Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Pattern Recognition & Computer Vision
Handbook of Pattern Recognition & Computer Vision

The area of pattern recognition and computer vision, after over 35 years of continued development, has now reached its maturity. The theories, techniques and algorithms are mostly well developed. There are a number of applications which are still being explored. New approaches motivated by applications and new computer architectures...

Hacking Secret Ciphers with Python: A beginner's guide to cryptography and computer programming with Python
Hacking Secret Ciphers with Python: A beginner's guide to cryptography and computer programming with Python

* * * This is the old edition! The new edition is under the title "Cracking Codes with Python" by Al Sweigart * * *

Hacking Secret Ciphers with Python not only teaches you how to write in secret ciphers with paper and pencil. This book teaches you how to write your own cipher programs and also the hacking programs that...

Combinatorial Algorithms for Computers and Calculators (Computer science and applied mathematics)
Combinatorial Algorithms for Computers and Calculators (Computer science and applied mathematics)

Since the appearance in 1975 of this work, the field of combinatorial algorithms has continued its rapid evolution. We have substantially rewritten several of the chapters in order to take account of theoretical or algorithmic improvements, and to clarify the presentation.

The result has been that a number of speedups,
...

Learn Computer Science with Swift: Computation Concepts, Programming Paradigms, Data Management, and Modern Component Architectures with Swift and Playgrounds
Learn Computer Science with Swift: Computation Concepts, Programming Paradigms, Data Management, and Modern Component Architectures with Swift and Playgrounds

Master the basics of solving logic puzzles, and creating algorithms using Swift on Apple platforms. This book is based on the curriculum currently being used in common computer classes. You’ll learn to automate algorithmic processes that scale using Swift in the context of iOS, macOS, tvOS, and watchOS.

Begin by...

Making Games with Python & Pygame
Making Games with Python & Pygame

Making Games with Python & Pygame is a programming book that covers the Pygame game library for the Python programming language. Each chapter gives you the complete source code for a new game and teaches the programming concepts from these examples. The book is available under a Creative Commons license and can be downloaded in full for...

Magic Universe: A Grand Tour of Modern Science
Magic Universe: A Grand Tour of Modern Science

As a prolific author, BBC commentator, and magazine editor, Nigel Calder has spent a lifetime spotting and explaining the big discoveries in all branches of science. In Magic Universe, he draws on his vast experience to offer readers a lively, far-reaching look at modern science in all its glory, shedding light on the latest ideas in...

Calculus Second Edition
Calculus Second Edition
On Teaching Mathematics

As a young instructor, I enjoyed teaching but I didn’t appreciate how difficult it is to communicate mathematics effectively. Early in my teaching career, I was confronted with a student rebellion when my efforts to explain epsilon-delta proofs were not greeted with the enthusiasm I
...
Einstein, Physics and Reality
Einstein, Physics and Reality

Albert Einstein was one of the principal founders of the quantum and relativity theories. Until 1925, when the Bose-Einstein statistics was discovered, he made great contributions to the foundations of quantum theory. However, after the discovery of quantum mechanics by Heisenberg and wave mechanics by Schrodinger, with the consequent...

Hacking Exposed Wireless
Hacking Exposed Wireless

Secure Your Wireless Networks the Hacking Exposed Way

Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute...

Imaging for Detection and Identification (NATO Security through Science Series B: Physics and Biophysics)
Imaging for Detection and Identification (NATO Security through Science Series B: Physics and Biophysics)

The chapters in this volume were presented at the July–August 2006 NATO Advanced Study Institute on Imaging for Detection and Identification. The conference was held at the beautiful Il Ciocco resort near Lucca, in the glorious Tuscany region of northern Italy. For the eighth time we gathered at this idyllic spot to explore and...

Red Hat Enterprise Linux Server Cookbook
Red Hat Enterprise Linux Server Cookbook

Key Features

  • Create fully unattended installations and deploy configurations without breaking a sweat
  • Discover and kick-start the newest RHEL 7 configuration and management tools through an easy-to-follow, practical approach for a lazy system management
  • Be guided by an experienced RHEL...
The Marino Mission: One Girl, One Mission, One Thousand Words; 1,000 Need-to-Know *SAT Vocabulary Words
The Marino Mission: One Girl, One Mission, One Thousand Words; 1,000 Need-to-Know *SAT Vocabulary Words

One unforgettable story.1,000 unforgettable SAT vocabulary words.

Alexa McCurry leads an ordinary teenager's life in upstate New York—until she embarks on a summer adventure in Central America. While working at a potentially boring internship in a marine DNA lab, she befriends a local boy, José, and a remarkable dolphin,...

unlimited object storage image
Result Page: 55 54 53 52 51 50 49 48 47 46 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy