Read more... | Seitokai Yakuindomo | épisode 12 Remember
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics)
Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics)

Master Bayesian Inference through Practical Examples and Computation–Without Advanced Mathematical Analysis

 

Bayesian methods of inference are deeply natural and extremely powerful. However, most discussions of Bayesian inference rely...

Building Maintainable Software, C# Edition: Ten Guidelines for Future-Proof Code
Building Maintainable Software, C# Edition: Ten Guidelines for Future-Proof Code

Have you ever felt frustrated working with someone else’s code? Difficult-to-maintain source code is a big problem in software development today, leading to costly delays and defects. Be part of the solution. With this practical book, you’ll learn 10 easy-to-follow guidelines for delivering C# software that’s easy...

The DevOps Adoption Playbook: A Guide to Adopting DevOps in a Multi-Speed IT Enterprise
The DevOps Adoption Playbook: A Guide to Adopting DevOps in a Multi-Speed IT Enterprise

Achieve streamlined, rapid production with enterprise-level DevOps

Awarded DevOps 2017 Book of the Year, The DevOps Adoption Playbook provides practical, actionable, real-world guidance on implementing DevOps at enterprise scale. Author Sanjeev Sharma heads the DevOps practice for IBM; in this book, he provides unique...

Applied Network Security
Applied Network Security

Master the art of detecting and averting advanced network security attacks and techniques

About This Book

  • Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
  • Become an expert in cracking WiFi...
Mastering Kubernetes: Large scale container deployment and management
Mastering Kubernetes: Large scale container deployment and management

Master the art of container management utilizing the power of Kubernetes.

About This Book

  • This practical guide demystifies Kubernetes and ensures that your clusters are always available, scalable, and up to date
  • Discover new features such as autoscaling, rolling updates, resource quotas,...
iOS 9 Application Development in 24 Hours, Sams Teach Yourself (7th Edition)
iOS 9 Application Development in 24 Hours, Sams Teach Yourself (7th Edition)

Covers iOS 9.1 and up, Xcode 7.x, iPhone, iPad, and More!

In just 24 sessions of one hour each, learn how to build powerful applications for today’s hottest handheld devices: the iPhone and iPad! Using this book’s straightforward, step-by-step approach, you’ll master every skill and technology you
...

VMware Horizon 6 Desktop Virtualization Solutions
VMware Horizon 6 Desktop Virtualization Solutions

Plan, design, and secure your virtual desktop environments with VMware Horizon 6 View

About This Book

  • Design a successful solution to deliver Windows desktops and applications as a service
  • Provide redundancy for components and design a backup solution and disaster recovery plan to protect...
Kali Linux CTF Blueprints
Kali Linux CTF Blueprints

Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux

About This Book

  • Put the skills of the experts to the test with these tough and customisable pentesting projects
  • Develop each challenge to suit your specific...
1000 Ideas by 100 Graphic Designers
1000 Ideas by 100 Graphic Designers

1000 Ideas by 100 Graphic Designers showcases work from a selection of today’s best designers while providing precious tips to the graphic design enthusiast. The book...

Prime Numbers: The Most Mysterious Figures in Math
Prime Numbers: The Most Mysterious Figures in Math

A fascinating journey into the mind-bending world of prime numbers

Cicadas of the genus Magicicada appear once every 7, 13, or 17 years. Is it just a coincidence that these are all prime numbers? How do twin primes differ from cousin primes, and what on earth (or in the mind of a mathematician) could be sexy about prime numbers?
...

Linear Genetic Programming (Genetic and Evolutionary Computation)
Linear Genetic Programming (Genetic and Evolutionary Computation)
Linear Genetic Programming presents a variant of genetic programming (GP) that evolves imperative computer programs as linear sequences of instructions, in contrast to the more traditional functional expressions or syntax trees. Primary characteristics of linear program structure are exploited to achieve acceleration of both execution time and...
Common English Mistakes Explained With Examples: Over 300 Mistakes Almost Students Make and How To Avoid Them In Less Than 5 Minutes A Day (Book 1)
Common English Mistakes Explained With Examples: Over 300 Mistakes Almost Students Make and How To Avoid Them In Less Than 5 Minutes A Day (Book 1)

Speak and write English as if it were your native tongue!

- Do you usually make mistakes in English?

- Do you feel tired of making the same mistakes in English again and again?

- Would you like to learn how to avoid and correct those typical mistakes so you are...

Result Page: 85 84 83 82 81 80 79 78 77 76 
¬©2018 LearnIT (support@pdfchm.net) - Privacy Policy