Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Machine Learning with the Raspberry Pi: Experiments with Data and Computer Vision (Technology in Action)
Machine Learning with the Raspberry Pi: Experiments with Data and Computer Vision (Technology in Action)

Using the Pi Camera and a Raspberry Pi board, expand and replicate interesting machine learning (ML) experiments.  This book provides a solid overview of ML and a myriad of underlying topics to further explore. Non-technical discussions temper complex technical explanations to make the hottest and most complex topic in the...

Software Design for Resilient Computer Systems
Software Design for Resilient Computer Systems

This book addresses the question of how system software should be designed to account for faults, and which fault tolerance features it should provide for highest reliability. With this second edition of Software Design for Resilient Computer Systems the book is thoroughly updated to contain the newest advice...

Historians on Leadership and Strategy: Case Studies From Antiquity to Modernity
Historians on Leadership and Strategy: Case Studies From Antiquity to Modernity
This book examines the well-covered subject of leadership from a unique perspective: history's vast catalogue of leadership successes and failures. Through a collection of highly compelling case studies spanning two millennia, it looks beyond the classic leadership parable of men in military or political crises and shows...
Digital Forensics Basics: A Practical Guide Using Windows OS
Digital Forensics Basics: A Practical Guide Using Windows OS

Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner...

Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring...
Transnational Identities on Okinawa’s Military Bases: Invisible Armies
Transnational Identities on Okinawa’s Military Bases: Invisible Armies

This book considers the role of civilian workers on U.S. bases in Okinawa, Japan and how transnational movements within East Asia during the Occupation period brought foreign workers, mostly from the Philippines, to work on these bases. Decades later, in a seeming “reproduction of base labour”, returnees of both Okinawan...

Color Atlas of Human Poisoning and Envenoming
Color Atlas of Human Poisoning and Envenoming
The field of medical toxicology can be simply divided into animal and human poisonings from animal, plant, or man-made sources. Even more precisely, toxinology is the study of poisoning and envenoming by biological organisms, and toxicology is the study of human poisoning from manmade sources. Living organisms, such as animals,...
Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks
Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks
The rapid progress of mobile/wireless communication and embedded microsensing MEMS technologies leads us toward the dream “Ubiquitous/Pervasive Computing.” Wireless local-area networks (WLANs) have been widely deployed in many cities and have become a requisite tool to many people in their daily lives. Wireless personal-area networks...
Translating Statistics to Make Decisions: A Guide for the Non-Statistician
Translating Statistics to Make Decisions: A Guide for the Non-Statistician

Examine and solve the common misconceptions and fallacies that non-statisticians bring to their interpretation of statistical results. Explore the many pitfalls that non-statisticians―and also statisticians who present statistical reports to non-statisticians―must avoid if statistical results are to be correctly used for...

Prehospital Trauma Care
Prehospital Trauma Care

Comprehensive in scope and content, Prehospital Trauma Care (PTC) covers all aspects of emergency medicine-triage assessment and treatment, anesthesia, intensive care, psychiatry, health and military disasters, burns, shock, and surgery.
Written by over 70 distinguished international experts representing Australia, Austria, Belgium,
...

The Art of War in the Network Age: Back to the Future (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)
The Art of War in the Network Age: Back to the Future (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)

Previous studies have looked at the contribution of information technology and network theory to the art of warfare as understood in the broader sense. This book, however, focuses on an area particularly important in understanding the significance of the information revolution; its impact on strategic theory. The purpose of the book is to...

Developments and Challenges for Autonomous Unmanned Vehicles: A Compendium
Developments and Challenges for Autonomous Unmanned Vehicles: A Compendium

It is widely anticipated that autonomous vehicles will have a transformational impact on military forces and will play a key role in many future force structures. As a result, many tasks have already been identified that unmanned systems could undertake more readily than humans. However, for this to occur, such systems will need to be agile,...

Result Page: 32 31 30 29 28 27 26 25 24 23 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy