Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Getting Started with MATLAB: A Quick Introduction for Scientists and Engineers
Getting Started with MATLAB: A Quick Introduction for Scientists and Engineers

MATLAB, a software package for high-performance numerical computation and visualization, is one of the most widely used tools in the engineering field today. Its broad appeal lies in its interactive environment, which features hundreds of built-in functions for technical computation, graphics, and animation. In addition, MATLAB provides easy...

C++ for Business Programmers (2nd Edition)
C++ for Business Programmers (2nd Edition)
C++ for Business Programming, Second Edition is an introduction to C++ programming. The power of C++ lies in its object-oriented extensions of the C language. However, we believe that for beginning students it is best to learn the basics of programming without the extra encumbrance of having to learn object-oriented concepts. Therefore, the book is...
The Toaster Project: Or a Heroic Attempt to Build a Simple Electric Appliance from Scratch
The Toaster Project: Or a Heroic Attempt to Build a Simple Electric Appliance from Scratch

Where do our things really come from? China is the most common answer, but Thomas Thwaites decided he wanted to know more. In The Toaster Project, Thwaites asks what lies behind the smooth buttons on a mobile phone or the cushioned soles of running sneakers. What is involved in extracting and processing materials? To answer these...

Microsoft  VBScript Step by Step
Microsoft VBScript Step by Step
Learn how to automate Windows administration step by step with hands-on instruction from a leading Microsoft Visual Basic Scripting Edition (VBScript) trainer. This guide features self-paced labs, timesaving tips, and more than 100 sample scripts.

Network administrators and consultants are confronted with numerous mundane...

Malicious Attack Propagation and Source Identification (Advances in Information Security)
Malicious Attack Propagation and Source Identification (Advances in Information Security)

This book covers and makes four major contributions:

1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks;

2) proposing a novel approach to identify rumor sources in time-varying networks;

3) developing a fast approach to identify...

Business Rules and Information Systems: Aligning IT with Business Goals
Business Rules and Information Systems: Aligning IT with Business Goals

Information systems often fail because their requirements are poorly defined. This book shows IT professionals how to specify more precisely and more effectively what their systems need to do. The key lies in the discovery and application of what are called business rules. A business rule is a compact and simple statement that represents some...

Exploring Data with RapidMiner
Exploring Data with RapidMiner

RapidMiner is a highly versatile tool that can make data work harder for you. This book will show you how to import, parse, and structure your data with remarkable speed and efficiency. It's data mining made accessible.

Overview

  • See how to import, parse, and structure your data quickly and...
Guide to Scientific Computing in C++ (Undergraduate Topics in Computer Science)
Guide to Scientific Computing in C++ (Undergraduate Topics in Computer Science)
Many books have been written on the C++ programming language, varying across a spectrum from the very practical to the very theoretical. This book certainly lies at the practical end of this spectrum, and has a particular focus for the practical treatment of this language: scientific computing.

Traditionally,
...
Expert Oracle Exadata
Expert Oracle Exadata

Expert Oracle Exadata, 2nd Edition opens up the internals of Oracle's Exadata platform so that you can fully benefit from the most performant and scalable database hardware appliance capable of running Oracle Database. This edition is fully-updated to cover Exadata 5-2 and Oracle Database 12c. If you're new to Exadata,...

The Philosophy of Creative Solitudes
The Philosophy of Creative Solitudes

What is solitude, why do we crave and fear it, and how do we distinguish it properly from loneliness? It lies at the core of the lives of philosophers and their self-reflective contemplations, and it is the enabling (and disabling) condition that allows us to seriously question how to live creatively and meaningfully.

...

The Best of 2600: A Hacker Odyssey
The Best of 2600: A Hacker Odyssey
The hacker subculture — shrouded in mystery, spiced with a hint of glamour, and thoroughly misunderstood by those who don't belong — was revealed in the original edition of The Best of 2600: A Hacker Odyssey. The book became an instant bestseller. If you're a 2600 subscriber, a member of the hacker community, a geek freak, or simply a...
Handbook of Graph Theory (Discrete Mathematics and Its Applications)
Handbook of Graph Theory (Discrete Mathematics and Its Applications)

The Handbook of Graph Theory is the most comprehensive single-source guide to graph theory ever published. Best-selling authors Jonathan Gross and Jay Yellen assembled an outstanding team of experts to contribute overviews of more than 50 of the most significant topics in graph theory-including those related to algorithmic and optimization...

unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy