|
|
|
|
|
|
Introduction to Embedded Systems: A Cyber-Physical Systems Approach
The most visible use of computers and software is processing information for human
consumption. We use them to write books (like this one), search for information
on the web, communicate via email, and keep track of financial data. The vast
majority of computers in use, however, are much less visible. They run the engine,
brakes,... | | Financial Risk Manager Handbook, Second EditionA comprehensive reference and training guide for financial risk management
Risk professionals looking to earn the Financial Risk Manager (FRM™) certification, corporate training programs, professors, and graduate students all rely on one book for the most comprehensive and up-to-date information on financial risk management–the... | | |
|
YUI 2.8 Learning the Library
The YUI Library has grown and improved since the first edition of this book. Several components came out of beta or experimental status and most of them will be covered in new chapters or added to related chapters, which will now have more than the two components originally presented.
The coding style has changed and that will be reflected... | | Machine Learning with R
Learn how to use R to apply powerful machine learning methods and gain an insight into real-world applications
Overview
-
Harness the power of R for statistical computing and data science
-
Use R to apply common machine learning algorithms with real-world applications
-
Prepare,...
| | SAP® Business Information Warehouse ReportingYour Hands-On Guide to SAP Business Information Warehouse
Give your company the competitive edge by delivering up-to-date, pertinent business reports to users inside and outside your enterprise. SAP Business Information Warehouse Reporting shows you how to construct Enterprise Data Warehouses, create workbooks... |
|
|
Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 |