Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Error Correction Coding: Mathematical Methods and Algorithms
Error Correction Coding: Mathematical Methods and Algorithms

Providing in-depth treatment of error correction

Error Correction Coding: Mathematical Methods and Algorithms, 2nd Edition provides a comprehensive introduction to classical and modern methods of error correction. The presentation provides a clear, practical introduction to using a...

Mastering Azure Analytics: Architecting in the Cloud with Azure Data Lake, HDInsight, and Spark
Mastering Azure Analytics: Architecting in the Cloud with Azure Data Lake, HDInsight, and Spark

Microsoft Azure has over 20 platform-as-a-service (PaaS) offerings that can act in support of a big data analytics solution. So which one is right for your project? This practical book helps you understand the breadth of Azure services by organizing them into a reference framework you can use when crafting your own big data analytics...

Microservices Deployment Cookbook
Microservices Deployment Cookbook

Key Features

  • Adopt microservices-based architecture and deploy it at scale
  • Build your complete microservice architecture using different recipes for different solutions
  • Identify specific tools for specific scenarios and deliver immediate business results, correlate use cases, and adopt them...
Learning the vi and Vim Editors
Learning the vi and Vim Editors
There's nothing that hard-core Unix and Linux users are more fanatical about than their text editor. Editors are the subject of adoration and worship, or of scorn and ridicule, depending upon whether the topic of discussion is your editor or someone else's. vi has been the standard editor for close to 30 years. Popular on Unix and Linux, it has a...
Applied Cryptanalysis: Breaking Ciphers in the Real World
Applied Cryptanalysis: Breaking Ciphers in the Real World
The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material...
Beginning Haskell: A Project-Based Approach
Beginning Haskell: A Project-Based Approach

Beginning Haskell provides a broad-based introduction to the Haskell language, its libraries and environment, and to the functional programming paradigm that is fast growing in importance in the software industry. The book takes a project-based approach to learning the language that is unified around the building of a web-based...

Exploring Abstract Algebra With Mathematica®
Exploring Abstract Algebra With Mathematica®
This upper-division laboratory supplement for courses in abstract algebra consists of several Mathematica packages programmed as a foundation for group and ring theory. Additionally, the "user's guide" illustrates the functionality of the underlying code, while the lab portion of the book reflects the contents of the...
Halophilic Microorganisms and their Environments (Cellular Origin, Life in Extreme Habitats and Astrobiology)
Halophilic Microorganisms and their Environments (Cellular Origin, Life in Extreme Habitats and Astrobiology)

"This water" he told me, "runs out to the eastern region, and flows into the Arabah; and when it comes into the sea, into the sea of foul waters [i. e. , the Dead Sea], the water will become wholesome. Every living creature that swarms will be able to live wherever this stream goes; the fish will be very abundant once these...

Oracle SQL: the Essential Reference
Oracle SQL: the Essential Reference
SQL (Structured Query Language) is the heart of a relational database management system. It's the language used to query the database, to create new tables in the database, to update and delete database fields, and to set privileges in the database. Oracle SQL: The Essential Reference is for everyone who needs to access an Oracle...
Reactive Streams in Java: Concurrency with RxJava, Reactor, and Akka Streams
Reactive Streams in Java: Concurrency with RxJava, Reactor, and Akka Streams

Get an easy introduction to reactive streams in Java to handle concurrency, data streams, and the propagation of change in today's applications. This compact book includes in-depth introductions to RxJava, Akka Streams, and Reactor, and integrates the latest related features from Java 9 and 11, as well as reactive streams...

Professional Practice in Artificial Intelligence: IFIP 19th World Computer Congress, TC-12: Professional Practice Stream, August 21-24, 2006
Professional Practice in Artificial Intelligence: IFIP 19th World Computer Congress, TC-12: Professional Practice Stream, August 21-24, 2006
This volume presents proceedings from the 19th IFIP World Computer Congress in Santiago, Chile. The proceedings of the World Computer Congress are a product of the gathering of 2,000 delegates from more than 70 countries to discuss a myriad of topics in the ICT domain. Of particular note, this marks the first time that a World Computer Congress has...
Data Mining Tools for Malware Detection
Data Mining Tools for Malware Detection

Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop...

unlimited object storage image
Result Page: 24 23 22 21 20 19 18 17 16 15 
┬ę2020 LearnIT (support@pdfchm.net) - Privacy Policy