Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
RESPONSIBLE RESPONSIVE DESIGN
RESPONSIBLE RESPONSIVE DESIGN

Contents: - Responsible Design - Sustainable Detection - Planning for Performance - Delivering Responsibly. "Responsive design has immeasurably improved multi-device, multi-browser visual layout-but it's only the first step in building responsively. Learn how to turn a critical eye on your designs as you develop for new contexts...

Kali Linux Cookbook
Kali Linux Cookbook

When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes.

Overview

  • Recipes designed to educate you extensively on the penetration testing principles and Kali...
Virtualization Security (EC-Council Disaster Recovery Professional)
Virtualization Security (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Breast Cancer: A Guide to Detection and Multidisciplinary Therapy (Current Clinical Oncology)
Breast Cancer: A Guide to Detection and Multidisciplinary Therapy (Current Clinical Oncology)

Michael H. Torosian, MD, and a panel of physicians and clinical researchers critically synthesize the wide variety of treatment options available to create a state-of-the-art reference for the management of breast cancer patients. Writing from a multidisciplinary perspective, these authoritative contributors review in the light of the most...

Statistics for Censored Environmental Data Using Minitab and R
Statistics for Censored Environmental Data Using Minitab and R

Praise for the First Edition

" . . . an excellent addition to an upper-level undergraduate course on environmental statistics, and . . . a 'must-have' desk reference for environmental practitioners dealing with censored datasets."
—Vadose Zone Journal

Statistical Methods for...

How to Cheat at Securing Linux
How to Cheat at Securing Linux
Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system for the majority of their servers designed for medium to large size businesses. As with any technologies, increased...
Pro Machine Learning Algorithms: A Hands-On Approach to Implementing Algorithms in Python and R
Pro Machine Learning Algorithms: A Hands-On Approach to Implementing Algorithms in Python and R
Bridge the gap between a high-level understanding of how an algorithm works and knowing the nuts and bolts to tune your models better. This book will give you the confidence and skills when developing all the major machine learning models. In Pro Machine Learning Algorithms, you will first develop the algorithm in Excel so...
Advances in Visual Computing: 6th International Symposium, ISVC 2010, Part III
Advances in Visual Computing: 6th International Symposium, ISVC 2010, Part III

The three volume set LNCS 6453, LNCS 6454, and LNCS 6455 constitutes the refereed proceedings of the 6th International Symposium on Visual Computing, ISVC 2010, held in Las Vegas, NV, USA, in November/December 2010. The 93 revised full papers and 73 poster papers presented together with 44 full and 6 poster papers of 7 special tracks were...

Penetration Testing: Procedures & Methodologies
Penetration Testing: Procedures & Methodologies

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Practical Computer Vision: Extract insightful information from images using TensorFlow, Keras, and OpenCV
Practical Computer Vision: Extract insightful information from images using TensorFlow, Keras, and OpenCV

A practical guide designed to get you from basics to current state of art in computer vision systems.

Key Features

  • Master the different tasks associated with Computer Vision and develop your own Computer Vision applications with ease
  • Leverage the power of Python,...
Optimizing Oracle Performance
Optimizing Oracle Performance
Oracle DBAs and developers are all too familiar with the outlay of time and resources, blown budgets, missed deadlines, and marginally effective performance fiddling that is commonplace with traditional methods of Oracle performance tuning. In Optimizing Oracle Performance, Cary Millsap, former VP of Oracle's System...
Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux: A Guide to Open Source Security is designed to help you deploy a Linux system on the Internet in a variety of security roles.This book provides practical instructions and pointers concerning the open source security tools that we use every day.

First, we show you how to obtain
...
unlimited object storage image
Result Page: 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy