Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Bayesian Methods in the Search for MH370
This book demonstrates how nonlinear/non-Gaussian Bayesian time series estimation methods were used to produce a probability distribution of potential MH370 flight paths. It provides details of how the probabilistic models of aircraft flight dynamics, satellite communication system measurements, environmental effects and radar data were constructed...
Embedded Firmware Solutions
Embedded Firmware Solutions is the perfect introduction and daily-use field guide - for the thousands of firmware designers, hardware engineers, architects, managers, and developers--to Intel's new firmware direction (including Quark coverage), showing how to integrate IntelĀ® Architecture designs into their plans. Featuring hands-on exampl...
Think DSP
If you understand basic mathematics and know how to program with Python, you're ready to dive into signal processing. While most resources start with theory to teach this complex subject, this practical book introduces techniques by showing you how they're applied in the real world. In the first chapter alone, you'll be able to decom...
MySQL Notes for Professionals
The MySQL Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
The little book about OS development
The OS kernel and this book were produced as part of an advanced individual course at the Royal Institute of Technology, Stockholm. The authors had previously taken courses in OS theory, but had only minor practical experience with OS kernel development. In order to get more insight and a deeper understanding of how the theory from the previous OS ...
Libelf by Example
This tutorial introduces libelf, a library for reading and writing object code in the Extensible Linking Format (ELF) file format. - Getting started with libelf: obtaining a handle to an ELF object, establishing a working ELF version, and handling errors reported by libelf. - How ELF data structures are laid out in-memory and on disk, the notions...
Operating Systems: From 0 to 1
This book helps you gain the foundational knowledge required to write an operating system from scratch. Hence the title, 0 to 1. After completing this book, at the very least you will learn: - How to write an operating system from scratch by reading hardware datasheets. In the real world, it works like that. You won't be able to consult Go...
Personalized Hip and Knee Joint Replacement
This open book describes and illustrates the surgical techniques, implants, and technologies used for the purpose of personalized implantation of hip and knee components. This new and flourishing treatment philosophy offers important benefits over conventional systematic techniques, including component positioning appropriate to individual anatomy,...
Excel
This book walks through all the most important and useful Excel functionalities that will advance your career in financial services. From logical functions such as IFERROR to calculating the yield of a bond, CFI's Excel book provides you with numerous examples and key shortcuts! We hope you find this book useful in reaching your future goals....
Kafka: The Definitive Guide
Every enterprise application creates data, whether it consists of log messages, metrics, user activity, or outgoing messages. Moving all this data is just as important as the data itself. With this updated edition, application architects, developers, and production engineers new to the Kafka streaming platform will learn how to handle data in motio...
Game Hacking Academy
Hacking games requires a unique combination of reversing, memory management, networking, and security skills. Even as ethical hacking has exploded in popularity, game hacking still occupies a very small niche in the wider security community. While it may not have the same headline appeal as a Chrome 0day or a massive data leak, the unique feeling o...