Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Data Structures and Algorithms Using Python and C++
Data Structures and Algorithms Using Python and C++
THIS BOOK is intended for use in a traditional college-level data structures course (commonly known as CS2). This book assumes that students have learned the basic syntax of Python and been exposed to the use of existing classes. Most traditional CS1 courses that use Python will have covered all the necessary topics, and some may have covered a...
Statistics for Censored Environmental Data Using Minitab and R
Statistics for Censored Environmental Data Using Minitab and R

Praise for the First Edition

" . . . an excellent addition to an upper-level undergraduate course on environmental statistics, and . . . a 'must-have' desk reference for environmental practitioners dealing with censored datasets."
—Vadose Zone Journal

Statistical Methods for...

Software Requirements (3rd Edition) (Developer Best Practices)
Software Requirements (3rd Edition) (Developer Best Practices)

Now in its third edition, this classic guide to software requirements engineering has been fully updated with new topics, examples, and guidance. Two leaders in the requirements community have teamed up to deliver a contemporary set of practices covering the full range of requirements development and management activities on software...

Foundations of Neural Networks, Fuzzy Systems, and Knowledge Engineering
Foundations of Neural Networks, Fuzzy Systems, and Knowledge Engineering
Here we have a comprehensive, problem-oriented, engineering perspective on the uses of neural nets, fuzzy systems, and hybrids that emphasizes practical solutions to everyday artificial intelligence (AI) problems over abstract theoretical noodling. Intended for upper-division students and postgraduates who need a...
Open-Source ESBs in Action
Open-Source ESBs in Action
Most modern business systems include independent applications that exchange information with each other-a technique usually called enterprise integration. An architectural approach called the Enterprise Service Bus (ESB) offers developers a way to handle the messages between those independent applications without creating a lot of custom code....
Green Tech: How to Plan and Implement Sustainable IT Solutions
Green Tech: How to Plan and Implement Sustainable IT Solutions
“Green” is a feel-good term. It has positive, earth-friendly connotations, often without much specificity—perfect for marketing purposes. Sustainability, on the other hand, is something we can measure and manage. We are sustainable when our use of resources does not permanently deplete or damage our supply, including natural...
An Introduction to Tensors and Group Theory for Physicists
An Introduction to Tensors and Group Theory for Physicists

The second edition of this highly praised textbook provides an introduction to tensors, group theory, and their applications in classical and quantum physics. Both intuitive and rigorous, it aims to demystify tensors by giving the slightly more abstract but conceptually much clearer definition found in the math literature, and then connects...

Java EE 7 First Look
Java EE 7 First Look

Discover the new features of Java EE 7 and learn to put them together to build a large-scale application

Overview

  • Explore changes brought in by the Java EE 7 platform
  • Master the new specifications that have been added in Java EE to develop applications without any hassle
  • ...
Introduction to Mobile Telephone Systems: 1G, 2G, 2.5G, and 3G Technologies and Services
Introduction to Mobile Telephone Systems: 1G, 2G, 2.5G, and 3G Technologies and Services

If you are involved or getting involved in mobile communication technologies and services, this book is for you. This book explains the different types of mobile telephone technologies and systems from 1st generation digital broadband. It describes the basics of how they operate, the different types of wireless voice, data and information...

IT Security Management: IT Securiteers - Setting up an IT Security Function (Lecture Notes in Electrical Engineering)
IT Security Management: IT Securiteers - Setting up an IT Security Function (Lecture Notes in Electrical Engineering)

In 1862, the gardener James Bateman sent several specimens of the Christmas orchid to Charles Darwin. This orchid was first planted in Britain in 1855 and it did not blossom until 1857. It had been discovered several decades before by the French botanist Louis-Marie Aubert du Petit-Thouars in Madagascar in 1822. The most significant...

Cloud Computing: Automating the Virtualized Data Center (Networking Technology)
Cloud Computing: Automating the Virtualized Data Center (Networking Technology)

Cloud computing is a paradigm shift in the IT industry similar to the displacement of local electric generators with the electric grid, providing utility computing, and it is changing the nature of competition within the computer industry. There are over a hundred companies that claim they can provide cloud services....

An Introduction to IMS: Your Complete Guide to IBM Information Management System (2nd Edition)
An Introduction to IMS: Your Complete Guide to IBM Information Management System (2nd Edition)

IBM’s Definitive One-Stop Guide to IMS Versions 12, 11, and 10: for Every IMS DBA, Developer, and System Programmer

 

Over 90% of the top Fortune® 1000 companies rely on IBM’s Information Management System...

Result Page: 32 31 30 29 28 27 26 25 24 23 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy