Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Nature of Code: Simulating Natural Systems with Processing
The Nature of Code: Simulating Natural Systems with Processing
How can we capture the unpredictable evolutionary and emergent properties of nature in software? How can understanding the mathematical principles behind our physical world help us to create digital worlds? This book focuses on a range of programming strategies and techniques behind computer simulations of natural systems, from elementary...
Applied Deep Learning: A Case-Based Approach to Understanding Deep Neural Networks
Applied Deep Learning: A Case-Based Approach to Understanding Deep Neural Networks

Work with advanced topics in deep learning, such as optimization algorithms, hyper-parameter tuning, dropout, and error analysis as well as strategies to address typical problems encountered when training deep neural networks. You’ll begin by studying the activation functions mostly with a single neuron (ReLu, sigmoid, and...

Interleaving Concepts for Digital-to-Analog Converters: Algorithms, Models, Simulations and Experiments
Interleaving Concepts for Digital-to-Analog Converters: Algorithms, Models, Simulations and Experiments

Modern complementary metal oxide semiconductor (CMOS) digital-to-analog converters (DACs) are limited in their bandwidth due to technological constraints. These limitations can be overcome by parallel DAC architectures, which are called interleaving concepts. Christian Schmidt analyzes the limitations and the potential of two...

Kali Linux: Wireless Penetration Testing Beginner's Guide
Kali Linux: Wireless Penetration Testing Beginner's Guide

Key Features

  • Learn wireless penetration testing with Kali Linux, the latest iteration of Backtrack
  • Detect hidden wireless networks and discover their names
  • Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing
  • Develop your encryption...
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Proceedings of the Eighth Workshop on Algorithm Engineering and Experiments and the Third Workshop (Proceedings in Applied Mathematics)
Proceedings of the Eighth Workshop on Algorithm Engineering and Experiments and the Third Workshop (Proceedings in Applied Mathematics)
The annual Workshop on Algorithm Engineering and Experiments (ALENEX) provides a forum for the presentation of original research in all aspects of algorithm engineering, including the implementation and experimental evaluation of algorithms and data structures. The workshop was sponsored by SIAM, the Society for Industrial and Applied...
Proof and Disproof in Formal Logic: An Introduction for Programmers (Oxford Texts in Logic)
Proof and Disproof in Formal Logic: An Introduction for Programmers (Oxford Texts in Logic)
Proof and Disproof in Formal Logic is a lively and entertaining introduction to formal logic providing an excellent insight into how a simple logic works. Formal logic allows you to check a logical claim without considering what the claim means. This highly abstracted idea is an essential and practical part of computer science. The idea of a...
Database Management Systems
Database Management Systems
DATABASE MANAGEMENT SYSTEMS is designed for use in a course in databases. This book is distinctive in its emphasis on the practical side of databases. This means that it has unique coverage of database design, uses SQL throughout the book to demonstrate different concepts, and has an emphasis on query evaluation and optimization. In this revision...
Time-Dependent Problems and Difference Methods
Time-Dependent Problems and Difference Methods

Praise for the First Edition

". . . fills a considerable gap in the numerical analysis literature by providing a self-contained treatment . . . this is an important work written in a clear style . . . warmly recommended to any graduate student or researcher in the field of the numerical solution of partial...

Intelligent Positioning: GIS-GPS Unification
Intelligent Positioning: GIS-GPS Unification
Satellite positioning and computerised spatial data have transformed the way in which many areas of research and commercial activity are conducted. The combination of GIS and GPS is used for a broad spectrum of experiments.

This book provides technical overview of GIS, GPS and their integration, before focusing on a selection of R&D...

JavaScript Projects for Kids
JavaScript Projects for Kids

Key Features

  • Get to know the concepts of HTML and CSS to work with JavaScript
  • Explore the concepts of object-oriented programming
  • Follow this step-by-step guide on the fundamentals of JavaScript programming

Book Description

JavaScript is the most widely-used...

Ruby Under a Microscope: An Illustrated Guide to Ruby Internals
Ruby Under a Microscope: An Illustrated Guide to Ruby Internals

Ruby is a powerful programming language with a focus on simplicity, but beneath its elegant syntax it performs countless unseen tasks.

Ruby Under a Microscope gives you a hands-on look at Ruby's core, using extensive diagrams and thorough explanations to show you how Ruby is implemented (no C skills
...

Result Page: 38 37 36 35 34 33 32 31 30 29 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy