Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Data Mining Tools for Malware Detection
Data Mining Tools for Malware Detection

Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop...

Optimal Design of Queueing Systems
Optimal Design of Queueing Systems

The First Comprehensive Book on the Subject

Focusing on the underlying structure of a system, Optimal Design of Queueing Systems explores how to set the parameters of a queueing system, such as arrival and service rates, before putting it into operation. It considers various objectives, comparing...

JavaScript Recipes: A Problem-Solution Approach
JavaScript Recipes: A Problem-Solution Approach

Quickly discover solutions to common problems, best practices you can follow, and everything JavaScript has to offer. Using a problem-solution approach, this book takes you from language basics like built-in objects and flow control all the way to advanced optimization techniques, frameworks and Node.js. 

...

Research in Communication Sciences and Disorders: Methods for Systematic Inquiry
Research in Communication Sciences and Disorders: Methods for Systematic Inquiry
Research in Communication Sciences and Disorders: Methods for Systematic Inquiry, Fourth Edition is a comprehensive yet comprehendible text meant for instructors and students of research methods in the field of communication sciences and disorders. This forward-thinking book reflects the movement toward evidence-based practice in...
Automatic Algorithm Recognition and Replacement: A New Approach to Program Optimization
Automatic Algorithm Recognition and Replacement: A New Approach to Program Optimization
Optimizing compilers have a fundamental problem. No matter how powerful their optimizations
are, they are no substitute for good application algorithms. Consider the case of
sorting. For sufficiently large data sets, a merge sort algorithm compiled with a less powerful
optimizer will always out-perform a selection sort algorithm
...
Applying Design for Six Sigma to Software and Hardware Systems
Applying Design for Six Sigma to Software and Hardware Systems

The Practical, Example-Rich Guide to Building Better Systems, Software, and Hardware with DFSS

Design for Six Sigma (DFSS) offers engineers powerful opportunities to develop more successful systems, software, hardware, and processes. In Applying Design for Six Sigma to Software and Hardware Systems, two
...

All-Digital Frequency Synthesizer in Deep-Submicron CMOS
All-Digital Frequency Synthesizer in Deep-Submicron CMOS

Design flow and circuit techniques of contemporary transceivers for multigigahertz mobile radio-frequency (RF) wireless applications are typically quite analog intensive and utilize process technologies that are incompatible with a digital baseband (DBB) and application processor (AP). Nowadays, the DBB and AP designs constantly migrate to...

Understanding Game Application Development: With Xamarin.Forms and ASP.NET
Understanding Game Application Development: With Xamarin.Forms and ASP.NET
Learn to build a simple data-driven mobile game application using the power of Xamarin.Forms, ASP.NET, the Web API, and SignalR with this short book. In it you will build a cross-platform mobile application that targets both iOS and Android, connect your app with your database using Entity Framework, and implement real-time...
Topics in Mathematical Analysis (Series on Analysis, Applications and Computation)
Topics in Mathematical Analysis (Series on Analysis, Applications and Computation)
This volume consists of a series of lecture notes on mathematical analysis. The contributors have been selected on the basis of both their outstanding scientific level and their clarity of exposition. Thus, the present collection is particularly suited to young researchers and graduate students. Through this volume, the editors intend to provide...
Introduction to Algorithms, Third Edition
Introduction to Algorithms, Third Edition

Some books on algorithms are rigorous but incomplete; others cover masses of material but lack rigor. Introduction to Algorithms uniquely combines rigor and comprehensiveness. The book covers a broad range of algorithms in depth, yet makes their design and analysis accessible to all levels of readers. Each chapter is relatively...

Secure Information Management Using Linguistic Threshold Approach (Advanced Information and Knowledge Processing)
Secure Information Management Using Linguistic Threshold Approach (Advanced Information and Knowledge Processing)

In recent years, cryptographic techniques for protecting and hiding secret information have been included in directions of research on intelligent information management. Data can be managed securely due to the use of algorithms for ensuring the confidentiality of data, information splitting techniques as well as protocols for sharing...

OCA Java SE 7 Programmer I Certification Guide: Prepare for the 1ZO-803 exam
OCA Java SE 7 Programmer I Certification Guide: Prepare for the 1ZO-803 exam

Summary

This book is a comprehensive guide to the 1Z0-803 exam. You'll explore a wide range of important Java topics as you systematically learn how to pass the certification exam. Each chapter starts with a list of the exam objectives covered in that chapter. You'll find sample questions and exercises...

unlimited object storage image
Result Page: 74 73 72 71 70 69 68 67 66 65 64 63 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy