Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Artificial Intelligence Basics: A Non-Technical Introduction
Artificial Intelligence Basics: A Non-Technical Introduction

Artificial intelligence touches nearly every part of your day. While you may initially assume that technology such as smart speakers and digital assistants are the extent of it, AI has in fact rapidly become a general-purpose technology, reverberating across industries including transportation, healthcare, financial services, and...

Critical Perspectives on Leadership: The Language of Corporate Power (Routledge Studies in Leadership Research)
Critical Perspectives on Leadership: The Language of Corporate Power (Routledge Studies in Leadership Research)

Within contemporary culture, ‘leadership’ is seen in ways that appeal to celebrated societal values and norms. As a result, it is becoming difficult to use the language of leadership without at the same time assuming its essentially positive, intrinsically affirmative nature. Within organizations, routinely referring to...

Applications in Engineering, Life and Social Sciences (De Gruyter Reference)
Applications in Engineering, Life and Social Sciences (De Gruyter Reference)
Fractional Calculus (FC) has originated in 1695, nearly at the same time as conventional calculus. However, FC attracted limited attention and remained a pure mathematical exercise in spite of the original contributions of important mathematicians, physicists and engineers. FC had a rapid development during the last few decades, both in...
Post-Silicon Validation and Debug
Post-Silicon Validation and Debug

This book provides a comprehensive coverage of System-on-Chip (SoC) post-silicon validation and debug challenges and state-of-the-art solutions with contributions from SoC designers, academic researchers as well as SoC verification experts.  The readers will get a clear understanding of the existing debug infrastructure and how...

Handbook of Logic in Computer Science 5
Handbook of Logic in Computer Science 5
"Oxford University Press publishes a wonderful series of books entitled Handbook of Logic in Computer Science. ... Volume 5: Logic and Algebraic Methods, has I think the best discussion of abstract data types that I have read."--he Bulletin of Mathematics Books

Logic is now widely recognized as one of the foundational
...
Software Test Automation (ACM Press)
Software Test Automation (ACM Press)
You can't just buy an automated testing tool and expect to improve your organization's testing process without some real effort, at least that is what the authors of Software Test Automation argue. Written for any test manager or engineer, this practical-minded guide shows the right way to automate testing to bring down costs and improve...
Multi-Sensor Image Fusion and Its Applications (Signal Processing and Communica)
Multi-Sensor Image Fusion and Its Applications (Signal Processing and Communica)
Imaging sensors are an important resource in today’s world. Further, a single sensor cannot provide a complete view of the environment in many applications. Just as humans use all five senses to great advantage, computers use image fusion algorithms to gain similar advantages. The resulting fused image, if suitably obtained from a set of...
Clean Code: A Handbook of Agile Software Craftsmanship (Robert C. Martin Series)
Clean Code: A Handbook of Agile Software Craftsmanship (Robert C. Martin Series)

Even bad code can function. But if code isn’t clean, it can bring a development organization to its knees. Every year, countless hours and significant resources are lost because of poorly written code. But it doesn’t have to be that way.

Noted software expert Robert C. Martin presents a revolutionary paradigm with
...

Web Penetration Testing with Kali Linux
Web Penetration Testing with Kali Linux

A practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux

Overview

  • Learn key reconnaissance concepts needed as a penetration tester
  • Attack and exploit key features, authentication, and sessions on web...
Programming Embedded Systems in C and C ++
Programming Embedded Systems in C and C ++

This book introduces embedded systems to C and C++ programmers. Topics include testing memory devices, writing and erasing Flash memory, verifying nonvolatile memory contents, controlling on-chip peripherals, device driver design and implementation, optimizing embedded code for size and speed, and making the most of C++...

Essentials of UMTS (The Cambridge Wireless Essentials Series)
Essentials of UMTS (The Cambridge Wireless Essentials Series)

The third generation (3G) cellular system UMTS is advanced, optimised and complex. The many existing books on UMTS attempt to explain all the intricacies of the system and as a result are large and equally complex. This book takes a different approach and explains UMTS in a concise, clear and readily understandable style. Written by a...

Firewall Policies and VPN Configurations
Firewall Policies and VPN Configurations
Deploying a network security policy is a significant and serious undertaking. Making good decisions in this matter will save a great deal of money and prevent many future security issues on your network, while making incorrect or hasty decisions will lay the foundation for an insecure network infrastructure. Creating a network security policy will...
Result Page: 123 122 121 120 119 118 117 116 115 114 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy