Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
wxPython Recipes: A Problem - Solution Approach
wxPython Recipes: A Problem - Solution Approach

Quickly discover solutions to common problems, learn best practices, and understand everything wxPython has to offer. This book is for anyone wanting to learn more about how to use the wxPython desktop GUI toolkit. It assumes some prior knowledge of Python and a general understanding of wxPython or GUI development, and contains more than 50...

Applications of Data Mining in E-Business and Finance (Frontiers in Artificial Intelligence and Applications)
Applications of Data Mining in E-Business and Finance (Frontiers in Artificial Intelligence and Applications)
The application of Data Mining (DM) technologies has shown an explosive growth in an increasing number of different areas of business, government and science. Two of the most important business areas are finance, in particular in banks and insurance companies, and e-business, such as web portals, e-commerce and ad management services.In...
Stealing the Network: How to Own the Box
Stealing the Network: How to Own the Box
Stealing the Network: How to Own the Box is a unique book in the fiction department.
It combines stories that are fictional with technology that is real.While
none of these specific events have happened, there is no reason why they could
not.You could argue it provides a roadmap for criminal hackers, but I say it does
something
...
Agent-Based Hybrid Intelligent Systems
Agent-Based Hybrid Intelligent Systems
Many complex problems, such as financial investment planning, involve many different components or sub-tasks, each of which requires different types of processing. To solve such complex problems, a great diversity of intelligent techniques, including traditional hard computing techniques (e.g., expert systems) and soft computing techniques (e.g.,...
Design Recipes for FPGAs
Design Recipes for FPGAs
This book provides a rich toolbox of design techniques and templates to solve practical, every-day problems using FPGAs. Using a modular structure, the book gives easy-to-find design techniques and templates at all levels, together with functional code, which engineers can easily match and apply to their application.

The easy-to-find
...
The Best Damn IT Security Management Book Period
The Best Damn IT Security Management Book Period
This chapter will address vulnerabilities and why they are important. It also discusses a concept known as Windows of Vulnerability, and shows how to determine the risk a given vulnerability poses to your environment.

What Are Vulnerabilities?

So, what are
...
Solaris Application Programming (Solaris Series)
Solaris Application Programming (Solaris Series)
This book is a guide to getting the best performance out of computers running the Solaris operating system. The target audience is developers and software architects who are interested in using the tools that are available, as well as those who are interested in squeezing the last drop of performance out of the system.

The book caters to
...
Complete Maya Programming, Vol. II: An In-Depth Guide to 3D Fundamentals, Geometry, and Modeling
Complete Maya Programming, Vol. II: An In-Depth Guide to 3D Fundamentals, Geometry, and Modeling
David Gould's acclaimed first book, Complete Maya Programming: An Extensive Guide to MEL and the C++ API, provides artists and programmers with a deep understanding of the way Maya works and how it can be enhanced and customized through programming. In his new book David offers a gentle, intuitive introduction to the core ideas of...
The Information System Consultant's Handbook: Systems Analysis and Design
The Information System Consultant's Handbook: Systems Analysis and Design
The Information System Consultant's Handbook familiarizes systems analysts, systems designers, and information systems consultants with underlying principles, specific documentation, and methodologies.Corresponding to the primary stages in the systems development life cycle, the book divides into eight sections:oPrinciplesoInformation Gathering and...
Drools JBoss Rules 5.0 Developer's Guide
Drools JBoss Rules 5.0 Developer's Guide
Business rules can help your business by providing a level of agility and flexibility. As a developer, you will be largely responsible for implementing these business rules effectively, but implementing them systematically can often be difficult due to their complexity. Drools, or JBoss Rules, makes the process of implementing these rules quicker...
Starting Out with C++ Brief: From Control Structures through Objects (6th Edition)
Starting Out with C++ Brief: From Control Structures through Objects (6th Edition)

Welcome to the Brief Version of Starting Out with C++: From Control Structures through Objects, 6th edition. This book is intended for use in a one or two-semester C++ programming course. Students new to programming, as well as those with prior course work in other languages, will find this text beneficial. The fundamentals of...

Knowledge in Formation: A Computational Theory of Interpretation (Cognitive Technologies)
Knowledge in Formation: A Computational Theory of Interpretation (Cognitive Technologies)

With knowledge representation we face more or less the same problem as Augustine (354–430) when thinking about time: if nobody asks what it is, it seems clear enough, but being asked it proves to be very difficult to provide an answer.

At the beginning of our research we thought that a solution for the problem of...

unlimited object storage image
Result Page: 243 242 241 240 239 238 237 236 235 234 233 232 231 230 229 228 227 226 225 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy