-
電子書 電腦資訊
【電子書】AI世代高中生也能輕鬆搞懂的運算思維與演算法-使用C語言
博碩文化 出版這是一本結合運算思維與演算法的入門書籍,開章即簡介AI世代與運算思維之間連結的關鍵心法,並針對運算思維的基礎安排了生動有趣、又富挑戰的小試身手擬真試題,包括: 線上軟體通關
-
Visual C# 2019程式設計經典:邁向Azure雲端與AI影像辨識服務(適用Visual C# 2019/2017)
碁峰資訊 出版由微軟MVP、MCSD認證專家與大學教師共同編著,是一本適合大專院校教學,以及MTA、MCSD認證課程的先修教材。內容豐富從基礎到進階,從地端到雲端,進而邁向AI影像辨識設計,範例解說詳細,讓初學者
-
電子書 電腦資訊
【電子書】Visual C# 2019程式設計經典:邁向Azure雲端與AI影像辨識服務(適用Visual C# 2019/2017)
碁峰資訊 出版由微軟MVP、MCSD認證專家與大學教師共同編著,是一本適合大專院校教學,以及MTA、MCSD認證課程的先修教材。內容豐富從基礎到進階,從地端到雲端,進而邁向AI影像辨識設計,範例解說詳細,讓初學者
-
Python機器學習超進化:AI影像辨識跨界應用實戰(附100分鐘影像處理入門影音教學/範例程式)
目前有1人說過讚碁峰資訊 出版轟動程式圈3大AI影像辨識利器 從收集資料、圖片擷取、建立標籤、訓練模型 到智慧影像辨識的全面進化實戰! 人工智慧(Artificial Intelligence)應用基本上可分五大層
-
電子書 電腦資訊
【電子書】Python機器學習超進化:AI影像辨識跨界應用實戰
碁峰資訊 出版轟動程式圈3大AI影像辨識利器 從收集資料、圖片擷取、建立標籤、訓練模型 到智慧影像辨識的全面進化實戰! 人工智慧(Artificial Intelligence)應用基本上可分五大層
-
一本書精通Python:爬蟲遊戲AI完全制霸
深智數位 出版以夠用、實用為原則,選擇Python 中必備、實用的知識說明,強化對程式思維能力的培養。案例選取接近生活,有助加強讀者的學習興趣。書中每個案例均提供了詳細的設計想法、關鍵技術分析以及實際的解決方
-
學Python程式設計-使用Halocode光環板輕鬆創作AI和IoT應用(精裝版)內含-光環板、USB數據
台科大 出版大:範圍大,涵蓋創意實現、專案教學、程式普及和群控技術,由淺入深,就算沒有基礎也能快速上手 人:結合微軟Azure雲,實現雲人工智慧應用 物:存取ThingSpeak,快速實現物聯應用
-
-
-
-
-
-
-
-
Medicare and Social Security Retirement Guide
Publishdrive 出版Don't Let Medicare and Social Security Mistakes Cost You Thousands in Retirement Every year, millio
-
Certificate of Cloud Security Knowledge (Ccsk V5) Study Guide
As cloud technology becomes increasingly essential across industries, the need for thorough securit
-
Understanding the Human Factor in Cyber Security
In an age where firewalls and encryption are just the beginning, Understanding the Human Factor in
-
-
Cloud Computing Security
CRC Press 出版The book provides a fundamental exploration of cloud security, addressing the growing risks associa
-
The Ethics of National Security Intelligence Institutions
Routledge 出版This book explores the ethics of national security intelligence institutions operating in contempor
-
Availability, Reliability and Security
Springer 出版This four-volume set LNCS 15994-15997 constitutes the proceedings of the ARES 2025 International Wo
-
Water Security and the Sustainable Development Goals
Water security is at the heart of achieving the Sustainable Development Goals, influencing poverty
-
Someone Saved My Life Tonight - A Justice Security Short Story
They're called the "grunts" - the uniformed officers of Justice Security. They don't have the cushy
-
American Border Security and Its Challenge to American National Security
The attacks of September 11th, 2001 brought terrorism to the United States and the realization that
-
Using Strategic Communications to Address Critical Threats to Border Security
Abstract Border security improvements have certainly been made since the tragic events of 9/11, but
-
The United Nations Security Council and the Authorisation of Force
This book examines the United Nations Security Council's authorisation of the use of force, conside
-
Loss of the Global Positioning System and Its Impact on U.S. Economic Security
The use of the Global Positioning System (GPS) has become so ubiquitous within the United States ec
-
Applying Automated Theorem Proving to Computer Security
While more and more data is stored and accessed electronically, better access control methods need
-
Analyzing Air Force Security Posture on Typical Industrial Control Systems Servicing Critical Infrastructures
Today's Air Force bases employ automated systems controlling critical functions such as power deliv
-
Routledge Handbook of Sport Security
Routledge 出版This book provides in-depth analysis of security issues and concerns in contemporary sport. Featuri
-
State, Security, and Cyberwar
Routledge 出版This book examines the states and security apparatuses in the contemporary global order, and the pr
-
Achieving Energy Security in the Caribbean Basin
Concerns over the soaring costs, limited supply and harmful ecological effects of fossil fuels have
-
Automating Security Protocol Analysis
When Roger Needham and Michael Schroeder first introduced a seemingly secure protocol [24], it took
-
Engaging African Sub-Regional Organizations to Improve Continental Stability and Security
Abstract The United States has been engaged on the African continent for one reason or another for
-
Automating Security Protocol Analysis
When Roger Needham and Michael Schroeder first introduced a seemingly secure protocol [24], it took
-
Transportation Security Administration in Defense of the National Aviation Infrastructure
The Transportation Security Administration rapidly fielded over 28,000 Transportation Security Offi
-
Transportation Security Administration in Defense of the National Aviation Infrastructure
The Transportation Security Administration rapidly fielded over 28,000 Transportation Security Offi
-
Buildling Maritime Security in Southeast Asia
The Naval War College Review was established in 1948 and is a forum for discussion of public policy
-
North East Asian Regional Power Security Issues of Korean Unification
Divided in 1945 between the United States and the Soviet Union, Korea's status was as much a testam
-
Globalized Security Reshaping America's Defense Trade Policy
Globalism is altering military, economic, and political forces, and their confluence has become out
-
Achieving Energy Security in the Caribbean Basin
Concerns over the soaring costs, limited supply and harmful ecological effects of fossil fuels have
-
National Security Implications of Long-Term Deficit Spending
This AY2010 USAWC student research paper explores the impact of ongoing deficit spending in terms o
-
The Army National Gaurd and the Department of Homeland Security
This AY-10 USAWC resident student paper argues that the citizen-soldiers of the Army National Guard
-
Promoting Japan and South Korea's Role in East Asian Security
The State Partnership Program, a National Guard supported initiative, is one of the many Theater Se
-
National Security Implications of Long-Term Deficit Spending
This AY2010 USAWC student research paper explores the impact of ongoing deficit spending in terms o
-
Security Sector Reform
The authors explore the definition of SSR as it has emerged in the international community. The mak
-
Intergovernmental Service Agreements Between the U.S. Department of Homeland Security
The United States Immigration and Customs Enforcement (ICE) is a government law agency ran by the U
-
Pure National Security Strategy
This study comprises a theoretical framework that is conducive to development and application of su