Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Language and the Internet
Language and the Internet
According to popular mythology, the Internet will be bad for the future of language--technospeak will rule, standards will be lost, and creativity diminished as globalization imposes sameness. David Crystal, one of the foremost authorities on language, argues the reverse in his new book: that the Internet is enabling a dramatic expansion of the...
As If an Enemy's Country: The British Occupation of Boston and the Origins of Revolution (Pivotal Moments in American History)
As If an Enemy's Country: The British Occupation of Boston and the Origins of Revolution (Pivotal Moments in American History)

In the dramatic few years when colonial Americans were galvanized to resist British rule, perhaps nothing did more to foment anti-British sentiment than the armed occupation of Boston. As If an Enemy's Country is Richard Archer's gripping narrative of those critical months between October 1, 1768 and the winter of 1770 when Boston was...

Cloud Computing and Virtualization
Cloud Computing and Virtualization

The purpose of this book is first to study cloud computing concepts, security concern in clouds and data centers, live migration and its importance for cloud computing, the role of firewalls in domains with particular focus on virtual machine (VM) migration and its security concerns. The book then tackles design, implementation of...

Program Construction: Calculating Implementations from Specifications
Program Construction: Calculating Implementations from Specifications
Programming is a highly skilled activity, and good programmers are few and far between. In few other professions is the 90-10 rule (90% of the effort goes into the last 10% of the work) so vitally important. Many programmers are able to write programs that 'work' in most circumstances; few programmers know the basic principles of program...
The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall
The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall

OpenBSD's stateful packet filter, PF, is the heart of the OpenBSD firewall and a necessity for any admin working in a BSD environment. With a little effort and this book, you'll gain the insight needed to unlock PF's full potential.

This second edition of The Book of PF has been completely updated and...

Outsmarting Google: SEO Secrets to Winning New Business (Que Biz-Tech)
Outsmarting Google: SEO Secrets to Winning New Business (Que Biz-Tech)

If you own any other books on search engine optimization, throw them out. They belong to the mass of misinformation that has been swimming around for years, keeping people from making their websites truly appealing to search engines. And no surprise, Google loves it.

What I am about to share with you are the real, gritty,...

Neural Network Design and the Complexity of Learning
Neural Network Design and the Complexity of Learning

Using the tools of complexity theory, Stephen Judd develops a formal description of associative learning in connectionist networks. He rigorously exposes the computational difficulties in training neural networks and explores how certain design principles will or will not make the problems easier.

Judd looks beyond the scope
...

Learning Veeam® Backup and Replication for VMware vSphere
Learning Veeam® Backup and Replication for VMware vSphere

Learn how to protect your data in your VMware vSphere infrastructure with Veeam®Backup & Replication

Overview

  • Explore Veeam Backup and Replication v7 infrastructure and its components
  • Create backup, replication, and restore strategies that protect data, your company's most...
Principles of the Business Rule Approach
Principles of the Business Rule Approach

The Business Rule Approach represents a major paradigm shift in business-system design and development. Employing a business-driven approach, the use of business rules has been proven to enhance the effectiveness, flexibility, and efficiency of business systems. The technology is appropriate...

From Logic to Logic Programming (Foundations of Computing)
From Logic to Logic Programming (Foundations of Computing)

This mathematically oriented introduction to the theory of logic programming presents a systematic exposition of the resolution method for propositional, first-order, and Horn- clause logics, together with an analysis of the semantic aspects of the method. It is through the inference rule of resolution that both proofs and computations can be...

Process Improvement in Practice: A Handbook for IT Companies
Process Improvement in Practice: A Handbook for IT Companies
Faster – better – cheaper. This is the challenge that software companies face every day. How to meet customer expectations in a world where continuously changing environments, organizations and technology is the rule rather than the exception.

One way to meet these challenges is to share knowledge and experience – use
...
Computational Intelligence and Feature Selection: Rough and Fuzzy Approaches (IEEE Press Series on Computational Intelligence)
Computational Intelligence and Feature Selection: Rough and Fuzzy Approaches (IEEE Press Series on Computational Intelligence)
This book provides readers with the background and fundamental ideas behind Feature Selection (FS), with an emphasis on techniques based on rough and fuzzy sets. For readers who are less familiar with the subject, the book begins with an introduction to fuzzy set theory and fuzzy-rough set theory. Next it provides a critical review of FS methods...
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy