Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Inventors at Work: The Minds and Motivation Behind Modern Inventions
Inventors at Work: The Minds and Motivation Behind Modern Inventions

Inventors at Work: The Minds and Motivation Behind Modern Inventions is a collection of interviews with inventors of famous products, innovations, and technologies that have made life easier or even changed the way we live. All of these scientists, engineers, wild-eyed geniuses, and amateur technologists have dedicated their...

Modern Compiler Implementation in C
Modern Compiler Implementation in C

This new, expanded textbook describes all phases of a modern compiler: lexical analysis, parsing, abstract syntax, semantic actions, intermediate representations, instruction selection via tree matching, dataflow analysis, graph-coloring register allocation, and runtime systems. It includes good coverage of current techniques in code...

Neural Network Programming with TensorFlow: Unleash the power of TensorFlow to train efficient neural networks
Neural Network Programming with TensorFlow: Unleash the power of TensorFlow to train efficient neural networks

Neural Networks and their implementation decoded with TensorFlow

About This Book

  • Develop a strong background in neural network programming from scratch, using the popular Tensorflow library.
  • Use Tensorflow to implement different kinds of neural networks – from simple...
Java All-In-One Desk Reference For Dummies
Java All-In-One Desk Reference For Dummies
9 books in 1— your key to success with Java!

Your one-stop guide to the most-used language for application development

There's no question that Java is the popular kid on the block, and knowing Java will definitely boost your reputation as a developer. Here are all the Java essentials packed into one handy resource. Find out...

Writing Security Tools and Exploits
Writing Security Tools and Exploits
Exploits. In most information technology circles these days, the term exploits has
become synonymous with vulnerabilities or in some cases, buffer overflows. It is not
only a scary word that can keep you up at night wondering if you purchased the best
firewalls, configured your new host-based intrusion prevention system correctly,
...
Applied XML: A Toolkit for Programmers
Applied XML: A Toolkit for Programmers
Looking past much of the hype surrounding XML, Applied XML provides a real-world guide to the XML used in the latest browsers and server-side solutions. Approachable yet filled with useful specifics about XML standards, this book fills a valuable niche for any IS professional, including Java developers.

The notable feature here is the...

Learning WML and WMLScript
Learning WML and WMLScript
The next generation of mobile communicators is here, and delivering content to them will mean programming in WML (Wireless Markup Language) and WMLScript, the languages of the Wireless Application Environment (WAE). The WAE allows information in almost all applications to be formatted for display on mobile devices, such as cell phones, and...
Handbook of Ceramic Composites
Handbook of Ceramic Composites

Ceramic matrix composites (CMCs) are at the forefront of advanced materials technology because of their light weight, high strength and toughness, high temperature capabilities, and graceful failure under loading. During the last 25 years, tremendous progress has been made in the development and advancement of CMCs under various research...

Windows Server 2008 Hyper-V: Insiders Guide to Microsoft's Hypervisor
Windows Server 2008 Hyper-V: Insiders Guide to Microsoft's Hypervisor
Hyper-V is one of the top virtualization products, and this practical guide focuses on the essentials of Windows Server 2008 Hyper-V. Written by the Microsoft team behind the Hyper-V product, this book shows you how to perform key virtualization scenarios, such as server consolidation, software test and development, and a dynamic data center and...
Systems Engineering in Wireless Communications
Systems Engineering in Wireless Communications

This book provides the reader with a complete coverage of radio resource management for 3G wireless communications

Systems Engineering in Wireless Communications focuses on the area of radio resource management in third generation wireless communication systems from a systems engineering perspective. The authors...

Rethink: A Business Manifesto for Cutting Costs and Boosting Innovation
Rethink: A Business Manifesto for Cutting Costs and Boosting Innovation

It's the trap that ensnares virtually every business. We focus on process: "how" we're doing the job. And we forget about the bigger issue: "what" we're doing and "why" we're doing it. That's why we're leaving so much value on the table. In Rethink, business architect Ric Merrifield...

Harnessing Solar Heat (Lecture Notes in Energy)
Harnessing Solar Heat (Lecture Notes in Energy)

Systems engineered by man to harness solar heat in a controlled manner now include a diverse range of technologies each serving distinctive needs in particular climate contexts.  This text covers the breadth of solar energy technologies for the conversion of solar energy to provide heat, either as the directly-used output or as an...

unlimited object storage image
Result Page: 288 287 286 285 284 283 282 281 280 279 278 277 276 275 274 273 272 271 270 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy