Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microchip Mathematics: Number Theory for Computer Users
Microchip Mathematics: Number Theory for Computer Users

In the Autumn of 1983, in the face of the phenomenal growth of home computer sales in the U.K., the national British newspaper The Guardian decided to produce, each week, a 'Computer Page'. Noone was quite sure exactly what should go into the page on a regular basis, but it was thought that a fortnightly column on computer mathematics...

High-Throughput Image Reconstruction and Analysis (Bioinformatics & Biomedical Imaging)
High-Throughput Image Reconstruction and Analysis (Bioinformatics & Biomedical Imaging)

Progress in biology is dependent on the ability to observe, measure, and model the behavior of organisms at multiple levels of abstraction, from the microscopic to the macroscopic. There has been a tremendous growth recently in the techniques to probe the structure and workings of cellular and organ-level mechanisms. Significant advances have...

Machine Learning with R - Second Edition
Machine Learning with R - Second Edition

Key Features

  • Harness the power of R for statistical computing and data science
  • Explore, forecast, and classify data with R
  • Use R to apply common machine learning algorithms to real-world scenarios

Book Description

Machine learning, at its core, is concerned...

Signals and Systems using MATLAB
Signals and Systems using MATLAB
Although it is hardly possible to keep up with advances in technology, it is reassuring to know that in science and engineering, development and innovation are possible through a solid understanding of basic principles. The theory of signals and systems is one of those fundamentals, and it will be the foundation of much research and...
Google Hacks: 100 Industrial-Strength Tips & Tools
Google Hacks: 100 Industrial-Strength Tips & Tools
Google Hacks is a collection of industrial-strength, real-world, tested solutions to practical problems. This concise book offers a variety of interesting ways for power users to mine the enormous amount of information that Google has access to, and helps you have fun while doing it. You'll learn clever and...
Information Technology for Counterterrorism: Immediate Actions and Futures Possibilities
Information Technology for Counterterrorism: Immediate Actions and Futures Possibilities
Immediately following the events of September 11, 2001, the National Academies (including the National Academy of Sciences, the National Academy of Engineering, the Institute of Medicine, and the National Research Council) offered its services to the nation to formulate a scientific and technological response to the challenges posed by emerging...
Facebook Marketing For Dummies
Facebook Marketing For Dummies

Discover how to leverage the power of the Facebook community to achieve your business marketing goals

Facebook boasts an extremely devoted user base, with more than 65 billion page visits per month. With Facebook, an organization can market and promote their brand, products, or services via the network's built-in...

Physical Database Design Using Oracle (Foundations of Database Design)
Physical Database Design Using Oracle (Foundations of Database Design)

The evolution of Oracle has led to a revolution in design practices. For Oracle 10g, database physical structures have become more complex than ever before and database designers face multiple ways to implement their logical models. IS students studying database design and administration need to be able to implement management systems in a...

Investing Strategies for the High Net-Worth Investor: Maximize Returns on Taxable Portfolios
Investing Strategies for the High Net-Worth Investor: Maximize Returns on Taxable Portfolios

A proven model for achieving high returns on taxable investments

Investing Strategies for the High Net-Worth Investor showcases an investing approach that helps readers understand the unique challenges and opportunities that wealthy families face when building a diversified portfolio for multiple generations. Renowned...

XSLT Cookbook
XSLT Cookbook
The XSLT Cookbook is a collection of hundreds of solutions to problems that Extensible Stylesheet Language Transformations (XSLT) developers regularly face. The recipes range from simple string-manipulation and mathematical processing to more complex topics like extending XSLT, testing and debugging XSLT...
AVIEN Malware Defense Guide for the Enterprise
AVIEN Malware Defense Guide for the Enterprise
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected...
Biometrics and ID Management: COST 2101 European Workshop, BioID 2011
Biometrics and ID Management: COST 2101 European Workshop, BioID 2011

This volume of Springer Lecture Notes in Computer Sciences (LNCS) constitutes the final publication of the EU COST 2101 Action “Biometrics for Identity Documents and Smart Cards,” which has been successfully running during the years 2006-2010. One of the many valuable outputs of this initiative is the realization of a new...

Result Page: 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy