Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Qt5 Python GUI Programming Cookbook: Building responsive and powerful cross-platform applications with PyQt
Qt5 Python GUI Programming Cookbook: Building responsive and powerful cross-platform applications with PyQt

Over 60 recipes to help you design interactive, smart, and cross-platform GUI applications

Key Features

  • Get succinct QT solutions to pressing GUI programming problems in Python
  • Learn how to effectively implement reactive programming
  • Build customized...
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats

Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful...

Building Smart Drones with ESP8266 and Arduino: Build exciting drones by leveraging the capabilities of Arduino and ESP8266
Building Smart Drones with ESP8266 and Arduino: Build exciting drones by leveraging the capabilities of Arduino and ESP8266

Leverage the WiFi chip to build exciting Quadcopters

Key Features

  • Learn to create a fully functional Drone with Arduino and ESP8266 and their modified versions of hardware.
  • Enhance your drone's functionalities by implementing smart features.
  • A...
Learn Robotics Programming: Build and control autonomous robots using Raspberry Pi 3 and Python
Learn Robotics Programming: Build and control autonomous robots using Raspberry Pi 3 and Python

Gain experience of building a next-generation collaboration robot

Key Features

  • Get up and running with the fundamentals of robotic programming
  • Program a robot using Python and the Raspberry Pi 3
  • Learn to build a smart robot with interactive and AI-enabled...
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.

Key Features

  • Learn how to test for common bugs
  • Discover tools and methods for hacking ethically
  • Practice working through pentesting engagements...
Jenkins Fundamentals: Accelerate deliverables, manage builds, and automate pipelines with Jenkins
Jenkins Fundamentals: Accelerate deliverables, manage builds, and automate pipelines with Jenkins

Continuous integration with Jenkins speeds up your projects and saves you time and money

Key Features

  • Get a perfect balance of theories and hands-on activities
  • Apply continuous integration and delivery to your workflow
  • Explore concepts such as the plugin...
Learn Computer Science with Swift: Computation Concepts, Programming Paradigms, Data Management, and Modern Component Architectures with Swift and Playgrounds
Learn Computer Science with Swift: Computation Concepts, Programming Paradigms, Data Management, and Modern Component Architectures with Swift and Playgrounds

Master the basics of solving logic puzzles, and creating algorithms using Swift on Apple platforms. This book is based on the curriculum currently being used in common computer classes. You’ll learn to automate algorithmic processes that scale using Swift in the context of iOS, macOS, tvOS, and watchOS.

Begin by...

Learning Robotics using Python: Design, simulate, program, and prototype an autonomous mobile robot using ROS, OpenCV, PCL, and Python, 2nd Edition
Learning Robotics using Python: Design, simulate, program, and prototype an autonomous mobile robot using ROS, OpenCV, PCL, and Python, 2nd Edition

Design, simulate, and program interactive robots

Key Features

  • Design, simulate, build, and program an interactive autonomous mobile robot
  • Leverage the power of ROS, Gazebo, and Python to enhance your robotic skills
  • A hands-on guide to creating an...
Defending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time
Defending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time
Apply a methodology and practical solutions for monitoring the behavior of the Internet of Things (IoT), industrial control systems (ICS), and other critical network devices with the inexpensive Raspberry Pi. With this book, you will master passive monitoring and detection of aberrant behavior, and learn how to generate early indications...
Keras Reinforcement Learning Projects: 9 projects exploring popular reinforcement learning techniques to build self-learning agents
Keras Reinforcement Learning Projects: 9 projects exploring popular reinforcement learning techniques to build self-learning agents

A practical guide to mastering reinforcement learning algorithms using Keras

Key Features

  • Build projects across robotics, gaming, and finance fields, putting reinforcement learning (RL) into action
  • Get to grips with Keras and practice on real-world unstructured...
Internet of Things Programming Projects: Build modern IoT solutions with the Raspberry Pi 3 and Python
Internet of Things Programming Projects: Build modern IoT solutions with the Raspberry Pi 3 and Python

A practical project-based guide to help you build and control your IoT projects

Key Features

  • Leverage the full potential of IoT with the combination of Raspberry Pi 3 and Python
  • Build complex Python-based applications with IoT
  • Work on various IoT projects...
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing

Learn how to hack systems like black hat hackers and secure them like security experts

Key Features

  • Understand how computer systems work and their vulnerabilities
  • Exploit weaknesses and hack into machines to test their security
  • Learn how to secure systems...
Result Page: 329 328 327 326 325 324 323 322 321 320 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy