Tomo-chan wa Onnanoko! Chapter 736: | Tomo-chan wa Onnanoko! Chapter 735: | Tomo-chan wa Onnanoko! Chapter 734:
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Data Science with R
Practical Data Science with R

Summary

Practical Data Science with R lives up to its name. It explains basic principles without the theoretical mumbo-jumbo and jumps right to the real use cases you'll face as you collect, curate, and analyze the data crucial to the success of your business. You'll apply the R programming language...

Router Security Strategies: Securing IP Network Traffic Planes (Networking Technology: Security)
Router Security Strategies: Securing IP Network Traffic Planes (Networking Technology: Security)
Router Security Strategies: Securing IP Network Traffic Planes provides a compre-hensive approach to understand and implement IP traffic plane separation and protection on IP routers. This book details the distinct traffic planes of IP networks and the advanced techniques necessary to operationally secure them. This includes the data,...
Understanding Search Engines: Mathematical Modeling and Text Retrieval (Software, Environments, Tools), Second Edition
Understanding Search Engines: Mathematical Modeling and Text Retrieval (Software, Environments, Tools), Second Edition
“There is no other information retrieval/search book where the heart is the mathematical foundations. This book is greatly needed to further establish information retrieval as a serious academic, as well as practical and industrial, area." ---Jaime Carbonell, Carnegie Mellon University. “Berry and Browne describe most of what...
Tensors: The Mathematics of Relativity Theory and Continuum Mechanics
Tensors: The Mathematics of Relativity Theory and Continuum Mechanics
This book emerged from courses taught at the University College of Dublin, Carnegie-Mellon University and mostly at Simon Fraser University. This is a modern introduction to the theory of tensor algebra and tensor analysis. It discusses tensor algebra in Chapters 1 and 2. Differential manifold is introduced in Chapter 3. Tensor analysis,...
Mind Design II: Philosophy, Psychology, and Artificial Intelligence
Mind Design II: Philosophy, Psychology, and Artificial Intelligence
"Ming Design II is a welcome update of its predecessor, itself a useful compendium on the philosophy of cognitive science. This new volume retains the intellectual foundations, and some discussions of classical AI built on them, while adding connectionism, situated AI, and dynamic systems theory as extra storeys. Which of these is...
Quiet: The Power of Introverts in a World That Can't Stop Talking
Quiet: The Power of Introverts in a World That Can't Stop Talking

At least one-third of the people we know are introverts. They are the ones who prefer listening to speaking, reading to partying; who innovate and create but dislike self-promotion; who favor working on their own over brainstorming in teams. Although they are often labeled "quiet," it is to introverts that we owe many of the great...

Think and Grow Rich
Think and Grow Rich
...During our ten-year association, I learned the missing number to my combination for worldwide successful achievement. The Master Mind Principle: two or more persons working together in complete harmony toward a mutual goal or goals...Napoleon Hill's philosophy teaches you what you were never taught. Specifically: How to Recognize, Relate,...
How to Win Friends & Influence People (Revised)
How to Win Friends & Influence People (Revised)
Millions of people around the world have - and continue to - improve their lives based on the teachings of Dale Carnegie. In "How to Win Friends and Influence People", Carnegie offers practical advice and techniques, in his exuberant and conversational style, for how to get out of a mental rut and make life more rewarding. His advice has...
UNIX and Linux Forensic Analysis DVD Toolkit
UNIX and Linux Forensic Analysis DVD Toolkit
The only Forensic Analysis book covering UNIX, which runs 37% of network servers worldwide.

This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account
...
Head First C# (Brain-Friendly Guides)
Head First C# (Brain-Friendly Guides)
Do you want to learn C#? Programmers around the world have learned that C# lets them design great-looking programs and build them fast. With C#, you ve got a powerful programming language and a valuable tool at your fingertips. And with the Visual Studio IDE, you ll never have to spend hours writing obscure code just to get a button...
Processing: A Programming Handbook for Visual Designers and Artists
Processing: A Programming Handbook for Visual Designers and Artists
It has been more than twenty years since desktop publishing reinvented design, and it's clear that there is a growing need for designers and artists to learn programming skills to fill the widening gap between their ideas and the capability of their purchased software. This book is an introduction to the concepts of computer programming within the...
The CISSP Prep Guide: Mastering the Ten Domains of Computer Security
The CISSP Prep Guide: Mastering the Ten Domains of Computer Security
A one-stop source of information covering everything you’ll need to know in order to pass the CISSP examination

The CISSP Prep Guide

From stolen intellectual proprietary and denial of service attacks to unauthorized use of critical resources and computer viruses, e-business companies face numerous threats each day that can...

Result Page: 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy