Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Atlas of Clinically Important Fungi
Atlas of Clinically Important Fungi

Although there are many texts that provide quality information for the identification of fungi, researchers and technologists rarely have time to read the text. Most are rushed for time and seek morphological information that helps guide them to the identification of fungi.

The Atlas of Clinically Important Fungi provides...

Effective C++ Third Edition 55 Specific Ways to Improve Your Programs and Designs
Effective C++ Third Edition 55 Specific Ways to Improve Your Programs and Designs

The first two editions of Effective C++ were embraced by hundreds of thousands of programmers worldwide. The reason is clear: Scott Meyers' practical approach to C++ describes the rules of thumb used by the experts—the things they almost always do or almost always avoid doing—to produce clear, correct, efficient code.The book...

Emotion-Oriented Systems
Emotion-Oriented Systems

The Affective Computing domain, term coined by Rosalind Picard in 1997, gathers several scientific areas such as computer science, cognitive science, psychology, design and art. The humane-machine interaction systems are no longer solely fast and efficient. They aim to offer to users affective experiences: user’s affective state is...

Pro Couchbase Development: A NoSQL Platform for the Enterprise
Pro Couchbase Development: A NoSQL Platform for the Enterprise

Pro Couchbase Development: A NoSQL Platform for the Enterprise discusses programming for Couchbase using Java and scripting languages, querying and searching, handling migration, and integrating Couchbase with Hadoop, HDFS, and JSON. It also discusses migration from other NoSQL databases like MongoDB.

This book is for big...

Computer Programming for Beginners and Cybersecurity: The Ultimate Manual to Learn step by step how to Professionally Code and Protect Your Data. This Book includes: Python, Java, C++ & Cybersecurity
Computer Programming for Beginners and Cybersecurity: The Ultimate Manual to Learn step by step how to Professionally Code and Protect Your Data. This Book includes: Python, Java, C++ & Cybersecurity

Are you looking for the right Guide to improve your technical skills in programming and cybersecurity?

Would you like to start your own business or look for a job with better knowledge in computer programming and data protection?

Would you like to be sure to have in your hands a manual...

The $1 Million Reason to Change Your Mind
The $1 Million Reason to Change Your Mind

What is the $1 million reason to change your mind?

Change the way you think and you will change your world. Simple.

In this book Pat Mesiti will teach you how to shrug off the shackles of mediocrity, find your inner millionaire and think differently about life and money -- and get rich and happy along the way!

...
Introduction to Computational Modeling Using C and Open-Source Tools (Chapman & Hall/CRC Computational Science)
Introduction to Computational Modeling Using C and Open-Source Tools (Chapman & Hall/CRC Computational Science)

Introduction to Computational Modeling Using C and Open-Source Tools presents the fundamental principles of computational models from a computer science perspective. It explains how to implement these models using the C programming language. The software tools used in the book include the Gnu Scientific Library (GSL), which...

PowerShell and Python Together: Targeting Digital Investigations
PowerShell and Python Together: Targeting Digital Investigations
Bring together the Python programming language and Microsoft’s PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators.

You will learn how to join PowerShell's robust set of commands and access to the
...
Debug It!: Find, Repair, and Prevent Bugs in Your Code
Debug It!: Find, Repair, and Prevent Bugs in Your Code
I’ve always been mystified why so few books are available on debugging. You can buy any number on every other aspect of software engineering such as design, code construction, requirements capture, methodologies... the list is endless. And yet, for some reason, debugging has been almost (not quite but very nearly) ignored by authors and...
Computer Security Fundamentals (2nd Edition)
Computer Security Fundamentals (2nd Edition)

It has been more than 6 years since the publication of the original edition of this book. A great deal has happened in the world of computer security since that time. This edition is updated to include newer information, updated issues, and revised content.

The real question is who is this book for. This book is...

Knowledge-Based Neurocomputing
Knowledge-Based Neurocomputing
Neurocomputing methods are loosely based on a model of the brain as a network of simple interconnected processing elements corresponding to neurons. These methods derive their power from the collective processing of artificial neurons, the chief advantage being that such systems can learn and adapt to a changing environment. In knowledge-based...
Multiparadigm Constraint Programming Languages (Cognitive Technologies)
Multiparadigm Constraint Programming Languages (Cognitive Technologies)

"Modeling" has become one of the primary concerns in modern Software Engineering. The reason is simple: starting development processes from clear and succinct models has proven to foster not only quality but also productivity. With the advance of modeling there also came a desire for automatic code generation from models....

unlimited object storage image
Result Page: 58 57 56 55 54 53 52 51 50 49 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy