Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks

Know how to set up, defend, and attack computer networks with this revised and expanded second edition.

You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You will continue with more...

The Essential Family Guide to Caring for Older People
The Essential Family Guide to Caring for Older People

No one wants to think about getting older. It's true. At any age, when things are moving along normally day to day and everyone seems fit and well, there seems no reason to think about future problems that your friends and relatives might (and probably will) come across as they age. In fact, it might even seem a little morbid to...

Blockchain Basics: A Non-Technical Introduction in 25 Steps
Blockchain Basics: A Non-Technical Introduction in 25 Steps

In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used. No previous knowledge in computer science, mathematics, programming, or cryptography is required. Terminology is explained through pictures, analogies, and metaphors.

This book...

Mathematica Cookbook
Mathematica Cookbook

Mathematica Cookbook helps you master the application's core principles by walking you through real-world problems. Ideal for browsing, this book includes recipes for working with numerics, data structures, algebraic equations, calculus, and statistics. You'll also venture into exotic territory with recipes for data...

Python Social Media Analytics: Analyze and visualize data from Twitter, YouTube, GitHub, and more
Python Social Media Analytics: Analyze and visualize data from Twitter, YouTube, GitHub, and more

Leverage the power of Python to collect, process, and mine deep insights from social media data

About This Book

  • Acquire data from various social media platforms such as Facebook, Twitter, YouTube, GitHub, and more
  • Analyze and extract actionable insights from your social data using various...
The Blockchain Alternative: Rethinking Macroeconomic Policy and Economic Theory
The Blockchain Alternative: Rethinking Macroeconomic Policy and Economic Theory

Examine what would happen if we were to deploy blockchain technology at the sovereign level and use it to create a decentralized cashless economy. This book explains how finance and economics work today, and how the convergence of various technologies related to the financial sector can help us find solutions to problems,...

Become a Python Data Analyst: Perform exploratory data analysis and gain insight into scientific computing using Python
Become a Python Data Analyst: Perform exploratory data analysis and gain insight into scientific computing using Python

Enhance your data analysis and predictive modeling skills using popular Python tools

Key Features

  • Cover all fundamental libraries for operation and manipulation of Python for data analysis
  • Implement real-world datasets to perform predictive analytics with Python
  • ...
Beginning Jenkins Blue Ocean: Create Elegant Pipelines With Ease
Beginning Jenkins Blue Ocean: Create Elegant Pipelines With Ease
Dive deep into Jenkins Blue Ocean and discover how easy creating a pipeline can be. You’ll see how Blue Ocean provides a better user experience when designing, running, and visualizing pipelines. This book shows you its intuitive user interface and its powerful pipeline editor and how this makes it a tool for everyone....
Identity and Data Security for Web Development: Best Practices
Identity and Data Security for Web Development: Best Practices

Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you’ll learn how...

UX for Developers: How to Integrate User-Centered Design Principles Into Your Day-to-Day Development Work
UX for Developers: How to Integrate User-Centered Design Principles Into Your Day-to-Day Development Work

Become more mindful of the user when building digital products, and learn how to integrate a user-centered approach into your thinking as a web or app developer. This book shows you how the user experience is the responsibility of everyone involved in creating the product and how to redefine development principles when building...

Building Embedded Linux Systems
Building Embedded Linux Systems
There's a great deal of excitement surrounding the use of Linux in embedded systems -- for everything from cell phones to car ABS systems and water-filtration plants -- but not a lot of practical information. Building Embedded Linux Systems offers an in-depth, hard-core guide to putting together embedded systems based on Linux.
...
Handbook of Modern Sensors: Physics, Designs, and Applications
Handbook of Modern Sensors: Physics, Designs, and Applications
Seven years have passed since the publication of the previous edition of this book. During that time, sensor technologies have made a remarkable leap forward. The sensitivity of the sensors became higher, the dimensions became smaller, the selectivity became better, and the prices became lower. What have not changed are the...
Result Page: 80 79 78 77 76 75 74 73 72 71 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy