Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Proceedings of the 20th Congress of the International Ergonomics Association (IEA 2018): Volume IV: Organizational Design and Management (ODAM), ... in Intelligent Systems and Computing)
Proceedings of the 20th Congress of the International Ergonomics Association (IEA 2018): Volume IV: Organizational Design and Management (ODAM), ... in Intelligent Systems and Computing)

This book presents the proceedings of the 20th Congress of the International Ergonomics Association (IEA 2018), held on August 26-30, 2018, in Florence, Italy. By highlighting the latest theories and models, as well as cutting-edge technologies and applications, and by combining findings from a range of disciplines including...

Neurosurgery: A Case-Based Approach
Neurosurgery: A Case-Based Approach

This book describes neurosurgical cases following the format of the clinical handover. Each case has a one line summary and differential diagnosis, appropriate interpretation of illustrated radiological studies, further ancillary tests, and management options. When appropriate, scoring/scaling systems and detailed anatomy are...

Beginning Blockchain: A Beginner's Guide to Building Blockchain Solutions
Beginning Blockchain: A Beginner's Guide to Building Blockchain Solutions

Understand the nuts and bolts of Blockchain, its different flavors with simple use cases, and cryptographic fundamentals. You will also learn some design considerations that can help you build custom solutions.

Beginning Blockchain is a beginner’s guide to understanding the core concepts of...

Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities
Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities

Master Shellcode to leverage the buffer overflow concept

Key Features

  • Understand how systems can be bypassed both at the operating system and network level with shellcode, assembly, and Metasploit
  • Learn to write and modify 64-bit shellcode along with kernel-level shellcode...
Artificial Intelligence for Big Data: Complete guide to automating Big Data solutions using Artificial Intelligence techniques
Artificial Intelligence for Big Data: Complete guide to automating Big Data solutions using Artificial Intelligence techniques

Build next-generation artificial intelligence systems with Java

Key Features

  • Implement AI techniques to build smart applications using Deeplearning4j
  • Perform big data analytics to derive quality insights using Spark MLlib
  • Create self-learning systems using...
Primer of Diagnostic Imaging: Expert Consult - Online and Print
Primer of Diagnostic Imaging: Expert Consult - Online and Print

Widely known as THE survival guide for radiology residents, fellows, and junior faculty, the "purple book" provides comprehensive, up-to-date coverage of diagnostic imaging in an easy-to-read, bulleted format. Focusing on the core information you need for learning and practice, this portable resource combines...

Bioenergy for Sustainability and Security
Bioenergy for Sustainability and Security

This book discusses the generation of green energy, providing fundamental scientific information on the availability of sustainable biological resources. It addresses inter- and multidisciplinary topics, including policies and strategies for sustainable energy; the environment and advanced renewable energy technology; electricity...

Digital and Statistical Signal Processing
Digital and Statistical Signal Processing

Nowadays, many aspects of electrical and electronic engineering are essentially applications of DSP. This is due to the focus on processing information in the form of digital signals, using certain DSP hardware designed to execute software. Fundamental topics in digital signal processing are introduced with theory, analytical tables,...

Deep Learning Quick Reference: Useful hacks for training and optimizing deep neural networks with TensorFlow and Keras
Deep Learning Quick Reference: Useful hacks for training and optimizing deep neural networks with TensorFlow and Keras

Dive deeper into neural networks and get your models trained, optimized with this quick reference guide

Key Features

  • A quick reference to all important deep learning concepts and their implementations
  • Essential tips, tricks, and hacks to train a variety of deep learning...
Hands-On Bitcoin Programming with Python: Build powerful online payment centric applications with Python
Hands-On Bitcoin Programming with Python: Build powerful online payment centric applications with Python

Simplified Python programming for Bitcoin and blockchain

Key Features

  • Build Bitcoin applications in Python with the help of simple examples
  • Mine Bitcoins, program Bitcoin-enabled APIs and transaction graphs, and build trading bots
  • Analyze Bitcoin...
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents

Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support.

Surviving an incident, or a...

Hybrid Massive MIMO Precoding in Cloud-RAN (Wireless Networks)
Hybrid Massive MIMO Precoding in Cloud-RAN (Wireless Networks)

This book covers the design and optimization of hybrid RF-baseband precoding for massive multiple-input multiple-output (MIMO)-enabled cloud radio access networks (RANs), where use cases such as millimeter-wave wireless backhauling, fully-loaded cellular networks are of interest. The suitability and practical implementation of the...

unlimited object storage image
Result Page: Previous 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy