Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mining the Social Web: Data Mining Facebook, Twitter, LinkedIn, Instagram, GitHub, and More
Mining the Social Web: Data Mining Facebook, Twitter, LinkedIn, Instagram, GitHub, and More

Mine the rich data tucked away in popular social websites such as Twitter, Facebook, LinkedIn, and Instagram. With the third edition of this popular guide, data scientists, analysts, and programmers will learn how to glean insights from social media—including who’s connecting with whom, what they’re...

Let Them See You: The Guide for Leveraging Your Diversity at Work
Let Them See You: The Guide for Leveraging Your Diversity at Work
The guide to getting hired, being promoted, and thriving professionally for the 40 million people of color in the workplace—from the CEO and cofounder of Jopwell, the leading career advancement platform for Black, Latinx, and Native American students and professionals.
 
Let Them See You is a
...
VACCINE SCIENCE REVISITED: Are Childhood Immunizations As Safe As Claimed? (The Underground Knowledge Series)
VACCINE SCIENCE REVISITED: Are Childhood Immunizations As Safe As Claimed? (The Underground Knowledge Series)
An unbiased, neutral, fact-based investigation that simply allows the science to do the talking on childhood vaccinations. Written by father and son investigative journalism/research team Lance & James Morcan, with a foreword by medical laboratory scientist Elísabet Norris, VACCINE SCIENCE REVISITED is possibly the most...
Anti-Spam Tool Kit
Anti-Spam Tool Kit

The three of us began our tech careers at a small local Internet service provider, where every dollar was sacred and wasting one was the equivalent of sacrilege. What we discovered then is still true today: Any way you cut it, spam wastes money. Organizations and individuals devote more time, money, and strategy to thwarting...

Weird Science: 40 Strange-Acting, Bizarre-Looking, and Barely Believable Activities for Kids
Weird Science: 40 Strange-Acting, Bizarre-Looking, and Barely Believable Activities for Kids
Discover the weird science behind the ickiest, wackiest, most unusual things ever to exist!

Would you like to make your own slime, discover how lava lamps work, or learn how materials decompose?
Have you ever heard about ball lightning or the Aurora Borealis on the news and wondered what the reporter was talking about?
Are
...

A Computational Model of Natural Language Communication: Interpretation, Inference, and Production in Database Semantics
A Computational Model of Natural Language Communication: Interpretation, Inference, and Production in Database Semantics
Everyday life would be easier if we could simply talk with machines instead of having to program them. Before such talking robots can be built, however, there must be a theory of how communicating with natural language works. This requires not only a grammatical analysis of the language signs, but also a model of the cognitive agent, with...
Solaris 8: The Complete Reference
Solaris 8: The Complete Reference
Clients often ask why we choose Solaris as an operating environment. Is it a decision based on price? Is it an attraction to the latest gizmo features, each with its own four-letter acronym? Do we have a cozy arrangement with Sun Microsystems to promote their operating system? The answer to each of these questions is no, no, NO!  ...
The Radio Station, Seventh Edition: Broadcast, Satellite & Internet
The Radio Station, Seventh Edition: Broadcast, Satellite & Internet
Keith's masterful updated survey of what has changed and what remains the same in the dynamic audio industry.
- Christopher Sterling,
George Washington University

The bible for beginning radio professionals. A complete guide to the internal workings of radio stations and the radio industry. The book is now a
...
Jess in Action: Java Rule-Based Systems
Jess in Action: Java Rule-Based Systems
A practical handbook for anyone interested in programming rule-based systems and written by the creator of the popular Java rule engine, Jess, this book is structured around a series of large, fully developed practical examples of rule-based programming in Java. After the topic of rule-based systems is introduced, software developers and...
Deficit: Why Should I Care?
Deficit: Why Should I Care?

At the turn of this century, the American national debt stood at just under $6 trillion and the deficit at a "mere" $86 billion. Today, the national debt has topped $14 trillion, and the yearly deficit for 2011 is projected at a whopping $1.4 trillion.

According to the U.S. Treasury Department's Annual...

Sams Teach Yourself Windows XP Computer Basics All in One
Sams Teach Yourself Windows XP Computer Basics All in One

Have you ever wished you had just one book, a truly complete reference that tells you what you need to know about your new or upgraded computer? Have you wanted one that's written in plain talk, one that tells you what you need to know to get started, and one that takes you to the next level without being too techie? Have you...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

unlimited object storage image
Result Page: 23 22 21 20 19 18 17 16 15 14 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy