Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Machine Learning and Security: Protecting Systems with Data and Algorithms
Machine Learning and Security: Protecting Systems with Data and Algorithms

Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you’ll explore ways to apply machine learning to security...

Magic For Dummies
Magic For Dummies

You don’t need a white tiger, expensive props, or hours of preparation to do magic. With a little practice, some clever misdirection (which lays at the heart of all magic tricks), and showmanship, you can surprise family, friends, and coworkers using a few everyday items!

If you’re looking to saw a beautiful women in...

Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation
Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation

Getting software released to users is often a painful, risky, and time-consuming process. This groundbreaking new book sets out the principles and technical practices that enable rapid, incremental delivery of high quality, valuable new functionality to users. Through automation of the build, deployment, and testing...

The Definitive Guide to MongoDB: A complete guide to dealing with Big Data using MongoDB
The Definitive Guide to MongoDB: A complete guide to dealing with Big Data using MongoDB

The Definitive Guide to MongoDB, Second Edition, is updated for the latest version and includes all of the latest MongoDB features, including the aggregation framework introduced in version 2.2 and hashed indexes in version 2.4. MongoDB is the most popular of the "Big Data" NoSQL database technologies, and it's still growing....

Algorithmics: The Spirit of Computing (3rd Edition)
Algorithmics: The Spirit of Computing (3rd Edition)
From a review of the first edition:

‘This book is a veritable tour de force. Harel writes with uncommon verve, clarity and imagination.'

‘Through the use of tantalizing questions and aptly chosen and often amusing examples, the author transmits to the reader the excitement and intellectual satisfaction of computer science...

String Theory Demystified
String Theory Demystified

UNRAVEL the mystery of STRING THEORY

Trying to understand string theory but ending up with your brain in knots? Here's your lifeline! This straightforward guide explains the fundamental principles behind this cutting-edge concept.

String Theory...

The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
"Few false ideas have more firmly gripped the minds of so many intelligent men than the one that, if they just tried, they could invent a cipher that no one could break," writes David Kahn in this massive (almost 1,200 pages) volume. Most of The Codebreakers focuses on the 20th century, especially World War II. But its reach is...
Head First Python
Head First Python

Ever wished you could learn Python from a book? Head First Python is a complete learning experience for Python that helps you learn the language through a unique method that goes beyond syntax and how-to manuals, helping you understand how to be a great Python programmer. You'll quickly learn the language's...

ValueWeb: How Fintech Firms are Using Bitcoin Blockchain and Mobile Technologies to Create the Internet  of Value
ValueWeb: How Fintech Firms are Using Bitcoin Blockchain and Mobile Technologies to Create the Internet of Value

The next generation internet, the Internet of Things, cannot work without an Internet of Value. The Internet of Value ― or ValueWeb, for short ― allows machines to trade with machines and people with people, anywhere on this planet in real-time and for free. The problem is that our old system cannot work that way, as it...

Cloud Computing and SOA Convergence in Your Enterprise: A Step-by-Step Guide
Cloud Computing and SOA Convergence in Your Enterprise: A Step-by-Step Guide

Massive, disruptive change is coming to IT as Software as a Service (SaaS), SOA, mashups, Web 2.0, and cloud computing truly come of age. Now, one of the world’s leading IT innovators explains what it all means—coherently, thoroughly, and authoritatively.

Writing for IT executives, architects, and developers
...

The Machine Question: Critical Perspectives on AI, Robots, and Ethics
The Machine Question: Critical Perspectives on AI, Robots, and Ethics

One of the enduring concerns of moral philosophy is deciding who or what is deserving of ethical consideration. Much recent attention has been devoted to the "animal question" -- consideration of the moral status of nonhuman animals. In this book, David Gunkel takes up the "machine question": whether and to what extent...

The Well-Grounded Rubyist
The Well-Grounded Rubyist
The Well-Grounded Rubyist takes you from interested novice to proficient practitioner. It's a beautifully written tutorial that begins with the basic steps to get your first Ruby program up and running and goes on to explore sophisticated topics like callable objects, reflection, and threading. Whether the topic is simple or tough, the...
Result Page: 72 71 70 69 68 67 66 65 64 63 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy