Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The GIMP Bible: Great for Beginners - 40+ Step-by-Step Tutorials
The GIMP Bible: Great for Beginners - 40+ Step-by-Step Tutorials
The GIMP Bible is the ultimate reference and guide to the free, recently updated, photo-editing software - GIMP. Due to its license-free application, this Adobe Photoshop-like image manipulation program is probably the most-used software in the world. If you're a beginner photographer or a professional, then this detailed how-to guide will...
Factories of the Future: The Italian Flagship Initiative
Factories of the Future: The Italian Flagship Initiative
This book is open access under a CC BY 4.0 license.
This book presents results relevant in the manufacturing research field, that are mainly aimed at closing the gap between the academic investigation and the industrial application, in collaboration with manufacturing companies. Several hardware and software prototypes represent...
Mastering Reverse Engineering: Re-engineer your ethical hacking skills
Mastering Reverse Engineering: Re-engineer your ethical hacking skills

Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses.

Key Features

  • Analyze and improvise software and hardware with real-world examples
  • Learn advanced debugging and patching...
Think Python
Think Python
In January 1999 I was preparing to teach an introductory programming class in Java. I had taught it three times and I was getting frustrated. The failure rate in the class was too high and, even for students who succeeded, the overall level of achievement was too low.

One of the problems I saw was the books. They were too
...
Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT (SpringerBriefs in Electrical and Computer Engineering)
Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT (SpringerBriefs in Electrical and Computer Engineering)
This book gives a comprehensive and systematic review of secure compressive sensing (CS) for applications in various fields such as image processing, pattern recognition, Internet of things (IoT), and cloud computing. It will help readers grasp the knowledge of secure CS and its applications, and stimulate more readers to work on the research...
Mastering Python Design Patterns: A guide to creating smart, efficient, and reusable software, 2nd Edition
Mastering Python Design Patterns: A guide to creating smart, efficient, and reusable software, 2nd Edition

Exploit various design patterns to master the art of solving problems using Python

Key Features

  • Master the application design using the core design patterns and latest features of Python 3.7
  • Learn tricks to solve common design and architectural challenges
  • ...
IEEE Recommended Practice for the Design of Reliable Industrial and Commercial Power Systems
IEEE Recommended Practice for the Design of Reliable Industrial and Commercial Power Systems
The design of reliable industrial and commercial power systems is of considerable interest to many people. Prior to 1962, a qualitative viewpoint was taken when attempting to achieve this objective. The need for a quantitative approach was first recognized in the early 1960s when a small group of pioneers led by W. H. Dickinson...
Digital System Design with VHDL (2nd Edition)
Digital System Design with VHDL (2nd Edition)

When the first edition of this book was published, the idea of combining a text on digital design with one on VHDL seemed novel. At about the same time, several other books with similar themes were published. This book has now been adopted by several universities as a core text. Moreover, the first edition has now been translated into...

Programming Google App Engine
Programming Google App Engine
On the Internet, popularity is swift and fleeting. A mention of your website on a popular blog can bring 300,000 potential customers your way at once, all expecting to find out who you are and what you have to offer. But if you’re a small company just starting out, your hardware and software aren’t...
IFRS 9 and CECL Credit Risk Modelling and Validation: A Practical Guide with Examples Worked in R and SAS
IFRS 9 and CECL Credit Risk Modelling and Validation: A Practical Guide with Examples Worked in R and SAS

IFRS 9 and CECL Credit Risk Modelling and Validation covers a hot topic in risk management. Both IFRS 9 and CECL accounting standards require Banks to adopt a new perspective in assessing Expected Credit Losses. The book explores a wide range of models and corresponding validation procedures. The most traditional regression...

Information Retrieval: Implementing and Evaluating Search Engines
Information Retrieval: Implementing and Evaluating Search Engines

An academic dynasty has come together to write an excellent textbook on information retrieval. Stefan Buttcher, Charles Clarke, and Gordon Cormack make up three generations of stellar information retrieval researchers with over fifty years of combined experience. Buttcher was Clarke's doctoral student, and Clarke was Cormack's...

Diagnosis and Surgical Management of Renal Tumors
Diagnosis and Surgical Management of Renal Tumors
Renal cell carcinoma (RCC) is the most common primary malignancy of the kidney, with an estimated 64,000 new cases diagnosed each year in the United States. Worldwide, this figure approaches 270,000 annual incident cases. At the time of initial presentation, 80% of patients with RCC will be diagnosed with a tumor localized the kidney. The...
Result Page: 97 96 95 94 93 92 91 90 89 88 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy