Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Neural Network Design and the Complexity of Learning
Neural Network Design and the Complexity of Learning

Using the tools of complexity theory, Stephen Judd develops a formal description of associative learning in connectionist networks. He rigorously exposes the computational difficulties in training neural networks and explores how certain design principles will or will not make the problems easier.

Judd looks beyond the scope
...

Intrusion Prevention and Active Response : Deploying Network and Host IPS
Intrusion Prevention and Active Response : Deploying Network and Host IPS
From the Foreword by Stephen Northcutt, Director of Training and Certification, The SANS Institute

Within a year of the infamous "Intrusion Detection is Dead" report by Gartner, we started seeing Intrusion Prevention System (IPS) products that actually worked in the real world. Security professionals are going to be...

Pathology and Genetics of Tumours of the Lung, Pleura, Thymus and Heart (IARC WHO Classification of Tumours)
Pathology and Genetics of Tumours of the Lung, Pleura, Thymus and Heart (IARC WHO Classification of Tumours)

This book is an authoritative, concise reference on the histological and genetic typing of tumors of the lung, pleura, thymus and heart. Prepared by 200 authors from 25 countries, it contains more than 670 color photographs, numerous MRIs, ultrasound images, CT scans, charts and approximately 2200 references. Diagnostic criteria, pathological...

An Executive's Guide to Information Technology: Principles, Business Models, and Terminology
An Executive's Guide to Information Technology: Principles, Business Models, and Terminology
Assessing the most valuable technology for an organization is becoming a growing challenge for business professionals confronted with an expanding array of options. This book is an A-Z compendium of technological terms written for the non-technical executive, allowing quick identification of what the term is and why it is significant. This is more...
Applied Java Patterns
Applied Java Patterns

A hands-on guide to design patterns for Java platform developers.

  • Pattern-based solutions for every stage of the development lifecycle
  • Documents 30 patterns, including the 23 core patterns for the Sun Certified Enterprise Architect exam
  • Describes pattern use within the Java APIs—including...
Domain Names: How to Choose and Protect a Great Name for Your Website (Quick & Legal)
Domain Names: How to Choose and Protect a Great Name for Your Website (Quick & Legal)
With clever (and even not-so-clever) names for websites disappearing faster than you can say "Internet Start-Up," e-entrepreneurs need to know that their choice won't be whisked out from under their ISPs.

This book explains in plain English how to choose, register and protect a domain name that works. Written both for those...

Fire Your Boss
Fire Your Boss

Fire Your Boss And Hire Yourself.

Impossible? Not according to nationally bestselling author Stephen M. Pollan. As he says in this new and empowering book, "You don't have to accept your current work situation. You can be in control of your job and your stream of income, so you're never again subject to the whims,...

RSA Security's Official Guide to Cryptography
RSA Security's Official Guide to Cryptography

Learn how cryptography works--from the leading authority in e-security. Cryptography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained...

Test-Driven Infrastructure with Chef: Bring Behavior-Driven Development to Infrastructure as Code
Test-Driven Infrastructure with Chef: Bring Behavior-Driven Development to Infrastructure as Code

Since Test-Driven Infrastructure with Chef first appeared in mid-2011, infrastructure testing has begun to flourish in the web ops world. In this revised and expanded edition, author Stephen Nelson-Smith brings you up to date on this rapidly evolving discipline, including the philosophy driving it and a growing array of tools....

Techniques and Applications of Digital Watermarking and Content Protection
Techniques and Applications of Digital Watermarking and Content Protection
Whether you need to quickly come up to speed on the state of the art in digital watermarking or want to explore the latest research in this area, such as 3-D geometry watermarking, this timely reference gives you the hands-on knowledge you need for your work. This book covers the full range of media -- still images, audio data, video, 3-D geometry...
SSL & TLS Essentials: Securing the Web
SSL & TLS Essentials: Securing the Web
The Secure Sockets Layer (SSL) and Transport Layer Security(TLS) protocols form the foundation for e-commerce security on the World Wide Web, verifying the authenticity of Web sites, encrypting the transfer of sensitive data, and ensuring the integrity of information exchanged. Now—for the first time the details of these critical security...
The Art of Profitability
The Art of Profitability
'Interesting, concise... This little book packs quite a punch.' - Miami Herald

What do Barbie dolls, Nokia phones, and American Express credit cards have in common? They all represent a powerful business model called pyramid profit. How about Intel, Microsoft, and Stephen King? They all exploit another model called value chain
...
unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy