enabling Full Code Generation
Domain-Specific Modeling (DSM) is the latest approach to software development, promising to greatly increase the speed and ease of software creation. Early adopters of DSM have been enjoying productivity increases of 500–1000% in production for over a decade. This book introduces DSM and offers examples from various fields to illustrate to...
Neural Networks and Pattern Recognition
Neural Networks and Pattern Recognition
This book is one of the most up-to-date and cutting-edge texts available on the rapidly growing application area of neural networks. Neural Networks and Pattern Recognition focuses on the use of neural networksin pattern recognition, a very important application area for neural networks technology. The contributors are widely known...
Kali Linux: Assuring Security By Penetration Testing
Kali Linux: Assuring Security By Penetration Testing

Master the art of penetration testing with Kali Linux

Overview

  • Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
  • Explore the insights and importance of testing your corporate network systems before the hackers strike
  • Understand the...
Learning R Programming
Learning R Programming

Key Features

  • Explore the R language from basic types and data structures to advanced topics
  • Learn how to tackle programming problems and explore both functional and object-oriented programming techniques
  • Learn how to address the core problems of programming in R and leverage the most popular...
Fourier Transform Methods in Finance
Fourier Transform Methods in Finance

In recent years, Fourier transform methods have emerged as one of the major methodologies for the evaluation of derivative contracts, largely due to the need to strike a balance between the extension of existing pricing models beyond the traditional Black-Scholes setting and a need to evaluate prices consistently with the market...

Fault Analysis in Cryptography (Information Security and Cryptography)
Fault Analysis in Cryptography (Information Security and Cryptography)

In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips. Research into the effect of cosmic rays on semiconductors, an area of particular interest in the aerospace industry, led to methods of hardening electronic...

Theory and Practice of Algorithms in (Computer) Systems: First International ICST Conference, TAPAS 2011, Rome, Italy
Theory and Practice of Algorithms in (Computer) Systems: First International ICST Conference, TAPAS 2011, Rome, Italy
This volume contains the 25 papers presented at the First International ICST Conference on Theory and Practice of Algorithms in (Computer) Systems (TAPAS 2011), held in Rome during April 18-20 2011, including three papers by the distinguished invited speakers Shay Kutten, Kirk Pruhs and Paolo Santi.

In light of
...
Result Page: 67 66 65 64 63 62 61 60 59 58 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy