Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Machine Learning with the Raspberry Pi: Experiments with Data and Computer Vision (Technology in Action)
Machine Learning with the Raspberry Pi: Experiments with Data and Computer Vision (Technology in Action)

Using the Pi Camera and a Raspberry Pi board, expand and replicate interesting machine learning (ML) experiments.  This book provides a solid overview of ML and a myriad of underlying topics to further explore. Non-technical discussions temper complex technical explanations to make the hottest and most complex topic in the...

Pragmatic Software Testing: Becoming an Effective and Efficient Test Professional
Pragmatic Software Testing: Becoming an Effective and Efficient Test Professional
A hands-on guide to testing techniques that deliver reliable software and systems

Testing even a simple system can quickly turn into a potentially infinite task. Faced with tight costs and schedules, testers need to have a toolkit of practical techniques combined with hands-on experience and the right strategies...

Web Penetration Testing with Kali Linux
Web Penetration Testing with Kali Linux

A practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux

Overview

  • Learn key reconnaissance concepts needed as a penetration tester
  • Attack and exploit key features, authentication, and sessions on web...
Systems Engineering in Wireless Communications
Systems Engineering in Wireless Communications

This book provides the reader with a complete coverage of radio resource management for 3G wireless communications

Systems Engineering in Wireless Communications focuses on the area of radio resource management in third generation wireless communication systems from a systems engineering perspective. The authors...

Firewall Policies and VPN Configurations
Firewall Policies and VPN Configurations
Deploying a network security policy is a significant and serious undertaking. Making good decisions in this matter will save a great deal of money and prevent many future security issues on your network, while making incorrect or hasty decisions will lay the foundation for an insecure network infrastructure. Creating a network security policy will...
Introduction to Online Payments Risk Management
Introduction to Online Payments Risk Management

If you've been tasked with building a team to handle risk management for online payments (RMP), this practical introduction provides a framework for choosing the technologies and personnel you need. Author and financial services executive Ohad Samet explains the components of payments risk management, and presents a coherent...

The Complete Guide to Software Testing
The Complete Guide to Software Testing

The Complete Guide to Software Testing Bill Hetzel Gain a new perspective to software testing as a life cycle activity, not merely as something that happens at the end of coding. This edition is completely revised and contains new chapters on testing methodologies including ANSI standard-based testing—a survey of testing practices. Dr....

Retail Marketing Management
Retail Marketing Management

For undergraduate and postgraduate courses in Retail Marketing and Marketing Management, and HND Retail Marketing. The second edition of this highly successful text offers a unique approach that combines retail marketing theory with the newer retail concepts and international examples. Building on the first edition this text starts by looking...

Programming Social Applications: Building Viral Experiences with OpenSocial, OAuth, OpenID, and Distributed Web Frameworks
Programming Social Applications: Building Viral Experiences with OpenSocial, OAuth, OpenID, and Distributed Web Frameworks

I first began developing social applications when Facebook opened up its developer platform in 2007, giving people like me a taste of the extensive social data that an application can use to improve growth and target personalization settings. At the time, I was building social fantasy sports applications for CBSSports.com, pulling user...

Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems

Implement defensive techniques in your ecosystem successfully with Python

Key Features

  • Identify and expose vulnerabilities in your infrastructure with Python
  • Learn custom exploit development
  • Make robust and powerful cybersecurity tools with Python
  • ...
Breaking Ocean Waves: Geometry, Structure and Remote Sensing
Breaking Ocean Waves: Geometry, Structure and Remote Sensing

This book represents the most comprehensive description of the physical findings of an investigation into the spatio-temporal characteristics of the gravity of breaking waves and the foam activity in open sea by methods and instruments of optical and microwave remote sensing.

The study of physical and electrodynamics'...

SAP PS FAQ: SAP Project Systems Interview Questions, Answers, and Explanations
SAP PS FAQ: SAP Project Systems Interview Questions, Answers, and Explanations
The Ultimate Reference & Learning Guide for S A P PS Consultants SAP PS Questions, Answers, and Explanations! It' s clear that SAP PS is the future for projects activity in SAP -- but finding resources can be difficult . SAP PS Interview Questions, Answers, and Explanations guides you through your learning process. From helping you to...
Result Page: 56 55 54 53 52 51 50 49 48 47 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy