Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Website Scraping with Python: Using BeautifulSoup and Scrapy
Website Scraping with Python: Using BeautifulSoup and Scrapy
Closely examine website scraping and data processing: the technique of extracting data from websites in a format suitable for further analysis. You'll review which tools to use, and compare their features and efficiency. Focusing on BeautifulSoup4 and Scrapy, this concise, focused book highlights common problems and suggests...
Pharmacy Informatics
Pharmacy Informatics

Applies the Principles of Informatics to the Pharmacy Profession
Emphasizes Evidence-Based Practice and Quality Improvement Approaches

Leading the way in the integration of information technology with healthcare, Pharmacy Informatics reflects some of the rapid changes that have developed in...

A Practical Guide to Trusted Computing
A Practical Guide to Trusted Computing
Use Trusted Computing to Make PCs Safer, More Secure, and More Reliable

 

Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what’s needed is secure hardware. The Trusted Platform Module (TPM) makes...

IT Innovation for Adaptability and Competitiveness
IT Innovation for Adaptability and Competitiveness

IT Innovation for Adaptability and Competitiveness addresses the topic of IT innovations that can further an organization's ability to adapt and be competitive. Thus we address the problem at an earlier starting point, that is, the emergence of something innovative in an organization, applied to that organization, and its process of being...

Bootstrap Yourself with Linux-USB Stack: Design, Develop, Debug, and Validate Embedded USB Systems
Bootstrap Yourself with Linux-USB Stack: Design, Develop, Debug, and Validate Embedded USB Systems

Before starting a new task, you generally do research so you can avoid mistakes. In the computer realm, bootstrap sessions provide a head start and help you minimize mistakes and surprises. As an example, to design a protocol stack, build a bootstrap session so you can understand the protocol specification and the system on which it...

Learning Einstein Analytics: Unlock critical insights with Salesforce  Einstein Analytics
Learning Einstein Analytics: Unlock critical insights with Salesforce Einstein Analytics

Learn to confidently setup and create app, lenses, dashboards using Salesforce Einstein Analytics.

Key Features

  • Explore Einstein analytics on desktop as well as mobile platforms
  • Turn data into smarter sales with Einstein Analytics for Sales
  • Visualize your data with...
Essential Linux Device Drivers (Prentice Hall Open Source Software Development Series)
Essential Linux Device Drivers (Prentice Hall Open Source Software Development Series)
“Probably the most wide ranging and complete Linux device driver book I’ve read.”

--Alan Cox, Linux Guru and Key Kernel Developer

 

“Very comprehensive and detailed, covering almost every single Linux device driver type.”

...
Beginning C: From Novice to Professional, Fourth Edition
Beginning C: From Novice to Professional, Fourth Edition

With Beginning C: From Novice to Professional, Fourth Edition, you'll come to understand the fundamentals of the C language and learn how to program. All you need is this book and any one of the widely available free or commercial C or C++ compilers--and you'll soon be writing real C programs. You'll learn C from the first principles,...

PCI Express System Architecture
PCI Express System Architecture

PCI Express is the third-generation Peripheral Component Inter-connect technology for a wide range of systems and peripheral devices. Incorporating recent advances in high-speed, point-to-point interconnects, PCI Express provides significantly higher performance, reliability, and enhanced capabilities—at a lower...

Windows Internals, Part 1: Covering Windows Server 2008 R2 and Windows 7
Windows Internals, Part 1: Covering Windows Server 2008 R2 and Windows 7
Windows Internals, Sixth Edition is intended for advanced computer professionals (both developers and system administrators) who want to understand how the core components of the Microsoft Windows 7 and Windows Server 2008 R2 operating systems work internally. With this knowledge, developers can better...
The Marketing Agency Blueprint: The Handbook for Building Hybrid PR, SEO, Content, Advertising, and Web Firms
The Marketing Agency Blueprint: The Handbook for Building Hybrid PR, SEO, Content, Advertising, and Web Firms

When I started HubSpot in June 2006 with my business partner, Dharmesh Shah, our experiences with marketing agencies led us to almost entirely avoid working with them. In fact, we designed our original business model around selling our marketing software directly to end customers, and developed an internal marketing team that would not be...

Hacking Exposed Wireless
Hacking Exposed Wireless

Secure Your Wireless Networks the Hacking Exposed Way

Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute...

Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy