Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
An Introduction to Statistical Learning: with Applications in R (Springer Texts in Statistics)
An Introduction to Statistical Learning: with Applications in R (Springer Texts in Statistics)

An Introduction to Statistical Learning provides an accessible overview of the field of statistical learning, an essential toolset for making sense of the vast and complex data sets that have emerged in fields ranging from biology to finance to marketing to astrophysics in the past twenty years. This book presents some of the most...

The Handbook of Financial Modeling: A Practical Approach to Creating and Implementing Valuation Projection Models
The Handbook of Financial Modeling: A Practical Approach to Creating and Implementing Valuation Projection Models

The ability to create and understand financial models that assess the valuation of a company, the projects it undertakes, and its future earnings/profit projections is one of the most valued skills in corporate finance. However, while many business professionals are familiar with financial statements and accounting reports, few are truly...

The Python Quick Syntax Reference
The Python Quick Syntax Reference

The Python Quick Syntax Reference is the "go to" book that contains an easy to read and use guide to Python programming and development. This condensed code and syntax reference presents the Python language in a well-organized format designed to be used time and again.

You won't find jargon, bloated samples,...

Computer and Information Security Handbook
Computer and Information Security Handbook

The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical...

Starting Out With Visual Basic 2012 (6th Edition)
Starting Out With Visual Basic 2012 (6th Edition)

Note: You are purchasing a Book/CD; MyProgrammingLab does not come packaged with this content. If you would like to purchase both the physical text and MyProgrammingLab search for ISBN-10: 0133441873 / ISBN-13: 9780133441871. That package includes ISBN-10: 0133128083 / ISBN-13: 9780133128086 and...

Kali Linux Cookbook
Kali Linux Cookbook

When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes.

Overview

  • Recipes designed to educate you extensively on the penetration testing principles and Kali...
Bandit Algorithms for Website Optimization
Bandit Algorithms for Website Optimization

When looking for ways to improve your website, how do you decide which changes to make? And which changes to keep? This concise book shows you how to use Multiarmed Bandit algorithms to measure the real-world value of any modifications you make to your site. Author John Myles White shows you how this powerful class of algorithms can...

Getting Started with Memcached
Getting Started with Memcached

Speed up and scale out your web applications with Memcached

Overview

  • Set up the Memcached service on your server or development machine
  • Use Memcached on your Java, Ruby, Python, and PHP applications
  • Full of practical, real-world examples and easy-to-follow explanations
  • ...
Getting Started with BeagleBone: Linux-Powered Electronic Projects With Python and JavaScript
Getting Started with BeagleBone: Linux-Powered Electronic Projects With Python and JavaScript

Many people think of Linux as a computer operating system, running on users' desktops and powering servers. But Linux can also be found inside many consumer electronics devices. Whether they're the brains of a cell phone, cable box, or exercise bike, embedded Linux systems blur the distinction between computer and device.
...

Quantum Attacks on Public-Key Cryptosystems
Quantum Attacks on Public-Key Cryptosystems

The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no...

An Introduction to Numerical Methods and Analysis
An Introduction to Numerical Methods and Analysis

Praise for the First Edition

". . . outstandingly appealing with regard to its style,contents, considerations of requirements of practice, choice ofexamples, and exercises."—Zentralblatt MATH

". . . carefully structured with many detailed workedexamples."—The...

Bad to the Bone: Crafting Electronics Systems with Beaglebone and BeagleBone Black
Bad to the Bone: Crafting Electronics Systems with Beaglebone and BeagleBone Black

This comprehensive book provides detailed materials for both novice and experienced programmers using all BeagleBone variants which host a powerful 32-bit, super-scalar TI Sitara ARM Cortex A8 processor. Authored by Steven F. Barrett and Jason Kridner, a seasoned ECE educator along with the founder of Beagleboard.org, respectively, the work...

Result Page: Previous 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 Next 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy