Python: Master the Art of Design Patterns
About This Book
Learn all about abstract design patterns and how to implement them in Python 3
Understand the structural, creational, and behavioral Python design patterns
Get to know the context and application of design patterns to solve real-world problems in software...
Penetration Testing Essentials
Your pen testing career begins here, with a solid foundation in essential skills and concepts
Penetration Testing Essentials provides a starting place for professionals and beginners looking to learn more about penetration testing for cybersecurity. Certification eligibility requires work experience—but before...
Internet of Things and Data Analytics Handbook
This book examines the Internet of Things (IoT) and Data Analytics from a technical, application, and business point of view.
Internet of Things and Data Analytics Handbook describes essential technical knowledge, building blocks, processes, design principles, implementation, and marketing...
Python Data Science Handbook: Essential Tools for Working with Data
For many researchers, Python is a first-class tool mainly because of its libraries for storing, manipulating, and gaining insight from data. Several resources exist for individual pieces of this data science stack, but only with the Python Data Science Handbook do you get them all—IPython, NumPy, Pandas, Matplotlib,...
Lean Python: Learn Just Enough Python to Build Useful Tools
Learn only the essential aspects of Python without cluttering up your mind with features you may never use. This compact book is not a "best way to write code" type of book; rather, the author goes over his most-used functions, which are all you need to know as a beginner and some way beyond.
The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that...
|Result Page: 344 343 342 341 340 339 338 337 336 335 |