Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Internet of Things and Data Analytics Handbook
Internet of Things and Data Analytics Handbook

This book examines the Internet of Things (IoT) and Data Analytics from a technical, application, and business point of view.

Internet of Things and Data Analytics Handbook describes essential technical knowledge, building blocks, processes, design principles, implementation, and marketing...

Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Secur
Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Secur

Are you interested in learning about how to hack systems?

Do you want to learn how to protect yourself from being hacked?

Do you wish to learn the art of ethical hacking?

Do you want to know the secrets techniques that genius hackers use?

Do you want to learn how to protect yourself...

Building Enterprise Applications with Windows Presentation Foundation and the Model View ViewModel Pattern
Building Enterprise Applications with Windows Presentation Foundation and the Model View ViewModel Pattern

The Windows Presentation Framework (WPF), Silverlight, and Windows Phone 7 are the latest technologies for building flexible user interfaces (UI) for applications built with Microsoft technology. All three rely on the XAML markup language to describe UI elements and layout, and you can program applications for all three platforms with...

From Semantics to Computer Science: Essays in Honour of Gilles Kahn
From Semantics to Computer Science: Essays in Honour of Gilles Kahn
Gilles Kahn was one of the most influential figures in the development of computer science and information technology, not only in Europe but throughout the world. This volume of articles by several leading computer scientists serves as a fitting memorial to Kahn's achievements and reflects the broad range of subjects to which he contributed...
Honeypots and Routers: Collecting Internet Attacks
Honeypots and Routers: Collecting Internet Attacks

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to...

Parallel Genetic Algorithms: Theory and Real World Applications (Studies in Computational Intelligence)
Parallel Genetic Algorithms: Theory and Real World Applications (Studies in Computational Intelligence)

This book is the result of several years of research trying to better characterize parallel genetic algorithms (pGAs) as a powerful tool for optimization, search, and learning. Readers can learn how to solve complex tasks by reducing their high computational times. Dealing with two scientific fields (parallelism and GAs) is always...

The Design Thinking Playbook: Mindful Digital Transformation of Teams, Products, Services, Businesses and Ecosystems
The Design Thinking Playbook: Mindful Digital Transformation of Teams, Products, Services, Businesses and Ecosystems

A radical shift in perspective to transform your organization to become more innovative

The Design Thinking Playbook is an actionable guide to the future of business. By stepping back and questioning the current mindset, the faults of the status quo stand out in stark relief—and this guide gives you the tools...

Active Rules in Database Systems (Monographs in Computer Science)
Active Rules in Database Systems (Monographs in Computer Science)
A timely survey of the field from the point of view of some of the subject's most active researchers. Divided into several parts organized by theme, the book first covers the underlying methodology regarding active rules, followed by formal specification, rule analysis, performance analysis, and support tools. It then moves on to the...
Constraint Databases and Applications: First International Symposium, CDB 2004, Paris, France, June 12-13, 2004, Proceedings (Lecture Notes in Computer Science)
Constraint Databases and Applications: First International Symposium, CDB 2004, Paris, France, June 12-13, 2004, Proceedings (Lecture Notes in Computer Science)
The ?rst International Symposium on the Applications of Constraint Databases (CDB2004) took place in Paris, France, on June 12–13, 2004, just before the ACM SIGMOD and PODS conferences. Since the publication of the paper “Constraint Query Languages” by Kan- lakis, Kuper and Revesz in 1990, the last decade has seen a growing...
Introduction to Embedded Systems: Using ANSI C and the Arduino Development Environment (Synthesis Lectures on Digital Circuits and Systems)
Introduction to Embedded Systems: Using ANSI C and the Arduino Development Environment (Synthesis Lectures on Digital Circuits and Systems)

Many electrical and computer engineering projects involve some kind of embedded system in which a microcontroller sits at the center as the primary source of control.

The recently-developed Arduino development platform includes an inexpensive hardware development board hosting an eight-bit ATMEL ATmega-family processor...

Innovations for Shape Analysis: Models and Algorithms (Mathematics and Visualization)
Innovations for Shape Analysis: Models and Algorithms (Mathematics and Visualization)

The concept of 'shape' is at the heart of image processing and computer vision, yet researchers still have some way to go to replicate the human brain's ability to extrapolate meaning from the most basic of outlines. This volume reflects the advances of the last decade, which have also opened up tough new challenges in...

Beginning SQL Server R Services: Analytics for Data Scientists
Beginning SQL Server R Services: Analytics for Data Scientists

Learn how to develop powerful data analytics applications quickly for SQL Server database administrators and developers. Organizations will be able to sift data and derive the business intelligence needed to drive business decisions and profit. The addition of R to SQL Server 2016 places a powerful analytical processor into an...

Result Page: 245 244 243 242 241 240 239 238 237 236 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy