Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Machine Learning and Security: Protecting Systems with Data and Algorithms
Machine Learning and Security: Protecting Systems with Data and Algorithms

Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you’ll explore ways to apply machine learning to security...

Analysis Patterns: Reusable Object Models (The Addison-Wesley Object Technology Series)
Analysis Patterns: Reusable Object Models (The Addison-Wesley Object Technology Series)

This innovative book recognizes the need within the object-oriented community for a book that goes beyond the tools and techniques of the typical methodology book. In Analysis Patterns: Reusable Object Models, Martin Fowler focuses on the end result of object-oriented analysis and design - the models themselves. He shares with...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

The Introverted Presenter: Ten Steps for Preparing and Delivering Successful Presentations
The Introverted Presenter: Ten Steps for Preparing and Delivering Successful Presentations

The introvert is a personality type that draws energy from the outside inward. According to standard personality testing assessments, most people are introverts and no group is more introverted than technical professionals. Introverts are congenitally programmed to recoil from the prospect of public speaking with fear and loathing, yet making...

The Geometry of the Word Problem for Finitely Generated Groups (Advanced Courses in Mathematics)
The Geometry of the Word Problem for Finitely Generated Groups (Advanced Courses in Mathematics)
The origins of the word problem are in group theory, decidability and complexity, but, through the vision of M. Gromov and the language of filling functions, the topic now impacts the world of large-scale geometry, including topics such as soap films, isoperimetry, coarse invariants and curvature.

The first part introduces van Kampen diagrams...

Quantum Computing without Magic: Devices (Scientific and Engineering Computation)
Quantum Computing without Magic: Devices (Scientific and Engineering Computation)
"Quantum Computing without Magic gives a refreshing and down to earth approach to quantum information as well as quantum devices which will have a fundamental impact on the technology of the 21st century."
Raymond Laflamme, Canada Research Chair in Quantum Information, and Director, Institute for
...
Planning Extreme Programming
Planning Extreme Programming

The hallmarks of Extreme Programming--constant integration and automated testing, frequent small releases that incorporate continual customer feedback, and a teamwork approach--make it an exceptionally flexible and effective approach to software development. Once considered radical, Extreme Programming (XP) is rapidly becoming
...
Mind, Matter and the Implicate Order (The Frontiers Collection)
Mind, Matter and the Implicate Order (The Frontiers Collection)
Quantum theory predicts experimental results brilliantly but simultaneously raises difficult conceptual issues. Paradoxes such as Schrödinger’s cat, the EPR paradox, or the nonlocality demanded by Bell’s inequalities have hampered philosophers in their attempts to include quantum theory when discussing the relation between mind and...
Videoblogging For Dummies
Videoblogging For Dummies

Eager to try this exciting new form of twenty-first century communication? This book makes it easy! A groundbreaking vlogger shows you what you need to get started, how to turn your text blog into a videoblog, how to make things easy for your adoring public, and even how to deal with little snags like stage...

How to Program Visual Basic 5.0: Control Creation Edition
How to Program Visual Basic 5.0: Control Creation Edition
A world in which every piece of software has the ability to interact with every other piece of software ain't gonna happen anytime soon. But you can always dream. I personally hope to someday put a software chip in a small house pet-a cat, perhaps-and control it through the use of Visual Basic properties and methods.

But perhaps I'm
...
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Beginning Cryptography with Java
Beginning Cryptography with Java
Beginning Cryptography with Java

While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications—if you know how.

This book teaches you how. Chapters one through...

Result Page: 9 8 7 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy