Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Software Development on a Leash (Expert's Voice)
Software Development on a Leash (Expert's Voice)

Software Development on a Leash is designed as a roadmap for experienced developers and architects who are interested in implementing a turbocharged software development process that encourages reuse and innovation. Author David Birmingham's products have been successfully deployed in a variety of venues, including...

Python 3 Text Processing with NLTK 3 Cookbook
Python 3 Text Processing with NLTK 3 Cookbook

Over 80 practical recipes on natural language processing techniques using Python's NLTK 3.0

About This Book

  • Break text down into its component parts for spelling correction, feature extraction, and phrase transformation
  • Learn how to do custom sentiment analysis and named entity...
The String Instrument Owner's Handbook
The String Instrument Owner's Handbook

In The String Instrument Owner’s Guide, Michael Pagliaro surveys the complete “ownership life cycle” of bowed string instruments. A touchstone work for uninitiated and advanced players, The String Instrument Owner’s...

Concurrency Theory: Calculi an Automata for Modelling Untimed and Timed Concurrent Systems
Concurrency Theory: Calculi an Automata for Modelling Untimed and Timed Concurrent Systems
In the world we live in concurrency is the norm. For example, the human body
is a massively concurrent system, comprising a huge number of cells, all simultaneously
evolving and independently engaging in their individual biological
processing. In addition, in the biological world, truly sequential systems rarely
arise. However,
...
Java 2 Enterprise Edition 1.4 (J2EE 1.4) Bible
Java 2 Enterprise Edition 1.4 (J2EE 1.4) Bible
"One stop shopping for J2EE."
– Scott Ambler, Senior Consultant, Ronin International, Inc. and Author of Agile Modeling

If Java 2 Enterprise Edition 1.4 can do it, you can do it too...

You already know that Java 2 Enterprise Edition 1.4 makes your enterprise services more cost-effective, more adaptable,...

Microwave Circuit Modeling Using Electromagnetic Field Simulation
Microwave Circuit Modeling Using Electromagnetic Field Simulation
This unique 'how to' book is an ideal introduction to electromagnetic field-solvers. It provides you with helpful advice on selecting the right tools for your RF and high-speed digital circuit design work. The focus is on the strengths and weaknesses of the major commercial software packages. Featuring full-color illustrations, this practical...
High-Speed Networking: A Systematic Approach to High-Bandwidth Low-Latency Communication
High-Speed Networking: A Systematic Approach to High-Bandwidth Low-Latency Communication
"Building networks with high performance demanded by today's applications requires a complete understanding of the basic principles and latest techniques. This book is the definitive guide to both."-Lyman Chapin

High-speed networking is the essential enabler of modern sophisticated distributed computing applications. This
...
Data Model Patterns: A Metadata Map (The Morgan Kaufmann Series in Data Management Systems)
Data Model Patterns: A Metadata Map (The Morgan Kaufmann Series in Data Management Systems)
A very ambitious undertaking, masterfully described. To the best of my knowledge, this is the first published version of the detailed models implied by the Zachman Framework. David Hay builds the models one step at a time, describing in each increment why the new entities were added, and how they related to the rest of the model. At least as...
Getting Your PhD: A Practical Insider's Guide (Survival Skills for Scholars)
Getting Your PhD: A Practical Insider's Guide (Survival Skills for Scholars)
Packed with practical advice on all aspects of the PhD process, new and continuing research students should find this book of great help.

Professor Malcolm Tight, Lancaster University, UK

How to get your Ph.D is an original study guide aimed at prospective and current postgraduate students, covering the process of
...

Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

Business Process Management Workshops: BPM 2009 International Workshops
Business Process Management Workshops: BPM 2009 International Workshops

This book constitutes the thoroughly refereed post-workshop proceedings of eight international workshops held in Ulm, Germany, in conjunction with the 7th International Conference on Business Process Management, BPM 2009, in September 2009. The eight workshops were on Empirical Research in Business Process Management (ER-BPM 2009), Reference...

Prediction of Protein Structures, Functions, and Interactions
Prediction of Protein Structures, Functions, and Interactions

The growing flood of new experimental data generated by genome sequencing has provided an impetus for the development of automated methods for predicting the functions of proteins that have been deduced by sequence analysis and lack experimental characterization.

Prediction of Protein Structures, Functions and Interactions presents...

Result Page: 443 442 441 440 439 438 437 436 435 434 433 432 431 430 429 428 427 426 425 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy