Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Distributed Database Management Systems: A Practical Approach
Distributed Database Management Systems: A Practical Approach

This book addresses issues related to managing data across a distributed database system. It is unique because it covers traditional database theory and current research, explaining the difficulties in providing a unified user interface and global data dictionary. The book gives implementers guidance on hiding discrepancies across systems and...

Beginning Ajax (Programmer to Programmer)
Beginning Ajax (Programmer to Programmer)
This book discusses what Ajax is and what it means to Web developers, as well as the technologies behind Ajax applications. The early chapters of this book begin with a discussion of the pros and cons of Ajax techniques, and they provide a quick refresher of JavaScript techniques. Working through this book, you’ll discover how Ajax...
Pattern Recognition, Third Edition
Pattern Recognition, Third Edition
A classic -- offering comprehensive and unified coverage with a balance between theory and practice!

Pattern recognition is integral to a wide spectrum of scientific disciplines and technologies including image analysis, speech recognition and audio classification, communications, computer-aided diagnosis, data mining. The authors,
...
Cryptography in C and C++
Cryptography in C and C++

This book covers everything you need to know to write professional-level cryptographic code. This expanded, improved second edition includes about 100 pages of additional material as well as numerous improvements to the original text. The chapter about random number generation has been completely rewritten, and the latest cryptographic...

Computer Security for the Home and Small Office
Computer Security for the Home and Small Office

Computer Security for the Home and Small Office addresses the long-neglected security needs of everyday users in the home, company workstation, and SOHO (small office/home office) categories, with emphasis on system hardening, eliminating malware, user and Internet privacy, encryption, and data hygiene.

The book offers...

Hands-On Markov Models with Python: Implement probabilistic models for learning complex data sequences using the Python ecosystem
Hands-On Markov Models with Python: Implement probabilistic models for learning complex data sequences using the Python ecosystem

Unleash the power of unsupervised machine learning in Hidden Markov Models using TensorFlow, pgmpy, and hmmlearn

Key Features

  • Build a variety of Hidden Markov Models (HMM)
  • Create and apply models to any sequence of data to analyze, predict, and extract valuable...
Digital Watermarking for Digital Media
Digital Watermarking for Digital Media
Digital media, like audio, video, images, and other multimedia documents, can be protected against copyright infringements with invisible, integrated patterns. Such methods are based on steganography and digital watermarking techniques. Most watermarks are inserted as a plain-bit or adjusted digital signal using a key-based embedding algorithm. The...
Practical Machine Learning
Practical Machine Learning

About This Book

  • Fully-coded working examples using a wide range of machine learning libraries and tools, including Python, R, Julia, and Spark
  • Comprehensive practical solutions taking you into the future of machine learning
  • Go a step further and integrate your machine learning projects with...
My War Criminal: Personal Encounters with an Architect of Genocide
My War Criminal: Personal Encounters with an Architect of Genocide

An investigation into the nature of violence, terror, and trauma through conversations with a notorious war criminal by Jessica Stern, one of the world's foremost experts on terrorism.

Between October 2014 and November 2016, global terrorism expert Jessica Stern held a series of conversations in a...

Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, Second Edition
Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, Second Edition
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Master the tools and techniques of mobile forensic investigations

...
The 7 Hidden Reasons Employees Leave: How to Recognize the Subtle Signs and Act Before It's Too Late
The 7 Hidden Reasons Employees Leave: How to Recognize the Subtle Signs and Act Before It's Too Late
This book is about the hidden, elusive motivations that cause capable employees to start questioning their decision to join your company, start thinking of leaving, eventually disengage, and finally, leave.

The true root causes of voluntary employee turnover are hiding in plain sight. If we really think about it, we already know what
...
del.icio.us Mashups
del.icio.us Mashups
del.icio.us has fast become part of the heartbeat of the Web, giving millions of Web users, both casual and hardcore, an online social network in which to collect, organize, and share their favorite web resources. Using a "hidden" underlayer of tools offered by del.icio.us, you now have the potential to tap into this social network and...
unlimited object storage image
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy