Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks

Know how to set up, defend, and attack computer networks with this revised and expanded second edition.

You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You will continue with more...

Deep Learning with TensorFlow: Explore neural networks and build intelligent systems with Python, 2nd Edition
Deep Learning with TensorFlow: Explore neural networks and build intelligent systems with Python, 2nd Edition

Delve into neural networks, implement deep learning algorithms, and explore layers of data abstraction with the help of TensorFlow.

Key Features

  • Learn how to implement advanced techniques in deep learning with Google's brainchild, TensorFlow
  • Explore deep neural...
Data Mining: Foundations and Practice (Studies in Computational Intelligence)
Data Mining: Foundations and Practice (Studies in Computational Intelligence)
The IEEE ICDM 2004 workshop on the Foundation of Data Mining and the IEEE ICDM 2005 workshop on the Foundation of Semantic Oriented Data and Web Mining focused on topics ranging from the foundations of data mining to new data mining paradigms. The workshops brought together both data mining researchers and practitioners to discuss these two...
Understand, Manage, and Prevent Algorithmic Bias: A Guide for Business Users and Data Scientists
Understand, Manage, and Prevent Algorithmic Bias: A Guide for Business Users and Data Scientists

Are algorithms friend or foe?

The human mind is evolutionarily designed to take shortcuts in order to survive. We jump to conclusions because our brains want to keep us safe. A majority of our biases work in our favor, such as when we feel a car speeding in our direction is dangerous and we instantly move, or when we...

Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation.
Key Features
  • Intelligence processes and procedures for response mechanisms
  • Master F3EAD to drive processes based on intelligence
  • Threat modeling and intelligent frameworks
  • ...
Computational Geometry: Algorithms and Applications
Computational Geometry: Algorithms and Applications
Computational geometry emerged from the field of algorithms design and analysis in the late 1970s. It has grown into a recognized discipline with its own journals, conferences, and a large community of active researchers. The success of the field as a research discipline can on the one hand be explained from the beauty of the...
Practical Haskell: A Real World Guide to Programming
Practical Haskell: A Real World Guide to Programming

Get a practical, hands-on introduction to the Haskell language, its libraries and environment, and to the functional programming paradigm that is fast growing in importance in the software industry. This book contains excellent coverage of the Haskell ecosystem and supporting tools, include Cabal and Stack for managing projects,...

Basic Security Testing with Kali Linux
Basic Security Testing with Kali Linux

With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take a more active stance in securing their computer systems. Kali Linux is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use so they can find issues with their...

Senior Cohousing: A New Way Forward for Active Older Adults (SpringerBriefs in Aging)
Senior Cohousing: A New Way Forward for Active Older Adults (SpringerBriefs in Aging)
This book presents a concise description and qualitative exploration of a new residential option for older adults: senior cohousing. It describes the practical, structural and communal aspects of senior cohousing and shares the lived experiences of actual residents. Pursuing an existential-phenomenological approach, the authors visited...
Essentials of Artificial Intelligence
Essentials of Artificial Intelligence

Since its publication, Essentials of Artificial Intelligence has been adopted at numerous universities and colleges offering introductory AI courses at the graduate and undergraduate levels. Based on the author's course at Stanford University, the book is an integrated, cohesive introduction to the field. The...

Numerical Simulation of Optical Wave Propagation With Examples in MATLAB (SPIE Press Monograph Vol. PM199)
Numerical Simulation of Optical Wave Propagation With Examples in MATLAB (SPIE Press Monograph Vol. PM199)
Wave-optics simulation is an immensely useful tool for many applications. The simulation techniques in this book are directly applicable to atmospheric imaging, astronomy, adaptive optics, free-space optical communications, and LADAR. In addition, many of the basic techniques are applicable to integrated optics and nonlinear, anisotropic,...
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Enhance your organization's secure posture by improving your attack and defense strategies

Key Features

  • Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.
  • Learn to unique...
Result Page: 116 115 114 113 112 111 110 109 108 107 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy