Home | Amazing | Today | Tags | Publishers | Years | Search 
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure

Key Features

  • Advanced exploitation techniques to breach modern operating systems and complex network devices
  • ...
Git Version Control Cookbook: Leverage version control to transform your development workflow and boost productivity, 2nd Edition
Git Version Control Cookbook: Leverage version control to transform your development workflow and boost productivity, 2nd Edition

A series of practical recipes to simplify the Git learning experience and increase your productivity when using Git version control

Key Features

  • Explore practical recipes to use Git's most advanced features
  • Learn how Git references its objects and how history is...
Mastering Machine Learning Algorithms: Expert techniques to implement popular machine learning algorithms and fine-tune your models
Mastering Machine Learning Algorithms: Expert techniques to implement popular machine learning algorithms and fine-tune your models

Explore and master the most important algorithms for solving complex machine learning problems.

Key Features

  • Discover high-performing machine learning algorithms and understand how they work in depth
  • One-stop solution to mastering supervised, unsupervised, and...
Hands-On Neural Networks with Keras: Design and create neural networks using deep learning and artificial intelligence principles
Hands-On Neural Networks with Keras: Design and create neural networks using deep learning and artificial intelligence principles

Your one-stop guide to learning and implementing artificial neural networks with Keras effectively

Key Features

  • Design and create neural network architectures on different domains using Keras
  • Integrate neural network models in your applications using this highly practical...
Numerical Computing with Python: Harness the power of Python to analyze and find hidden patterns in the data
Numerical Computing with Python: Harness the power of Python to analyze and find hidden patterns in the data

Understand, explore, and effectively present data using the powerful data visualization techniques of Python

Key Features

  • Use the power of Pandas and Matplotlib to easily solve data mining issues
  • Understand the basics of statistics to build powerful predictive data...
Artificial Intelligence By Example: Develop machine intelligence from scratch using real artificial intelligence use cases
Artificial Intelligence By Example: Develop machine intelligence from scratch using real artificial intelligence use cases

Be an adaptive thinker that leads the way to Artificial Intelligence

Key Features

  • AI-based examples to guide you in designing and implementing machine intelligence
  • Develop your own method for future AI solutions
  • Acquire advanced AI, machine learning, and...
Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python
Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python

Become a master at penetration testing using machine learning with Python

Key Features

  • Identify ambiguities and breach intelligent security systems
  • Perform unique cyber attacks to breach robust systems
  • Learn to leverage machine learning algorithms
  • ...
Mastering Reverse Engineering: Re-engineer your ethical hacking skills
Mastering Reverse Engineering: Re-engineer your ethical hacking skills

Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses.

Key Features

  • Analyze and improvise software and hardware with real-world examples
  • Learn advanced debugging and patching...
Neurosurgery: A Case-Based Approach
Neurosurgery: A Case-Based Approach

This book describes neurosurgical cases following the format of the clinical handover. Each case has a one line summary and differential diagnosis, appropriate interpretation of illustrated radiological studies, further ancillary tests, and management options. When appropriate, scoring/scaling systems and detailed anatomy are...

Venture Work: Employees in Thinly Capitalized Firms
Venture Work: Employees in Thinly Capitalized Firms

This book contributes to the ongoing discussion around so-called precarious or venture work, as the proportion of those employed by start-ups and thinly-capitalized firms continues to grow. Filling a gap in literature, the author explores the relationship between venture co-workers and examines how they cope with economic...

We Want to Negotiate: The Secret World of Kidnapping, Hostages and Ransom
We Want to Negotiate: The Secret World of Kidnapping, Hostages and Ransom
"A wise and thorough investigation." - Lawrence Wright, author of The Looming Tower and The Terror Years

Starting in late 2012, Westerners working in Syria -- journalists and aid workers -- began disappearing without a trace. A year later the world learned they had been taken hostage by the
...
Basic Theory (De Gruyter Reference)
Basic Theory (De Gruyter Reference)
Fractional calculus (FC) originated in 1695, nearly at the same time as conventional calculus. However, FC attracted limited attention and remained a pure mathematical exercise, in spite of the contributions of important mathematicians, physicists and engineers. FC had a rapid development during the last few decades, both in...
Result Page: 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 74 73 72 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy