Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Java How to Program, 7th Edition
Java How to Program, 7th Edition

The Deitels' groundbreaking How to Program series offers unparalleled breadth and depth of object-oriented programming concepts and intermediate-level topics for further study. The Seventh Edition has been extensively fine-tuned and is completely up-to-date with Sun Microsystems, Inc.’s...

The Handbook of Brain Theory and Neural Networks: Second Edition
The Handbook of Brain Theory and Neural Networks: Second Edition
Dramatically updating and extending the first edition, published in 1995, the second edition of The Handbook of Brain Theory and Neural Networks presents the enormous progress made in recent years in the many subfields related to the two great questions: How does the brain work? and, How can we build intelligent machines?

Once
...
FPGA Implementations of Neural Networks
FPGA Implementations of Neural Networks

The development of neural networks has now reached the stage where they are employed in a large variety of practical contexts. However, to date the majority of such implementations have been in software. While it is generally recognised that hardware implementations could, through performance advantages, greatly increase the use of neural...

Session Initiation Protocol (SIP): Controlling Convergent Networks (McGraw-Hill Communication Series)
Session Initiation Protocol (SIP): Controlling Convergent Networks (McGraw-Hill Communication Series)
Telephone networks have come a long ways in the last 100 years. Or have they? If one looks at how a telephone network works, not much has changed. Connections are still made through “dedicated” circuits connected end to end for the duration of a call. While switchboard operators have been replaced by digital switching systems, the...
Applied Security Visualization
Applied Security Visualization
APPLIED SECURITY VISUALIZATION

 

“Collecting log data is one thing, having relevant information is something else. The art to transform all kinds of log data into meaningful security information is the core of this book. Raffy illustrates in a...

Fundamentals of Deep Learning: Designing Next-Generation Machine Intelligence Algorithms
Fundamentals of Deep Learning: Designing Next-Generation Machine Intelligence Algorithms

With the reinvigoration of neural networks in the 2000s, deep learning has become an extremely active area of research, one that’s paving the way for modern machine learning. In this practical book, author Nikhil Buduma provides examples and clear explanations to guide you through major concepts of this complicated field.

...
Practical Computer Vision: Extract insightful information from images using TensorFlow, Keras, and OpenCV
Practical Computer Vision: Extract insightful information from images using TensorFlow, Keras, and OpenCV

A practical guide designed to get you from basics to current state of art in computer vision systems.

Key Features

  • Master the different tasks associated with Computer Vision and develop your own Computer Vision applications with ease
  • Leverage the power of Python,...
Python Data Analysis Cookbook
Python Data Analysis Cookbook

Key Features

  • Analyze Big Data sets, create attractive visualizations, and manipulate and process various data types
  • Packed with rich recipes to help you learn and explore amazing algorithms for statistics and machine learning
  • Authored by Ivan Idris, expert in python programming and proud...
Configuring Symantec AntiVirus Corporate Edition
Configuring Symantec AntiVirus Corporate Edition
At some time in the last 15 years many of us blinked, and upon opening our eyes
we found the world on the verge of becoming one large network. Public and
private networks were interconnected both far and near, and now in your corner
of this interconnected puzzle, virus protection for the network has become
your
...
Complex Networks and Their Applications VII: Volume 1 Proceedings The 7th International Conference on Complex Networks and Their Applications COMPLEX ... 2018 (Studies in Computational Intelligence)
Complex Networks and Their Applications VII: Volume 1 Proceedings The 7th International Conference on Complex Networks and Their Applications COMPLEX ... 2018 (Studies in Computational Intelligence)
This book highlights cutting-edge research in the field of network science, offering scientists, researchers, students and practitioners a unique update on the latest advances in theory, together with a wealth of applications. It presents the peer-reviewed proceedings of the VII International Conference on Complex Networks and their Applications...
Pro Arduino (Technology in Action)
Pro Arduino (Technology in Action)

So, you've created a few projects with Arduino, and now it's time to kick it up a notch. Where do you go next? With Pro Arduino, you'll learn about new tools, techniques, and frameworks to make even more ground-breaking, eye-popping projects.

You'll discover how to make Arduino-based gadgets and robots...

The InfoSec Handbook: An Introduction to Information Security
The InfoSec Handbook: An Introduction to Information Security

The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts.

It is intended mainly for beginners to the field of...

Result Page: 266 265 264 263 262 261 260 259 258 257 256 255 254 253 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy