Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Power of Algorithms: Inspiration and Examples in Everyday Life
The Power of Algorithms: Inspiration and Examples in Everyday Life

To examine, analyze, and manipulate a problem to the point of designing an algorithm for solving it is an exercise of fundamental value in many fields. With so many everyday activities governed by algorithmic principles, the power, precision, reliability and speed of execution demanded by users have transformed the design and...

The Nature of Code: Simulating Natural Systems with Processing
The Nature of Code: Simulating Natural Systems with Processing
How can we capture the unpredictable evolutionary and emergent properties of nature in software? How can understanding the mathematical principles behind our physical world help us to create digital worlds? This book focuses on a range of programming strategies and techniques behind computer simulations of natural systems, from elementary...
Achieving DevOps: A Novel About Delivering the Best of Agile, DevOps, and Microservices
Achieving DevOps: A Novel About Delivering the Best of Agile, DevOps, and Microservices
Ben is stuck. A development lead with a strong vision for how the intersection of development and operations at his office can be improved, he can’t help but feel overwhelmed and discouraged by common problems such as slow turnaround time, rushed and ineffective handover documentation, mounting technical debt, and a...
Probabilistic Databases (Synthesis Lectures on Data Management)
Probabilistic Databases (Synthesis Lectures on Data Management)
Probabilistic databases are databases where the value of some attributes or the presence of some records are uncertain and known only with some probability. Applications in many areas such as information extraction, RFID and scientific data management, data cleaning, data integration, and financial risk assessment produce large volumes of...
Building WordPress Themes from Scratch
Building WordPress Themes from Scratch

Walk through the steps you need to build your very own WordPress theme! Included with the book is a WordPress theme and other necessary files, so roll up your sleeves and let Joe take you through the process explaining what you need to do - and why you’re doing it - every step of the way. Hi, I’m Joe, the author of Building...

Theoretical Aspects of Computer Science: Advanced Lectures (Lecture Notes in Computer Science)
Theoretical Aspects of Computer Science: Advanced Lectures (Lecture Notes in Computer Science)
The First Summer School on Theoretical Aspects on Computer Science was held at the Institute for Studies in Theoretical Physics and Mathematics (IPM) from July 3-10, 2000.

The idea of organizing a summer school was originated during a conversation between the first and the second editor of this volume in the winter
...
Mastering Microsoft Power BI: Expert techniques for effective data analytics and business intelligence
Mastering Microsoft Power BI: Expert techniques for effective data analytics and business intelligence

Design, create and manage robust Power BI solutions to gain meaningful business insights

Key Features

  • Master all the dashboarding and reporting features of Microsoft Power BI
  • Combine data from multiple sources, create stunning visualizations and publish your reports across...
Data Mining for Social Network Data (Annals of Information Systems)
Data Mining for Social Network Data (Annals of Information Systems)

Driven by counter-terrorism efforts, marketing analysis, and the explosion in on-line social networking, data mining has moved to the top of the agenda in information science. This book presents a broad range of recent studies in social networking analysis.

 

...
Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Ever wonder how easy it is to hack into someone’s bank account info while surfing the net at your local Starbucks? Learning how to hack is one of the best preventative measures you can take when protecting yourself from other hackers. Hacking is often misunderstood and that is for good reason. Many people use hacking as...
Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a
Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a

Do you want to learn ethical hacking/ penetration testing but not sure where to begin? Does the amount of information on the web make you feel overwhelmed and confused? Or maybe your looking to start a career as an ethical hacker and want to further your skills? How about step by step, methodical, literally foolproof approaches to be...

Hands-On Neural Networks with Keras: Design and create neural networks using deep learning and artificial intelligence principles
Hands-On Neural Networks with Keras: Design and create neural networks using deep learning and artificial intelligence principles

Your one-stop guide to learning and implementing artificial neural networks with Keras effectively

Key Features

  • Design and create neural network architectures on different domains using Keras
  • Integrate neural network models in your applications using this highly practical...
Pro Spring 5: An In-Depth Guide to the Spring Framework and Its Tools
Pro Spring 5: An In-Depth Guide to the Spring Framework and Its Tools

Master Spring basics and core topics, and share the authors’ insights and real–world experiences with remoting, Hibernate, and EJB. Beyond the basics, you'll learn how to leverage the Spring Framework to build the various tiers and parts of an enterprise Java application: transactions, web and presentation tiers, deployment,...

Result Page: 157 156 155 154 153 152 151 150 149 148 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy