Home | Amazing | Today | Tags | Publishers | Years | Search 
Mechanisms of Implicit Learning: Connectionist Models of Sequence Processing
Mechanisms of Implicit Learning: Connectionist Models of Sequence Processing

What do people learn when they do not know that they are learning? Until recently all of the work in the area of implicit learning focused on empirical questions and methods. In this book, Axel Cleeremans explores unintentional learning from an information-processing perspective. He introduces a theoretical framework that unifies existing...

PHP and MySQL for Dynamic Web Sites: Visual QuickPro Guide (4th Edition)
PHP and MySQL for Dynamic Web Sites: Visual QuickPro Guide (4th Edition)
Today’s Web users expect exciting pages that are updated frequently and provide a customized experience. For them, Web sites are more like communities, to which they’ll return time and again. At the same time, Web-site administrators want sites that are easier to update and maintain, understanding...
Cloud Computing for Enterprise Architectures (Computer Communications and Networks)
Cloud Computing for Enterprise Architectures (Computer Communications and Networks)

Cloud Computing is emerging as a pervasive and consumer-driven utility that is attracting great interest from entrepreneurs, innovators and technology evangelists, as well as the ‘connected’ public at large. The shift from a focus upon IT, to a more assertive focus upon business, further strengthens the case for cloud adoption,...

Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Picture Yourself Learning Corel PaintShop Pro X4
Picture Yourself Learning Corel PaintShop Pro X4
Designed for anyone interested in graphics, photography, or photographic creations, this book came into existence to show you how you can put the incredible power of Corel PaintShop Pro X4 into play.

This book cuts right to the chase of the PaintShop Pro X4 tools that are best used when working with photographs
...
Wireless Crime and Forensic Investigation
Wireless Crime and Forensic Investigation

Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However, based on the broad reach of wireless, stopping someone from passively listening is just as critical. Intrusion detection systems, firewalls, and forensics are just a few of the...

Discovering Computers FUNDAMENTALS Your Interactive Guide to the Digital World
Discovering Computers FUNDAMENTALS Your Interactive Guide to the Digital World
The Shelly Cashman Series® offers the fi nest textbooks in computer education. This book is our answer to the many requests we have received from instructors and students for a textbook that provides a succinct, yet thorough, introduction to computers.

In Discovering Computers —
...
Introduction to Biometrics
Introduction to Biometrics
A number of crucial societal applications like international border crossing, electronic commerce, and welfare disbursement require reliable person recognition systems. Traditional person authentication methods based on passwords and identity documents often fail to meet the stringent security and performance demands of these...
Machine Learning for Email: Spam Filtering and Priority Inbox
Machine Learning for Email: Spam Filtering and Priority Inbox
To explain the perspective from which this book was written, it will be helpful to define the terms machine learning and hackers.

What is machine learning? At the highest level of abstraction, we can think of machine learning as a set of tools and methods that attempt to infer patterns and extract
...
CCNP Security Firewall 642-617 Official Cert Guide
CCNP Security Firewall 642-617 Official Cert Guide

CCNP Security FIREWALL 642-617 Official Cert Guide is a best of breed Cisco exam study guide that focuses specifically on the objectives for the CCNP Security FIREWALL exam. Senior security consultants and instructors David Hucaby, Dave Garneau, and Anthony Sequeira share preparation hints and test-taking tips,...

Understanding Complex Datasets: Data Mining with Matrix Decompositions
Understanding Complex Datasets: Data Mining with Matrix Decompositions
Many data-mining algorithms were developed for the world of business, for example for customer relationship management. The datasets in this environment, although large, are simple in the sense that a customer either did or did not buy three widgets, or did or did not fly from Chicago to Albuquerque.

In contrast,
...
A Practical Introduction to Hardware/Software Codesign
A Practical Introduction to Hardware/Software Codesign
This is a practical book for computer engineers who want to understand or implement hardware/software systems. It focuses on problems that require one to combine hardware design with software design – such problems can be solved with hardware/software codesign. When used properly, hardware/software codesign works better...
Result Page: 574 573 572 571 570 569 568 567 566 565 564 563 562 561 560 559 558 557 556 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy