|
|
|
|
Neural Network Design and the Complexity of Learning
Using the tools of complexity theory, Stephen Judd develops a formal description of associative learning in connectionist networks. He rigorously exposes the computational difficulties in training neural networks and explores how certain design principles will or will not make the problems easier.
Judd looks beyond the scope... | | Intrusion Prevention and Active Response : Deploying Network and Host IPSFrom the Foreword by Stephen Northcutt, Director of Training and Certification, The SANS Institute
Within a year of the infamous "Intrusion Detection is Dead" report by Gartner, we started seeing Intrusion Prevention System (IPS) products that actually worked in the real world. Security professionals are going to be... | | Pathology and Genetics of Tumours of the Lung, Pleura, Thymus and Heart (IARC WHO Classification of Tumours)
This book is an authoritative, concise reference on the histological and genetic typing of tumors of the lung, pleura, thymus and heart. Prepared by 200 authors from 25 countries, it contains more than 670 color photographs, numerous MRIs, ultrasound images, CT scans, charts and approximately 2200 references. Diagnostic criteria, pathological... |
|
|
|
Techniques and Applications of Digital Watermarking and Content ProtectionWhether you need to quickly come up to speed on the state of the art in digital watermarking or want to explore the latest research in this area, such as 3-D geometry watermarking, this timely reference gives you the hands-on knowledge you need for your work. This book covers the full range of media -- still images, audio data, video, 3-D geometry... | | SSL & TLS Essentials: Securing the WebThe Secure Sockets Layer (SSL) and Transport Layer Security(TLS) protocols form the foundation for e-commerce security on the World Wide Web, verifying the authenticity of Web sites, encrypting the transfer of sensitive data, and ensuring the integrity of information exchanged. Now—for the first time the details of these critical security... | | The Art of Profitability'Interesting, concise... This little book packs quite a punch.' - Miami Herald
What do Barbie dolls, Nokia phones, and American Express credit cards have in common? They all represent a powerful business model called pyramid profit. How about Intel, Microsoft, and Stephen King? They all exploit another model called value chain... |
|
|
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 |