Search Results - ((((java programming) OR (games programming))) OR ((games OR james) programming))

Search alternatives:

Refine Results
  1. 1941

    Social injustice and public health

    Published 2006
    Table of Contents: “…Larry Brown -- Chronic diseases / Derek Yach -- Mental health / Carles Munaner, Jeanne Geiger-Brown -- Assaultive violence and war / James A. Mercy -- Environmental health / Colin D. …”
    Full text (MFA users only)
    Electronic eBook
  2. 1942

    Medical aspects of chemical warfare

    Published 2008
    Table of Contents: “…Baskin [and others] -- Incapacitating agents / James S. Ketchum and Harry Salem -- Riot control agents / Harry Salem [and others] -- Field management of chemical casualties / Charles H. …”
    Full text (MFA users only)
    Government Document Electronic eBook
  3. 1943

    Effective college and university teaching : strategies and tactics for the new professoriate

    Published 2012
    Table of Contents: “…Goldstein -- Writing and developing your philosophy of teaching / James H. Korn -- Developing student-teacher rapport in the undergraduate classroom / Janie H. …”
    Full text (MFA users only)
    Electronic eBook
  4. 1944

    Culturally sustaining and revitalizing pedagogies : language, culture, and power

    Published 2017
    Table of Contents: “…Lopez -- Dual language programs: language and access / Laura Gomez -- Culturally sustaining pedagogy in action: views from inside a secondary social studies teacher's classroom / Margarita Jimenez-Silva Ruth Luevanos -- Part II: Culture -- Voices from the community: the past embraced / Lisa Unin -- Yupiunrirngaitua/the skirt I refuse to wear / Panigkaq Agatha John-Shields -- Preparing culturally sustaining/revitalizing educators: lessons from field experiences in Alaska native village schools / Timothy E. …”
    Full text (MFA users only)
    Electronic eBook
  5. 1945

    Co-operative Management of Local Fisheries : New Directions for Improved Management and Community Development. by Pinkerton, Evelyn

    Published 2014
    Table of Contents: “…10 The Development of State/Tribal Co-Management of Wisconsin FisheriesPART FOUR: PROVISIONS IN COMPREHENSIVE CLAIMS FOR NATIVE SELF-MANAGEMENT -- 11 Co-Management and the James Bay Agreement -- 12 Co-Management Provisions of the Inuvialuit Final Agreement -- PART FIVE: B.C. …”
    Full text (MFA users only)
    Electronic eBook
  6. 1946

    Machine Learning with Spark - Second Edition. by Dua, Rajdeep

    Published 2016
    Table of Contents: “…Cover -- Credits -- About the Authors -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Getting Up and Running with Spark -- Installing and setting up Spark locally -- Spark clusters -- The Spark programming model -- SparkContext and SparkConf -- SparkSession -- The Spark shell -- Resilient Distributed Datasets -- Creating RDDs -- Spark operations -- Caching RDDs -- Broadcast variables and accumulators -- SchemaRDD -- Spark data frame -- The first step to a Spark program in Scala -- The first step to a Spark program in Java -- The first step to a Spark program in Python -- The first step to a Spark program in R -- SparkR DataFrames -- Getting Spark running on Amazon EC2 -- Launching an EC2 Spark cluster -- Configuring and running Spark on Amazon Elastic Map Reduce -- UI in Spark -- Supported machine learning algorithms by Spark -- Benefits of using Spark ML as compared to existing libraries -- Spark Cluster on Google Compute Engine -- DataProc -- Hadoop and Spark Versions -- Creating a Cluster -- Submitting a Job -- Summary -- Chapter 2: Math for Machine Learning -- Linear algebra -- Setting up the Scala environment in Intellij -- Setting up the Scala environment on the Command Line -- Fields -- Real numbers -- Complex numbers -- Vectors -- Vector spaces -- Vector types -- Vectors in Breeze -- Vectors in Spark -- Vector operations -- Hyperplanes -- Vectors in machine learning -- Matrix -- Types of matrices -- Matrix in Spark -- Distributed matrix in Spark -- Matrix operations -- Determinant -- Eigenvalues and eigenvectors -- Singular value decomposition -- Matrices in machine learning -- Functions -- Function types -- Functional composition -- Hypothesis -- Gradient descent -- Prior, likelihood, and posterior -- Calculus -- Differential calculus -- Integral calculus.…”
    Full text (MFA users only)
    Electronic eBook
  7. 1947
  8. 1948

    The handbook of practice and research in study abroad : higher education and the quest for global citizenship

    Published 2009
    Table of Contents: “…Deardorff -- Here to stay: increasing acceptance of short-term study abroad programs / Lisa Chieffo and Lesa Griffiths -- Going global in the sciences: a case study of Emory University / Philip Wainwright [and others] -- Undergraduate research during study abroad: scope, meaning, and potential / Bernhard T. …”
    Full text (MFA users only)
    Electronic eBook
  9. 1949

    Realizing the Future of Nursing : VA Nurses Tell Their Story. by Nurses, Department of Veteran Affairs

    Published 2015
    Table of Contents: “…Jamie GilliamChapter 6: Expanding the Primary Care RN Care Manager and RN Case Manager Roles in VA Care Program; Storm Morgan, Donna C. Vogel, Patricia Hryzak Lind, Joanne M. …”
    Full text (MFA users only)
    Electronic eBook
  10. 1950

    The everyday project manager a primer for learning the principles of successful project management by Nicholls, Jeremy

    Published 2020
    Table of Contents: “…-- The Everyday Project Manager vs the Professional Project Manager -- The Structure of This Book -- What This Book Is and What It Isn't -- Introduction Part Two -- Some Project Management Definitions -- Projects, Programs, and Portfolios -- Waterfall vs Agile Project Management -- Phase 1 Project Start-Up -- Chapter 1 What Are We Doing Here?…”
    Full text (MFA users only)
    eBook
  11. 1951

    Juvenile law violators, human rights, and the development of new juvenile justice systems

    Published 2006
    Table of Contents: “…The role of the police within the Spanish juvenile justice system : the results of legal reform in Catalonia / Lola Valles ; Achieving positive results with serious juvenile offenders in a reintegrative framework : strategies essential for rehabilitative effectiveness with the intensive aftercare program (IAP) model / Troy L. Armstrong ; Exploring traditional cultural mechanisms of conflict resolution in American Indian communities / Barbara Mendenhall, James Dumesnil ; The juvenile justice forums of Malawi : a case study of the Lilongwe juvenile justice forum / Desmond Kaunda ; Combining juvenile justice with family law reform in Serbia / Ivana Stevanovic ; The inherent tension of social welfare and criminal social control : policy lessons from the American juvenile court experience / Barry C. …”
    Full text (MFA users only)
    Electronic eBook
  12. 1952

    Public finance in China : reform and growth for a harmonious society

    Published 2008
    Table of Contents: “…Evans and Ke Xu -- Health reform in rural China: challenges and options / Adam Wagstaff and Magnus Lindelow -- Part VI: Social security -- Notional defined contribution accounts: a pension reform model worth considering / Jiange Li, Mark Dorfman, and Yan Wang -- Realizing the potential of China's social security pension system / Martin Feldstein and Jeffrey Liebman -- Part VII: Growth, inequality and fiscal reform -- Does the Di Bao program guarantee a minimum income in China's cities? …”
    Full text (MFA users only)
    Electronic eBook
  13. 1953

    Innovations in child and family policy : multidisciplinary research and perspectives on strengthening children and their families

    Published 2010
    Table of Contents: “…Brady -- 5. contribution of the helping relationship in promoting retention in a home visitation program to prevent child maltreatment / Michelle P. …”
    Full text (MFA users only)
    Electronic eBook
  14. 1954

    Social media : usage and impact

    Published 2011
    Table of Contents: “…Tweets, blogs, Facebook, and the ethics of 21st-century communication technology / James Benjamin.…”
    Full text (MFA users only)
    Electronic eBook
  15. 1955

    Transboundary river governance in the face of uncertainty : the Columbia River Treaty : a project of the Universities Consortium on Columbia River Governance

    Published 2012
    Table of Contents: “…The Columbia exchange : a Canadian perspective on the negotiation of the Columbia River Treaty, 1944-1964 / Jeremy Mouat -- The Columbia River Treaty : managing for uncertainty / James D. Barton and Kelvin Ketchum -- The Columbia River : operation under the 1964 Treaty / Anthony G. …”
    Full text (MFA users only)
    Electronic eBook
  16. 1956

    International collaborations in literacy research and practice

    Published 2014
    Table of Contents: “…Richards -- Active learning and critical thinking: a higher education professional development program in Croatia / Sharon B. Kletzien, Vlasta Vizek Vidovi?…”
    Full text (MFA users only)
    Electronic eBook
  17. 1957
  18. 1958

    The second cataract fortress of Dorginarti by Heidorn, Lisa A. (Lisa Ann), 1956-

    Published 2023
    Book
  19. 1959

    Antivirus hacker's handbook. by Koret, Joxean

    Published 2015
    Table of Contents: “…-- Discovering Where and How Malware Is Detected -- Old Tricks for Determining Where Malware Is Detected: Divide and Conquer -- Evading a Simple Signature-Based Detection with the Divide and Conquer Trick -- Binary Instrumentation and Taint Analysis -- Summary -- Chapter 7 Evading Signatures -- File Formats: Corner Cases and Undocumented Cases -- Evading a Real Signature -- Evasion Tips and Tricks for Specific File Formats -- PE Files -- JavaScript -- String Encoding -- Executing Code on the Fly -- Hiding the Logic: Opaque Predicates and Junk Code -- PDF -- Summary -- Chapter 8 Evading Scanners -- Generic Evasion Tips and Tricks -- Fingerprinting Emulators -- Advanced Evasion Tricks -- Taking Advantage of File Format Weaknesses -- Using Anti-emulation Techniques -- Using Anti-disassembling Techniques -- Disrupting Code Analyzers through Anti-analysis -- More Anti-Anti-Anti ... -- Causing File Format Confusion -- Automating Evasion of Scanners -- Initial Steps -- Installing ClamAV -- Installing Avast -- Installing AVG -- Installing F-Prot -- Installing Comodo -- Installing Zoner Antivirus -- MultiAV Configuration -- peCloak -- Writing the Final Tool -- Summary -- Chapter 9 Evading Heuristic Engines -- Heuristic Engine Types -- Static Heuristic Engines.…”
    Full text (MFA users only)
    Electronic eBook
  20. 1960