Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Introduction to Chemical Engineering Computing
Introduction to Chemical Engineering Computing
An innovative introduction to chemical engineering computing

As chemical engineering technology advances, so does the complexity of the problems that arise. The problemsthat chemical engineers and chemical engineering students face today can no longer be answered with programs written on a case-by-case basis. Introduction...

Professional BizTalk Server 2006
Professional BizTalk Server 2006
This book provides insight into how industry experts have successfully architected, developed, and maintained Microsoft BizTalk Server in mission-critical environments. Authored by highly-regarded consultants with a wealth of knowledge on designing, building, and operating enterprise applications using BizTalk, this comprehensive guide gives you...
A Kick in the Attitude: An Energizing Approach to Recharge your Team, Work, and Life
A Kick in the Attitude: An Energizing Approach to Recharge your Team, Work, and Life

What Jumper Cables are to A Car Battery this Book is to YOUR Attitude

"Good old fashioned advice on how to have a great attitude, delivered in a pithy andinteresting way."
—Karen Leland, bestselling author of Watercooler Wisdom: How Smart People Prosper in the Face of Conflict, Pressure and
...

Writing Excel Macros: Automating Excel to Work for You
Writing Excel Macros: Automating Excel to Work for You

Microsoft Excel is an enormously powerful and flexible application. Yet despite its powerful feature set, there is a great deal that Excel either does not allow you to do or does not allow you to do easily through its user interface. And in spite of Excel's reputation as the most widely used spreadsheet application, the majority...

The Hacker Playbook: Practical Guide To Penetration Testing
The Hacker Playbook: Practical Guide To Penetration Testing

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the...

Deep Learning for Computer Vision: Expert techniques to train advanced neural networks using TensorFlow and Keras
Deep Learning for Computer Vision: Expert techniques to train advanced neural networks using TensorFlow and Keras

Learn how to model and train advanced neural networks to implement a variety of Computer Vision tasks

Key Features

  • Train different kinds of deep learning model from scratch to solve specific problems in Computer Vision
  • Combine the power of Python, Keras, and TensorFlow to...
Computer Science and Educational Software Design: A Resource for Multidisciplinary Work in Technology Enhanced Learning
Computer Science and Educational Software Design: A Resource for Multidisciplinary Work in Technology Enhanced Learning

Developing educational software requires thinking, problematizing, representing, modeling, implementing and analyzing pedagogical objectives and issues, as well as conceptual models and software architectures. Computer scientists face the difficulty of understanding the particular issues and phenomena to be taken into account in...

Americans at Work: A Cultural Guide to the Can-Do People
Americans at Work: A Cultural Guide to the Can-Do People
Whether you work with Americans face-to-face, communicate with them via telephone or e-mail, or interact together in a virtual team, this book reveals the subtle and not-so-subtle aspects of American culture in the workplace.

Best-selling author Craig Storti provides historical perspectives and explanations of the six most important...

Eating the IT Elephant: Moving from Greenfield Development to Brownfield
Eating the IT Elephant: Moving from Greenfield Development to Brownfield
A Practical, Start-to-Finish Approach to Managing, Evolving, and Transforming Legacy IT Systems

 

For every IT executive, manager, architect, program leader, project leader, and lead analyst

 

...
Handbook of Remote Biometrics: for Surveillance and Security (Advances in Pattern Recognition)
Handbook of Remote Biometrics: for Surveillance and Security (Advances in Pattern Recognition)
This comprehensive and innovative handbook covers aspects of biometrics from the perspective of recognizing individuals at a distance, in motion, and under a surveillance scenario. Features: Starts with a thorough introductory chapter; Provides topics from a range of different perspectives offered by an international collection of leading...
JavaScript and AJAX For Dummies
JavaScript and AJAX For Dummies

Learn to use these powerful tools together and build Web sites that work

If you want to build Web pages that offer real value to your site's visitors, JavaScript and AJAX are top tools for the job. Even if you're new to Web programming, this book helps you create sites any designer will admire. With easy-to-understand steps...

Pro CSS for High Traffic Websites
Pro CSS for High Traffic Websites

Although web standards-based websites can scale effectively—and basic CSS will give you basic results—there are considerations and obstacles that high traffic websites must face to keep your development and hosting costs to a minimum. There are many tips and tricks, as well as down-to-earth best practice information, to make sure...

Result Page: 105 104 103 102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy