Home | Amazing | Today | Tags | Publishers | Years | Search 
NumPy Cookbook
NumPy Cookbook
We, NumPy users, live in exciting times. New NumPy-related developments seem to come to our attention every week or maybe even daily. When this book was being written, NumPy Foundation of Open Code for Usable Science was created. The Numba project—NumPy-aware, dynamic Python compiler using LLVM—was announced. Also,...
WordPress Bible
WordPress Bible

Get the latest word on the biggest self-hosted blogging tool on the market

Within a week of the announcement of WordPress 3.0, it had been downloaded over a million times. Now you can get on the bandwagon of this popular open-source blogging tool with WordPress Bible, 2nd Edition. Whether you're a casual blogger or...

Yammer Starter
Yammer Starter
Welcome to the Yammer Starter. This book has been especially created to provide you with all the information that you need to get set up with Yammer. You will learn the basics of Yammer, get started with building your profile, and discover some tips and tricks for using Yammer.

A concise, enjoyable look at using Yammer, the...

HTML5 Video How-To
HTML5 Video How-To
Are you looking to host the next mini blockbuster video from your website? Do you want it to be accessible in most modern browsers, without the need for lots of extra plugins, or extra code?

If the answer to the above two questions is yes, then enter HTML5 Video—created as the new way to show video online in
...
Ethical Hacking and Countermeasures: Secure Network Infrastructures (Ethical Hacking and Countermeasures: C/ E H: Certified Ethical Hacker)
Ethical Hacking and Countermeasures: Secure Network Infrastructures (Ethical Hacking and Countermeasures: C/ E H: Certified Ethical Hacker)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
iOS 6 Programming Cookbook
iOS 6 Programming Cookbook
The long-awaited iOS 6 SDK (Software Development Kit) is finally out, and we need to learn about all the great features that this release offers us. Apple did a great job adding new features to the SDK and, of course, to iOS itself. iOS 6 is much more stable than the previous versions of iOS, as you would expect....
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes

Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT® Guide to Insider...

Pervasive Computing and Networking
Pervasive Computing and Networking

This book presents state-of-the-art research on architectures, algorithms, protocols and applications in pervasive computing and networks

With the widespread availability of wireless and mobile networking technologies and the expected convergence of ubiquitous computing with these emerging technologies in the near future,...

Insulin Resistance: Insulin Action and its Disturbances in Disease
Insulin Resistance: Insulin Action and its Disturbances in Disease
Hormone resistance syndromes are typically thought of as rare, usually genetic, disorders with a severe but relatively stereotyped clinical and biochemical profile. While there are syndromes of severe insulin resistance that conform to this description, defective insulin action is of much more pervasive biomedical importance....
Deciding Who Leads: How Executive Recruiters Drive, Direct, and Disrupt the Global Search for Leadership Talent
Deciding Who Leads: How Executive Recruiters Drive, Direct, and Disrupt the Global Search for Leadership Talent
Leadership recruiting and succession rank as the most pivotal agendas for today’s growth-minded, change-oriented organizations. Given the risks and rewards inherent in senior-management recruiting, deciding who leads is the quintessential challenge faced by boards of directors, senior corporate officers, and division or...
Pocket Guide to Critical Care Pharmacotherapy
Pocket Guide to Critical Care Pharmacotherapy
Critical care medicine is a cutting-edge medical field that is highly evidence-based. Studies are continuously published that alter the approach to patient care. As a critical care clinician, I am aware of the tremendous commitment required to provide optimal evidence-based care. Pocket Guide to Critical Care...
Microarrays in Clinical Diagnostics (Methods in Molecular Medicine)
Microarrays in Clinical Diagnostics (Methods in Molecular Medicine)
Within the last decade, microarray technology has evolved from an emerging technology developed and used by a few laboratories into a well-established technology used in laboratories all over the world. In fact, the need to characterize genetic alterations is one of the highest priorities for the future of medicine and the...
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy