Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The CTO Job Manual: A Wealth of Reference Material and Thought Leadership on What Every Manager Needs to Know to Lead Their Technology Team
The CTO Job Manual: A Wealth of Reference Material and Thought Leadership on What Every Manager Needs to Know to Lead Their Technology Team
Why spend countless hours searching for relevant thought leadership articles, specific pieces of statistical data, and navigable reference information, when one resource provides it all? In The CTO Handbook, former CTO of IBM Next Generation Group Mark Minevich, guides readers through what need not be a daunting world of IT management - addressing...
Hacking Exposed Linux
Hacking Exposed Linux
GNU-Linux is the ultimate hacker’s playground. It’s a toy for the imagination, not unlike a box of blocks or a bag of clay. Whether someone is an artist or a scientist, the possibilities are endless. Anything that you want to try to do and build and make with a computer is subject only to your creativity. This is why so many people are...
Generative Adversarial Networks Projects: Build next-generation generative models using TensorFlow and Keras
Generative Adversarial Networks Projects: Build next-generation generative models using TensorFlow and Keras

Explore various Generative Adversarial Network architectures using the Python ecosystem

Key Features

  • Use different datasets to build advanced projects in the Generative Adversarial Network domain
  • Implement projects ranging from generating 3D shapes to a face aging...
Microsoft Excel VBA Programming for the Absolute Beginner
Microsoft Excel VBA Programming for the Absolute Beginner
VBA Programming for the Absolute Beginner is designed to help readers with no programming experience learn not only the basics of VBA, but also the fundamental programming concepts they need to grasp in order to learn their next programming language. Offering an easy, non-intimidating approach to VBA, the For the Absolute Beginner series was...
Beowulf Cluster Computing with Linux (Scientific and Engineering Computation)
Beowulf Cluster Computing with Linux (Scientific and Engineering Computation)
Beowulf clusters, which exploit mass-market PC hardware and software in conjunction with cost-effective commercial network technology, are becoming the platform for many scientific, engineering, and commercial applications. With growing popularity has come growing complexity. Addressing that complexity, Beowulf Cluster Computing with Linux and...
Algorithms and Data Structures: The Basic Toolbox
Algorithms and Data Structures: The Basic Toolbox
Algorithms are at the heart of every nontrivial computer application, and algorithmics is a modern and active area of computer science. Every computer scientist and every professional programmer should know about the basic algorithmic toolbox: structures that allow efficient organization and retrieval of data, frequently used algorithms, and basic...
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century

The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention

 

Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments....

Java Programming 24-Hour Trainer (Wrox Programmer to Programmer)
Java Programming 24-Hour Trainer (Wrox Programmer to Programmer)
It doesn’t take a rocket scientist to notice the recent serious decline in the publishing of computer books, to say nothing of computer magazines. I enjoy reading books about software and visit the nearby Barnes and Noble at least twice a month. During the last three years the number of bookcases dedicated to computer books...
Relevance Ranking for Vertical Search Engines
Relevance Ranking for Vertical Search Engines

In plain, uncomplicated language, and using detailed examples to explain the key concepts, models, and algorithms in vertical search ranking, Relevance Ranking for Vertical Search Engines teaches readers how to manipulate ranking algorithms to achieve better results in real-world applications.

This reference book for...

Einstein Relatively Simple: Our Universe Revealed
Einstein Relatively Simple: Our Universe Revealed

Einstein Relatively Simple brings together for the first time an exceptionally clear explanation of both special and general relativity. It is for people who always wanted to understand Einstein's ideas but never thought they could.

Told with humor, enthusiasm, and rare clarity, this entertaining book reveals how a former high...

Python Machine Learning Case Studies: Five Case Studies for the Data Scientist
Python Machine Learning Case Studies: Five Case Studies for the Data Scientist
Embrace machine learning approaches and Python to enable automatic rendering of rich insights and solve business problems. The book uses a hands-on case study-based approach to crack real-world applications to which machine learning concepts can be applied. These smarter machines will enable your business processes to achieve efficiencies on...
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
Real 802.11 Security: Wi-Fi Protected Access and 802.11i

"Real 802.11 Security provides clear descriptions of current and emerging security techniques. The authors handle complex topics nicely, and offer significant clarification of IEEE draft standards."
-Russ Housley, IETF Security Area Director and founder of Vigil Security, LLC

"This...

unlimited object storage image
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy