Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks

Know how to set up, defend, and attack computer networks with this revised and expanded second edition.

You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You will continue with more...

Deep Learning with TensorFlow: Explore neural networks and build intelligent systems with Python, 2nd Edition
Deep Learning with TensorFlow: Explore neural networks and build intelligent systems with Python, 2nd Edition

Delve into neural networks, implement deep learning algorithms, and explore layers of data abstraction with the help of TensorFlow.

Key Features

  • Learn how to implement advanced techniques in deep learning with Google's brainchild, TensorFlow
  • Explore deep neural...
Electric Motors and Drives: Fundamentals, Types and Applications (3rd Edition)
Electric Motors and Drives: Fundamentals, Types and Applications (3rd Edition)
Like its predecessors, the third edition of this book is intended primarily for non-specialist users and students of electric motors and drives. My original aim was to bridge the gap between specialist textbooks (which are pitched at a level too academic for the average user) and the more prosaic ‘handbooks’, which...
Evolving Digital Leadership: How to Be a Digital Leader in Tomorrow’s Disruptive World
Evolving Digital Leadership: How to Be a Digital Leader in Tomorrow’s Disruptive World
Get ready to be an effective digital leader, influencer, disruptor, and catalyst for change in the digital world!

As a leader you need to constantly evolve to achieve sustained success. The world is being transformed by Digital. The pace of change is constantly accelerating and volatility and complexity are the
...
Preparing for the Worst: A Comprehensive Guide to Protecting Your Family from Terrorist Attacks, Natural Disasters, and Other Catastrophes
Preparing for the Worst: A Comprehensive Guide to Protecting Your Family from Terrorist Attacks, Natural Disasters, and Other Catastrophes

Preparing for the Worst details the best practices in antiterrorism tactics and preparing for disaster. This book is for typical American families, business travelers, corporate executive management personnel, emergency first responders, school administrators, and local government officials responsible for public safety and emergency...

Network Security Through Data Analysis: Building Situational Awareness
Network Security Through Data Analysis: Building Situational Awareness

Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what...

Scaling Big Data with Hadoop and Solr
Scaling Big Data with Hadoop and Solr

As data grows exponentially day-by-day, extracting information becomes a tedious activity in itself. Technologies like Hadoop are trying to address some of the concerns, while Solr provides high-speed faceted search. Bringing these two technologies together is helping organizations resolve the problem of information extraction from Big Data...

Real-Time Systems Design and Analysis
Real-Time Systems Design and Analysis
This book is an introduction to real-time systems. It is intended not as a cookbook,
but, rather, as a stimulus for thinking about hardware and software in a different
way. It is necessarily broader than deep. It is a survey book, designed to heighten
the reader’s awareness of real-time issues.

This book is the
...
Statistical Mechanics of Learning
Statistical Mechanics of Learning
The effort to build machines that are able to learn and undertake tasks such as datamining, image processing and pattern recognition has led to the development of artificial neural networks in which learning from examples may be described and understood. The contribution to this subject made over the past decade by researchers applying the...
Hands-On Software Engineering with Python: Move beyond basic programming and construct reliable and efficient software with complex code
Hands-On Software Engineering with Python: Move beyond basic programming and construct reliable and efficient software with complex code

Explore various verticals in software engineering through high-end systems using Python

Key Features

  • Master the tools and techniques used in software engineering
  • Evaluates available database options and selects one for the final Central Office system-components
  • ...
Mastering Wireless Penetration Testing for Highly-Secured Environments
Mastering Wireless Penetration Testing for Highly-Secured Environments

Scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals

About This Book

  • Conduct a full wireless penetration test and implement defensive techniques that can be used to protect wireless systems
  • Crack WEP, WPA, and even WPA2 wireless...
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks

Learn to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources.

You'll learn how to configure your network from the ground up, starting by setting up your...

Result Page: 29 28 27 26 25 24 23 22 21 20 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy