Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Genetic Algorithms in Electromagnetics
Genetic Algorithms in Electromagnetics
A thorough and insightful introduction to using genetic algorithms to optimize electromagnetic systems

Genetic Algorithms in Electromagnetics focuses on optimizing the objective function when a computer algorithm, analytical model, or experimental result describes the performance of an electromagnetic system. It...

Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions
Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions
Develop, validate, and deploy powerful decentralized applications using blockchain 


Get the most out of cutting-edge blockchain technology using the hands-on information contained in this comprehensive resource. Written by a team of technology and legal experts, Blockchain:...
Information Security Management Handbook, Volume 7
Information Security Management Handbook, Volume 7

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding...

Cyber-Physical Security and Privacy in the Electric Smart Grid (Synthesis Lectures on Information Security, Privacy, and Tru)
Cyber-Physical Security and Privacy in the Electric Smart Grid (Synthesis Lectures on Information Security, Privacy, and Tru)

This book focuses on the combined cyber and physical security issues in advanced electric smart grids. Existing standards are compared with classical results and the security and privacy principles of current practice are illustrated. The book paints a way for future development of advanced smart grids that operated in a peer-to-peer fashion,...

The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Be online without leaving a trace.

Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand.

In this explosive yet practical book,
...
CompTIA Project+ Study Guide: Exam PK0-004
CompTIA Project+ Study Guide: Exam PK0-004

The bestselling Project+ preparation guide, updated for the latest exam

The CompTIA Project+ Study Guide, Second Edition is your comprehensive resource for taking Exam PK0-004. With 100% coverage of all exam objectives, bolstered by real-world scenarios and the Sybex interactive learning environment, this book...

MATLAB Deep Learning: With Machine Learning, Neural Networks and Artificial Intelligence
MATLAB Deep Learning: With Machine Learning, Neural Networks and Artificial Intelligence
Get started with MATLAB for deep learning and AI with this in-depth primer. In this book, you start with machine learning fundamentals, then move on to neural networks, deep learning, and then convolutional neural networks. In a blend of fundamentals and applications, MATLAB Deep Learning employs MATLAB as the underlying programming...
The Career Programmer: Guerilla Tactics for an Imperfect World (Expert's Voice)
The Career Programmer: Guerilla Tactics for an Imperfect World (Expert's Voice)

The crucial wisdom-guide to surviving within the programming industry in 2006. Provides raw material for surviving and thinking smart in today's industry. Delivered with the wit and aplomb to make a serious topic entertaining and palatable

TE Conquer Master self-defense techniques to shield yourself, your project,...

iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
This book is intended for individuals who are interested in the iPhone and other iOS devices and, more importantly, in the type of data that is stored and can be recovered from these devices. The demand for mobile forensics has grown tremendously with the release of smart phones. Communication on these devices is now documented...
PIC Robotics: A Beginner's Guide to Robotics Projects Using the PIC Micro
PIC Robotics: A Beginner's Guide to Robotics Projects Using the PIC Micro
Complete, do-it-yourself robotics projects!

SMART 'BOTS!

* Artificial vision system that uses a CCD camera to track and follow brightly colored objects
* Bi-pedal robots that walk upright
* Functional robotic arm
* Easily programmed behavior-based robots
* Complete parts
...
Architecting the Industrial Internet: The architect's guide to designing Industrial Internet solutions
Architecting the Industrial Internet: The architect's guide to designing Industrial Internet solutions

Learn the ins and outs of the Industrial Internet of Things through subjects ranging from its history and evolution, right up to what the future holds.

About This Book

  • Define solutions that can connect existing systems and newer cloud-based solutions to thousands of thousands of edge devices and...
Software Test Attacks to Break Mobile and Embedded Devices (Chapman & Hall/CRC Innovations in Software Engineering and Software Development Series)
Software Test Attacks to Break Mobile and Embedded Devices (Chapman & Hall/CRC Innovations in Software Engineering and Software Development Series)

Address Errors before Users Find Them
Using a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of "smart" devices driven by software, the book
...

Result Page: 70 69 68 67 66 65 64 63 62 61 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy