James Vincent McMorrow – Post Tropical (2014) | Deep State 9.6 | Warren Jeffs: Prophet of Evil HD
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Deep Learning with Python: A Hands-on Introduction
Deep Learning with Python: A Hands-on Introduction
Discover the practical aspects of implementing deep-learning solutions using the rich Python ecosystem. This book bridges the gap between the academic state-of-the-art and the industry state-of-the-practice by introducing you to deep learning frameworks such as Keras, Theano, and Caffe. The practicalities of these frameworks is often...
Software Testing: Concepts and Operations (Quantitative Software Engineering Series)
Software Testing: Concepts and Operations (Quantitative Software Engineering Series)

Explores and identifies the main issues, concepts, principles and evolution of software testing, including software quality engineering and testing concepts, test data generation, test deployment analysis, and software test management

This book examines the principles, concepts, and processes that are fundamental to
...

Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics)
Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics)

Master Bayesian Inference through Practical Examples and Computation–Without Advanced Mathematical Analysis

 

Bayesian methods of inference are deeply natural and extremely powerful. However, most discussions of Bayesian inference rely...

Blockchain Basics: A Non-Technical Introduction in 25 Steps
Blockchain Basics: A Non-Technical Introduction in 25 Steps

In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used. No previous knowledge in computer science, mathematics, programming, or cryptography is required. Terminology is explained through pictures, analogies, and metaphors.

This book...

A Primer on Scientific Programming with Python (Texts in Computational Science and Engineering)
A Primer on Scientific Programming with Python (Texts in Computational Science and Engineering)

The book serves as a first introduction to computer programming of scientific applications, using the high-level Python language. The exposition is example and problem-oriented, where the applications are taken from mathematics, numerical calculus, statistics, physics, biology and finance. The book teaches "Matlab-style" and...

Conducting Network Penetration and Espionage in a Global Environment
Conducting Network Penetration and Espionage in a Global Environment

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open...

The Art of Computer Programming, Vol. 1: Fundamental Algorithms, 3rd Edition
The Art of Computer Programming, Vol. 1: Fundamental Algorithms, 3rd Edition

The bible of all fundamental algorithms and the work that taught many of today's software developers most of what they know about computer programming.

Byte, September 1995

 

I can't begin to tell you how many pleasurable...

Translating Statistics to Make Decisions: A Guide for the Non-Statistician
Translating Statistics to Make Decisions: A Guide for the Non-Statistician

Examine and solve the common misconceptions and fallacies that non-statisticians bring to their interpretation of statistical results. Explore the many pitfalls that non-statisticians―and also statisticians who present statistical reports to non-statisticians―must avoid if statistical results are to be correctly used for...

Network Security Through Data Analysis: From Data to Action
Network Security Through Data Analysis: From Data to Action

Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You’ll...

Solving Applied Mathematical Problems with MATLAB
Solving Applied Mathematical Problems with MATLAB

This textbook presents a variety of applied mathematics topics in science and engineering with an emphasis on problem solving techniques using MATLAB®. The authors provide a general overview of the MATLAB language and its graphics abilities before delving into problem solving, making the book useful for readers without prior...

Spectral Logic and Its Applications for the Design of Digital Devices
Spectral Logic and Its Applications for the Design of Digital Devices

Spectral techniques facilitate the design and testing of today's increasingly complex digital devices

There is heightened interest in spectral techniques for the design of digital devices dictated by ever increasing demands on technology that often cannot be met by classical approaches. Spectral methods provide a uniform
...

A Matrix Handbook for Statisticians (Wiley Series in Probability and Statistics)
A Matrix Handbook for Statisticians (Wiley Series in Probability and Statistics)
A comprehensive, must-have handbook of matrix methods with a unique emphasis on statistical applications

This timely book, A Matrix Handbook for Statisticians, provides a comprehensive, encyclopedic treatment of matrices as they relate to both statistical concepts and methodologies. Written by an experienced authority on matrices and...

Result Page: 144 143 142 141 140 139 138 137 136 135 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy