Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Book of Numbers
Book of Numbers

This book, more than any other I’ve written up to this point in my life, was a labor of love. It allowed me to combine the knowledge and experience of two careers (over a decade in government and law enforcement, and close to another decade in the computer field, encompassing almost 20 years of working with computers as a hobbyist).When...

Killing in War (Uehiro Series in Practical Ethics)
Killing in War (Uehiro Series in Practical Ethics)
Killing a person is in general among the most seriously wrongful forms of action, yet most of us accept that it can be permissible to kill people on a large scale in war. Does morality become more permissive in a state of war? Jeff McMahan argues that conditions in war make no difference to what morality permits and that the justifications for...
Markov Chains and Stochastic Stability (Cambridge Mathematical Library)
Markov Chains and Stochastic Stability (Cambridge Mathematical Library)
'This second edition remains true to the remarkable standards of scholarship established by the first edition ... it will no doubt be a very welcome addition to the literature.' Peter W. Glynn, Prologue to the Second Edition

Meyn & Tweedie is back! The bible on Markov chains in general state spaces has been brought up to
...
Games, Puzzles, and Computation
Games, Puzzles, and Computation

The authors show that there are underlying mathematical reasons for why games and puzzles are challenging (and perhaps why they are so much fun). They also show that games and puzzles can serve as powerful models of computation―quite different from the usual models of automata and circuits―offering a new way of thinking about...

Business Intelligence: Data Mining and Optimization for Decision Making
Business Intelligence: Data Mining and Optimization for Decision Making

Business intelligence is a broad category of applications andtechnologies for gathering, providing access to, and analyzing datafor the purpose of helping enterprise users make better businessdecisions. The term implies having a comprehensive knowledge of allfactors that affect a business, such as customers, competitors,business partners,...

A Modern Approach to Regression with R (Springer Texts in Statistics)
A Modern Approach to Regression with R (Springer Texts in Statistics)

This book focuses on tools and techniques for building regression models using real-world data and assessing their validity. A key theme throughout the book is that it makes sense to base inferences or conclusions only on valid models. Plots are shown to be an important tool for both building regression models and assessing their validity. We...

Distributed Source Coding: Theory, Algorithms and Applications
Distributed Source Coding: Theory, Algorithms and Applications
Everything a signal and image processing engineer needs to know about distributed source coding - theorems, practical algorithms for design and the latest applications.

The advent of wireless sensor technology and ad-hoc networks has made DSC a major field of interest. Edited and written by the leading players in the field,
...
Professional JavaScript for Web Developers (Wrox Programmer to Programmer)
Professional JavaScript for Web Developers (Wrox Programmer to Programmer)
This eagerly anticipated update to the breakout book on JavaScript offers you an in-depth look at the numerous advances to the techniques and technology of the JavaScript language. You'll see why JavaScript's popularity continues to grow while you delve through topics such as debugging tools in Microsoft Visual Studio, FireBug, and Drosera;...
Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

An Introduction to 3D Computer Vision Techniques and Algorithms
An Introduction to 3D Computer Vision Techniques and Algorithms

Computer vision encompasses the construction of integrated vision systems and the application of vision to problems of real-world importance. The process of creating 3D models is still rather difficult, requiring mechanical measurement of the camera positions or manual alignment of partial 3D views of a scene. However using algorithms, it is...

20 Minutes to a Top Performer: Three Fast and Effective Conversations to Motivate, Develop, and Engage Your Employees (Business Books)
20 Minutes to a Top Performer: Three Fast and Effective Conversations to Motivate, Develop, and Engage Your Employees (Business Books)

Transform Average Employees into Powerhouse Performers

“I cannot think of a more important message and timely book. 20 Minutes to a Top Performer offers quick, simple techniques for managers to improve their effectiveness in communicating with their teams.”
Steven Fine, vice president for
...

Faith and Place: An Essay in Embodied Religious Epistemology
Faith and Place: An Essay in Embodied Religious Epistemology
Faith and Place takes knowledge of place as a basis for thinking about the relationship between religious belief and our embodied life.

Recent epistemology of religion has appealed to various secular analogues for religious belief - especially analogues drawn from sense perception and scientific theory construction. These approaches tend
...
Result Page: Previous 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 Next 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy