Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Raspberry Pi for Python Programmers Cookbook - Second Edition
Raspberry Pi for Python Programmers Cookbook - Second Edition

About This Book

  • Install your first operating system, share files over the network, and run programs remotely
  • Construct robots and interface with your own circuits and purpose built add-ons, as well as adapt off-the-shelf household devices using this pragmatic guide
  • Packed with clear,...
Exploratory Multivariate Analysis by Example Using R (Chapman & Hall/CRC Computer Science & Data Analysis)
Exploratory Multivariate Analysis by Example Using R (Chapman & Hall/CRC Computer Science & Data Analysis)

Full of real-world case studies and practical advice, Exploratory Multivariate Analysis by Example Using R focuses on four fundamental methods of multivariate exploratory data analysis that are most suitable for applications. It covers principal component analysis (PCA) when variables are quantitative, correspondence analysis...

A Theory of the Drone
A Theory of the Drone
Drone warfare has raised profound ethical and constitutional questions both in the halls of Congress and among the U.S. public. Not since debates over nuclear warfare has American military strategy been the subject of discussion in living rooms, classrooms, and houses of worship. Yet as this groundbreaking new work shows, the full...
The Art of Deception: Controlling the Human Element of Security
The Art of Deception: Controlling the Human Element of Security

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in...

Mastering Windows 8 C++ App Development
Mastering Windows 8 C++ App Development

A practical guide to developing Windows Store apps with C++ and XAML

Overview

  • Details the most important features of C++, XAML, and WinRT for building fantastic Windows Store apps
  • Full of detailed and engaging code samples that can be used as a basis for your own projects
  • ...
Computer and Information Security Handbook
Computer and Information Security Handbook

The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical...

Python Machine Learning Case Studies: Five Case Studies for the Data Scientist
Python Machine Learning Case Studies: Five Case Studies for the Data Scientist
Embrace machine learning approaches and Python to enable automatic rendering of rich insights and solve business problems. The book uses a hands-on case study-based approach to crack real-world applications to which machine learning concepts can be applied. These smarter machines will enable your business processes to achieve efficiencies on...
Mathematics for the Analysis of Algorithms
Mathematics for the Analysis of Algorithms

"The book presents a welcome selection and careful exposition of material that can be (and is) covered in a single course...In this reviewer's opinion, this would be an interesting text to use with a group of advanced students well-grounded in undergraduate mathematics and computer science, and would produce a valuable course for the...

Introduction to Machine Learning with R: Rigorous Mathematical Analysis
Introduction to Machine Learning with R: Rigorous Mathematical Analysis

Machine learning is an intimidating subject until you know the fundamentals. If you understand basic coding concepts, this introductory guide will help you gain a solid foundation in machine learning principles. Using the R programming language, you’ll first start to learn with regression modelling and then move into more...

Computer Viruses: from theory to applications (Collection IRIS)
Computer Viruses: from theory to applications (Collection IRIS)
This book deals with computer viruses envisaged from three different points of view, namely the theoretical fundamentals of computer virology, algorithmic and practical aspects of viruses and their potential applications to various areas. The theoretical formalization by means of Turing machines, self-reproducing automata and recursive functions...
Marketing Metrics: The Definitive Guide to Measuring Marketing Performance (2nd Edition)
Marketing Metrics: The Definitive Guide to Measuring Marketing Performance (2nd Edition)

The Definitive Guide to the New State-of-the-Art in Marketing Metrics

 

Marketing Metrics, Second Edition, is the definitive guide to today’s most valuable marketing metrics. In this thoroughly updated and significantly...

Amazon Web Services for Mobile Developers: Building Apps with AWS
Amazon Web Services for Mobile Developers: Building Apps with AWS

A practical, real-world introduction to AWS tools and concepts

Amazon Web Services for Mobile Developers: Building Apps with AWS presents a professional view of cloud computing and AWS for experienced iOS/Android developers and technical/solution architects. Cloud computing is a rapidly expanding ecosystem, and...

Result Page: 177 176 175 174 173 172 171 170 169 168 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy