Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Data Scientists at Work
Data Scientists at Work

Data Scientists at Work is a collection of interviews with sixteen of the world's most influential and innovative data scientists from across the spectrum of this hot new profession. "Data scientist is the sexiest job in the 21st century," according to the Harvard Business Review. By 2018, the United States will...

PC Disaster and Recovery
PC Disaster and Recovery

Has disaster struck? If you’re reading this, something very bad may have already happened to your PC. Or maybe you’re wisely looking ahead to any of several what-if scenarios. Either way, PC Disaster and Recovery is the book you need to recover from today’s disaster and not lose sleep over the ones that lie around...

Terrorism and Public Safety Policing: Implications for the Obama Presidency
Terrorism and Public Safety Policing: Implications for the Obama Presidency

A Pragmatic Answer to the Systematic Change Already Underway

The trends, data, and battle-tested logic do not lie. A perfect storm of extremist ideologies is on the horizon that threatens to challenge the current state of public safety—forcing police chiefs, public administrators, and security...

Python Algorithms: Mastering Basic Algorithms in the Python Language
Python Algorithms: Mastering Basic Algorithms in the Python Language

Python Algorithms, Second Edition explains the Python approach to algorithm analysis and design. Written by Magnus Lie Hetland, author of Beginning Python, this book is sharply focused on classical algorithms, but it also gives a solid understanding of fundamental algorithmic problem-solving techniques.

The book...

Security Sage's Guide to Hardening the Network Infrastructure
Security Sage's Guide to Hardening the Network Infrastructure
With the proliferation of wireless access points (WAPs), virtual private networks
(VPNs), and extranets, it’s becoming increasingly difficult to determine where
your network begins and ends. Add this complexity to common economic factors,
such as company mergers and acquisitions, and now you have a tangled web
of
...
The Mac Hacker's Handbook
The Mac Hacker's Handbook
As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat...
You Can't Lie to Me: The Revolutionary Program to Supercharge Your Inner Lie Detector and Get to the Truth
You Can't Lie to Me: The Revolutionary Program to Supercharge Your Inner Lie Detector and Get to the Truth

Janine Driver was trained as a lie detection expert for the ATF, FBI, and the CIA and is a New York Times bestselling author (You Say More Than You Think). Now she makes a powerful and incontrovertible declaration: You Can’t Lie to Me.  Driver—who is known in professional circles as “the...

The Hundred-Year Lie: How to Protect Yourself from the Chemicals That Are Destroying Your Health
The Hundred-Year Lie: How to Protect Yourself from the Chemicals That Are Destroying Your Health

In a devastating exposé in the tradition of Silent Spring and Fast Food Nation, investigative journalist Randall Fitzgerald warns how thousands of man-made chemicals in our food, water, medicine, and environment are making humans the most polluted species on the planet. A century ago in 1906, when Congress enacted the...

The R Book
The R Book

R is a high-level language and an environment for data analysis and graphics. The design of R was heavily influenced by two existing languages: Becker, Chambers and Wilks’ S and Sussman’s Scheme. The resulting language is very similar in appearance to S, but the underlying implementation and semantics are derived from Scheme. This...

Geometric Methods and Applications: For Computer Science and Engineering (Texts in Applied Mathematics)
Geometric Methods and Applications: For Computer Science and Engineering (Texts in Applied Mathematics)

This book is an introduction to the fundamental concepts and tools needed for solving problems of a geometric nature using a computer. It attempts to fill the gap between standard geometry books, which are primarily theoretical, and applied books on computer graphics, computer vision, robotics, or machine learning.

 This book...

Packet Guide to Core Network Protocols
Packet Guide to Core Network Protocols

Trying to find the perfect networking resource or textbook can be a real challenge. Sometimes they are extremely focused on one technology, and thus miss the mark. Or they are extremely broad, covering every networking idea known to man. This book is about something that all networks have in common—the core protocols. Networks...

The 25 Habits of Highly Successful Investors: How to Invest for Profit in Today's Changing Markets
The 25 Habits of Highly Successful Investors: How to Invest for Profit in Today's Changing Markets
The definitive guide to investing in today's market!

Especially after the wild ride that began in the fall of 2008, individual stock investing has become far more challenging. Think of a golf swing - hit it right and it goes long and straight, hit it wrong and you'll end up far off in the weeds. But - like much else in life...

Result Page: 15 14 13 12 11 10 9 8 7 6 5 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy