Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Ruby Gems
Practical Ruby Gems
Practical Ruby Gems is a comprehensive guide to utilizing and creating Ruby Gems--ready-made Ruby code modules that can be easily added to Ruby and Rails projects. This book is ideal for Ruby programmers as well as web developers who use Rails and wish to extend the functionality of their projects.

You'll get a prime selection of 34 of
...
Learning Machine Translation (Neural Information Processing)
Learning Machine Translation (Neural Information Processing)
The Internet gives us access to a wealth of information in languages we don't understand. The investigation of automated or semi-automated approaches to translation has become a thriving research field with enormous commercial potential. This volume investigates how machine learning techniques can improve statistical machine translation, currently...
Sams Teach Yourself SQL in 24 Hours (5th Edition)
Sams Teach Yourself SQL in 24 Hours (5th Edition)

In just 24 sessions of one hour or less, you’ll learn how to use SQL to build effective databases, efficiently retrieve your data, and manage everything from performance to security! Using this book’s straightforward, step-by-step approach, you’ll learn hands-on through practical examples. Each lesson...

Interactive InDesign CS5: Take your Print Skills to the Web and Beyond
Interactive InDesign CS5: Take your Print Skills to the Web and Beyond

The release of InDesign CS5 is nothing short of revolutionary. Now you can apply all the tools that have made InDesign the industry standard for print, to design for interactive electronic media too. With the release of Creative Suite 5, InDesign has evolved from print to “printeractive!” Designers expected to meet the demands of...

Practical Methods of Financial Engineering and Risk Management: Tools for Modern Financial Professionals
Practical Methods of Financial Engineering and Risk Management: Tools for Modern Financial Professionals

Risk control, capital allocation, and realistic derivative pricing and hedging are critical concerns for major financial institutions and individual traders alike. Events from the collapse of Lehman Brothers to the Greek sovereign debt crisis demonstrate the urgent and abiding need for statistical tools...

Learning ROS for Robotics Programming - Second Edition
Learning ROS for Robotics Programming - Second Edition

Your one-stop guide to the Robot Operating System

About This Book

  • Model your robot on a virtual world and learn how to simulate it
  • Create, visualize, and process Point Cloud information
  • Easy-to-follow, practical tutorials to program your own robots

Who...

MIDP 2.0 Style Guide for the Java 2 Platform, Micro Edition
MIDP 2.0 Style Guide for the Java 2 Platform, Micro Edition

MIDP 2.0 Style Guide for the Java(TM) 2 Platform, Micro Edition, is the comprehensive reference for designing and creating interactive Java(TM) applications for consumer-oriented mobile devices. Readers learn how to best exploit MIDP 2.0 features, such as the gaming API, multimedia, and...

Modern Operating Systems
Modern Operating Systems
For software development professionals and computer science students, Modern Operating Systems gives a solid conceptual overview of operating system design, including detailed case studies of Unix/Linux and Windows 2000.

What makes an operating system modern? According to author Andrew Tanenbaum, it is the awareness of high-demand...

Playing with Videogames
Playing with Videogames
This book enlarges the discussion of mobility from tools and technologies to employees working in multiple places and between them Matti Vartiainen (Helsinki University of Technology, Finland)

Playing with Videogames documents the richly productive, playful and social cultures of videogaming that support, surround and sustain
...
Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The wide variety of methods used in terrorism informatics are...
The Book of VMware: The Complete Guide to VMware Workstation
The Book of VMware: The Complete Guide to VMware Workstation

There's only so much you can do by multitasking applications. Frequently, you just need another computer for testing software, trying out network configurations, or doing any of a dozen things that engineers and administrators need to do. VMware allows you to run several virtual machines on one physical computer, each completely...

Governing Climate Change (Global Institutions)
Governing Climate Change (Global Institutions)

Governing Climate Change provides a short and accessible introduction to how climate change is governed by an increasingly diverse range of actors, from civil society and market actors to multilateral development banks, donors and cities.

The issue of global climate change has risen to the top of the international...

unlimited object storage image
Result Page: 203 202 201 200 199 198 197 196 195 194 193 192 191 190 189 188 187 186 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy