Book picks similar to
Machine Learning 机器学习 by Zhou Zhihua 周志华
acquired
ai-machinelearning
china
computers
Numerical Recipes in C: The Art of Scientific Computing
William H. Press - 1988
In a self-contained manner it proceeds from mathematical and theoretical considerations to actual practical computer routines. With over 100 new routines bringing the total to well over 300, plus upgraded versions of the original routines, the new edition remains the most practical, comprehensive handbook of scientific computing available today.
Cultural Anthropology (MyAnthroLab Series)
Barbara D. Miller
Faculty and students praise the book's proven ability to generate class discussion, increase faculty-student engagement, and enhance student learning. Through clear writing, a balanced theoretical approach, and engaging examples, Miller stresses the importance of social inequality, cultural change, and applied aspects of anthropology throughout the book. Each chapter highlights an example of applied anthropology and connects with students by providing practical tips about how they can use anthropology in their everyday lives and careers. The last two chapters address how migration is changing world cultures and the importance of local cultural values and needs in shaping international development policies.
Python: 3 Manuscripts in 1 book: - Python Programming For Beginners - Python Programming For Intermediates - Python Programming for Advanced
Maurice J. Thompson - 2018
This Box Set Includes 3 Books: Python Programming For Beginners - Learn The Basics Of Python In 7 Days! Python Programming For Intermediates - Learn The Basics Of Python In 7 Days! Python Programming For Advanced - Learn The Basics Of Python In 7 Days! Python Programming For Beginners - Learn The Basics Of Python In 7 Days! Here's what you'll learn from this book: ✓Introduction ✓Understanding Python: A Detailed Background ✓How Python Works ✓Python Glossary ✓How to Download and Install Python ✓Python Programming 101: Interacting With Python in Different Ways ✓How to Write Your First Python Program ✓Variables, Strings, Lists, Tuples, Dictionaries ✓About User-Defined Functions ✓How to Write User-Defined Functions in Python ✓About Coding Style ✓Practice Projects: The Python Projects for Your Practice Python Programming For Intermediates - Learn The Basics Of Python In 7 Days! Here's what you'll learn from this book: ✓ Shallow copy and deep copy ✓ Objects and classes in Python–including python inheritance, multiple inheritances, and so on ✓ Recursion in Python ✓ Debugging and testing ✓ Fibonacci sequence (definition) and Memoization in Python in Python ✓ Arguments in Python ✓ Namespaces in Python and Python Modules ✓ Simple Python projects for Intermediates Python Programming For Advanced - Learn The Basics Of Python In 7 Days! Here's what you'll learn from this book: ✓File management ✓Python Iterator ✓Python Generator ✓Regular Expressions ✓Python Closure ✓Python Property ✓Python Assert, and ✓Simple recap projects Start Coding Now!
Summary and Analysis of The Handmaid's Tale: Based on the Book by Margaret Atwood (Smart Summaries)
Worth Books - 2017
Crafted and edited with care, Worth Books set the standard for quality and give you the tools you need to be a well-informed reader. This short summary and analysis of The Handmaid’s Tale by Margaret Atwood includes: Historical context Part-by-part summaries Analysis of the main characters Themes and symbols Important quotes Fascinating trivia Glossary of terms Supporting material to enhance your understanding of the original work About Margaret Atwood’s The Handmaid’s Tale: Margaret Atwood’s dystopian literary masterpiece tells the story of Offred, a Handmaid living in the near future in what was once the United States. A new theocratic regime called the Republic of Gilead has come to power and changed life as she knew it. Once Offred had a her own name and a loving family—a husband and daughter—both of which were taken from her; now she belongs to the Commander and his hostile wife, and her only value lies in her ability to bear a child for them. She used to read books and learn; now such things are forbidden to all women. Gripping, disturbing, and so relevant today, The Handmaid’s Tale is a brilliant novel and a chilling warning about what can happen when extreme ideas are taken to their logical conclusions. The summary and analysis in this ebook are intended to complement your reading experience and bring you closer to a great work of fiction.
Essential English for Foreign Students, Book II, Students' Book
C.E. Eckersley - 1940
It is planned to give a solid basis of the structures and vocabulary of English. Each book contains material for about a year's work, the vocabulary rising to some 3,000 words.The Teacher's Books provide notes on each lesson, the vocabulary to be taught, supplementary grammatical material and answers to exercises.In this new edition some of the grammatical sections have been, rewritten and expanded, and parts of the text and many illustrations have been brought up to date. Fundamentally, however, the new edition remains the same as previous editions.
MCSE Self-Paced Training Kit (Exams 70-290, 70-291, 70-293, 70-294): Microsoft Windows Server 2003 Core Requirements
Dan HolmeMelissa Craft - 2003
Maybe you re going for MCSA first, then MCSE. Maybe you need to upgrade your current credentials. Now, direct from Microsoft, this set brings together all the study resources you ll need. You get the brand-new Second Edition of all four books: for Exam 70-290 (Managing and Maintaining a Windows Server Environment), 70-291 and 70-293 (Network Infrastructure), and 70-294 (Active Directory). What s new here? Deeper coverage, more case studies, more troubleshooting, plus significant new coverage: Emergency Management Services, DNS, WSUS, Post-Setup Security Updates, traffic monitoring, Network Access Quarantine Control, and much more. There are more than 1,200 highly customizable CD-based practice questions. And, for those who don t have easy acess to Windows Server 2003, there s a 180-day eval version. This package isn t cheap, but there s help there, too: 15% discount coupons good toward all four exams. Bill Camarda, from the August 2006 href="http://www.barnesandnoble.com/newslet... Only
Hacking Exposed Wireless: Wireless Security Secrets & Solutions
Johnny Cache - 2007
Providing tactical wireless security implementation coverage by showing how to execute the attacks and implement the defenses, this title demonstrates how attackers identify and exploit wireless network weaknesses and covers various wireless technologies - WiFi/802.11, Bluetooth, IRDA, 3G Wireless, and more.
Survival Kit for Overseas Living: For Americans Planning to Live and Work Abroad
L. Robert Kohls - 1984
With this new fourth edition, sojourners about to set out to live or work overseas will soon discover why Kohls' experience and wisdom have stood the test of time. Kohls' penetrating insights and practical strategies on how to avoid stereotypes, how to explore the mysteries of culture, and how values and different ways of thinking influence behavior make this an indispensable guide. To bridge the cultural divide - whether traveling alone or with a family, for business or education, whether staying a month or a lifetime - pack this guide first!
Django for Beginners: Learn web development with Django 2.0
William S. Vincent - 2018
Proceed step-by-step through five progressively more complex web applications: from a "Hello World" app all the way to a robust Newspaper app with a custom user model, complete user authentication flow, foreign key relationships, and more. Learn current best practices around class-based views, templates, urls, user authentication, testing, and deployment. The material is up-to-date with the latest versions of both Django (2.0) and Python (3.6). TABLE OF CONTENTS: * Introduction * Chapter 1: Initial Setup * Chapter 2: Hello World app * Chapter 3: Pages app * Chapter 4: Message Board app * Chapter 5: Blog app * Chapter 6: Forms * Chapter 7: User Accounts * Chapter 8: Custom User Model * Chapter 9: User Authentication * Chapter 10: Bootstrap * Chapter 11: Password Change and Reset * Chapter 12: Email * Chapter 13: Newspaper app * Chapter 14: Permissions and Authorizations * Chapter 15: Comments * Conclusion
Doing Math with Python
Amit Saha - 2015
Python is easy to learn, and it's perfect for exploring topics like statistics, geometry, probability, and calculus. You’ll learn to write programs to find derivatives, solve equations graphically, manipulate algebraic expressions, even examine projectile motion.Rather than crank through tedious calculations by hand, you'll learn how to use Python functions and modules to handle the number crunching while you focus on the principles behind the math. Exercises throughout teach fundamental programming concepts, like using functions, handling user input, and reading and manipulating data. As you learn to think computationally, you'll discover new ways to explore and think about math, and gain valuable programming skills that you can use to continue your study of math and computer science.If you’re interested in math but have yet to dip into programming, you’ll find that Python makes it easy to go deeper into the subject—let Python handle the tedious work while you spend more time on the math.
America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare
Joel Brenner - 2011
An urgent wake-up call that identifies our foes; unveils their methods; and charts the dire consequences for government, business, and individuals.Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of national intelligence. He saw at close range the battleground on which our adversaries are now attacking us-cyberspace. We are at the mercy of a new generation of spies who operate remotely from China, the Middle East, Russia, even France, among many other places. These operatives have already shown their ability to penetrate our power plants, steal our latest submarine technology, rob our banks, and invade the Pentagon's secret communications systems.Incidents like the WikiLeaks posting of secret U.S. State Department cables hint at the urgency of this problem, but they hardly reveal its extent or its danger. Our government and corporations are a "glass house," all but transparent to our adversaries. Counterfeit computer chips have found their way into our fighter aircraft; the Chinese stole a new radar system that the navy spent billions to develop; our own soldiers used intentionally corrupted thumb drives to download classified intel from laptops in Iraq. And much more.Dispatches from the corporate world are just as dire. In 2008, hackers lifted customer files from the Royal Bank of Scotland and used them to withdraw $9 million in half an hour from ATMs in the United States, Britain, and Canada. If that was a traditional heist, it would be counted as one of the largest in history. Worldwide, corporations lose on average $5 million worth of intellectual property apiece annually, and big companies lose many times that.The structure and culture of the Internet favor spies over governments and corporations, and hackers over privacy, and we've done little to alter that balance. Brenner draws on his extraordinary background to show how to right this imbalance and bring to cyberspace the freedom, accountability, and security we expect elsewhere in our lives.In America the Vulnerable, Brenner offers a chilling and revelatory appraisal of the new faces of war and espionage-virtual battles with dangerous implications for government, business, and all of us.
HTML and CSS: Visual QuickStart Guide (Visual QuickStart Guides)
Elizabeth Castro - 2013
In this updated edition author Bruce Hyslop uses crystal-clear instructions and friendly prose to introduce you to all of today's HTML and CSS essentials. The book has been refreshed to feature current web design best practices. You'll learn how to design, structure, and format your website. You'll learn about the new elements and form input types in HTML5. You'll create and use images, links, styles, and forms; and you'll add video, audio, and other multimedia to your site. You'll learn how to add visual effects with CSS3. You'll understand web standards and learn from code examples that reflect today's best practices. Finally, you will test and debug your site, and publish it to the web. Throughout the book, the author covers all of HTML and offers essential coverage of HTML5 and CSS techniques.
Grammar of the Shot
Roy Thompson - 1998
It is aimed at the novice, concentrating purely on the principles of shooting - still the best way to tell a visual story.Written in simple, easy-to-follow language and illustrated with clear uncomplicated line drawings, the book sets down the fundamental knowledge needed to achieve acceptable results.The book: - is a sister volume to Grammar of the Edit- has been extensively tested in Europe, Asia and Africa- lists, examines and explains the conventions and working practices of taking pictures.
Using Information Technology
Brian K. Williams - 1990
This text is user-focused and has been highly updated including topics, pictures and examples. The Williams text contains less theory and more application to engage students who might be more familiar with technology. Continually published and updated for over 15 years, Using Information Technology was the first text to foresee and define the impact of digital convergence--the fusion of computers and communications. It was also the first text to acknowledge the new priorities imposed by the Internet and World Wide Web and bring discussion of them from late in the course to the beginning. Today, it is directed toward the "Always On" generation that is at ease with digital technology--comfortable with iPhones, MySpace, Facebook, Twitter, Wikipedia, and the blogosphere--but not always savvy about its processes, possibilities, and liabilities. This 8th edition continues to address the two most significant challenges that instructors face in teaching this course: -Trying to make the course interesting and challenging, and -Trying to teach to students with a variety of computer backgrounds. In addition, this text correlates with Simnet Online for full integration of resources within the Computing Concepts course.
Money & Capital Markets
Peter S. Rose - 1989
This book discuses various major types of financial institutions and financial instruments present along with how and why the system of money and capital markets is changing. It also provides a descriptive explanation of how interest rates and security values are determined.