Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Big and Complex Data Analysis: Methodologies and Applications (Contributions to Statistics)
Big and Complex Data Analysis: Methodologies and Applications (Contributions to Statistics)

This volume conveys some of the surprises, puzzles and success stories in high-dimensional and complex data analysis and related fields. Its peer-reviewed contributions showcase recent advances in variable selection, estimation and prediction strategies for a host of useful models, as well as essential new developments in the field.

...

The Essential Guide to Flash CS4
The Essential Guide to Flash CS4
If you're familiar with the basics of Flash, then The Essential Guide to Flash CS4 will take you further in all aspects of the application, animation, sound, 3D, Inverse Kinematics, the drawing tools, ActionScript, and much more. This book takes all the good bits of Flash CS4 and demonstrates them in methodical and intuitive exercises full of hints...
How to Cheat in 3ds Max 2011: Get Spectacular Results Fast
How to Cheat in 3ds Max 2011: Get Spectacular Results Fast

THE TECHNIQUES DESCRIBED in this book assume a basic grasp of 3ds Max. But with so many options to choose from, it’s easy to get lost in all the tools, buttons, and menus.

Not all features are created equal. This chapter goes over the fundamentals of 3ds Max with an eye toward the most important tools and how you...

Windows Vista Annoyances: Tips, Secrets, and Hacks
Windows Vista Annoyances: Tips, Secrets, and Hacks
Windows Vista may be the next big thing, but it still contains enough quirks and unaccountable behaviors to vex anyone. This unique guide not only discusses the most irritating features of the latest Microsoft operating system and how to get around them, but also explains how to improve Windows and do more with the software than Microsoft intended....
DHCP Handbook, The (2nd Edition)
DHCP Handbook, The (2nd Edition)
The Dynamic Host Configuration Protocol (DHCP) provides a way to automate and manage the network configurations of devices that use the TCP/IP protocol suite. Without DHCP, network administrators must manually enter in IP addresses for each computer and network device and then manually change that address each time the device is moved to a...
Sex Hormones and Immunity to Infection
Sex Hormones and Immunity to Infection

Why sex matters

Among human and nonhuman animals, the prevalence and intensity of infection typically is higher in males than females and may reflect differences in exposure as well as susceptibility to pathogens. Elevated immunity among females is a double-edged sword in which it is beneficial against infectious diseases but is...

Algorithms, Data Structures, and Problem Solving With C++
Algorithms, Data Structures, and Problem Solving With C++
This book was designed for a second course in computer science, which has typically been known as CS-2 Data Structures. The content of CS-2 has been evolving over some time, but there is general agreement that topics such as structures, pointers, and data structures should be taught, along with an introduction to algorithm analysis and a general...
Nginx HTTP Server - Second Edition
Nginx HTTP Server - Second Edition

Nginx is a lightweight HTTP server designed for high-traffic websites, with network scalability as the primary objective. With the advent of high speed Internet access, short loading times and fast transfer rates have become a necessity. This free, open source solution will either come as a full replacement of other software such as Apache,...

CentOS 6 Linux Server Cookbook
CentOS 6 Linux Server Cookbook

An all-in-one guide to installing, configuring, and running a Centos 6 server. Ideal for newbies and old-hands alike, this practical tutorial ensures you get the best from this popular, enterprise-class free server solution.

  • Delivering comprehensive insight into CentOS server with a series of starting points that show you...
Toll-Like Receptors (TLRs) and Innate Immunity (Handbook of Experimental Pharmacology)
Toll-Like Receptors (TLRs) and Innate Immunity (Handbook of Experimental Pharmacology)
In the second half of the 20th century innate immune responses of cellular or humoral type were treated like stepchildren by many immunologists: that is, somewhat neglected. This disregard turned into an exciting research field over the past several years and led to the identification of receptor families involved in the recognition...
Mastering Linux Shell Scripting
Mastering Linux Shell Scripting

Key Features

  • Identify the high level steps such as verifying user input, using command lines and conditional statements in creating and executing simple shell scripts
  • Create and edit dynamic shell scripts to manage complex and repetitive tasks
  • Learn about scripting in Perl and programming in...
Unix Unleashed: Internet Edition
Unix Unleashed: Internet Edition
The first edition of Unix Unleashed provided a thick, comprehensive guide to the basic tools of the Unix trade, covering everything from system administration to the windowing system to the compiler environments. The guide also featured information on other tools, such as the vi editor, the command shells, the AWK, PERL, C and C++...
unlimited object storage image
Result Page: 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy