Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Scientific Computing with Python 3
Scientific Computing with Python 3

Key Features

  • Your ultimate resource for getting up and running with Python numerical computations
  • Explore numerical computing and mathematical libraries using Python 3.x code with SciPy and NumPy modules
  • A hands-on guide to implementing mathematics with Python, with complete...
Microsoft .NET for Visual FoxPro Developers
Microsoft .NET for Visual FoxPro Developers
I asked myself this question when early releases of .NET first arrived on the scene. Visual FoxPro allowed me to do pretty much anything I wanted, from building single-tier applications with a VFP back end, all the way to building distributed Internet applications accessing clientserver data.

Then, I started to dive into the .NET
...
Nutrition and Well-being a To Z; 2V.
Nutrition and Well-being a To Z; 2V.
Nutrition is one of the most important factors that impact health in all areas of the lifecycle. Pregnant women need adequate food and health care to deliver a healthy baby who has a good birth weight and a fighting chance for survival. In many regions of the world, the infant mortality rate is very high, meaning that many...
The Golden Ratio: The Story of Phi, the World's Most Astonishing Number
The Golden Ratio: The Story of Phi, the World's Most Astonishing Number
Throughout history, thinkers from mathematicians to theologians have pondered the mysterious relationship between numbers and the nature of reality. In this fascinating book, Mario Livio tells the tale of a number at the heart of that mystery: phi, or 1.6180339887...This curious mathematical relationship, widely known as "The Golden...
Hands-On Oracle Application Express Security: Building Secure Apex Applications
Hands-On Oracle Application Express Security: Building Secure Apex Applications
AT RECX we’ve been involved in the world of IT Security for more than a decade. We were involved in some of the fi rst penetration tests performed in the UK, where large organizations and government departments allowed ethical hackers into their networks to determine the risk they faced from what are now known as cyber attacks....
Clinton and Japan: The Impact of Revisionism on U.S. Trade Policy
Clinton and Japan: The Impact of Revisionism on U.S. Trade Policy

This book chronicles how a controversial set of policy assumptions about the Japanese economy, known as revisionism, rose to become the basis of the trade policy approach of the Clinton administration. In the context of growing fear over Japan's increasing economic strength, revisionists argued that Japan represented a distinctive form of...

Game Character Development
Game Character Development
The game development industry is in some ways quite similar to the film industry. We create entertainment for the masses, escapism for people as they are taken into different lives, and amazing worlds of imagination and wonder. The outsider’s view of what it must be like to work in these industries is often enjoyed through rose-tinted...
Medicine and Victory: British Military Medicine in the Second World War
Medicine and Victory: British Military Medicine in the Second World War

Medicine and Victory is the first comprehensive account of British military medicine in the Second World War since the publication of the official history in the early 1950s. Drawing on a wide range of official and non-official sources, the book examines medical work in all the main theatres of the war, from the front line to the...

Architecting Software Intensive Systems: A Practitioners Guide
Architecting Software Intensive Systems: A Practitioners Guide
Today our civilization is highly dependent upon software-intensive systems. Software-intensive systems are those systems that are highly dependent upon computing infrastructure and software for the basic functionality they provide and the properties they possess. Architecture design of software-intensive systems as a separate and distinct...
IT Portfolio Management: Unlocking the Business Value of Technology
IT Portfolio Management: Unlocking the Business Value of Technology
This book provides a pragmatic, step-by-step road map, describing IT portfolio
management and its major elements. Chapter 1 provides an overview of IT
portfolio management. Chapter 2 describes the planning aspects of IT portfolio
management. It explains the IT portfolio management maturity model and the
key people, process, and
...
Sams Teach Yourself Adobe Photoshop CS2 in 24 Hours, First Edition
Sams Teach Yourself Adobe Photoshop CS2 in 24 Hours, First Edition
Create works of art using your computer, Adobe Photoshop CS 2 and Sams Teach Yourself Photoshop CS 2 in 24 Hours. Learn the basics of Photoshop with a minimum of jargon from market-leading author, Carla Rose. Her conversational, friendly approach will make Photoshop seem less intimidating and more manageable to learn. With Carla's help, you...
Sams Teach Yourself Adobe Photoshop CS3 in 24 Hours
Sams Teach Yourself Adobe Photoshop CS3 in 24 Hours
You can master Photoshop® CS3 faster than you ever thought possible–even if you have no Photoshop or image editing experience at all! In just 24 hands-on, step-by-step lessons, this book will teach you all the core Photoshop skills you need to get great results–in digital photography, graphic design, painting, or anything else! ...
Result Page: 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy