Home | Amazing | Today | Tags | Publishers | Years | Search 
Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game
Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game

There is considerably more skill in the IT and security communities than is reflected in the jobs people are able to attain. Most people's limiting factor in their ability to get better jobs is not technical skills or even the soft skills necessary to do well in a new job. It is that getting a job is a completely different skill set and...

Windows 10 Troubleshooting (Windows Troubleshooting Series)
Windows 10 Troubleshooting (Windows Troubleshooting Series)

Learn how to troubleshoot Windows 10 the way the experts do, whatever device or form-factor you’re using. Focus on the problems that most commonly plague PC users and fix each one with a step-by-step approach that helps you understand the cause, the solution, and the tools required. Discover the connections between the...

Statistical Methods for Environmental Epidemiology with R: A Case Study in Air Pollution and Health (Use R!)
Statistical Methods for Environmental Epidemiology with R: A Case Study in Air Pollution and Health (Use R!)
As an area of statistical application, environmental epidemiology and more speci cally, the estimation of health risk associated with the exposure to - vironmental agents, has led to the development of several statistical methods and software that can then be applied to other scienti c areas. The stat- tical analyses aimed at addressing...
Algorithms in Combinatorial Design Theory (Mathematics Studies)
Algorithms in Combinatorial Design Theory (Mathematics Studies)
Recent years have seen an explosive growth in research in combinatorics and graph theory. One primary factor in this rapid development has been the advent of computers, and the parallel study of practical and efficient algorithms. This volume represents an attempt to...
Graphs, Networks and Algorithms (Algorithms and Computation in Mathematics)
Graphs, Networks and Algorithms (Algorithms and Computation in Mathematics)

From the reviews of the previous editions

".... The book is a first class textbook and seems to be indispensable for everybody who has to teach combinatorial optimization. It is very helpful for students, teachers, and researchers in this area. The author finds a striking synthesis of nice and interesting...

Circuit Systems with MATLAB and PSpice
Circuit Systems with MATLAB and PSpice
Software tools applied to circuit analysis and design are rapidly evolving, enabling students to move beyond the time-consuming, math-intensive methods of traditional circuit instruction. By incorporating MATLAB 7.0 and PSpice 10.0, alongside systematic use of the Laplace transform, Yang and Lee help readers rapidly gain an intuitive...
Building Django 2.0 Web Applications: Create enterprise-grade, scalable Python web applications easily with Django 2.0
Building Django 2.0 Web Applications: Create enterprise-grade, scalable Python web applications easily with Django 2.0

Go from the initial idea to a production-deployed web app using Django 2.0.

Key Features

  • A beginners guide to learning python's most popular framework, Django
  • Build fully featured web projects in Django 2.0 through examples.
  • Deploy web applications in...
Unity 2018 Artificial Intelligence Cookbook: Over 90 recipes to build and customize AI entities for your games with Unity, 2nd Edition
Unity 2018 Artificial Intelligence Cookbook: Over 90 recipes to build and customize AI entities for your games with Unity, 2nd Edition

Explore various recipes to build games using popular artificial intelligence techniques and algorithms such as Navmesh navigation A*, DFS, and UCB1

Key Features

  • Explore different algorithms for creating decision-making agents that go beyond simple behaviors and movement
  • ...
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

Develop blockchain application with step-by-step instructions, working example and helpful recommendations

Key Features

  • Understanding the blockchain technology from the cybersecurity perspective
  • Developing cyber security solutions with Ethereum blockchain technology
  • ...
Practical Tinker Board: Getting Started and Building Projects with the ASUS Single-Board Computer
Practical Tinker Board: Getting Started and Building Projects with the ASUS Single-Board Computer
Get started with the ASUS Tinker Board and begin building and expanding your own projects. This book covers the basic operating systems offered by ASUS for the Tinker Board and Tinker Board S, TinkerOS and Android, and then dives deeper into its capabilities for projects; such as a music streamer or a weather display with...
Intensive Care of the Adult with Congenital Heart Disease (Congenital Heart Disease in Adolescents and Adults)
Intensive Care of the Adult with Congenital Heart Disease (Congenital Heart Disease in Adolescents and Adults)

Dedicated to the critical management of acutely ill adults with congenital heart disease, this comprehensive book discusses the many challenges faced in the management of these patients, who require intensive inter- and trans-disciplinary care. It provides the first universal review of the practical management of patients with these...

Polysaccharide based Nano-Biocarrier in Drug Delivery
Polysaccharide based Nano-Biocarrier in Drug Delivery
With the growing awareness of drug-induced diseases in the last few decades, the trend of phar maceutical research had shifted to drug targeting. The research community seems to be fascinated with idea of delivering drugs at an optimal rate to their exact site of action. Once considered wishful thinking, nanotechnology has made this...
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy