Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions
Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions
Develop, validate, and deploy powerful decentralized applications using blockchain 


Get the most out of cutting-edge blockchain technology using the hands-on information contained in this comprehensive resource. Written by a team of technology and legal experts, Blockchain:...
CCNA Cyber Ops SECOPS 210-255 Official Cert Guide (Certification Guide)
CCNA Cyber Ops SECOPS 210-255 Official Cert Guide (Certification Guide)

Learn, prepare, and practice for CCNA Cyber Ops SECOPS #210-255 exam success with this Official Cert Guide from Pearson IT Certification, a leader in IT Certification learning.

  • Master CCNA Cyber Ops SECOPS #210-255 exam topics
Internet Psychology (The Basics)
Internet Psychology (The Basics)

We can't imagine our lives without the Internet. It is the tool of our existence; without it we couldn't work, plan our social and leisure activities, and interact with friends. The Internet’s influence on contemporary society extends across every aspect of our personal and professional lives, but how has this altered us in...

My Samsung Galaxy S7
My Samsung Galaxy S7
Before you start customizing your Galaxy S7 and working with apps, you should examine the external features, device features, and the Android 6.01 operating system.

In addition to Android 6.01 (Marshmallow), this chapter covers the Samsung TouchWiz interface, which is overlaid on top of Android to adjust the way
...
Power Management Integrated Circuits (Devices, Circuits, and Systems)
Power Management Integrated Circuits (Devices, Circuits, and Systems)

Power Management Integrated Circuits and Technologies delivers a modern treatise on mixed-signal integrated circuit design for power management. Comprised of chapters authored by leading researchers from industry and academia, this definitive text:

  • Describes circuit- and architectural-level innovations...
Cloud and Fog Computing in 5G Mobile Networks: Emerging Advances and Applications (Iet Telecommunications)
Cloud and Fog Computing in 5G Mobile Networks: Emerging Advances and Applications (Iet Telecommunications)

Now diffused among end-user devices in mobile and wireline networks, the "cloud" is becoming the "fog." This book focuses on the challenges and solutions related to cloud and fog computing for 5G mobile networks and presents novel approaches to the frameworks and schemes that carry out storage, communication, computation,...

Python Unlocked
Python Unlocked

Key Features

  • Write smarter, bug-free, high performance code with minimal effort
  • Uncover the best tools and options available to Python developers today
  • Deploy decorators, design patters, and various optimization techniques to use Python 3.5 effectively

Book...

Python Forensics: A workbench for inventing and sharing digital forensic technology
Python Forensics: A workbench for inventing and sharing digital forensic technology

Python Forensics provides many never-before-published proven forensic modules, libraries, and solutions that can be used right out of the box. In addition, detailed instruction and documentation provided with the code samples will allow even novice Python programmers to add their own unique twists or use the models presented to build...

Neural Networks in Finance : Gaining Predictive Edge in the Market (Advanced Finance Series)
Neural Networks in Finance : Gaining Predictive Edge in the Market (Advanced Finance Series)
"This book clarifies many of the mysteries of Neural Networks and related optimization techniques for researchers in both economics and finance. It contains many practical examples backed up with computer programs for readers to explore. I recommend it to anyone who wants to understand methods used in nonlinear forecasting."
Blake
...
Robust Control Systems with Genetic Algorithms (Control Series)
Robust Control Systems with Genetic Algorithms (Control Series)

In recent years, new paradigms have emerged to replace-or augment-the traditional, mathematically based approaches to optimization. The most powerful of these are genetic algorithms (GA), inspired by natural selection, and genetic programming, an extension of GAs based on the optimization of symbolic codes.

Robust
...

Microsoft Azure IAAS Essentials
Microsoft Azure IAAS Essentials

Design, configure, and build your cloud-based infrastructure using Microsoft Azure

About This Book

  • Deploy both Windows-based and Linux-based virtual machines to Microsoft Azure
  • Utilize SQL Server Azure to build a robust, highly available solution that can be recovered in the event of...
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

Cutting-edge techniques for finding and fixing critical security flaws

Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s...

Result Page: 122 121 120 119 118 117 116 115 114 113 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy