Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Jihadism, Foreign Fighters and Radicalization in the EU: Legal, Functional and Psychosocial Responses (Contemporary Terrorism Studies)
Jihadism, Foreign Fighters and Radicalization in the EU: Legal, Functional and Psychosocial Responses (Contemporary Terrorism Studies)

Jihadism, Foreign Fighters and Radicalization in the EU addresses the organizational and strategic changes in terrorism in Europe as a result of urban jihadism and the influx of foreign fighters of European nationality or residence.

Examining the different types of responses to the treatment of radicalization...

xUnit Test Patterns: Refactoring Test Code (The Addison-Wesley Signature Series)
xUnit Test Patterns: Refactoring Test Code (The Addison-Wesley Signature Series)
Automated testing is a cornerstone of agile development. An effective testing strategy will deliver new functionality more aggressively, accelerate user feedback, and improve quality. However, for many developers, creating effective automated tests is a unique and unfamiliar challenge.

xUnit Test Patterns is the...

Fast Data Processing with Spark - Second Edition
Fast Data Processing with Spark - Second Edition

Perform real-time analytics using Spark in a fast, distributed, and scalable way

About This Book

  • Develop a machine learning system with Spark's MLlib and scalable algorithms
  • Deploy Spark jobs to various clusters such as Mesos, EC2, Chef, YARN, EMR, and so on
  • This is a...
Programming Web Applications with Node, Express and Pug
Programming Web Applications with Node, Express and Pug

Learn how to program modern web applications using the full Node.js platform, including Node.js on the server, Express for middleware and routing, and Pug (formerly Jade) to simplify the creation of views.

Node.js is the foundation of all full JavaScript apps and plenty of books cover its full usage. This book focuses on how to use...

Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines
Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines

Discover the simple steps to implementing information security standards using ISO 27001, the most popular information security standard across the world. You’ll see how it offers best practices to be followed, including the roles of all the stakeholders at the time of security framework implementation,...

Data Mining: Concepts and Techniques (The Morgan Kaufmann Series in Data Management Systems)
Data Mining: Concepts and Techniques (The Morgan Kaufmann Series in Data Management Systems)

We are deluged by data—scientific data, medical data, demographic data, financial data, and marketing data. People have no time to look at this data. Human attention has become a precious resource. So, we must find ways to automatically analyze the data, to automatically classify it, to automatically summarize it, to...

Reinforcement Learning of Bimanual Robot Skills (Springer Tracts in Advanced Robotics)
Reinforcement Learning of Bimanual Robot Skills (Springer Tracts in Advanced Robotics)

This book tackles all the stages and mechanisms involved in the learning of manipulation tasks by bimanual robots in unstructured settings, as it can be the task of folding clothes.

The first part describes how to build an integrated system, capable of properly handling the kinematics and dynamics of the robot along the...

SQL Server Integration Services Design Patterns
SQL Server Integration Services Design Patterns

SQL Server Integration Services Design Patterns is newly-revised for SQL Server 2014, and is a book of recipes for SQL Server Integration Services (SSIS). Design patterns in the book help to solve common problems encountered when developing data integration solutions. The patterns and solution examples in the book increase your...

Kendo UI Cookbook
Kendo UI Cookbook

Over 50 recipes to help you rapidly build rich and dynamic user interfaces for web and mobile platforms.

Overview

  • Create rich interfaces for the Web using the Kendo UI application framework and various sets of widgets that come packaged in the library
  • Build web applications for the mobile...
Big Data Analytics with Spark: A Practitioner's Guide to Using Spark for Large Scale Data Analysis
Big Data Analytics with Spark: A Practitioner's Guide to Using Spark for Large Scale Data Analysis

Big Data Analytics with Spark is a step-by-step guide for learning Spark, which is an open-source fast and general-purpose cluster computing framework for large-scale data analysis. You will learn how to use Spark for different types of big data analytics projects, including batch, interactive, graph, and stream data analysis as well...

Beginning Arduino Programming (Technology in Action)
Beginning Arduino Programming (Technology in Action)

Beginning Arduino Programming allows you to quickly and intuitively develop your programming skills through sketching in code. This clear introduction provides you with an understanding of the basic framework for developing Arduino code, including the structure, syntax, functions, and libraries needed to create...

Between Compliance and Particularism: Member State Interests and European Union Law
Between Compliance and Particularism: Member State Interests and European Union Law
The book examines how the interests of the member states, which provide the primary driving force for developments in European integration, are internalised and addressed by the law of the European Union. In this context, member state interests are taken to mean the policy considerations, economic calculations, local socio-cultural factors, and...
Result Page: 280 279 278 277 276 275 274 273 272 271 270 269 268 267 266 265 264 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy