Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Spanish Language Media
Handbook of Spanish Language Media
With the rise of Spanish language media around the world, no reference work is available that provides an overview of the field or its emerging issues. The Handbook of Spanish Language Media is intended to fill that need. The goal is to establish a Handbook that will become the definitive source for scholars interested in this...
A UML Pattern Language (Macmillan Technology Series)
A UML Pattern Language (Macmillan Technology Series)

This book is about how to model software systems and how to use those models. It is rooted in that emerging intellectual "ecosystem" comprising the various networks (the Internet, intranets, extranets, and so on), distributed objects, piecemeal development based on short development cycles, and something called...

Advances in Evolutionary Algorithms: Theory, Design and Practice
Advances in Evolutionary Algorithms: Theory, Design and Practice
The goal of this book is to develop efficient optimization algorithms to solve diverse real-world problems of graded difficulty. Genetic and evolutionary mechanisms have been deployed for reaching the goal.

This book has made five significant contributions in the realm of genetic and evolutionary computation (GEC).

Practical
...
Hybrid Intelligent Systems for Pattern Recognition Using Soft Computing: An Evolutionary Approach for Neural Networks and Fuzzy Systems
Hybrid Intelligent Systems for Pattern Recognition Using Soft Computing: An Evolutionary Approach for Neural Networks and Fuzzy Systems
We describe in this book, new methods for intelligent pattern recognition using soft computing techniques. Soft Computing (SC) consists of several computing paradigms, including fuzzy logic, neural networks, and genetic algorithms, which can be used to produce powerful hybrid intelligent systems for pattern recognition. Hybrid intelligent systems...
C++ Without Fear: A Beginner's Guide That Makes You Feel Smart (2nd Edition)
C++ Without Fear: A Beginner's Guide That Makes You Feel Smart (2nd Edition)

Many years ago, when I had to learn C overnight to make a living as a programmer (this was before C++), I would have given half my salary to find a mentor, a person would say, “Here are the potholes in the road...errors that you are sure to make in learning C. And here’s how to steer around them.” Instead, I had to...

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

With the increasing focus on IT Security comes a higher demand for identity management in the modern business. This requires a flexible, scalable, and secure authentication method. Identity control is made mandatory by many public standards, such as PCI, and PKI is an essential component to set up authentication in many technologies,...

Simple Steps to Data Encryption: A Practical Guide to Secure Computing
Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who...

Global Marketing Management
Global Marketing Management

Global Marketing Management prepares students to become effective managers overseeing global marketing activities in an increasingly competitive environment.  The text’s guiding principle, as laid out clearly and methodically by authors Kotabe and Helsen, is that the realities of international marketing are more...

Quality of Telephone-Based Spoken Dialogue Systems
Quality of Telephone-Based Spoken Dialogue Systems
An increasing number of telephone services are offered in a fully automatic way with the help of speech technology. The underlying systems, called spoken dialogue systems (SDSs), possess speech recognition, speech understanding, dialogue management, and speech generation capabilities, and enable a more-or-less natural spoken interaction with the...
Malware Detection (Advances in Information Security)
Malware Detection (Advances in Information Security)

Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly dependent on information systems. These two factors have exposed our critical infrastructures to malicious attacks and accidental failures. Many...

New Perspectives on Microsoft Excel 2010: Brief (New Perspectives)
New Perspectives on Microsoft Excel 2010: Brief (New Perspectives)

The New Perspectives Series’ critical-thinking, problem-solving approach is the ideal way to prepare students to transcend point-and-click skills and take advantage of all that Microsoft Office 2010 has to offer.

In developing the New Perspectives Series, our goal was to create books that give students the software...

3ds Max 2012 Bible
3ds Max 2012 Bible
Every time I enter the computer room (which my wife calls the dungeon), my wife still says that I am off to my “fun and games.” I, as always, flatly deny this accusation, saying that it is serious work that I am involved in. But later, when I emerge with a twinkle in my eye and excitedly ask her to take a look at my...
Result Page: 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy