Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computational Models of Complex Systems (Intelligent Systems Reference Library)
Computational Models of Complex Systems (Intelligent Systems Reference Library)

Computational and mathematical models provide us with the opportunities to investigate the complexities of real world problems. They allow us to apply our best analytical methods to define problems in a clearly mathematical manner and exhaustively test our solutions before committing expensive resources. This is made possible by assuming...

Getting Started with ownCloud
Getting Started with ownCloud

Making your data easily accessible on multiple devices is the primary goal of ownCloud. It gives you control of your own data along with the flexibility to set it up the way you want it. Community backup to the project ensures high quality software and gives you the power to modify and create features.

Getting Started with ownCloud...

Build Awesome Command-Line Applications in Ruby 2: Control Your Computer, Simplify Your Life
Build Awesome Command-Line Applications in Ruby 2: Control Your Computer, Simplify Your Life

Speak directly to your system. With its simple commands, flags, and parameters, a well-formed command-line application is the quickest way to automate a backup, a build, or a deployment and simplify your life. With this book, you'll learn specific ways to write command-line applications that are easy to use, deploy, and maintain, using a...

Algorithms Unlocked
Algorithms Unlocked

Have you ever wondered how your GPS can find the fastest way to your destination, selecting one route from seemingly countless possibilities in mere seconds? How your credit card account number is protected when you make a purchase over the Internet? The answer is algorithms. And how do these mathematical formulations translate themselves...

Group Policy: Fundamentals, Security, and the Managed Desktop
Group Policy: Fundamentals, Security, and the Managed Desktop

The Ultimate Book on Group Policy

Freshly updated to include Windows 7, Windows 8 and Windows Server 2012, Group Policy: Fundamentals, Security, and the Managed Desktop, Second Edition is the book for learning everything you need to know about Group Policy, no matter which version of Windows you use. Microsoft...

Understanding Computation: From Simple Machines to Impossible Programs
Understanding Computation: From Simple Machines to Impossible Programs
This book is for programmers who are curious about programming languages and the theory of computation, especially those who don’t have a formal background in mathematics or computer science.

If you’re interested in the mind-expanding parts of computer science that deal with programs,
...
Unity Android Game Development by Example Beginner's Guide
Unity Android Game Development by Example Beginner's Guide

Absolute beginners to designing games for Android will find this book is their passport to quick results. Lots of handholding and practical exercises using Unity 3D makes learning a breeze.

Overview

  • Enter the increasingly popular mobile market and create games using Unity 3D and Android
  • ...
Taming Text: How to Find, Organize, and Manipulate It
Taming Text: How to Find, Organize, and Manipulate It

Summary

Taming Text, winner of the 2013 Jolt Awards for Productivity, is a hands-on, example-driven guide to working with unstructured text in the context of real-world applications. This book explores how to automatically organize text using approaches such as full-text search, proper name recognition,...

Programming with Mathematica®: An Introduction
Programming with Mathematica®: An Introduction

Starting from first principles, this book covers all of the foundational material needed to develop a clear understanding of the Mathematica language, with a practical emphasis on solving problems. Concrete examples throughout the text demonstrate how Mathematica language, can be used to solve problems in science, engineering,...

Managing Information Security, Second Edition
Managing Information Security, Second Edition

Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers...

Linear Mixed-Effects Models Using R: A Step-by-Step Approach
Linear Mixed-Effects Models Using R: A Step-by-Step Approach
Linear mixed-effects models (LMMs) are an important class of statistical models that can be used to analyze correlated data. Such data include clustered observations, repeated measurements, longitudinal measurements, multivariate observations, etc.

The aim of our book is to help readers in fitting LMMs using R
...
C Primer Plus (6th Edition)
C Primer Plus (6th Edition)

C Primer Plus is a carefully tested, well-crafted, and complete tutorial on a subject core to programmers and developers. This computer science classic teaches principles of programming, including structured code and top-down design.

 

Author and...

Result Page: Previous 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 Next 
┬ę2019 LearnIT (support@pdfchm.net) - Privacy Policy