Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Introduction to Blockchain and Ethereum: Use distributed ledgers to validate digital transactions in a decentralized and trustless manner
Introduction to Blockchain and Ethereum: Use distributed ledgers to validate digital transactions in a decentralized and trustless manner

Build distributed applications that resolve data ownership issues when working with transactions between multiple parties

Key Features

  • Explore a perfect balance between theories and hands-on activities
  • Discover popular Blockchain use cases such as Bitcoin
  • ...
Machine Learning for Vision-Based Motion Analysis: Theory and Techniques
Machine Learning for Vision-Based Motion Analysis: Theory and Techniques

Techniques of vision-based motion analysis aim to detect, track, identify, and generally understand the behavior of objects in image sequences. With the growth of video data in a wide range of applications from visual surveillance to human-machine interfaces, the ability to automatically analyze and understand object motions from video...

Performance Management: Integrating Strategy Execution, Methodologies, Risk, and Analytics
Performance Management: Integrating Strategy Execution, Methodologies, Risk, and Analytics

Praise for Praise for Performance Management: Integrating Strategy Execution, Methodologies, Risk, and Analytics

"A highly accessible collection of essays on contemporary thinking in performance management. Readers will get excellent overviews on the Balanced Scorecard, strategy maps, incentives, management...

Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide
Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide

This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do...

Fusion of Neural Networks, Fuzzy Systems and Genetic Algorithms: Industrial Applications
Fusion of Neural Networks, Fuzzy Systems and Genetic Algorithms: Industrial Applications
Artificial neural networks can mimic the biological information-processing mechanism in - a very limited sense. Fuzzy logic provides a basis for representing uncertain and imprecise knowledge and forms a basis for human reasoning. Neural networks display genuine promise in solving problems, but a definitive theoretical basis does not yet exist for...
SQL Server Integration Services Design Patterns
SQL Server Integration Services Design Patterns

SQL Server Integration Services Design Patterns is newly-revised for SQL Server 2014, and is a book of recipes for SQL Server Integration Services (SSIS). Design patterns in the book help to solve common problems encountered when developing data integration solutions. The patterns and solution examples in the book increase your...

Delphi Cookbook: Recipes to master Delphi for IoT integrations, cross-platform, mobile and server-side development, 3rd Edition
Delphi Cookbook: Recipes to master Delphi for IoT integrations, cross-platform, mobile and server-side development, 3rd Edition

Quickly learn and employ practical recipes for developing real-world, cross-platform applications using Delphi.

Key Features

  • Get to grips with Delphi to build and deploy various cross-platform applications
  • Design and deploy real-world apps by implementing a single source...
Functional Python Programming: Discover the power of functional programming, generator functions, lazy evaluation, the built-in itertools library, and monads, 2nd Edition
Functional Python Programming: Discover the power of functional programming, generator functions, lazy evaluation, the built-in itertools library, and monads, 2nd Edition

Create succinct and expressive implementations with functional programming in Python

Key Features

  • Learn how to choose between imperative and functional approaches based on expressiveness, clarity, and performance
  • Get familiar with complex concepts such as monads,...
Hands-On Functional Programming in Rust: Build modular and reactive applications with functional programming techniques in Rust 2018
Hands-On Functional Programming in Rust: Build modular and reactive applications with functional programming techniques in Rust 2018

Explore the support Rust offers for creating functional applications in Rust. Learn about various design patterns, implementing concurrency, metaprogramming, and so on in the process

Key Features

  • Learn generics, organization, and design patterns in functional programming
  • ...
Java EE 8 Design Patterns and Best Practices: Build enterprise-ready scalable applications with architectural design patterns
Java EE 8 Design Patterns and Best Practices: Build enterprise-ready scalable applications with architectural design patterns

Get the deep insights you need to master efficient architectural design considerations and solve common design problems in your enterprise applications.

Key Features

  • The benefits and applicability of using different design patterns in JAVA EE
  • Learn best practices to solve...
Design Patterns and Best Practices in Java: A comprehensive guide to building smart and reusable code in Java
Design Patterns and Best Practices in Java: A comprehensive guide to building smart and reusable code in Java

Create various design patterns to master the art of solving problems using Java

Key Features

  • This book demonstrates the shift from OOP to functional programming and covers reactive and functional patterns in a clear and step-by-step manner
  • All the design patterns come...
Bash Quick Start Guide: Get up and running with shell scripting with Bash
Bash Quick Start Guide: Get up and running with shell scripting with Bash

Learn how to write shell script effectively with Bash, to quickly and easily write powerful scripts to manage processes, automate tasks, and to redirect and filter program input and output in useful and novel ways.

Key Features

  • Demystify the Bash command line
  • Write shell...
Result Page: 264 263 262 261 260 259 258 257 256 255 254 253 252 251 250 249 248 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy