Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Effective Programming: More Than Writing Code
Effective Programming: More Than Writing Code

ABOUT THE BOOK Jeff Atwood began the Coding Horror blog in 2004, and is convinced that it changed his life. He needed a way to keep track of software development over time - whatever he was thinking about or working on. He researched subjects he found interesting, then documented his research with a public blog post, which he could easily...

Data Mining for Bioinformatics
Data Mining for Bioinformatics

Covering theory, algorithms, and methodologies, as well as data mining technologies, Data Mining for Bioinformatics provides a comprehensive discussion of data-intensive computations used in data mining with applications in bioinformatics. It supplies a broad, yet in-depth, overview of the application domains of data mining...

Image Processing: Tensor Transform and Discrete Tomography with MATLAB ®
Image Processing: Tensor Transform and Discrete Tomography with MATLAB ®

Focusing on mathematical methods in computer tomography, Image Processing: Tensor Transform and Discrete Tomography with MATLAB® introduces novel approaches to help in solving the problem of image reconstruction on the Cartesian lattice. Specifically, it discusses methods of image processing along...

Getting Started with CouchDB
Getting Started with CouchDB
When I was about nine years old, I had an Acorn Electron, a home computer developed by Acorn Machines and one of the major precursors to modern home computing. It was tiny by today’s standards, having just 32K of RAM, a 2MHz CPU, and with the staggering ability to store a massive 360 Kb on the 3 inch Amstrad disks I was using...
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Penetration testers are faced with a combination of firewalls, intrusion detection systems, host-based protection, hardened systems, and teams of knowledgeable analysts that pour over data collected by their security information management systems. In an environment such as this, simply running automated tools will typically...
Foundation Version Control for Web Developers (Foundations Apress)
Foundation Version Control for Web Developers (Foundations Apress)

Since you happen to be reading through the opening pages of Foundation Version Control for Web Developers then it’s safe to say you have some interest in finding out a little bit more about version control. It may be true that this new interest isn’t actually your own, but instead comes from a friend, colleague, or employer who...

The OS X Mountain Lion Pocket Guide (Peachpit Pocket Guide)
The OS X Mountain Lion Pocket Guide (Peachpit Pocket Guide)
A lot has happened since Apple introduced OS X a decade ago (then called “Mac OS X”). What started as an incomplete replacement for an established operating system has become not only the backbone of today’s powerful Mac computers, but also the foundation for the iPhone, iPad, iPod touch, and Apple TV. At one...
Akka Essentials
Akka Essentials
Akka Essentials is meant as a guide for architects, solution providers, consultants, engineers, and anyone planning to design and implement a distributed, concurrent application based on Akka. It will refer to easy-to-explain concept examples, as they are likely to be the best teaching aids. It will explain the logic, code, and...
Business Intelligence, Second Edition: The Savvy Manager's Guide (The Morgan Kaufmann Series on Business Intelligence)
Business Intelligence, Second Edition: The Savvy Manager's Guide (The Morgan Kaufmann Series on Business Intelligence)

Following the footsteps of the first edition, the second edition of Business Intelligence is a full overview of what comprises business intelligence. It is intended to provide an introduction to the concepts to uncomplicate the learning process when implementing a business intelligence program.

Over a relatively long...

Micro / Nano Replication: Processes and Applications
Micro / Nano Replication: Processes and Applications

An introduction to micro and nano replication processes and applications

Micro/Nano Replication: Processes and Applications provides an overview of the fundamentals, processes, and applications involved in micro and nano replication in the manufacturing of product parts. A major field of nanotechnology, the study...

Development Cooperation Policy in Forestry from an Analytical Perspective (World Forests)
Development Cooperation Policy in Forestry from an Analytical Perspective (World Forests)

Any reader eager to gain a comprehensive insight into forest development policy, praxis and reality shouldn’t miss this excellent publication. Hard to find a comparable reading where the author is digging as deep into Forest Development Policy. The author discovered numerous highly relevant theories as well as inspiring cases about...

Energy-aware Scheduling on Multiprocessor Platforms (SpringerBriefs in Computer Science)
Energy-aware Scheduling on Multiprocessor Platforms (SpringerBriefs in Computer Science)

Multiprocessor platforms play important roles in modern computing systems, and appear in various applications, ranging from energy-limited hand-held devices to large data centers. As the performance requirements increase, energy-consumption in these systems also increases significantly. Dynamic Voltage and Frequency Scaling (DVFS), which...

unlimited object storage image
Result Page: Previous 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy