Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Building Trading Bots Using Java
Building Trading Bots Using Java

Build an automated currency trading bot from scratch with java. In this book, you will learn about the nitty-gritty of automated trading and have a closer look at Java, the Spring Framework, event-driven programming, and other open source APIs, notably Google's Guava API. And of course, development will all be test-driven with...

Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious
Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious
Over the last seven years, Internet Security Systems' (ISS) elite X-Force has discovered more high-risk vulnerabilities than all other research groups and vendors combined, including the vulnerability that led to the recent, widespread Zotob worm. For the first time ever, follow the X-Force team as they analyze potential vulnerabilities and...
Programming Spiders, Bots, and Aggregators in Java
Programming Spiders, Bots, and Aggregators in Java
The content and services available on the web continue to be accessed mostly through direct human control. But this is changing. Increasingly, users rely on automated agents that save them time and effort by programmatically retrieving content, performing complex interactions, and aggregating data from diverse sources. Programming Spiders,...
Exploiting Online Games: Cheating Massively Distributed Systems
Exploiting Online Games: Cheating Massively Distributed Systems

If you are a gamer, a game developer, a software security professional, or an interested bystander, this book exposes the inner workings of online-game security for all to see.

From the authors of the best-selling Exploiting Software, Exploiting Online Games takes a frank look at controversial security issues...

Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Security is a broad topic that is only becoming broader as we become more reliant on computers for everything we do, from work to home to leisure, and our computers become more and more interconnected. Most of our computing experiences now require, or are enriched by, Internet connections, which means our systems are constantly exposed to foreign...
MATLAB Deep Learning: With Machine Learning, Neural Networks and Artificial Intelligence
MATLAB Deep Learning: With Machine Learning, Neural Networks and Artificial Intelligence
Get started with MATLAB for deep learning and AI with this in-depth primer. In this book, you start with machine learning fundamentals, then move on to neural networks, deep learning, and then convolutional neural networks. In a blend of fundamentals and applications, MATLAB Deep Learning employs MATLAB as the underlying programming...
UnrealScript Game Programming Cookbook
UnrealScript Game Programming Cookbook

Make the Unreal Engine your own and enter the world of high-level game programming with this super-practical collection of recipes for UnrealScript. Professional developer or hobbyist, this book will give you the edge.

Overview

  • Create a truly unique experience within UDK using a series of powerful recipes...
Instant Simple Botting with PHP
Instant Simple Botting with PHP

do for you, and then get to work with the most important features and tasks. This book is a hands-on Starter guide that takes the reader from initialization to the coding and implementation of bot apps.Instant Simple Botting with PHP targets programmers of all levels who are familiar with common PHP functions and syntax, and who want to learn...

Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet
Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet
Originally designed to sabotage or annihilate websites, computerized “Bots” are increasingly used in mass spamming events, fraud, extortion, identity theft, and software theft. Focusing on the malicious use of bots and bot herder means and motivations, Malicious Bots provides a much needed a resource for understanding...
Absolute Beginner's Guide to Building Robots
Absolute Beginner's Guide to Building Robots

Finally, a robots book for people who don't know the first thing about robotics! Absolute Beginner's Guide to Robots is well-written, inviting, and action-packed, with engaging ideas and fascinating factoids about robots and robot-related arts and sciences. You are led gently into the...

Extreme Exploits: Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses...

The Book of IRC: The Ultimate Guide to Internet Relay Chat
The Book of IRC: The Ultimate Guide to Internet Relay Chat
ICQ and other new-fangled chat applications may get most of the press, but Internet Relay Chat (IRC) remains the Wild West of real-time online conversations. Populated by the most diverse collection of characters this side of the Mos Eisley cantina scene in Star Wars, IRC will keep you up late chatting with people all over the world. The...
Result Page: 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy