Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advances in Data Analysis: Proceedings of the 30th Annual Conference
Advances in Data Analysis: Proceedings of the 30th Annual Conference
The book focuses on exploratory data analysis, learning of latent structures in datasets, and unscrambling of knowledge. It covers a broad range of methods from multivariate statistics, clustering and classification, visualization and scaling as well as from data and time series analysis. It provides new approaches for information retrieval and...
Frogs into Princes: Neuro Linguistic Programming
Frogs into Princes: Neuro Linguistic Programming

NLP is an explicit and powerful model of human experience and communication. Using the principles of NLP it is possible to describe any human activity in a detailed way that allows you to make many deep and lasting changes quickly and easily. A few specific examples of things you can learn to accomplish are: (1) cure phobias and other...

Sams Teach Yourself Django in 24 Hours
Sams Teach Yourself Django in 24 Hours
In just 24 lessons of one hour or less, you will be able to build full-featured production websites using Django, the powerful web development framework based on Python.

 

Designed for experienced website developers who have at least some familiarity with the Python programming language,...

Penetration Testing with BackBox
Penetration Testing with BackBox

This tutorial will immerse you in the fascinating environment of penetration testing. Thoroughly practical and written for ease of understanding, it will give you the insights and knowledge you need to start using BackBox.

Overview

  • Experience the real world of penetration testing with Backbox Linux using...
Gaming, Simulations and Society: Research Scope and Perspective
Gaming, Simulations and Society: Research Scope and Perspective
This book presents a current research scope and perspective of Simulation and Gaming. Theoretical problems of Simulation and Gaming will be examined with a view to improving the social sciences through the introduction of the techniques and concepts of Simulation and Gaming. The fields of economics, political science, psychology and business...
Elements of X-Ray Diffraction (3rd Edition)
Elements of X-Ray Diffraction (3rd Edition)
This edition appears over twenty years after the Second Edition was released. That the Second Edition, without revision, continued as a popular materials text and as a reference book is a tribute to Professor Cullity's clarity and thoroughness.

Instrumentation and techniques have changed considerably, however, in the intervening twenty years,...

Mac OS X Server 10.4 Tiger: Visual QuickPro Guide
Mac OS X Server 10.4 Tiger: Visual QuickPro Guide
Offering Apple's legendary ease of use plus everything you would expect from a Unix-based operating system--preemptive multitasking, symmetric multiprocessing, and support for networking and security standards--Mac OS X Server has revolutionized the world of network administration. Mac OS X Tiger server continues that tradition by offering more...
Flash Animation for Teens
Flash Animation for Teens
Welcome to your no-experience-required, introductory guide to creating animations with Macromedia Flash! Flash Animation for Teens will help you develop the fundamental Flash skills that you need to confidently create your own animations. Covering the basics of Flash animation, this book uses Flash 8 to teach you the techniques you need to create a...
Human-Centric Interfaces for Ambient Intelligence
Human-Centric Interfaces for Ambient Intelligence

To create truly effective human-centric ambient intelligence systems both engineering and computing methods are needed. This is the first book to bridge data processing and intelligent reasoning methods for the creation of human-centered ambient intelligence systems. Interdisciplinary in nature, the book covers topics such as multi-modal...

Emergency Planning for Industrial Hazards
Emergency Planning for Industrial Hazards
Recent events worldwide have again highlighted the need for effective emergency measures for hazards connected with the process industries and the large scale storage of dangerous substances. The Commission of the European Communities, DG XI, in collaboration with the JRC Ispra Establishment, has therefore organised the...
Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013, Proceedings (Lecture Notes in Computer Science)
Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013, Proceedings (Lecture Notes in Computer Science)

This book constitutes the refereed conference proceedings of the 18th Australasian Conference on Information Security and Privacy, ACISP 2013, held in Brisbane, Australia, in July 2013. The 28 revised full papers presented were carefully selected from 78 submissions. Conference papers are organized in technical sessions, covering topics of...

Securing and Controlling Cisco Routers
Securing and Controlling Cisco Routers

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite, and the subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting...

unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy