Télécharger le livre :  Bloodstain Pattern Analysis in Crime Scenarios
Ajouter à ma liste d'envies
This book introduces the core concepts of bloodstain pattern analysis that help to understand and make independent contributions to crime scenes accurately. It presents a bridge between new research results and the practical work field of crime scene investigation in...

Editeur : Springer
Parution : 2020-12-12

PDF, ePub

73,84
Télécharger le livre :  IP Address Management
Ajouter à ma liste d'envies
Rediscover fundamental and advanced topics in IPAM, DNS, DHCP and other core networking technologies with this updated one-stop reference The thoroughly revised second edition of IP Address Management is the definitive reference for working with core IP management...

Editeur : Wiley-IEEE Press
Parution : 2020-12-12
Collection : IEEE Press Series on Network and Service Management
PDF, ePub

116,99
Télécharger le livre :  Pro Ember Data
Ajouter à ma liste d'envies
Learn how to work with Ember Data efficiently, from APIs, adapters, and serializers to polymorphic relationships, using your existing JavaScript and Ember knowledge. This book will teach you how to adapt Ember Data to fit your custom API.Have a custom API that you...

Editeur : Apress
Parution : 2020-12-12

PDF, ePub

36,47
Télécharger le livre :  Smart Cities: A Data Analytics Perspective
Ajouter à ma liste d'envies
This book offers practical as well as conceptual knowledge of the latest trends, tools, techniques and methodologies of data analytics in smart cities. The smart city is an advanced technological area that is capable of understanding the environment by examining the...

Editeur : Springer
Parution : 2020-12-11

PDF, ePub

168,79
Télécharger le livre :  Wireless Networks and Industrial IoT
Ajouter à ma liste d'envies
This book provides a comprehensive overview of the most relevant research and standardization results in the area of wireless networking for Industrial IoT, covering both critical and massive connectivity. Most chapters in this book are intended to serve as short...

Editeur : Springer
Parution : 2020-12-11

PDF, ePub

168,79
Télécharger le livre :  A Machine Learning Based Model of Boko Haram
Ajouter à ma liste d'envies
This is the first study of Boko Haram that brings advanced data-driven, machine learning models to both learn models capable of predicting a wide range of attacks carried out by Boko Haram, as well as develop data-driven policies to shape Boko Haram’s behavior and...

Editeur : Springer
Parution : 2020-12-11

PDF, ePub

137,14
Télécharger le livre :  Workgroups eAssessment: Planning, Implementing and Analysing Frameworks
Ajouter à ma liste d'envies
This book was developed during a particular pandemic situation in the whole world which confined people to their homes. Therefore, there was a rise in the use of distance working and learning (e-learning) which led to a very quick adoption of...

Editeur : Springer
Parution : 2020-12-11

PDF, ePub

147,69
Télécharger le livre :  IT Crisisology: Smart Crisis Management in Software Engineering
Ajouter à ma liste d'envies
This book focuses on crisis management in software development which includes forecasting, responding and adaptive engineering models, methods, patterns and practices. It helps the stakeholders in understanding and identifying the key technology, business and human...

Editeur : Springer
Parution : 2020-12-11

PDF, ePub

147,69
Télécharger le livre :  IoT Projects with NVIDIA Jetson Nano
Ajouter à ma liste d'envies
Explore the capabilities of the NVIDIA Jetson Nano, an IoT device designed to perform computations like a computer desktop. This book will show you how to build your first project and optimize your devices, programs, and daily activities with the AI computation...

Editeur : Apress
Parution : 2020-12-11

PDF, ePub

46,34
Télécharger le livre :  Authentication and Access Control
Ajouter à ma liste d'envies
Cybersecurity is a critical concern for individuals and for organizations of all types and sizes. Authentication and access control are the first line of defense to help protect you from being attacked. This book begins with the theoretical background of cryptography...

Editeur : Apress
Parution : 2020-12-11

PDF, ePub

62,11
Télécharger le livre :  Skew PBW Extensions
Ajouter à ma liste d'envies
This monograph is devoted to a new class of non-commutative rings, skew Poincaré–Birkhoff–Witt (PBW) extensions. Beginning with the basic definitions and ring-module theoretic/homological properties, it goes on to investigate finitely generated projective modules over...

Editeur : Springer
Parution : 2020-12-11

PDF

137,14
Télécharger le livre :  Implementing AI Systems
Ajouter à ma liste d'envies
AI is one of the fastest growing corners of the tech world. But there remains one big problem: manyAI projects fail. The fact is thatAI is unique among IT projects. The technology requires a different mindset, in terms of understanding probabilities, data structures and...

Editeur : Apress
Parution : 2020-12-11

PDF, ePub

62,11
Télécharger le livre :  Core Blender Development
Ajouter à ma liste d'envies
Learn the essential source code of Blender and its unique build system. This book provides the inner workings of the Blender C-based source code, and will be indispensable for those wanting to contribute to this important open-source project.Blender is an...

Editeur : Apress
Parution : 2020-12-11

PDF, ePub

62,11
Télécharger le livre :  C++20 for Lazy Programmers
Ajouter à ma liste d'envies
Ready to learn programming with less effort and more fun? Then do it the lazy way! C++20 for Lazy Programmers uses humor and fun to make you actually willing to read and eager to do the projects as you master the popular and powerful C++ language. Along the way it...

Editeur : Apress
Parution : 2020-12-11

PDF, ePub

49,29
Télécharger le livre :  Codebreaking
Ajouter à ma liste d'envies
'The best book on codebreaking I have read', SIR DERMOT TURING 'Brings back the joy I felt when I first read about these things as a kid', PHIL ZIMMERMANN 'This is at last the single book on codebreaking that you must have. If you are not yet addicted to cryptography,...

Editeur : Robinson
Parution : 2020-12-10

ePub

3,99
Télécharger le livre :  Proceedings of the Sixth International Conference on Mathematics and Computing
Ajouter à ma liste d'envies
This book features selected papers from the 6th International Conference on Mathematics and Computing (ICMC 2020), organized by Sikkim University, Gangtok, Sikkim, India, during September 2020. It covers recent advances in the field of mathematics, statistics, and...

Editeur : Springer
Parution : 2020-12-10

PDF, ePub

210,99
Télécharger le livre :  Full-Stack Web Development with Jakarta EE and Vue.js
Ajouter à ma liste d'envies
Harness the power of Jakarta EE to build sturdy back ends while applying Vue.js on the front end. The demand for modern, high-performing enterprise web applications is growing swiftly. The basic HTML front end is no longer enough to meet customer demands. This book...

Editeur : Apress
Parution : 2020-12-10

PDF, ePub

62,11
Télécharger le livre :  Beginning Ruby 3
Ajouter à ma liste d'envies
Learn the principles behind object-oriented programming in Ruby and within a few chapters create a fully functional Ruby 3-based application. You'll gain a basic understanding of many ancillary technologies such as databases, XML, web frameworks, and networking - some...

Editeur : Apress
Parution : 2020-12-09

PDF, ePub

62,11
Télécharger le livre :  Digital Forensic Investigation of Internet of Things (IoT) Devices
Ajouter à ma liste d'envies
This book provides a valuable reference for digital forensics practitioners and cyber security experts operating in various fields of law enforcement, incident response and commerce. It is also aimed at researchers seeking to obtain a more profound knowledge of Digital...

Editeur : Springer
Parution : 2020-12-09

PDF, ePub

105,49
Télécharger le livre :  SCADA Security
Ajouter à ma liste d'envies
Examines the design and use of Intrusion Detection Systems (IDS) to secure Supervisory Control and Data Acquisition (SCADA) systems Cyber-attacks on SCADA systems?the control system architecture that uses computers, networked data communications, and graphical user...

Editeur : Wiley
Parution : 2020-12-09
Collection : Wiley Series on Parallel and Distributed Computing
PDF, ePub

108,99
<< < 392393394395396 >