-
Aloqa. Kommunikatsiya texnologiyalari
-
Aloqa. Kommunikatsiya texnologiyalari
-
Aloqa. Kommunikatsiya texnologiyalari
-
Aloqa. Kommunikatsiya texnologiyalari
-
Aloqa. Kommunikatsiya texnologiyalari
-
-
-
-
-
San’at. San’atshunoslik
-
Aloqa. Kommunikatsiya texnologiyalari
-
-
-
-
-
A Data Scientist's Guide to Acquiring, Cleaning, and Managing Data in R
Every experienced practitioner knows that preparing data for modeling is a painstaking, time-consuming process. Adding to the difficulty is that most modelers learn the steps involved in cleaning and managing data piecemeal, often on the fly, or they develop their own ad hoc methods. This book helps simplify their task by providing a unified, systematic approach to acquiring, modeling, manipulating, cleaning, and maintaining data in R.
-
(ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide, 3rd Edition
The (ISC)2 Systems Security Certified Practitioner (SSCP) certification is a well-known vendor-neutral global IT security certification. The SSCP is designed to show that holders have the technical skills to implement, monitor, and administer IT infrastructure using information security policies and procedures.
-
Основы корреляционной обработки сигналов
Пособие посвящено изучению корреляторов различного вида и назначения. Рассмотрены как аналоговые корреляторы, так и корреляторы совпадения полярности. Приводятся оценки отношения сигнал/шум на выходе коррелятора. Даны примеры применения корреляторов в процессах обнаружения сигналов и оценки их параметров. Приведен краткий обзор корреляционных методов обработки сигналов.
-
Alice and Bob Learn Application Security
Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Development Life Cycle, best security practices in software development. This book covers all the basic subjects such as threat modeling and security testing, but also dives deep into more complex and advanced topics for securing modern software systems and architectures. Throughout, the book offers analogies, stories of the characters Alice and Bob, real-life examples, technical explanations and diagrams to ensure maximum clarity of the many abstract and complicated subjects.
-
Кибер безопасность
Компании тратят огромные средства, чтобы их активы и данные были под надежной защитой, однако киберриски только возрастают. Никакие новые технологии или увеличение бюджета не в силах переломить эту ситуацию.
-
-
-
-
Behind Deep Blue
In late April 1997, posters for an unusual chess event were appear- ing on the streets of New York. They showed a somber and pondering gentleman in his early 30s peering over a chess set at the viewers. The small caption under his chin said, "How do you make a computer blink?" The gentleman on the poster was the World Chess Champion Garry Kasparov, possibly the strongest chess player who has ever lived.
-
Избранные Эстрадные Произведения советских и зарубежных композитор выпуск 1
Избранные Эстрадные Произведения советских и зарубежных композитор в облегченном переложении для фортепиано
-
along came google a history of library digitization
Along Came Google sheds light on the transformational effects of the Google Books project on scholarship and discusses how we can continue to think imaginatively and collaboratively about expanding the digital availability of knowledge.
-
Избранные Эстрадные Произведения советских и зарубежных композиторов Выпуск_2
Избранные Эстрадные Произведения советских и зарубежных композиторов в облегченном переложении для фортепиано Выпуск_2
-
-
-
-