Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Scientific Computing with Python 3
Scientific Computing with Python 3

Key Features

  • Your ultimate resource for getting up and running with Python numerical computations
  • Explore numerical computing and mathematical libraries using Python 3.x code with SciPy and NumPy modules
  • A hands-on guide to implementing mathematics with Python, with complete...
Theory of Relativity
Theory of Relativity

THIRTY-FIVE years ago this article on the theory of relativity, written by me at the rather young age of 21 years for the Mathematical Encyclopedia, was first published as a separate monograph together with a preface by Sommerfeld, who as the editor of this volume of the Encyclopedia was responsible for my authorship. It was the aim of the...

Visual Modeling with Rational Rose 2002 and UML (3rd Edition)
Visual Modeling with Rational Rose 2002 and UML (3rd Edition)

Within the space of just a few years, the Unified Modeling Language (UML) has emerged as the design medium of choice for developing large-scale distributed object applications. The UML's standard semantics and notation for describing object structure and behavior make it particularly well suited to this function. Augmented by...

Castles and Fortified Cities of Medieval Europe: An Illustrated History
Castles and Fortified Cities of Medieval Europe: An Illustrated History

During the Middle Ages, castles and other fortified buildings were a common feature of the European landscape. As central powers rose and fell, the insecurity of the time inspired a revival of fortification techniques first introduced in the Roman Empire. Despite limitations in construction techniques and manpower, medieval fortifications...

Hands-On Oracle Application Express Security: Building Secure Apex Applications
Hands-On Oracle Application Express Security: Building Secure Apex Applications
AT RECX we’ve been involved in the world of IT Security for more than a decade. We were involved in some of the fi rst penetration tests performed in the UK, where large organizations and government departments allowed ethical hackers into their networks to determine the risk they faced from what are now known as cyber attacks....
Clinton and Japan: The Impact of Revisionism on U.S. Trade Policy
Clinton and Japan: The Impact of Revisionism on U.S. Trade Policy

This book chronicles how a controversial set of policy assumptions about the Japanese economy, known as revisionism, rose to become the basis of the trade policy approach of the Clinton administration. In the context of growing fear over Japan's increasing economic strength, revisionists argued that Japan represented a distinctive form of...

Microsoft .NET for Visual FoxPro Developers
Microsoft .NET for Visual FoxPro Developers
I asked myself this question when early releases of .NET first arrived on the scene. Visual FoxPro allowed me to do pretty much anything I wanted, from building single-tier applications with a VFP back end, all the way to building distributed Internet applications accessing clientserver data.

Then, I started to dive into the .NET
...
Nutrition and Well-being a To Z; 2V.
Nutrition and Well-being a To Z; 2V.
Nutrition is one of the most important factors that impact health in all areas of the lifecycle. Pregnant women need adequate food and health care to deliver a healthy baby who has a good birth weight and a fighting chance for survival. In many regions of the world, the infant mortality rate is very high, meaning that many...
Game Character Development
Game Character Development
The game development industry is in some ways quite similar to the film industry. We create entertainment for the masses, escapism for people as they are taken into different lives, and amazing worlds of imagination and wonder. The outsider’s view of what it must be like to work in these industries is often enjoyed through rose-tinted...
Medicine and Victory: British Military Medicine in the Second World War
Medicine and Victory: British Military Medicine in the Second World War

Medicine and Victory is the first comprehensive account of British military medicine in the Second World War since the publication of the official history in the early 1950s. Drawing on a wide range of official and non-official sources, the book examines medical work in all the main theatres of the war, from the front line to the...

Architecting Software Intensive Systems: A Practitioners Guide
Architecting Software Intensive Systems: A Practitioners Guide
Today our civilization is highly dependent upon software-intensive systems. Software-intensive systems are those systems that are highly dependent upon computing infrastructure and software for the basic functionality they provide and the properties they possess. Architecture design of software-intensive systems as a separate and distinct...
IT Portfolio Management: Unlocking the Business Value of Technology
IT Portfolio Management: Unlocking the Business Value of Technology
This book provides a pragmatic, step-by-step road map, describing IT portfolio
management and its major elements. Chapter 1 provides an overview of IT
portfolio management. Chapter 2 describes the planning aspects of IT portfolio
management. It explains the IT portfolio management maturity model and the
key people, process, and
...
Result Page: 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy