Backstrom | Watch Now | Streamango
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Statistical Analysis with R For Dummies (For Dummies (Computers))
Statistical Analysis with R For Dummies (For Dummies (Computers))

Understanding the world of R programming and analysis has never been easier

Most guides to R, whether books or online, focus on R functions and procedures. But now, thanks to Statistical Analysis with R For Dummies, you have access to a trusted, easy-to-follow guide that focuses on the foundational statistical...

Pro Processing for Images and Computer Vision with OpenCV: Solutions for Media Artists and Creative Coders
Pro Processing for Images and Computer Vision with OpenCV: Solutions for Media Artists and Creative Coders

Open Source Computer Vision Library (OpenCV, http://opencv.org/) started as an Intel research initiative around 1999. Now, it is the most popular open source software library for computer vision and machine learning. In the beginning, it was a set of C library functions for image processing and computer vision. Now, it has C++, Python, Java,...

JBoss in Action: Configuring the JBoss Application Server
JBoss in Action: Configuring the JBoss Application Server
JBoss in Action is the first book to focus on teaching readers in detail how to use the JBoss application server. Unlike other titles about JBoss, the authors of JBoss in Action go deeper into the advanced features and configuration of the server. In particular, it focuses on enterprise-class topics, such as high availability,...
OpenCL Parallel Programming Development Cookbook
OpenCL Parallel Programming Development Cookbook

OpenCL (Open Computing Language) is the first royalty-free standard for cross platform, parallel programming of modern processors found in personal computers, servers, mobiles, and embedded devices. OpenCL greatly improves speed and responsiveness for a wide spectrum of applications in numerous market categories, from gaming and entertainment...

Low-Level Programming: C, Assembly, and Program Execution on Intel® 64 Architecture
Low-Level Programming: C, Assembly, and Program Execution on Intel® 64 Architecture

Learn Intel 64 assembly language and architecture, become proficient in C, and understand how the programs are compiled and executed down to machine instructions, enabling you to write robust, high-performance code.

Low-Level Programming explains Intel 64 architecture as the result of von Neumann architecture...

Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the...

Introduction to 64 Bit Intel Assembly Language Programming for Linux
Introduction to 64 Bit Intel Assembly Language Programming for Linux
The Intel CPU architecture has evolved over 3 decades from a 1 6 bit CPU with no memory protection, through a period with 32 bit processors with sophisticated architectures into the current series of processors which support all the old modes of operation in addition to a greatly expanded 64 bit mode of operation. Assembly...
Windows Xp: Command Line
Windows Xp: Command Line
An operating system is a software program. If you have a microcomputer, commonly referred to as a PC, that conforms to the standards developed by IBM and uses a microprocessor in the Intel family, you are probably using a version of the Windows operating system. In fact, these computers are sometimes called Wintel machines because they use the...
Hack Attacks Testing: How to Conduct Your Own Security Audit
Hack Attacks Testing: How to Conduct Your Own Security Audit
Learn how to conduct thorough security examinations via illustrations and virtual simulations

A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the...

Bluetooth Revealed: The Insider's Guide to an Open Specification for Global Wireless Communications
Bluetooth Revealed: The Insider's Guide to an Open Specification for Global Wireless Communications
The convergence of computing and communications has been predicted for many years. Today's explosion of a myriad of new types of personal computing and communications devices—notebook computers, personal digital assistants, "smart" phones, two-way pagers, digital cameras and so on—has resulted in new ways for people to...
Fundamentals of WiMAX: Understanding Broadband Wireless Networking
Fundamentals of WiMAX: Understanding Broadband Wireless Networking

Fundamentals of WiMAX was consciously written to appeal to a broad audience, and to be of value to anyone who is interested in the IEEE 802.16e standards or wireless broadband networks more generally. The book contains cutting-edge tutorials on the technical and theoretical underpinnings to WiMAX that are not available anywhere else,...

Running MS-DOS 20th Anniversary Edition
Running MS-DOS 20th Anniversary Edition

Get the book that set the standard for all other MS-DOS books—now celebrating its 20th anniversary! Running MS-DOS is the best selling guide to the operating system that changed personal computing history. Featuring Van Wolverton’s down-to-earth style and eloquent applications, this one-step reference makes MS-DOS...

Result Page: 19 18 17 16 15 14 13 12 11 10 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy