Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Concurrent, Real-Time and Distributed Programming in Java: Threads, RTSJ and RMI (Focus: Computer Science)
Concurrent, Real-Time and Distributed Programming in Java: Threads, RTSJ and RMI (Focus: Computer Science)

This book provides an introduction to concurrent, real-time, distributed programming with Java object-oriented language support as an algorithm description tool. It describes in particular the mechanisms of synchronization (cooperative and competitive) and sharing of data (internal class, static variables) between threads in Java. He...

Bandwidth Efficient Coding (IEEE Series on Digital & Mobile Communication)
Bandwidth Efficient Coding (IEEE Series on Digital & Mobile Communication)

This book addresses coding, a new solution to the major challenge of communicating more bits of information in the same radio spectrum.

  • Explores concepts and new transmission methods that have arisen in the last 15 years
  • Discusses the method of faster than Nyquist signaling
  • ...
Sampling Algorithms (Springer Series in Statistics)
Sampling Algorithms (Springer Series in Statistics)
This book is based upon courses on sampling algorithms. After having used scattered notes for several years, I have decided to completely rewrite the material in a consistent way. The books of Brewer and Hanif (1983) and H´ajek (1981) have been my works of reference. Brewer and Hanif (1983) have drawn up an...
Deep Learning Cookbook: Practical Recipes to Get Started Quickly
Deep Learning Cookbook: Practical Recipes to Get Started Quickly

Deep learning doesn’t have to be intimidating. Until recently, this machine-learning method required years of study, but with frameworks such as Keras and Tensorflow, software engineers without a background in machine learning can quickly enter the field. With the recipes in this cookbook, you’ll learn how to solve...

From Hacking to Report Writing: An Introduction to Security and Penetration Testing
From Hacking to Report Writing: An Introduction to Security and Penetration Testing

Learn everything you need to know to become a professional security and penetration tester. It simplifies hands-on security and penetration testing by breaking down each step of the process so that finding vulnerabilities and misconfigurations becomes easy. The book explains how to methodically locate, exploit, and professionally...

Learning Agile: Understanding Scrum, XP, Lean, and Kanban
Learning Agile: Understanding Scrum, XP, Lean, and Kanban
Learning Agile is a comprehensive guide to the most popular agile methods, written in a light and engaging style that makes it easy for you to learn.

Agile has revolutionized the way teams approach software development, but with dozens of agile methodologies to choose from, the decision to "go agile"
...
MySQL and JSON: A Practical Programming Guide
MySQL and JSON: A Practical Programming Guide
Practical instruction on using JavaScript Object Notation (JSON) with MySQL


This hands-on guide teaches, step by step, how to use JavaScript Object Notation (JSON) with MySQL. Written by a MySQL Community Manager for Oracle, MySQL and JSON: A Practical Programming Guide...
WiFi Hacking for Beginners
WiFi Hacking for Beginners

In this book you will start as a beginner with no previous knowledge about penetration testing. The book is structured in a way that will take you through the basics of networking and how clients communicate with each other, then we will start talking about how we can exploit this method of communication to carry out a number of powerful...

Meditation - Neuroscientific Approaches and Philosophical Implications (Studies in Neuroscience, Consciousness and Spirituality)
Meditation - Neuroscientific Approaches and Philosophical Implications (Studies in Neuroscience, Consciousness and Spirituality)

This volume features a collection of essays on consciousness, which has become one of the hot topics at the crossroads between neuroscience, philosophy, and religious studies. Is consciousness something the brain produces? How can we study it? Is there just one type of consciousness or are there different states that can be discriminated? Are...

Coping with Interference in Wireless Networks (Signals and Communication Technology)
Coping with Interference in Wireless Networks (Signals and Communication Technology)

Unlike wired networks where transmitters have no effect on receivers other than their own, in wireless networks we are limited by interference. The traditional routing methods are not optimal any more when it comes to a wireless medium. The maximum data rate on each link depends not only on the power in that link but also on the transmitted...

Fourier Transform Methods in Finance
Fourier Transform Methods in Finance

In recent years, Fourier transform methods have emerged as one of the major methodologies for the evaluation of derivative contracts, largely due to the need to strike a balance between the extension of existing pricing models beyond the traditional Black-Scholes setting and a need to evaluate prices consistently with the market...

Object-Oriented Analysis and Design with Applications (3rd Edition)
Object-Oriented Analysis and Design with Applications (3rd Edition)
Object-Oriented Design with Applications has long been the essential reference to object-oriented technology, which, in turn, has evolved to join the mainstream of industrial-strength software development. In this third edition--the first revision in 13 years--readers can learn to apply object-oriented methods using new paradigms...
Result Page: 97 96 95 94 93 92 91 90 89 88 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy