Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Neural Networks and Pattern Recognition
Neural Networks and Pattern Recognition
This book is one of the most up-to-date and cutting-edge texts available on the rapidly growing application area of neural networks. Neural Networks and Pattern Recognition focuses on the use of neural networksin pattern recognition, a very important application area for neural networks technology. The contributors are widely known...
Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention
Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention

Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support...

Essentials of Human Anatomy & Physiology, Global Edition
Essentials of Human Anatomy & Physiology, Global Edition
Elaine Marieb After receiving her Ph.D. in zoology from the University of Massachusetts at Amherst, Elaine N. Marieb joined the faculty of the Biological Science Division of Holyoke Community College. While teaching at Holyoke Community College, where many of her students were pursuing nursing degrees, she developed a...
Python for Data Analysis: Data Wrangling with Pandas, NumPy, and IPython
Python for Data Analysis: Data Wrangling with Pandas, NumPy, and IPython

Get complete instructions for manipulating, processing, cleaning, and crunching datasets in Python. Updated for Python 3.6, the second edition of this hands-on guide is packed with practical case studies that show you how to solve a broad set of data analysis problems effectively. You’ll learn the latest versions of pandas,...

Payment System Technologies and Functions: Innovations and Developments
Payment System Technologies and Functions: Innovations and Developments

Payment systems are the indispensable infrastructure for financial markets and business activities. Every commercial trade and financial transaction is finalized only when the final settlement is made through a payment system. If operational failures would occur in a payment system, preventing smooth transfers of funds, national economies and...

Exploratory Programming for the Arts and Humanities (MIT Press)
Exploratory Programming for the Arts and Humanities (MIT Press)

This book introduces programming to readers with a background in the arts and humanities; there are no prerequisites, and no knowledge of computation is assumed. In it, Nick Montfort reveals programming to be not merely a technical exercise within given constraints but a tool for sketching, brainstorming, and inquiring about important topics....

Basic Statistics Using SAS Enterprise Guide: A Primer
Basic Statistics Using SAS Enterprise Guide: A Primer

Now it's easy to perform many of the most common statistical techniques when you use the SAS Enterprise Guide point-and-click interface to access the power of SAS. Emphasizing the practical aspects of the analysis, this example-rich guide shows you how to conduct a wide range of statistical analyses without any SAS programming required. One or...

Common Warehouse Metamodel: An Introduction to the Standard for Data Warehouse Integration
Common Warehouse Metamodel: An Introduction to the Standard for Data Warehouse Integration
"The time has come for the consumers themselves to step forward and to specify a standard for meta data semantics and meta data exchange. This book is an important first step in that direction."
–W. H. Inmon, from the Foreword

The Common Warehouse Metamodel (CWM) is rapidly gaining momentum within the data warehousing...

Implementing 802.1X Security Solutions for Wired and Wireless Networks
Implementing 802.1X Security Solutions for Wired and Wireless Networks
When deploying a wireless or wired network, you must ensure that proper security safeguards are put in place. An enterprise, for example, often has valuable resources stored inside databases that are attached to the network. Using passwords to access specific applications is usually not good enough to keep hackers from accessing the resources in an...
Unauthorised Access: Physical Penetration Testing For IT Security Teams
Unauthorised Access: Physical Penetration Testing For IT Security Teams

The first guide to planning and performing a physical penetration test on your computer's security

Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application...

Lean Connections: Making Information Flow Efficiently and Effectively
Lean Connections: Making Information Flow Efficiently and Effectively
Achieve effective information flow through the extended value stream to the end customer

Dependable information flow is a necessary prerequisite to the successful implementation of lean production principles. But while most managers understand how to make materials and manpower flow, the flow of information tends to be much...

The Definitive Guide to symfony
The Definitive Guide to symfony
Developing a new web application should not mean reinventing the wheel. Thats why a framework is an essential item in your development toolbox. It helps you respect coding standards; write bulletproof, maintainable code; and focus on business rules rather than waste time on repetitive tasks. This book introduces you to symfony, the leading...
Result Page: 14 13 12 11 10 9 8 7 6 5 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy