Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data
Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data

Learn to evaluate and compare data encryption methods and attack cryptographic systems

Key Features

  • Explore popular and important cryptographic methods
  • Compare cryptographic modes and understand their limitations
  • Learn to perform attacks on cryptographic...
Visual Perception for Humanoid Robots: Environmental Recognition and Localization, from Sensor Signals to Reliable 6D Poses (Cognitive Systems Monographs (38))
Visual Perception for Humanoid Robots: Environmental Recognition and Localization, from Sensor Signals to Reliable 6D Poses (Cognitive Systems Monographs (38))
This book provides an overview of model-based environmental visual perception for humanoid robots. The visual perception of a humanoid robot creates a bidirectional bridge connecting sensor signals with internal representations of environmental objects. The objective of such perception systems is to answer two fundamental...
Algorithms in Java: Parts 1-4, Third Edition
Algorithms in Java: Parts 1-4, Third Edition

Sedgewick has a real gift for explaining concepts in a way that makes them easy to understand. The use of real programs in page-size (or less) chunks that can be easily understood is a real plus. The figures, programs, and tables are a significant contribution to the learning experience of the reader; they make this book...

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Visual Basic® .NET Power Coding
Visual Basic® .NET Power Coding

Visual Basic(R) .NET Power Coding is the experienced developer's guide to mastering advanced Visual Basic .NET concepts. Paul Kimmel saves readers time and money by providing thorough explanations of essential topics so you can quickly begin creating robust programs that have fewer bugs. He...

Professional Windows PowerShell (Programmer to Programmer)
Professional Windows PowerShell (Programmer to Programmer)
Professional Windows® PowerShell

Forget everything you know about the Windows command line because you're about to enter a whole new ballgame. Windows PowerShell provides a new environment for interactive exploration and administration of Windows machines that's different from and more consistent than what you've previously used on Windows...

10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and...

Optimizing Compilers for Modern Architectures: A Dependence-based Approach
Optimizing Compilers for Modern Architectures: A Dependence-based Approach

Modern computer architectures designed with high-performance microprocessors offer tremendous potential gains in performance over previous designs. Yet their very complexity makes it increasingly difficult to produce efficient code and to realize their full potential. This landmark text from two leaders in the field focuses on the pivotal role...

Cisco Network Design Solutions for Small-Medium Businesses
Cisco Network Design Solutions for Small-Medium Businesses

Maximize the potential of your small-medium business network with effective design solutions that cover network security, IP telephony, unified communications, wireless networks, and CRM.

  • Design and implement effective network solutions by mastering the design process that is used by...

TensorFlow Machine Learning Cookbook: Over 60 recipes to build intelligent machine learning systems with the power of Python, 2nd Edition
TensorFlow Machine Learning Cookbook: Over 60 recipes to build intelligent machine learning systems with the power of Python, 2nd Edition

Skip the theory and get the most out of Tensorflow to build production-ready machine learning models

Key Features

  • Exploit the features of Tensorflow to build and deploy machine learning models
  • Train neural networks to tackle real-world problems in Computer Vision and...
The Jericho Principle: How Companies Use Strategic Collaboration to Find New Sources of Value
The Jericho Principle: How Companies Use Strategic Collaboration to Find New Sources of Value
Understanding the opportunities and dangers of innovation through intercompany collaboration
The Jericho Principle identifies key trends and patterns in the increasing use of collaboration by corporations and creates a strategic and operational framework for answering key questions about the why and how of using collaboration to rapidly
...
Microsoft Encyclopedia of Security
Microsoft Encyclopedia of Security

Get the single resource that defines—and illustrates—the rapidly evolving world of computer and network security. The Microsoft Encyclopedia of Security delivers more than 1000 cross-referenced entries detailing the latest security-related technologies, standards, products, services, and issues—including sources...

Result Page: 42 41 40 39 38 37 36 35 34 33 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy