Home | Amazing | Today | Tags | Publishers | Years | Search 
Machine Learning for Hackers
Machine Learning for Hackers

To explain the perspective from which this book was written, it will be helpful to define the terms machine learning and hackers.

What is machine learning? At the highest level of abstraction, we can think of machine learning as a set of tools and methods that attempt to infer patterns and extract insight from a record of the...

Pro jQuery
Pro jQuery

At its heart, jQuery does something that sounds pretty dull: it lets you modify the contents of HTML documents by manipulating the model that the browser creates when it processes the HTML (known as DOM manipulation, as I’ll explain later). If you are reading this, you have probably already done some DOM manipulation, either using...

SQL and Relational Theory: How to Write Accurate SQL Code
SQL and Relational Theory: How to Write Accurate SQL Code

This edition differs from its predecessor in a number of ways. The overall objective remains the same, of course— using SQL relationally is still the emphasis—but the text has been revised throughout to reflect, among other things, experience gained from teaching live seminars based on the first edition.

One...

iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
This book is intended for individuals who are interested in the iPhone and other iOS devices and, more importantly, in the type of data that is stored and can be recovered from these devices. The demand for mobile forensics has grown tremendously with the release of smart phones. Communication on these devices is now documented...
Software and Systems Traceability
Software and Systems Traceability
Software engineering is a pessimistic discipline. The glass is always half empty rather than half full. Not surprising really, we are hardened to the grind of improving quality, painstakingly testing and, never quite, eliminating bugs. Critical review is of the essence. We know there is “no silver bullet”.

...
Linear Programming: An Introduction with Applications
Linear Programming: An Introduction with Applications
This book is aimed at freshman, sophomores, and juniors in college who are even remotely interested in some of the current applications of mathematics to the real world. The difficulty with most of the other linear programming books on the market is that they are high end books, written primarily in a fairly rigorous fashion...
Machine Learning for Email: Spam Filtering and Priority Inbox
Machine Learning for Email: Spam Filtering and Priority Inbox
To explain the perspective from which this book was written, it will be helpful to define the terms machine learning and hackers.

What is machine learning? At the highest level of abstraction, we can think of machine learning as a set of tools and methods that attempt to infer patterns and extract
...
Applying Psychology to Everyday Life: A Beginner's Guide
Applying Psychology to Everyday Life: A Beginner's Guide
I began by wanting to write a book entitled something like Where Psychology Has Gone Wrong. The reason for this desire came from thinking that psychology is a far more interesting and stimulating subject than it would appear to be from a glance at some academic texts and journal articles. Also, many students begin their...
Polyurethane and Related Foams: Chemistry and Technology
Polyurethane and Related Foams: Chemistry and Technology
Polyurethane foams debuted over 60 years ago. At the present time these types of foams make up the largest segment in the thermosetting foam industry. This book describes polyurethane (PUR) and urethane linkage-modified polyisocyanurate (PIR) foams. A characteristic of these foams lies in the versatility of their physical...
Cardiac Perfusion and Pumping Engineering (Clinically-Oriented Biomedical Engineering)
Cardiac Perfusion and Pumping Engineering (Clinically-Oriented Biomedical Engineering)

Cardiac pumping is dependent on cardiac perfusion. Hence, it is only natural that we address both cardiac perfusion and pumping in this book. We have gone one step further in also considering assisted perfusion by coronary bypass surgery and myocardial regeneration by means of stem cells transformed into implantable cardiomyocytes. The book...

Hoax of the Twentieth Century
Hoax of the Twentieth Century

Professor A. R. Butz was the first (and so far the only) writer to treat the entire Holocaust complex from the Revisionist perspective, in a precise scientific manner. This book exhibits the overwhelming force of historical and logical arguments which Revisionism had accumulated by the middle of the 70s. This new edition comes with several...

Pro Business Applications with Silverlight 5 (Professional Apress)
Pro Business Applications with Silverlight 5 (Professional Apress)
Silverlight is a web-based platform from Microsoft that can be used to build Rich Internet Applications (RIAs). Of the many new possibilities it enables, one of its key focuses is as a platform for building business applications. Community support for the technology has been overwhelmingly positive, and Microsoft has gone on to use...
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy