Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
PowerShell and Python Together: Targeting Digital Investigations
PowerShell and Python Together: Targeting Digital Investigations
Bring together the Python programming language and Microsoft’s PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators.

You will learn how to join PowerShell's robust set of commands and access to the
...
Algorithms in Java: Parts 1-4, Third Edition
Algorithms in Java: Parts 1-4, Third Edition

Sedgewick has a real gift for explaining concepts in a way that makes them easy to understand. The use of real programs in page-size (or less) chunks that can be easily understood is a real plus. The figures, programs, and tables are a significant contribution to the learning experience of the reader; they make this book...

Data Mining Algorithms in C++: Data Patterns and Algorithms for Modern Applications
Data Mining Algorithms in C++: Data Patterns and Algorithms for Modern Applications
Discover hidden relationships among the variables in your data, and learn how to exploit these relationships.  This book presents a collection of data-mining algorithms that are effective in a wide variety of prediction and classification applications.  All algorithms include an intuitive explanation of operation, essential...
Analog-and-Algorithm-Assisted Ultra-low Power Biosignal Acquisition Systems (Analog Circuits and Signal Processing)
Analog-and-Algorithm-Assisted Ultra-low Power Biosignal Acquisition Systems (Analog Circuits and Signal Processing)
This book discusses the design and implementation aspects of ultra-low power biosignal acquisition platforms that exploit analog-assisted and algorithmic approaches for power savings.The authors describe an approach referred to as “analog-and-algorithm-assisted” signal processing.This enables significant power consumption...
Secure Coding in C and C++
Secure Coding in C and C++

"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append...

Algorithms in C++, Parts 1-4: Fundamentals, Data Structure, Sorting, Searching (3rd Edition) (Pts. 1-4)
Algorithms in C++, Parts 1-4: Fundamentals, Data Structure, Sorting, Searching (3rd Edition) (Pts. 1-4)

Robert Sedgewick has thoroughly rewritten and substantially expanded and updated his popular work to provide current and comprehensive coverage of important algorithms and data structures. Christopher Van Wyk and Sedgewick have developed new C++ implementations that both express the methods in a concise and direct manner, and...

Optimizing Compilers for Modern Architectures: A Dependence-based Approach
Optimizing Compilers for Modern Architectures: A Dependence-based Approach

Modern computer architectures designed with high-performance microprocessors offer tremendous potential gains in performance over previous designs. Yet their very complexity makes it increasingly difficult to produce efficient code and to realize their full potential. This landmark text from two leaders in the field focuses on the pivotal role...

PostgreSQL 10 High Performance: Expert techniques for query optimization, high availability, and efficient database maintenance
PostgreSQL 10 High Performance: Expert techniques for query optimization, high availability, and efficient database maintenance

Leverage the power of PostgreSQL 10 to design, administer and maintain a high-performance database solution

Key Features

  • Obtain optimal PostgreSQL 10 database performance, ranging from initial design to routine maintenance
  • Fine tune the performance of your queries and...
Microsoft Encyclopedia of Security
Microsoft Encyclopedia of Security

Get the single resource that defines—and illustrates—the rapidly evolving world of computer and network security. The Microsoft Encyclopedia of Security delivers more than 1000 cross-referenced entries detailing the latest security-related technologies, standards, products, services, and issues—including sources...

RabbitMQ Cookbook
RabbitMQ Cookbook

Knowing a reliable enterprise messaging system based on the AMQP standard can be an essential for today’s software developers. This cookbook helps you learn all the basics of RabbitMQ through recipes, code, and real-life examples.

Overview

  • Create scalable distributed applications with RabbitMQ
  • ...
The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things
The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things
Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.  

You’ll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE
...
Mastering Python Design Patterns: A guide to creating smart, efficient, and reusable software, 2nd Edition
Mastering Python Design Patterns: A guide to creating smart, efficient, and reusable software, 2nd Edition

Exploit various design patterns to master the art of solving problems using Python

Key Features

  • Master the application design using the core design patterns and latest features of Python 3.7
  • Learn tricks to solve common design and architectural challenges
  • ...
Result Page: 42 41 40 39 38 37 36 35 34 33 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy