Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Scalability Patterns: Best Practices for Designing High Volume Websites
Scalability Patterns: Best Practices for Designing High Volume Websites

In this book, the CEO of Cazton, Inc. and internationally-acclaimed speaker, Chander Dhall, demonstrates current website design scalability patterns and takes a pragmatic approach to explaining their pros and cons to show you how to select the appropriate pattern for your site. He then tests the patterns by deliberately...

Mastering Ubuntu Server: Master the art of deploying, configuring, managing, and troubleshooting Ubuntu Server 18.04, 2nd Edition
Mastering Ubuntu Server: Master the art of deploying, configuring, managing, and troubleshooting Ubuntu Server 18.04, 2nd Edition

Get up-to-date with the finer points of Ubuntu Server using this comprehensive guide

Key Features

  • A practical easy-to-understand book that will teach you how to deploy, maintain and troubleshoot Ubuntu Server
  • Get well-versed with newly-added features in Ubuntu 18.04.
  • ...
Deep Belief Nets in C++ and CUDA C: Volume 3: Convolutional Nets
Deep Belief Nets in C++ and CUDA C: Volume 3: Convolutional Nets
Discover the essential building blocks of a common and powerful form of deep belief network: convolutional nets. This book shows you how the structure of these elegant models is much closer to that of human brains than traditional neural networks; they have a ‘thought process’ that is capable of learning abstract...
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
Deep Belief Nets in C++ and CUDA C: Volume 2: Autoencoding in the Complex Domain
Deep Belief Nets in C++ and CUDA C: Volume 2: Autoencoding in the Complex Domain
Discover the essential building blocks of a common and powerful form of deep belief net: the autoencoder. You’ll take this topic beyond current usage by extending it to the complex domain for signal and image processing applications. Deep Belief Nets in C++ and CUDA C: Volume 2 also covers several...
Deep Belief Nets in C++ and CUDA C: Volume 1: Restricted Boltzmann Machines and Supervised Feedforward Networks
Deep Belief Nets in C++ and CUDA C: Volume 1: Restricted Boltzmann Machines and Supervised Feedforward Networks
Discover the essential building blocks of the most common forms of deep belief networks. At each step this book provides intuitive motivation, a summary of the most important equations relevant to the topic, and concludes with highly commented code for threaded computation on modern CPUs as well as massive parallel processing on computers...
Police Technology: 21st-Century Crime-Fighting Tools (Law Enforcement and Intelligence Gathering)
Police Technology: 21st-Century Crime-Fighting Tools (Law Enforcement and Intelligence Gathering)

Computers have become vital for police work in the twenty-first century. Applications explored in this compelling volume include the capability of searching extensive, internationally synchronized criminal information databases; plotting crime incidents and patterns to anticipate and prevent recurrences; interrogating criminal suspects and...

Coding Theory: A First Course
Coding Theory: A First Course
"This book is well written and highly recommended for students and professionals in engineering, computer science, mathematics and related fields." Mathematical Reviews

Concerned with successfully transmitting data through a noisy channel, coding theory can be applied to electronic engineering and communications.
...
Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))
Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))

ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY

 

Clearly explains core concepts, terminology, challenges, technologies, and skills

 

Covers today’s latest attacks and...

Theoretical Physics
Theoretical Physics
Classic one-volume treatise covers mathematical topics needed by theoretical and experimental physicists (vector analysis, calculus of variations, etc.), followed by extensive coverage of mechanics, electromagnetic theory, thermodynamics, quantum mechanics, and nuclear physics. Indispensable reference for graduates and undergraduates.
...
Calculus, Vol. 2: Multi-Variable Calculus and Linear Algebra with Applications to Differential Equations and Probability
Calculus, Vol. 2: Multi-Variable Calculus and Linear Algebra with Applications to Differential Equations and Probability

Volume I presents one-variable calculus with an introduction to linear algebra and volume II presents multi-variable calculus and linear algebra, with applications to differential equations and probability

...
Fourier Analysis (Graduate Studies in Mathematics)
Fourier Analysis (Graduate Studies in Mathematics)

Fourier analysis encompasses a variety of perspectives and techniques. This volume presents the real variable methods of Fourier analysis introduced by Calderón and Zygmund. The text was born from a graduate course taught at the Universidad Autónoma de Madrid and incorporates lecture notes from a course taught by José...

Result Page: 277 276 275 274 273 272 271 270 269 268 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy