Home | Amazing | Today | Tags | Publishers | Years | Search 
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure

Key Features

  • Advanced exploitation techniques to breach modern operating systems and complex network devices
  • ...
Mastering Numerical Computing with NumPy: Master scientific computing and perform complex operations with ease
Mastering Numerical Computing with NumPy: Master scientific computing and perform complex operations with ease

Enhance the power of NumPy and start boosting your scientific computing capabilities

Key Features

  • Grasp all aspects of numerical computing and understand NumPy
  • Explore examples to learn exploratory data analysis (EDA), regression, and clustering
  • Access...
Ethereum Cookbook: Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps
Ethereum Cookbook: Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps

Mine Ether, deploy smart contracts, tokens, and ICOs, and manage security vulnerabilities of Ethereum

Key Features

  • Build end-to-end decentralized Ethereum apps using Truffle, Web3, and Solidity
  • Explore various solution-based recipes to build smart contracts and foolproof...
Beginning Blockchain: A Beginner's Guide to Building Blockchain Solutions
Beginning Blockchain: A Beginner's Guide to Building Blockchain Solutions

Understand the nuts and bolts of Blockchain, its different flavors with simple use cases, and cryptographic fundamentals. You will also learn some design considerations that can help you build custom solutions.

Beginning Blockchain is a beginner’s guide to understanding the core concepts of...

DSP Applications Using C and the TMS320C6x DSK
DSP Applications Using C and the TMS320C6x DSK
Digital signal processors, such as the TMS320 family of processors, are used in a wide range of applications, such as in communications, controls, speech processing, and so on. They are used in fax transmission, modems, cellular phones, and other devices. These devices have also found...
Software Development From A to Z: A Deep Dive into all the Roles Involved in the Creation of Software
Software Development From A to Z: A Deep Dive into all the Roles Involved in the Creation of Software

Understand the big picture of the software development process. We use software every day – operating systems, applications, document editing programs, home banking – but have you ever wondered who creates software and how it’s created? This book guides you through the entire process, from conception to the finished...

Hands-On Automated Machine Learning: A beginner's guide to building automated machine learning systems using AutoML and Python
Hands-On Automated Machine Learning: A beginner's guide to building automated machine learning systems using AutoML and Python

Automate data and model pipelines for faster machine learning applications

Key Features

  • Build automated modules for different machine learning components
  • Understand each component of a machine learning pipeline in depth
  • Learn to use different open source...
Accelerating Development Velocity Using Docker: Docker Across Microservices
Accelerating Development Velocity Using Docker: Docker Across Microservices

Discover how a software engineer can leverage Docker in order to expedite development velocity. This book focuses on the fundamental concepts this program is built upon and explores how it can help you get your services up and running inside Docker containers. You'll also review tips on how to debug microservices applications...

Pro SQL Server on Linux: Including Container-Based Deployment with Docker and Kubernetes
Pro SQL Server on Linux: Including Container-Based Deployment with Docker and Kubernetes
Get SQL Server up and running on the Linux operating system and containers. No database professional managing or developing SQL Server on Linux will want to be without this deep and authoritative guide by one of the most respected experts on SQL Server in the industry. Get an inside look at how SQL Server for Linux works through the...
Ruby Data Processing: Using Map, Reduce, and Select
Ruby Data Processing: Using Map, Reduce, and Select
Gain the basics of Ruby’s map, reduce, and select functions and discover how to use them to solve data-processing problems. This compact hands-on book explains how you can encode certain complex programs in 10 lines of Ruby code, an astonishingly small number. You will walk through problems and solutions which are effective...
Python Data Science Essentials: A practitioner's guide covering essential data science principles, tools, and techniques, 3rd Edition
Python Data Science Essentials: A practitioner's guide covering essential data science principles, tools, and techniques, 3rd Edition

Gain useful insights from your data using popular data science tools

Key Features

  • A one-stop guide to Python libraries such as pandas and NumPy
  • Comprehensive coverage of data science operations such as data cleaning and data manipulation
  • Choose scalable...
Hands-On Full Stack Development with Spring Boot 2.0  and React: Build modern and scalable full stack applications using the Java-based Spring Framework 5.0 and React
Hands-On Full Stack Development with Spring Boot 2.0 and React: Build modern and scalable full stack applications using the Java-based Spring Framework 5.0 and React

Develop efficient and modern full stack applications using Spring Boot and React 16

Key Features

  • Build resourceful backends using Spring Boot and faultless frontends using React
  • Explore techniques involved in creating a full stack app
  • Add CRUD...
Result Page: 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy