Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Neural Network Programming with Java
Neural Network Programming with Java

Create and unleash the power of neural networks by implementing professional Java code

About This Book

  • Learn to build amazing projects using neural networks including forecasting the weather and pattern recognition
  • Explore the Java multi-platform feature to run your personal neural...
Scheduling: Theory, Algorithms, and Systems
Scheduling: Theory, Algorithms, and Systems

This new edition provides an up-to-date coverage of important theoretical models in the scheduling literature as well as  significant scheduling problems that occur in the real world. It again includes supplementary  material in the form of  slide-shows from industry and movies that...

Enterprise Content and Search Management for Building Digital Platforms
Enterprise Content and Search Management for Building Digital Platforms

Provides modern enterprises with the tools to create a robust digital platform utilizing proven best practices, practical models, and time-tested techniques

Contemporary business organizations can either embrace the digital revolution—or be left behind. Enterprise Content and Search Management for Building Digital...

Information Security Science: Measuring the Vulnerability to Data Compromises
Information Security Science: Measuring the Vulnerability to Data Compromises

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically...

HTML, CSS & JavaScript Web Publishing in One Hour a Day, Sams Teach Yourself: Covering HTML5, CSS3, and jQuery (7th Edition)
HTML, CSS & JavaScript Web Publishing in One Hour a Day, Sams Teach Yourself: Covering HTML5, CSS3, and jQuery (7th Edition)

Thoroughly revised and updated with examples rewritten to conform to HTML5, CSS3, and contemporary web development practices, this easy-to-understand, step-by-step tutorial helps you quickly master the basics of HTML and CSS before moving on to more advanced topics such as graphics, video, and interactivity with...
A Guide to Eighteenth-Century Art
A Guide to Eighteenth-Century Art

A Guide to Eighteenth-Century Art offers an introductory overview of the art, artists, and artistic movements of this exuberant period in European art, and the social, economic, philosophical, and political debates that helped shape them. 

  • Covers both artistic developments and critical approaches to the period...
Cutting and Draping Party and Eveningwear: Pattern Cutting for Special Occasion Clothes
Cutting and Draping Party and Eveningwear: Pattern Cutting for Special Occasion Clothes
When you want to dress up, this is the complete guide to creating special-occasion clothes—party dresses and eveningwear. With step-by-step instructions, Dawn Cloake explains how to develop basic design blocks for a wide range of garments, and then mix and match the elements to make something that’s truly unique. She includes...
PHP Beyond the Web
PHP Beyond the Web

Use your existing web-based PHP skills to write all types of software: CLI scripts, desktop software, network servers, and more. This book gives you the tools, techniques, and background necessary to write just about any type of software you can think of, using the PHP you know.

PHP Beyond the Web...

Learning Analytics in R with SNA, LSA, and MPIA
Learning Analytics in R with SNA, LSA, and MPIA

This book introduces Meaningful Purposive Interaction Analysis (MPIA) theory, which combines social network analysis (SNA) with latent semantic analysis (LSA) to help create and analyse a meaningful learning landscape from the digital traces left by a learning community in the co-construction of knowledge.    

...

iOS Penetration Testing: A Definitive Guide to iOS Security
iOS Penetration Testing: A Definitive Guide to iOS Security
Unearth some of the most significant attacks threatening iOS applications in recent times and learn methods of patching them to make payment transactions and personal data sharing more secure. 

When it comes to security, iOS has been in the spotlight for a variety of reasons. Although a tough system to
...
Indigenous Pop: Native American Music from Jazz to Hip Hop
Indigenous Pop: Native American Music from Jazz to Hip Hop
Popular music compels, it entertains, and it has the power to attract and move audiences. With that in mind, the editors of Indigenous Pop showcase the contributions of American Indian musicians to popular forms of music, including jazz, blues, country-western, rock and roll, reggae, punk, and hip hop.

From Joe
...
SAS Data Analytic Development: Dimensions of Software Quality (Wiley and SAS Business Series)
SAS Data Analytic Development: Dimensions of Software Quality (Wiley and SAS Business Series)

Design quality SAS software and evaluate SAS software quality

SAS Data Analytic Development is the developer’s compendium for writing better-performing software and the manager’s guide to building comprehensive software performance requirements. The text introduces and parallels the International...

Result Page: Previous 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 Next 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy