Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Machine Learning and Security: Protecting Systems with Data and Algorithms
Machine Learning and Security: Protecting Systems with Data and Algorithms

Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you’ll explore ways to apply machine learning to security...

A Theory of the Drone
A Theory of the Drone
Drone warfare has raised profound ethical and constitutional questions both in the halls of Congress and among the U.S. public. Not since debates over nuclear warfare has American military strategy been the subject of discussion in living rooms, classrooms, and houses of worship. Yet as this groundbreaking new work shows, the full...
Configuring Financial Accounting in SAP
Configuring Financial Accounting in SAP
What you have in your hands is a unique book. You may have seen several books on SAP Financial Accounting (FI) that are available in the market, but none of them are as comprehensive as this, covering the gamut of Financial Accounting in SAP Financials including—besides the regular topics —FI-CA (Contract Accounts...
Macs For Dummies
Macs For Dummies

Take a bite out of all your Mac has to offer with this bestselling guide

So, you joined the cool kids club and bought a Mac. Kudos! Now, do you dare admit to your sophisticated Mac mates that you still need some help figuring out how it works? No worries, Macs For Dummies is here to help! In full color for the first...

Discrete Mathematics for Computer Scientists
Discrete Mathematics for Computer Scientists

Many colleges and universities offer a course in discrete mathematics. Students taking these courses are from many disciplines, one of the largest being computer science. As a part of the Mathematics Across the Curriculum project at Dartmouth, supported by the National Science Foundation,1 we proposed to create a discrete mathematics...

Calculus Demystified : A Self Teaching Guide
Calculus Demystified : A Self Teaching Guide
LEARNING CALCULUS JUST GOT A LOT EASIER!

Here’s an innovative shortcut to gaining a more intuitive understanding of both differential and integral calculus. In Calculus Demystified an experienced teacher and author of more than 30 books puts all the math background you need inside and uses practical examples,...

Electronics Demystified
Electronics Demystified
SHOCK YOURSELF BY LEARNING ELECTRONICS

Now anyone with an interest in electronics can master it„oby reading this book. In Electronics Demystified, best-selling science and math writer Stan Gibilisco provides an effective and painless way to understand the electronics that power so much of modern life.

With Electronics...

Electronic Circuits - Fundamentals & Applications, Third Edition
Electronic Circuits - Fundamentals & Applications, Third Edition

Electronic Circuits is a unique combination of a comprehensive reference text and a practical electronics handbook in one volume.

Mike Tooley provides all the essential information required to get to grips with the fundamentals of electronics, detailing the underpinning knowledge
...

java interview questions: Top 20 java interview programs and answers
java interview questions: Top 20 java interview programs and answers

Java Interview Question is here to help you through the INTERVIEW process, teaching you what you need to know and enabling you to perform at your very best. I've coached and interviewed hundreds of software engineers. The result is this book. These interview questions are real; they are not pulled out of computer science textbooks. They...

Computer Viruses: from theory to applications (Collection IRIS)
Computer Viruses: from theory to applications (Collection IRIS)
This book deals with computer viruses envisaged from three different points of view, namely the theoretical fundamentals of computer virology, algorithmic and practical aspects of viruses and their potential applications to various areas. The theoretical formalization by means of Turing machines, self-reproducing automata and recursive functions...
Cloud Storage Forensics
Cloud Storage Forensics

To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. Digital forensic investigation in the cloud computing environment, however, is in infancy due to the...

The Blockchain Alternative: Rethinking Macroeconomic Policy and Economic Theory
The Blockchain Alternative: Rethinking Macroeconomic Policy and Economic Theory

Examine what would happen if we were to deploy blockchain technology at the sovereign level and use it to create a decentralized cashless economy. This book explains how finance and economics work today, and how the convergence of various technologies related to the financial sector can help us find solutions to problems,...

Result Page: 73 72 71 70 69 68 67 66 65 64 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy