- Sách/Book
Authors: Crystal Panek (2020) - A clear and concise resource on Windows networking, perfect for IT beginners, this practical guide covers everything you need to know about network infrastructures, hardware, protocols, and services
|
- Sách/Book
Authors: Trefousse, Hans L (1999) - In Impeachment of a President, Hans L. Trefousse focuses on the causes of the failure to convict, the consequences of the acquittal, and the relationship of the impeachment to the ill success of Reconstruction. Drawing on a wealth of material, some only recently made available, Professor Trefousse sheds new light on the President's objectives and character.
|
- Sách/Book
Authors: Pierre-Olivier Laurence (2022) - Authors Pierre-Olivier Laurence, Amanda Hinchman-Dominguez, G. Blake Meike, and Mike Dunn explore implementations of the most common tasks in native Android development, and show you how Kotlin can help you solve concurrency problems. With a focus on structured concurrency, a new asynchronous programming paradigm, this book will guide you through one of Kotlin's most powerful constructs, coroutines.
|
- Sách/Book
Authors: Marcin Jamro (2024) - You’ll also learn how to sort arrays using various algorithms, setting a solid foundation for your programming expertise. As you progress through the book, you’ll venture into more complex data structures – trees and graphs – and discover algorithms for tasks such as determining the shortest path in a graph before advancing to see various algorithms in action, such as solving Sudoku. By the end of the book, you’ll have learned how to use the C# language to build algorithmic components that are not only easy to understand and debug but also seamlessly applicable in various applications, spanning web and mobile platforms
|
- Sách/Book
Authors: Mugerman, Yevgeny (2023) - This book describes certainty, uncertainty, financial risks, methods of risk mitigation, and risk management. The first chapter of this book represents some milestones in risk management and introduces the main aspects of financial risk management. The following chapters discuss various types of financial risk such as market risk, credit risk, operational risk, liquidity risk, interest rate risk, and other financial risks. The last chapter describes enterprise risk management which binds together all the risks. This book, which is accompanied by PowerPoint presentations, is aimed at lecturers, students, and practitioners with an interest in risk management. The book is the fruit of the authors' long years of work in the field of risk management, serving as a risk management advisor ...
|
- Sách/Book
Authors: Ata Jahangir Moshayedi (2023) - "Unity in Embedded System Design and Robotics is the first of its kind and provides a step-by-step guide to Unity for embedded system design and robotics. It is an open gateway for anyone who wants to learn Unity through real projects and examples and will be a particularly useful aid for both professionals and students in the fields of embedded system design and robotics. Each chapter contains a unique project, and the user will be guided through the different windows and sections of Unity every step of the way. The book also includes projects which connect Unity to Arduino and Raspberry Pi, which will help readers better understand various Unity applications in the real world"--
|
- Sách/Book
Authors: Tudor, Daniel (2015) - Private Markets, Fashion Trends, Prison Camps, Dissenters and Defectors. North Korea is one of the most troubled societies on earth. The country's 24 million people live under a violent dictatorship led by a single family, which relentlessly pursues the development of nuclear arms, which periodically incites risky military clashes with the larger, richer, liberal South, and which forces each and every person to play a role in the "theater state" even as it pays little more than lip service to the wellbeing of the overwhelming majority. With this deeply anachronistic system eventually failed in the 1990s, it triggered a famine that decimated the countryside and obliterated the lives of many hundreds of thousands of people.
|
- Sách/Book
Authors: Syed Abdul Rehman Khan (2019) - This book covers the scope of supply chain and logistics, which has continued to grow with a rapid speed. The book includes core aspects of supply chain and logistics philosophy and practice. The authors then cover the general principles of supply chain and logistics that can be applied in countries throughout the world.
|
- Sách/Book
Authors: Pawan Singh (2024) - "The book presents theoretical and experimental approaches, quantitative and qualitative analysis, and simulations in wireless ad-hoc and sensor networks. It further explains the power, and routing optimization in underwater sensor networks, advanced cross-layer framework, challenges, security issues in underwater sensor networks, and the use of machine learning and deep learning techniques for security implementations in wireless ad-hoc and sensor networks. This book: Discusses mobile ad-hoc network routing issues and challenges with node mobility and resource limitations. Cover the internet of vehicles, autonomous vehicle architecture, and design of heterogeneous wireless sensor networks. Presents various technologies of ad-hoc networks, use of machine learning, and deep learning ...
|
- Sách/Book
Authors: Denis Rothman (2022) - The book investigates machine translations, speech-to-text, text-to-speech, question-answering, and many more NLP tasks. It provides techniques to solve hard language problems and may even help with fake news anxiety (read chapter 13 for more details).You'll see how cutting-edge platforms, such as OpenAI, have taken transformers beyond language into computer vision tasks and code creation using Codex.By the end of this book, you'll know how transformers work and how to implement them and resolve issues like an AI detective!What you will learnFind out how ViT and CLIP label images (including blurry ones!) and create images from a sentence using DALL-EDiscover new techniques to investigate complex language problemsCompare and contrast the results of GPT-3 against T5, GPT-2, and BERT-b...
|