Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python
Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python

Become a master at penetration testing using machine learning with Python

Key Features

  • Identify ambiguities and breach intelligent security systems
  • Perform unique cyber attacks to breach robust systems
  • Learn to leverage machine learning algorithms
  • ...
Digital Color Image Processing
Digital Color Image Processing
Color information is gaining an ever-greater importance in digital image processing. Nevertheless, the leap to be mastered by the transition from scalar to vector-valued image functions is not yet generally addressed in most textbooks on digital image processing. The main goal of this book is to clarify the significance of vector-valued color image...
Optical Sources, Detectors, and Systems
Optical Sources, Detectors, and Systems
Optical Sources, Detectors, and Systems presents a unified approach, from the applied engineering point of view, to radiometry, optical devices, sources, and receivers. One of the most important and unique features of the book is that it combines modern optics, electric circuits, and system analysis into a unified, comprehensive...
Cancer Precursors: Epidemiology, Detection, and Prevention
Cancer Precursors: Epidemiology, Detection, and Prevention
Dramatic advances in our understanding of cancer causation have come from epidemiologic and laboratory research, particularly over the past two decades. These developments have included a broadening interest in the critical events that take place during the early stages of the dynamic multistep process leading to invasive...
Intrusion Detection and Correlation: Challenges and Solutions
Intrusion Detection and Correlation: Challenges and Solutions

Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the problem of managing and correlating the alerts produced. This volume discusses the role of intrusion detection in the realm of network security with comparisons to traditional methods such as firewalls and...

Network Security: A Beginner's Guide, Second Edition
Network Security: A Beginner's Guide, Second Edition
Essential Skills--Made Easy!

Protect your digital knowledge, data, and capabilities from misuse or tampering. This fully updated guidebook provides step-by-step instruction on implementing firewalls, wireless security, desktop protection, biometrics, and many of today's essential security measures. Understand the four primary forms of attack...

Discrete Fourier Analysis and Wavelets: Applications to Signal and Image Processing
Discrete Fourier Analysis and Wavelets: Applications to Signal and Image Processing

A thorough guide to the classical and contemporary mathematical methods of modern signal and image processing

Discrete Fourier Analysis and Wavelets presents a thorough introduction to the mathematical foundations of signal and image processing. Key concepts and applications are addressed in a thought-provoking...

Feature Engineering for Machine Learning: Principles and Techniques for Data Scientists
Feature Engineering for Machine Learning: Principles and Techniques for Data Scientists

Feature engineering is a crucial step in the machine-learning pipeline, yet this topic is rarely examined on its own. With this practical book, you’ll learn techniques for extracting and transforming features—the numeric representations of raw data—into formats for machine-learning models. Each chapter guides you...

Mining the Social Web: Data Mining Facebook, Twitter, LinkedIn, Instagram, GitHub, and More
Mining the Social Web: Data Mining Facebook, Twitter, LinkedIn, Instagram, GitHub, and More

Mine the rich data tucked away in popular social websites such as Twitter, Facebook, LinkedIn, and Instagram. With the third edition of this popular guide, data scientists, analysts, and programmers will learn how to glean insights from social media—including who’s connecting with whom, what they’re...

Developing Games in Java
Developing Games in Java
If you already have experience programming games with Java, this book is for you. David Brackeen, along with co-authors Bret Barker and Lawrence Vanhelsuwe, show you how to make fast, full-screen action games such as side scrollers and 3D shooters. Key features covered in this book include Java 2 game programming techniques, including latest 2D...
Survey of Text Mining II: Clustering, Classification, and Retrieval
Survey of Text Mining II: Clustering, Classification, and Retrieval
The proliferation of digital computing devices and their use in communication has resulted in an increased demand for systems and algorithms capable of mining textual data. Thus, the development of techniques for mining unstructured, semi-structured, and fully-structured textual data has become increasingly important in both academia and industry....
SIP Handbook: Services, Technologies, and Security of Session Initiation Protocol
SIP Handbook: Services, Technologies, and Security of Session Initiation Protocol
Widely adopted by service providers to enable IP telephony, instant messaging, and other data services, SIP is the signaling protocol of choice for advanced multimedia communications signaling. Compiled by noted engineering experts Syed Ahson and Mohammad Ilyas, SIP Handbook: Services, Technologies, and Security of Session Initiation...
unlimited object storage image
Result Page: 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy