Home | Amazing | Today | Tags | Publishers | Years | Search 
C# 7 Quick Syntax Reference: A Pocket Guide to the Language, APIs, and Library
C# 7 Quick Syntax Reference: A Pocket Guide to the Language, APIs, and Library
This quick C# 7 guide is a condensed code and syntax reference to the C# programming language, updated with the latest features of C# 7.3 for .NET and Windows 10. It presents the essential C# 7 syntax in a well-organized format that can be used as a handy reference.


In the C# 7 Quick Syntax...
Deep Learning with TensorFlow: Explore neural networks and build intelligent systems with Python, 2nd Edition
Deep Learning with TensorFlow: Explore neural networks and build intelligent systems with Python, 2nd Edition

Delve into neural networks, implement deep learning algorithms, and explore layers of data abstraction with the help of TensorFlow.

Key Features

  • Learn how to implement advanced techniques in deep learning with Google's brainchild, TensorFlow
  • Explore deep neural...
An Introduction to Quantum Computing Algorithms
An Introduction to Quantum Computing Algorithms
In 1994 Peter Shor [65] published a factoring algorithm for a quantum computer that finds the prime factors of a composite integer N more efficiently than is possible with the known algorithms for a classical com­ puter. Since the difficulty of the factoring problem is crucial for the se­ curity of a public key encryption system,...
Dark Web: Exploring and Data Mining the Dark Side of the Web (Integrated Series in Information Systems)
Dark Web: Exploring and Data Mining the Dark Side of the Web (Integrated Series in Information Systems)

The University of Arizona Artificial Intelligence Lab (AI Lab) Dark Web project is a long-term scientific research program that aims to study and understand the international terrorism (Jihadist) phenomena via a computational, data-centric approach. We aim to collect "ALL" web content generated by international terrorist groups,...

Applied Statistical Genetics with R: For Population-based Association Studies (Use R!)
Applied Statistical Genetics with R: For Population-based Association Studies (Use R!)

Statistical genetics has become a core course in many graduate programs in public health and medicine. This book presents fundamental concepts and principles in this emerging field at a level that is accessible to students and researchers with a first course in biostatistics. Extensive examples are provided using publicly available data and...

Practical Forensic Imaging: Securing Digital Evidence with Linux Tools
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools

Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.

Practical
...

Communicating Science: A Practical Guide for Engineers and Physical Scientists
Communicating Science: A Practical Guide for Engineers and Physical Scientists

Read this book before you write your thesis or journal paper! Communicating Science is a textbook and reference on scientific writing oriented primarily at researchers in the physical sciences and engineering. It is written from the perspective of an experienced researcher. It draws on the authors' experience of teaching and working with...

A Theory of the Drone
A Theory of the Drone
Drone warfare has raised profound ethical and constitutional questions both in the halls of Congress and among the U.S. public. Not since debates over nuclear warfare has American military strategy been the subject of discussion in living rooms, classrooms, and houses of worship. Yet as this groundbreaking new work shows, the full...
Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Meet the world's top ethical hackers and explore the tools of the trade

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat...

Mathematics and Computer Science II: Algorithms, Trees, Combinatorics and Probabilities (Trends in Mathematics)
Mathematics and Computer Science II: Algorithms, Trees, Combinatorics and Probabilities (Trends in Mathematics)

This is the second volume in a series of innovative proceedings entirely devoted to the connections between mathematics and computer science. Here mathematics and computer science are directly confronted and joined to tackle intricate problems in computer science with deep and innovative mathematical approaches.

The book...

Survival Analysis Using S: Analysis of Time-to-Event Data (Chapman & Hall/CRC Texts in Statistical Science)
Survival Analysis Using S: Analysis of Time-to-Event Data (Chapman & Hall/CRC Texts in Statistical Science)
Survival Analysis Using S: Analysis of Time-to-Event Data is designed as a text for a one-semester or one-quarter course in survival analysis for upper-level or graduate students in statistics, biostatistics, and epidemiology. Prerequisites are a standard pre-calculus first course in probability and statistics, and a course in applied...
Linear Mixed-Effects Models Using R: A Step-by-Step Approach
Linear Mixed-Effects Models Using R: A Step-by-Step Approach
Linear mixed-effects models (LMMs) are an important class of statistical models that can be used to analyze correlated data. Such data include clustered observations, repeated measurements, longitudinal measurements, multivariate observations, etc.

The aim of our book is to help readers in fitting LMMs using R
...
Result Page: 116 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy