Information theory Books

Sidebar Sidebar Sidebar
  • Polynomial Methods in Statistical Inference Polynomial Methods in Statistical Inference
    Add to Cart The item has been added

    Polynomial Methods in Statistical Inference

    The authors of this monograph survey a suite of techniques based on the theory of polynomials, collectively referred to as polynomial methods. These techniques provide useful tools not only for the design of highly practical algorithms with provable...
    $156.00

    Add to Cart The item has been added
  • Coded Computing Coded Computing
    Add to Cart The item has been added

    Coded Computing

    Recent years have witnessed a rapid growth of large-scale machine learning and big data analytics, facilitating the developments of data intensive applications like voice/image recognition, real-time mapping services, autonomous driving, social networks,...
    $226.00

    Add to Cart The item has been added
  • Echinides Echinides
    Add to Cart The item has been added

    Echinides

    ""Echinides: Jurassiques, Cretaces, Eocenes Du Sud-Ouest De La France (1883)"" est un livre �����crit par Gustave Cotteau. Ce livre traite des �����chinodermes fossiles, notamment des oursins, qui ont v�����cu dans le sud-ouest de la France pendant les...
    $78.00

    Add to Cart The item has been added
  • Elemens De Mineralogie V2 Elemens De Mineralogie V2
    Add to Cart The item has been added

    Elemens De Mineralogie V2

    Les ""Elemens De Mineralogie V2: Appliquee Aux Sciences Chimiques Ouvrage Base Sur La Methode De M. Berzelius"" est un livre �����crit par Jean Girardin en 1837. Ce livre est une �����tude approfondie de la min�����ralogie et de son application aux...
    $104.00

    Add to Cart The item has been added
  • Automated Machine Learning Automated Machine Learning
    Add to Cart The item has been added

    Automated Machine Learning

    This open access book presents the first comprehensive overview of general methods in Automated Machine Learning (AutoML), collects descriptions of existing systems based on these methods, and discusses the first series of international challenges of...
    $80.00

    Add to Cart The item has been added
  • Computer Aided Verification Computer Aided Verification
    Add to Cart The item has been added

    Computer Aided Verification

    This open access two-volume set LNCS 10980 and 10981 constitutes the refereed proceedings of the 30th International Conference on Computer Aided Verification, CAV 2018, held in Oxford, UK, in July 2018. The 52 full and 13 tool papers presented together...
    $122.00

    Add to Cart The item has been added
  • Machine Learning for Cyber Physical Systems Machine Learning for Cyber Physical Systems
    Add to Cart The item has been added

    Machine Learning for Cyber Physical Systems

    This Open Access proceedings presents new approaches to Machine Learning for Cyber Physical Systems, experiences and visions. It contains some selected papers from the international Conference ML4CPS - Machine Learning for Cyber Physical Systems, which...
    $72.00

    Add to Cart The item has been added
  • Nanoinformatics Nanoinformatics
    Add to Cart The item has been added

    Nanoinformatics

    This open access book brings out the state of the art on how informatics-based tools are used and expected to be used in nanomaterials research. There has been great progress in the area in which "big-data" generated by experiments or computations are...
    $83.00

    Add to Cart The item has been added
  • The Tao of Leadership
    Add to Cart The item has been added

    The Tao of Leadership

    Ancient Wisdom Meets Cutting-Edge LeadershipIn The Tao of Leadership, renowned media ecologist Jack Myers reveals the key to thriving in an AI-driven business world. This groundbreaking book blends ancient Eastern philosophy with modern technological...
    $64.00

    Add to Cart The item has been added
  • The Physical Nature of Information
    Add to Cart The item has been added

    The Physical Nature of Information

    A unified introduction to information theory for scientistsApplications of information theory span a broad range of disciplines today. This book presents a unified treatment of the subject for students and practitioners in the sciences. It teaches the...
    RRP: $115.00
    $107.00

    Add to Cart The item has been added
  • Crime in Cyberspace an Analytical Study Crime in Cyberspace an Analytical Study
    Add to Cart The item has been added

    Crime in Cyberspace an Analytical Study

    "Crime in Cyberspace: An Analytical Study" is a comprehensive and insightful book that delves into the world of cybercrime, providing an in-depth analysis of its various dimensions and implications. Authored by experts in the field of cybersecurity and...
    $74.00

    Add to Cart The item has been added
  • The Haitian Media System and its Main Characteristics The Haitian Media System and its Main Characteristics
    Add to Cart The item has been added

    The Haitian Media System and its Main Characteristics

    This book presents a new theoretical model of a media system called: the model of the precarious system of democratic transition. The latter is based on fifteen parameters that characterize the Haitian media system and the environment in which it evolves...
    $111.00

    Add to Cart The item has been added
  • Iron Has Memory, Rocks Breathe Slowly, Crystals Learn Iron Has Memory, Rocks Breathe Slowly, Crystals Learn
    Add to Cart The item has been added

    Iron Has Memory, Rocks Breathe Slowly, Crystals Learn

    This short book examines the need for change in human systems and provides an opportunity for achieving lasting, sustainable change. This book it set out in three chapters which address: the challenges with change in organizations and how those...
    $33.00

    Add to Cart The item has been added
  • We Are All Targets We Are All Targets
    Add to Cart The item has been added

    We Are All Targets

    The incredible untold origin story of cyberwar and the hackers who unleashed it on the world, tracing their journey from the ashes of the Cold War to the criminal underworld, governments, and even Silicon Valley. 'Extraordinary, terrifying,...
    $28.00

    Add to Cart The item has been added
  • Image coming soon
    Add to Cart The item has been added

    Metaverse Investing & Marketing Book

    Are you looking for exciting new ways to invest?Have you heard of the Metaverse and its amazingly creative opportunities?How would you use it to generate passive income streams that will increase your wealth?The Metaverse is here now, and...
    $70.00

    Add to Cart The item has been added
  • Amyrian Intelligence Amyrian Intelligence
    Add to Cart The item has been added

    Amyrian Intelligence

    The Amyrian Intelligence is reality architecture data. The goal of distribution of this data is to guide society into the next age of civilization: Universe Refinery. This data is unrecognized and unknown in this time period of 2022.
    $55.00

    Add to Cart The item has been added
  • Dawn of Distrust Dawn of Distrust
    Add to Cart The item has been added

    Dawn of Distrust

    In "Dawn of Distrust: Technological Threads Weaving a Trustless Society," embark on a riveting exploration into a future where trust is a relic of the past and transparency reigns supreme. Delve into the intricacies of a society transformed by...
    $27.00

    Add to Cart The item has been added
  • How to Guard Against Adware and Spyware How to Guard Against Adware and Spyware
    Add to Cart The item has been added

    How to Guard Against Adware and Spyware

    How to Guard Against Spyware and Adware The Complete Guide To Adware And Spyware Removal And Protection On Your Computer What is meant by spyware? Adware: what is it? Since everyone who uses the internet is either inundated with material about items that...
    $27.00

    Add to Cart The item has been added
  • CONTROLO 2016 CONTROLO 2016
    Add to Cart The item has been added

    CONTROLO 2016

    The biennial CONTROLO conferences are the main events promoted by The CONTROLO 2016 - 12th Portuguese Conference on Automatic Control, Guimarães, Portugal, September 14th to 16th, was organized by Algoritmi, School of Engineering, University of Minho, in...
    $657.00

    Add to Cart The item has been added
  • Global Insanity Global Insanity
    Add to Cart The item has been added

    Global Insanity

    The Global Economy that sustains the civilized world is destroying the biosphere. As a result, civilization, like the Titanic, is on a collision course with disaster. But changing course via the body politic appears to be well nigh impossible, given...
    $40.00

    Add to Cart The item has been added
  • Sparse Regression Codes Sparse Regression Codes
    Add to Cart The item has been added

    Sparse Regression Codes

    Developing increasingly computationally-efficient codes for communication and compression has been the major goal of information and coding theory. There have been significant advances towards this goal in the last couple of decades with the emergence of...
    $226.00

    Add to Cart The item has been added
  • Quantum Machine Learning Quantum Machine Learning
    Add to Cart The item has been added

    Quantum Machine Learning

    Know how to adapt quantum computing and machine learning algorithms. This book takes you on a journey into hands-on quantum machine learning (QML) through various options available in industry and research.The first three chapters offer insights into the...
    $108.00

    Add to Cart The item has been added
  • Universal Cycle Theory Universal Cycle Theory
    Add to Cart The item has been added

    Universal Cycle Theory

    There are only two elements that make the Universal Cycle Theory radical - cycles and infinity. Other than that, much of what you read in the book will seem familiar and conventional. The book focuses on these key elements in the following ways. Cycles...
    $109.00

    Add to Cart The item has been added
  • Zero Trust Proactive Cyber Security For Everyone Zero Trust Proactive Cyber Security For Everyone
    Add to Cart The item has been added

    Zero Trust Proactive Cyber Security For Everyone

    Proactive cyber security is the first step to protecting data and digital information from cybercriminals. It involves cyber security prevention measures such as establishing firewalls, setting up antivirus software, implementing two-factor...
    $13.00

    Add to Cart The item has been added
  • Search Engine Domination Search Engine Domination
    Add to Cart The item has been added

    Search Engine Domination

    Learn the Proven System We’ve Used to Earn MillionsClay Clark & his partner Doctor Robert Zoellner actually own REAL businesses, not theoretical click-funnel based businesses. Regardless of how much you know or don’t know, Search Engine...
    $30.00

    Add to Cart The item has been added
  • AI Malicious Actors AI Malicious Actors
    Add to Cart The item has been added

    AI Malicious Actors

    AI Malicious Actors: The Dark Side of Artificial IntelligenceAre you concerned about the potential misuse of AI? Conversational Chat Informative BookBy Abebe-Bard AI Woldemariam This book, AI Malicious Actors: The Dark Side of Artificial Intelligence,...
    $63.00

    Add to Cart The item has been added
  • Kryptologie Kryptologie
    Add to Cart The item has been added

    Kryptologie

    Die Kryptologie, eine jahrtausendealte "Geheimwissenschaft", gewinnt für den Informatiker zusehends praktische Bedeutung in Verbindung mit Datenbanken und Telekommunikation. Neben ihre Nutzung in rechnergestützten öffentlichen...
    $107.00

    Add to Cart The item has been added
  • Happily Ever Cyber! Happily Ever Cyber!
    Add to Cart The item has been added

    Happily Ever Cyber!

    Are your family, your business, and your data safe from cyber threats?Our world has dramatically changed, and we rely on technology for everything we do, but according to recent studies, there is a new victim of identity theft every two seconds. Identity...
    $30.00

    Add to Cart The item has been added
  • The Cerebranauts The Cerebranauts
    Add to Cart The item has been added

    The Cerebranauts

    Lizzie Sayler, a young doctor specializing in the emerging field of brain mapping, is approached by the government with an urgent request to help salvage a quantum computer project when its two inventors become neurologically impaired.Utilizing a new...
    $39.00

    Add to Cart The item has been added
  • Middleware Networks Middleware Networks
    Add to Cart The item has been added

    Middleware Networks

    Middleware Networks: Concept, Design and Deployment of Internet Infrastructure describes a framework for developing IP Service Platforms and emerging managed IP networks with a reference architecture from the AT&T Labs...
    $335.00

    Add to Cart The item has been added
  • Data and Applications Security XVII Data and Applications Security XVII
    Add to Cart The item has been added

    Data and Applications Security XVII

    Security and privacy are paramount concerns in information processing systems, which are vital to business, government and military operations and, indeed, society itself. Meanwhile, the expansion of the Internet and its...
    $324.00

    Add to Cart The item has been added
  • Intelligent Control Systems Intelligent Control Systems
    Add to Cart The item has been added

    Intelligent Control Systems

    Intelligent control is a rapidly developing, complex and challenging field with great practical importance and potential. Because of the rapidly developing and interdisciplinary nature of the subject, there are only a few...
    $335.00

    Add to Cart The item has been added
Information theory