Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Scientific Computing with Python 3
Scientific Computing with Python 3

Key Features

  • Your ultimate resource for getting up and running with Python numerical computations
  • Explore numerical computing and mathematical libraries using Python 3.x code with SciPy and NumPy modules
  • A hands-on guide to implementing mathematics with Python, with complete...
Wicked Cool Shell Scripts, 2nd Edition: 101 Scripts for Linux, OS X, and UNIX Systems
Wicked Cool Shell Scripts, 2nd Edition: 101 Scripts for Linux, OS X, and UNIX Systems
Shell scripts are an efficient way to interact with your machine and manage your files and system operations. With just a few lines of code, your computer will do exactly what you want it to do. But you can also use shell scripts for many other essential (and not-so-essential) tasks.

This second edition of Wicked Cool
...
Honeypots and Routers: Collecting Internet Attacks
Honeypots and Routers: Collecting Internet Attacks

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to...

Modern Data Science with R (Chapman & Hall/CRC Texts in Statistical Science)
Modern Data Science with R (Chapman & Hall/CRC Texts in Statistical Science)

Modern Data Science with R is a comprehensive data science textbook for undergraduates that incorporates statistical and computational thinking to solve real-world problems with data. Rather than focus exclusively on case studies or programming syntax, this book illustrates how statistical programming in the...

Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Ever wonder how easy it is to hack into someone’s bank account info while surfing the net at your local Starbucks? Learning how to hack is one of the best preventative measures you can take when protecting yourself from other hackers. Hacking is often misunderstood and that is for good reason. Many people use hacking as...
Beginning SQL Server R Services: Analytics for Data Scientists
Beginning SQL Server R Services: Analytics for Data Scientists

Learn how to develop powerful data analytics applications quickly for SQL Server database administrators and developers. Organizations will be able to sift data and derive the business intelligence needed to drive business decisions and profit. The addition of R to SQL Server 2016 places a powerful analytical processor into an...

Amazing Java: Learn Java Quickly!
Amazing Java: Learn Java Quickly!


Do you know Java is being used worldwide? These days it is difficult to find a platform not running on Java. Their uses begin from commercial e-commerce website to Android apps, from desktop applications to games, from financial applications to scientific applications, from J2ME applications to open source library
...

Microsoft Visual C# 2015: An Introduction to Object-Oriented Programming
Microsoft Visual C# 2015: An Introduction to Object-Oriented Programming
Develop the strong programming skills you need for professional success with Farrell's MICROSOFT VISUAL C# 2015: AN INTRODUCTION TO OBJECT-ORIENTED PROGRAMMING, 6E. Approachable examples and a clear, straightforward style help you build a solid understanding of both structured and object-oriented programming concepts. You master critical...
Mastering IPython 4.0
Mastering IPython 4.0

Key Features

  • Most updated book on Interactive computing with IPython 4.0;
  • Detailed, example-rich guide that lets you use the most advanced level interactive programming with IPython;
  • Get flexible interactive programming with IPython using this comprehensive guide
...
Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))
Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))

ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY

 

Clearly explains core concepts, terminology, challenges, technologies, and skills

 

Covers today’s latest attacks and...

Beginner's Guide to Android App Development: A Practical Approach for Beginners
Beginner's Guide to Android App Development: A Practical Approach for Beginners
This book covers Android app design fundamentals in Android Studio using Java programming language.

The author assumes you have no experience in app development. The book starts with the installation of the required development environment and setting up the emulators. Then, the simplest “Hello World” app is
...
New Perspectives HTML5 and CSS3: Comprehensive
New Perspectives HTML5 and CSS3: Comprehensive
Now you can master Web page design as you learn from the unique, hands-on approach found in NEW PERSPECTIVES HTML5 AND CSS3: COMPREHENSIVE, 7E. Each tutorial in this complete book challenges you to put into practice the concepts you have just learned. Every tutorial includes a basic statement of the problem, the goals you should achieve, and a...
Result Page: 335 334 333 332 331 330 329 328 327 326 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy