Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning Data Science with Python and Jupyter: Use powerful tools to unlock actionable insights from data
Beginning Data Science with Python and Jupyter: Use powerful tools to unlock actionable insights from data

Getting started with data science doesn't have to be an uphill battle. This step-by-step guide is ideal for beginners who know a little Python and are looking for a quick, fast-paced introduction.

Key Features

  • Get up and running with the Jupyter ecosystem and some example datasets
  • ...
Learning Machine Translation (Neural Information Processing)
Learning Machine Translation (Neural Information Processing)
The Internet gives us access to a wealth of information in languages we don't understand. The investigation of automated or semi-automated approaches to translation has become a thriving research field with enormous commercial potential. This volume investigates how machine learning techniques can improve statistical machine translation, currently...
A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness
A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness

Information technology is an increasingly large factor in legal proceedings. In cases large and small, from the U.S. Government's antitrust suit against Microsoft Corporation, to civil lawsuits filed over the failure of a network, to criminal cases in which the authenticity of electronic evidence is questioned, the testimony of a technical...

iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
This book is intended for individuals who are interested in the iPhone and other iOS devices and, more importantly, in the type of data that is stored and can be recovered from these devices. The demand for mobile forensics has grown tremendously with the release of smart phones. Communication on these devices is now documented...
Advances in Applied Artificial Intelligence (Computational Intelligence and Its Applications)
Advances in Applied Artificial Intelligence (Computational Intelligence and Its Applications)
Discussion on the nature of intelligence long pre-dated the development of the
electronic computer, but along with that development came a renewed burst of investigation
into what an artificial intelligence would be. There is still no consensus on how
to define artificial intelligence: Early definitions tended to discuss the type of
...
Scene of the Cybercrime, Second Edition
Scene of the Cybercrime, Second Edition

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one...

Forensic Science
Forensic Science

This is a comprehensive reference source on the theory, techniques, and application of the various forensic sciences.The past decade has seen an explosion of interest in the application of scientific techniques to investigations of crime. Television audiences have developed a seemingly insatiable appetite for shows such as CSI: Crime Scene...

Despeckle Filtering Algorithims and Software for Ultrasound Imaging
Despeckle Filtering Algorithims and Software for Ultrasound Imaging

It is well-known that speckle is a multiplicative noise that degrades image quality and the visual evaluation in ultrasound imaging. This necessitates the need for robust despeckling techniques for both routine clinical practice and teleconsultation. The goal for this book is to introduce the theoretical background (equations), the...

Cloud Storage Forensics
Cloud Storage Forensics

To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. Digital forensic investigation in the cloud computing environment, however, is in infancy due to the...

Electromagnetic Fields in Mechatronics, Electrical And Electronic Engineering: Proceedings of Isef'05
Electromagnetic Fields in Mechatronics, Electrical And Electronic Engineering: Proceedings of Isef'05
This book contains the papers presented at the International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering ISEF’05 which was held in Baiona, Spain on September 15–17, 2005. ISEF conferences have been organized since 1985 as a common initiative of Polish and European...
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition
Updating and expanding information on concealment techniques, new technologies, hardware, software, and relevant new legislation, this second edition details scope of cyber forensics to reveal and track legal and illegal activity. Designed as an introduction and overview to the field, the authors guide you step-by-step through the basics of...
The Annotated Build-It-Yourself Science Laboratory: Build Over 200 Pieces of Science Equipment! (Make)
The Annotated Build-It-Yourself Science Laboratory: Build Over 200 Pieces of Science Equipment! (Make)

In this book, you will learn how to make some amazing things: a carbon arc furnace, cloud chamber, mechanical stroboscope, radiometer, optical micrometer, electromagnet, microtome, spectroscope, and so many others. You will blow glass, catch bugs, and cut the ends off of power cords. You will learn how acids and alkalis taste, what lands of...

Result Page: 32 31 30 29 28 27 26 25 24 23 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy