Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Enhance your organization's secure posture by improving your attack and defense strategies

Key Features

  • Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.
  • Learn to unique...
Learn Robotics Programming: Build and control autonomous robots using Raspberry Pi 3 and Python
Learn Robotics Programming: Build and control autonomous robots using Raspberry Pi 3 and Python

Gain experience of building a next-generation collaboration robot

Key Features

  • Get up and running with the fundamentals of robotic programming
  • Program a robot using Python and the Raspberry Pi 3
  • Learn to build a smart robot with interactive and AI-enabled...
Defending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time
Defending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time
Apply a methodology and practical solutions for monitoring the behavior of the Internet of Things (IoT), industrial control systems (ICS), and other critical network devices with the inexpensive Raspberry Pi. With this book, you will master passive monitoring and detection of aberrant behavior, and learn how to generate early indications...
Network Analysis Using Wireshark 2 Cookbook: Practical recipes to analyze and secure your network using Wireshark 2, 2nd Edition
Network Analysis Using Wireshark 2 Cookbook: Practical recipes to analyze and secure your network using Wireshark 2, 2nd Edition

Over 100 recipes to analyze and troubleshoot network problems using Wireshark 2

Key Features

  • Place Wireshark 2 in your network and configure it for effective network analysis
  • Deep dive into the enhanced functionalities of Wireshark 2 and protect your network with ease
  • ...
Testing and Tuning Market Trading Systems: Algorithms in C++
Testing and Tuning Market Trading Systems: Algorithms in C++

Build, test, and tune financial, insurance or other market trading systems using C++ algorithms and statistics. You’ve had an idea and have done some preliminary experiments, and it looks promising. Where do you go from here?  Well, this book discusses and dissects this case study approach.  

...

Angular 6 for Enterprise-Ready Web Applications: Deliver production-ready and cloud-scale Angular web apps
Angular 6 for Enterprise-Ready Web Applications: Deliver production-ready and cloud-scale Angular web apps

A hands-on guide with a minimalist and flexible approach that enables quick learning and rapid delivery of cloud-ready enterprise applications with Angular 6

Key Features

  • Explore tools and techniques to push your web app to the next level
  • Master Angular app design and...
Unity 2018 By Example: Learn about game and virtual reality development by creating five engaging projects, 2nd Edition
Unity 2018 By Example: Learn about game and virtual reality development by creating five engaging projects, 2nd Edition

Build exciting 2D/3D games and virtual reality applications with the help of hands-on examples

Key Features

  • Create five different types of games from scratch with Unity 2018
  • Import custom content into Unity from third-party tools such as Maya and Blender
  • ...
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

Understand malware analysis and its practical implementation

Key Features

  • Explore the key concepts of malware analysis and memory forensics using real-world examples
  • Learn the art of detecting, analyzing, and investigating malware threats
  • Understand...
Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities
Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities

Master Shellcode to leverage the buffer overflow concept

Key Features

  • Understand how systems can be bypassed both at the operating system and network level with shellcode, assembly, and Metasploit
  • Learn to write and modify 64-bit shellcode along with kernel-level shellcode...
Mastering C++ Game Development: Create professional and realistic 3D games using C++ 17
Mastering C++ Game Development: Create professional and realistic 3D games using C++ 17

High-end game development with advanced C++ 17 programming techniques

Key Features

  • Make the best use of object-oriented capabilities of C++ to develop high-end games
  • Create reusable C++ libraries and editor tools for your game
  • Series of example projects...
Unity 2018 Artificial Intelligence Cookbook: Over 90 recipes to build and customize AI entities for your games with Unity, 2nd Edition
Unity 2018 Artificial Intelligence Cookbook: Over 90 recipes to build and customize AI entities for your games with Unity, 2nd Edition

Explore various recipes to build games using popular artificial intelligence techniques and algorithms such as Navmesh navigation A*, DFS, and UCB1

Key Features

  • Explore different algorithms for creating decision-making agents that go beyond simple behaviors and movement
  • ...
Hands-On Recommendation Systems with Python: Start building powerful and personalized, recommendation engines with Python
Hands-On Recommendation Systems with Python: Start building powerful and personalized, recommendation engines with Python

With Hands-On Recommendation Systems with Python, learn the tools and techniques required in building various kinds of powerful recommendation systems (collaborative, knowledge and content based) and deploying them to the web

Key Features

  • Build industry-standard recommender systems
  • ...
Result Page: 92 91 90 89 88 87 86 85 84 83 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy