Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Applied Data Science with Python and Jupyter: Use powerful industry-standard tools to unlock new, actionable insights from your data
Applied Data Science with Python and Jupyter: Use powerful industry-standard tools to unlock new, actionable insights from your data

Become the master player of data exploration by creating reproducible data processing pipelines, visualizations, and prediction models for your applications.

Key Features

  • Get up and running with the Jupyter ecosystem and some example datasets
  • Learn about key machine...
TCP/IP Analysis and Troubleshooting Toolkit
TCP/IP Analysis and Troubleshooting Toolkit
Discover TCP/IP troubleshooting solutions that solve real-world networking problems

TCP/IP is the backbone of the Internet and corporate networks and has become much more complex in the last decade. If you’re a networking professional, you need to take trouble-shooting to a new level to address this complexity–and adopt solutions...

Configuring IPv6 for Cisco IOS
Configuring IPv6 for Cisco IOS
Configuring IPv6 with Cisco IOS provides complete coverage of IPv6 strategies, configuration scenarios, and techniques to successfully deploy an IPv6 addressing and subnetting scheme on a network. The book also covers such topics as: increasing the IP address size from 32 bits to 128 bits; supporting more levels of addressing hierarchy; supporting...
Session Initiation Protocol (SIP): Controlling Convergent Networks (McGraw-Hill Communication Series)
Session Initiation Protocol (SIP): Controlling Convergent Networks (McGraw-Hill Communication Series)
Telephone networks have come a long ways in the last 100 years. Or have they? If one looks at how a telephone network works, not much has changed. Connections are still made through “dedicated” circuits connected end to end for the duration of a call. While switchboard operators have been replaced by digital switching systems, the...
The OS X Mountain Lion Pocket Guide (Peachpit Pocket Guide)
The OS X Mountain Lion Pocket Guide (Peachpit Pocket Guide)
A lot has happened since Apple introduced OS X a decade ago (then called “Mac OS X”). What started as an incomplete replacement for an established operating system has become not only the backbone of today’s powerful Mac computers, but also the foundation for the iPhone, iPad, iPod touch, and Apple TV. At one...
Lightweight Django
Lightweight Django

How can you take advantage of the Django framework to integrate complex client-side interactions and real-time features into your web applications? Through a series of rapid application development projects, this hands-on book shows experienced Django developers how to include REST APIs, WebSockets, and client-side MVC frameworks...

LANs to WANs: The Complete Management Guide
LANs to WANs: The Complete Management Guide
This text addresses key network management challenges, showing professionals how to tie together incompatible LANs, meld legacy systems and LANs, extend the reach of LANs with wireless links, and protect information assets from various disaster scenarios.

Empowered by today’s high-performance computers interconnected over LANs and...

Web 2.0 Security - Defending AJAX, RIA, AND SOA
Web 2.0 Security - Defending AJAX, RIA, AND SOA
Service-Oriented Architecure (SOA), Rich Internet Applications (RIA), and Asynchronous Java and eXtended Markup Language (Ajax) comprise the backbone behind now-widespread Web 2.0 applications, such as MySpace, Google Maps, Flickr, and Live.com. Although these robust tools make next-generation Web applications possible, they also add new security...
Building Hybrid Android Apps with Java and JavaScript: Applying Native Device APIs
Building Hybrid Android Apps with Java and JavaScript: Applying Native Device APIs

Build HTML5-based hybrid applications for Android with a mix of native Java and JavaScript components, without using third-party libraries and wrappers such as PhoneGap or Titanium. This concise, hands-on book takes you through the entire process, from setting up your development environment to deploying your product to an app...

IP Routing Primer (Networking Technology)
IP Routing Primer (Networking Technology)
A thorough guide to understanding IP behavior in a router-based networkLearn IP behavior in a Cisco router-based network from an expertExamine proven, effective troubleshooting techniques to eliminate the need for additional technical supportMaster IP fundamentals that everyone supporting an IP network needs to knowStudy visual explanations of...
Descartes: The World and Other Writings (Cambridge Texts in the History of Philosophy)
Descartes: The World and Other Writings (Cambridge Texts in the History of Philosophy)

Descartes' The World offers the most comprehensive vision of the nature of the world since Aristotle, and is crucial for an understanding of his later writings, in particular the Meditations and Principles of Philosophy. Above all, it provides an insight into how Descartes conceived of natural philosophy before he started to reformulate...

Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations
Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations

“We are dropping cyber bombs. We have never done that before.”—U.S. Defense Department official

A new era of war fighting is emerging for the U.S. military. Hi-tech weapons have given way to hi tech in a number of instances recently:

A computer virus is unleashed that...

unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy