Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Artificial Intelligence By Example: Develop machine intelligence from scratch using real artificial intelligence use cases
Artificial Intelligence By Example: Develop machine intelligence from scratch using real artificial intelligence use cases

Be an adaptive thinker that leads the way to Artificial Intelligence

Key Features

  • AI-based examples to guide you in designing and implementing machine intelligence
  • Develop your own method for future AI solutions
  • Acquire advanced AI, machine learning, and...
Agile Model-Based Development Using UML-RSDS
Agile Model-Based Development Using UML-RSDS

This book describes the concepts and application of model-based development (MBD), model transformations, and Agile MBD to a wide range of software systems. It covers systems requirements engineering, system specification and design, verification, reuse, and system composition in the context of Agile MBD. Examples of applications in...

Data Analytics: Concepts, Techniques, and Applications
Data Analytics: Concepts, Techniques, and Applications

Large data sets arriving at every increasing speeds require a new set of efficient data analysis techniques. Data analytics are becoming an essential component for every organization and technologies such as health care, financial trading, Internet of Things, Smart Cities or Cyber Physical Systems. However, these diverse application...

Blockchain Technology for Industry 4.0: Secure, Decentralized, Distributed and Trusted Industry Environment (Blockchain Technologies)
Blockchain Technology for Industry 4.0: Secure, Decentralized, Distributed and Trusted Industry Environment (Blockchain Technologies)

This book explores recent advances in blockchain technology and its impact on Industry 4.0 via advanced technologies. It provides an in-depth analysis of the step by step evolution of Industry 4.0 and blockchain technologies for creating the next-generation, secure, decentralized, distributed and trusted industry environment and...

The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
"Few false ideas have more firmly gripped the minds of so many intelligent men than the one that, if they just tried, they could invent a cipher that no one could break," writes David Kahn in this massive (almost 1,200 pages) volume. Most of The Codebreakers focuses on the 20th century, especially World War II. But its reach is...
Deploying Virtual Private Networks with Microsoft Windows Server 2003
Deploying Virtual Private Networks with Microsoft Windows Server 2003

Get in-depth technical guidance, Windows-specific best practices, and real-world troubleshooting tactics-direct from the Windows wireless product development team.

This is the essential reference for any IT professional deploying virtual private networks (VPNs) using Windows Server 2003 and Windows XP. The book thoroughly details how...

Mastering Azure Analytics: Architecting in the Cloud with Azure Data Lake, HDInsight, and Spark
Mastering Azure Analytics: Architecting in the Cloud with Azure Data Lake, HDInsight, and Spark

Microsoft Azure has over 20 platform-as-a-service (PaaS) offerings that can act in support of a big data analytics solution. So which one is right for your project? This practical book helps you understand the breadth of Azure services by organizing them into a reference framework you can use when crafting your own big data analytics...

Malware Detection (Advances in Information Security)
Malware Detection (Advances in Information Security)

Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly dependent on information systems. These two factors have exposed our critical infrastructures to malicious attacks and accidental failures. Many...

Nine Algorithms That Changed the Future: The Ingenious Ideas That Drive Today's Computers
Nine Algorithms That Changed the Future: The Ingenious Ideas That Drive Today's Computers
Computing is transforming our society in ways that are as profound as the changes wrought by physics and chemistry in the previous two centuries. Indeed, there is hardly an aspect of our lives that hasn't already been influenced, or even revolutionized, by digital technology. Given the importance of computing to modern society,...
The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics
The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics

The Basics of Digital Forensics provides a foundation for people new to the field of digital forensics. This book teaches you how to conduct examinations by explaining what digital forensics is, the methodologies used, key technical concepts and the tools needed to perform examinations. Details on digital forensics for computers,...

Modern Database Management (8th Edition)
Modern Database Management (8th Edition)

STUDY.MODERN DATABASE MANAGEMENT WITH THE LATEST COVERAGE!

  • Complete SQL Coverage! Now two full chapters on SQL (Chapters 7 and 8) provide a thorough introduction to SQL, plus advanced material with examples.
  • Internet Database...
Cryptography for Dummies
Cryptography for Dummies

Protect yourself and your business from online eavesdroppers—it’s easier than you think! If you were hoping for a flame-throwing watch or flying a car, we’re sorry—this isn’t James Bond’s equipment manual. Cryptography is a common-sense way to secure stuff on the Internet, and this friendly guidebook makes...

unlimited object storage image
Result Page: 342 341 340 339 338 337 336 335 334 333 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy