Home | Amazing | Today | Tags | Publishers | Years | Search 
Healthcare-Associated Infections in Children: A Guide to Prevention and Management
Healthcare-Associated Infections in Children: A Guide to Prevention and Management
With advances in technology and medical science, children with previously untreatable and often fatal conditions, such as congenital heart disease, extreme prematurity and pediatric malignancy, are living longer.  While this is a tremendous achievement, pediatric providers are now more commonly facing challenges in these medical...
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework

Over 100 recipes for penetration testing using Metasploit and virtual machines

Key Features

  • Special focus on the latest operating systems, exploits, and penetration testing techniques
  • Learn new anti-virus evasion techniques and use Metasploit to evade countermeasures
  • ...
Monetizing Machine Learning: Quickly Turn Python ML Ideas into Web Applications on the Serverless Cloud
Monetizing Machine Learning: Quickly Turn Python ML Ideas into Web Applications on the Serverless Cloud

Take your Python machine learning ideas and create serverless web applications accessible by anyone with an Internet connection. Some of the most popular serverless cloud providers are covered in this book?Amazon, Microsoft, Google, and PythonAnywhere.

You will work through a series of common Python data science problems...

Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
Hands-On Kubernetes on Azure: Run your applications securely and at scale on the most widely adopted orchestration platform
Hands-On Kubernetes on Azure: Run your applications securely and at scale on the most widely adopted orchestration platform

Efficiently deploy and manage Kubernetes clusters on a cloud

Key Features

  • Deploy highly scalable applications with Kubernetes on Azure
  • Leverage AKS to deploy, manage, and operations of Kubernetes
  • Gain best practices from this guide to increase efficiency...
Generative Adversarial Networks Projects: Build next-generation generative models using TensorFlow and Keras
Generative Adversarial Networks Projects: Build next-generation generative models using TensorFlow and Keras

Explore various Generative Adversarial Network architectures using the Python ecosystem

Key Features

  • Use different datasets to build advanced projects in the Generative Adversarial Network domain
  • Implement projects ranging from generating 3D shapes to a face aging...
Mastering Elixir: Build and scale concurrent, distributed, and fault-tolerant applications
Mastering Elixir: Build and scale concurrent, distributed, and fault-tolerant applications

Leverage the power of Elixir programming language to solve practical problems associated with scalability, concurrency, fault tolerance, and high availability.

Key Features

  • Enhance your Elixir programming skills using its powerful tools and abstractions
  • Discover how to...
Beginning Java Data Structures and Algorithms: Sharpen your problem solving skills by learning core computer science concepts in a pain-free manner
Beginning Java Data Structures and Algorithms: Sharpen your problem solving skills by learning core computer science concepts in a pain-free manner

Though your application serves its purpose, it might not be a high performer. Learn techniques to accurately predict code efficiency, easily dismiss inefficient solutions, and improve the performance of your application.

Key Features

  • Explains in detail different algorithms and data...
Blockchain By Example: A developer's guide to creating decentralized applications using Bitcoin, Ethereum, and Hyperledger
Blockchain By Example: A developer's guide to creating decentralized applications using Bitcoin, Ethereum, and Hyperledger

Implement decentralized blockchain applications to build scalable Dapps

Key Features

  • Understand the blockchain ecosystem and its terminologies
  • Implement smart contracts, wallets, and consensus protocols
  • Design and develop decentralized applications using...
Deep Learning By Example: A hands-on guide to implementing advanced machine learning algorithms and neural networks
Deep Learning By Example: A hands-on guide to implementing advanced machine learning algorithms and neural networks

Grasp the fundamental concepts of deep learning using Tensorflow in a hands-on manner

Key Features

  • Get a first-hand experience of the deep learning concepts and techniques with this easy-to-follow guide
  • Train different types of neural networks using Tensorflow for...
Qt 5 and OpenCV 4 Computer Vision Projects: Get up to speed with cross-platform computer vision app development by building seven practical projects
Qt 5 and OpenCV 4 Computer Vision Projects: Get up to speed with cross-platform computer vision app development by building seven practical projects

Create image processing, object detection and face recognition apps by leveraging the power of machine learning and deep learning with OpenCV 4 and Qt 5

Key Features

  • Gain practical insights into code for all projects covered in this book
  • Understand modern computer vision...
Nature-Inspired Algorithms for Optimisation (Studies in Computational Intelligence)
Nature-Inspired Algorithms for Optimisation (Studies in Computational Intelligence)

Nature-Inspired Algorithms have been gaining much popularity in recent years due to the fact that many real-world optimisation problems have become increasingly large, complex and dynamic. The size and complexity of the problems nowadays require the development of methods and solutions whose efficiency is measured...

Result Page: 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy