Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Artificial Intelligence and Machine Learning Fundamentals: Develop real-world applications powered by the latest AI advances
Artificial Intelligence and Machine Learning Fundamentals: Develop real-world applications powered by the latest AI advances

Create AI applications in Python and lay the foundations for your career in data science

Key Features

  • Practical examples that explain key machine learning algorithms
  • Explore neural networks in detail with interesting examples
  • Master core AI concepts with...
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring...
Hands-On GPU Programming with Python and CUDA: Explore high-performance parallel computing with CUDA
Hands-On GPU Programming with Python and CUDA: Explore high-performance parallel computing with CUDA

Build GPU-accelerated high performing applications with Python 2.7, CUDA 9, and open source libraries such as PyCUDA and scikit-cuda. We recommend the use of Python 2.7 as this version has stable support across all libraries used in this book.

Key Features

  • Get to grips with GPU programming...
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence

Investigate crimes involving cryptocurrencies and other blockchain technologies

Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their...

Cybersecurity Law
Cybersecurity Law

A definitive guide to cybersecurity law

Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information...

Telecosmos: The Next Great Telecom Revolution
Telecosmos: The Next Great Telecom Revolution
An insider's guide to the exciting future of telecommunications

The last great telecommunications revolution brought us fiber optics, mobile phones, videoconferencing, and a host of other innovations that improved life and business and connected individuals in ways never imagined. Now emerging technologies such as Voice over Internet Protocol...

Linear Algebra and Probability for Computer Science Applications
Linear Algebra and Probability for Computer Science Applications

Based on the author’s course at NYU, Linear Algebra and Probability for Computer Science Applications gives an introduction to two mathematical fields that are fundamental in many areas of computer science. The course and the text are addressed to students with a very weak mathematical background. Most of the...

Electronics Cookbook: Practical Electronic Recipes with Arduino and Raspberry Pi
Electronics Cookbook: Practical Electronic Recipes with Arduino and Raspberry Pi

If you’re among the many hobbyists and designers who came to electronics through Arduino and Raspberry Pi, this cookbook will help you learn and apply the basics of electrical engineering without the need for an EE degree. Through a series of practical recipes, you’ll learn how to solve specific problems while diving into...

The Character of Physical Law (Messenger Lectures, 1964)
The Character of Physical Law (Messenger Lectures, 1964)

In these Messenger Lectures, originally delivered at Cornell University and recorded for television by the BBC, Richard Feynman offers an overview of selected physical laws and gathers their common features into one broad principle of invariance. He maintains at the outset that the importance of a physical law is not "how clever...

Programming Many-Core Chips
Programming Many-Core Chips

Parallel computing has been confined, for much of its over 40 year history, to highly specialized, technology-wise advanced domains such as scientific computing or telecommunications. There were only a few experts who had the background and experience to write efficient, robust and scalable programs for these parallel machines.

...

Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
The mightiest fortresses in the world can fail, and when that happens all you can do (you being the person responsible for castle security) is figure out what went wrong, what damage was done, and by whom. If the castle was located in the right kind of kingdom--to take a metaphor too far--you can hope to prosecute the perpetrator. Computer...
Control Theory for Engineers: A Primer (Environmental Science and Engineering / Environmental Engine)
Control Theory for Engineers: A Primer (Environmental Science and Engineering / Environmental Engine)

Control Theory is at the heart of information and communication technologies of complex systems. It can contribute to meeting the energy and environmental challenges we are facing.

The textbook is organized in the way an engineer classically proceeds to solve a control problem, that is, elaboration of a mathematical model capturing...

Result Page: 57 56 55 54 53 52 51 50 49 48 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy