Home | Amazing | Today | Tags | Publishers | Years | Search 
Python Social Media Analytics: Analyze and visualize data from Twitter, YouTube, GitHub, and more
Python Social Media Analytics: Analyze and visualize data from Twitter, YouTube, GitHub, and more

Leverage the power of Python to collect, process, and mine deep insights from social media data

About This Book

  • Acquire data from various social media platforms such as Facebook, Twitter, YouTube, GitHub, and more
  • Analyze and extract actionable insights from your social data using various...
Windows Security Monitoring: Scenarios and Patterns
Windows Security Monitoring: Scenarios and Patterns

Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security

Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...

Feature Engineering for Machine Learning: Principles and Techniques for Data Scientists
Feature Engineering for Machine Learning: Principles and Techniques for Data Scientists

Feature engineering is a crucial step in the machine-learning pipeline, yet this topic is rarely examined on its own. With this practical book, you’ll learn techniques for extracting and transforming features—the numeric representations of raw data—into formats for machine-learning models. Each chapter guides you...

Machine Learning and Security: Protecting Systems with Data and Algorithms
Machine Learning and Security: Protecting Systems with Data and Algorithms

Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you’ll explore ways to apply machine learning to security...

Anti-Hacker Tool Kit, Fourth Edition
Anti-Hacker Tool Kit, Fourth Edition

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best...

Field Guide to Lidar (SPIE Field Guide FG36)
Field Guide to Lidar (SPIE Field Guide FG36)
This Field Guide covers the various components and types of active electro-optical sensors referred to as lidars in the text from simple 2D direct-detection lidars to multiple subaperture synthetic aperture lidars. Other topics covered include receivers, apertures, atmospheric effects, and appropriate processing of different lidars....
Intel Edison Projects: Build exciting IoT projects with Intel Edison
Intel Edison Projects: Build exciting IoT projects with Intel Edison

Build powerful Robots and IoT solutions using Intel Edison

About This Book

  • Learn to build advanced level robots with Intel Edison and Arduino
  • Efficiently build and program home automation and IoT projects with Intel Edison
  • Master the skills of creating...
Penetration Testing Essentials
Penetration Testing Essentials
Your pen testing career begins here, with a solid foundation in essential skills and concepts

Penetration Testing Essentials provides a starting place for professionals and beginners looking to learn more about penetration testing for cybersecurity. Certification eligibility requires work experience—but before...

Instant Nokogiri
Instant Nokogiri

Learning data scraping and parsing in Ruby using the Nokogiri gem

Overview

  • Learn something new in an Instant! A short, fast, focused guide delivering immediate results
  • Master Nokogiri with the use of clear, step-by-step instructions and real world examples
  • ...
DNS Security Management (IEEE Press Series on Networks and Service Management)
DNS Security Management (IEEE Press Series on Networks and Service Management)

An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies  

DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This...

Data Mining and Statistics for Decision Making
Data Mining and Statistics for Decision Making
Data mining is the process of automatically searching large volumes of data for models and patterns using computational techniques from statistics, machine learning and information theory; it is the ideal tool for such an extraction of knowledge. Data mining is usually associated with a business or an organization's need to identify...
Algorithms in Combinatorial Design Theory (Mathematics Studies)
Algorithms in Combinatorial Design Theory (Mathematics Studies)
Recent years have seen an explosive growth in research in combinatorics and graph theory. One primary factor in this rapid development has been the advent of computers, and the parallel study of practical and efficient algorithms. This volume represents an attempt to...
Result Page: 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy