Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Total Snow Leopard Superguide
Total Snow Leopard Superguide

Nobody spends more time with Apple s computers and software than the writers and editors at Macworld, the world s foremost Mac authority. Now Macworld s team of experts take you inside Apple s latest update to the popular Mac OS X operating system: Snow Leopard, Mac OS X 10.6. Snow Leopard is an OS X update unlike any in recent memory one...

MATLAB Machine Learning
MATLAB Machine Learning
This book is a comprehensive guide to machine learning with worked examples in MATLAB. It starts with an overview of the history of Artificial Intelligence and automatic control and how the field of machine learning grew from these. It provides descriptions of all major areas in machine learning.

The book reviews
...
Big Data Analytics Made Easy
Big Data Analytics Made Easy
Big Data Analytics Made Easy is a must-read for everybody as it explains the power of Analytics in a simple and logical way along with an end to end code in R. Even if you are a novice in Big Data Analytics, you will still be able to understand the concepts explained in this book. If you are already working in Analytics and dealing with Big...
System Center 2016 Virtual Machine Manager Cookbook - Third Edition: Design, configure, and manage an efficient virtual infrastructure with VMM in System Center 2016
System Center 2016 Virtual Machine Manager Cookbook - Third Edition: Design, configure, and manage an efficient virtual infrastructure with VMM in System Center 2016

Maximize your administration skills effectively and efficiently

Key Features

  • Implement cost-effective virtualization solutions for your organization with actionable recipes
  • Explore the concepts of VMM with real-world use cases
  • Use the latest features with...
Soft Computing in Data Science: 4th International Conference, SCDS 2018, Bangkok, Thailand, August 15-16, 2018, Proceedings (Communications in Computer and Information Science)
Soft Computing in Data Science: 4th International Conference, SCDS 2018, Bangkok, Thailand, August 15-16, 2018, Proceedings (Communications in Computer and Information Science)
We are pleased to present the proceeding of the 4th International Conference on Soft Computing in Data Science 2018 (SCDS 2018). SCDS 2018 was held in Chulalongkorn University, in Bangkok, Thailand, during August 15–16, 2018. The theme of the conference was “Science in Analytics: Harnessing Data and...
Steal This Computer Book 3: What They Won't Tell You About the Internet
Steal This Computer Book 3: What They Won't Tell You About the Internet
This offbeat, non-technical book looks at what hackers do, how they do it, and how you can protect yourself. This edition also covers rootkits, spyware, web bugs, identity theft, hacktivism, wireless hacking (wardriving), biometrics, and firewalls.

WARNING: This book is not to be used for hacking into government computers, shutting...

The Variational Bayes Method in Signal Processing
The Variational Bayes Method in Signal Processing
This is the first book-length treatment of the Variational Bayes (VB) approximation in signal processing. It has been written as a self-contained, self-learning guide for academic and industrial research groups in signal processing, data analysis, machine learning, identification and control. It reviews the VB distributional approximation, showing...
Bioinformatics Technologies
Bioinformatics Technologies
Solving modern biological problems requires advanced computational methods. Bioinformatics evolved from the active interaction of two fast-developing disciplines, biology and information technology. The central issue of this emerging field is the transformation of often distributed and unstructured biological data into meaningful information....
Hacking Exposed Linux
Hacking Exposed Linux
GNU-Linux is the ultimate hacker’s playground. It’s a toy for the imagination, not unlike a box of blocks or a bag of clay. Whether someone is an artist or a scientist, the possibilities are endless. Anything that you want to try to do and build and make with a computer is subject only to your creativity. This is why so many people are...
Computational Vision and Medical Image Processing: Recent Trends
Computational Vision and Medical Image Processing: Recent Trends

Nowadays, computationalmethodologies of signal processing and imaging analysis for 2D, 3D and even 4D data are commonly used for various applications in society. For example, Computational Vision systems are progressively used for surveillance tasks, traffic analysis, recognition process, inspection purposes, human-machine interfaces, 3D...

Generative Adversarial Networks Projects: Build next-generation generative models using TensorFlow and Keras
Generative Adversarial Networks Projects: Build next-generation generative models using TensorFlow and Keras

Explore various Generative Adversarial Network architectures using the Python ecosystem

Key Features

  • Use different datasets to build advanced projects in the Generative Adversarial Network domain
  • Implement projects ranging from generating 3D shapes to a face aging...
The Worst Is Yet to Come: A Post-Capitalist Survival Guide
The Worst Is Yet to Come: A Post-Capitalist Survival Guide
Capitalism is about to commit suicide and is threatening to take us down with it. But will it give way to a grand social utopia or the beginning of a new dark age... albeit WiFi enabled?

The Worst is Yet to Come explores the disturbing possibility that the current crisis of neoliberal capitalism isn’t
...
unlimited object storage image
Result Page: 106 105 104 103 102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy