Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Bioinformatics: High Performance Parallel Computer Architectures (Embedded Multi-Core Systems)
Bioinformatics: High Performance Parallel Computer Architectures (Embedded Multi-Core Systems)

New sequencing technologies have broken many experimental barriers to genome scale sequencing, leading to the extraction of huge quantities of sequence data. This expansion of biological databases established the need for new ways to harness and apply the astounding amount of available genomic information and convert it into substantive...

The Design of Everyday Things: Revised and Expanded Edition
The Design of Everyday Things: Revised and Expanded Edition
Even the smartest among us can feel inept as we fail to figure out which light switch or oven burner to turn on, or whether to push, pull, or slide a door. The fault, argues this ingenious—even liberating—book, lies not in ourselves, but in product design that ignores the needs of users and the principles of cognitive...
Hands-On Machine Learning for Algorithmic Trading: Design and implement investment strategies based on smart algorithms that learn from data using Python
Hands-On Machine Learning for Algorithmic Trading: Design and implement investment strategies based on smart algorithms that learn from data using Python

Explore effective trading strategies in real-world markets using NumPy, spaCy, pandas, scikit-learn, and Keras

Key Features

  • Implement machine learning algorithms to build, train, and validate algorithmic models
  • Create your own algorithmic design process to apply...
Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network
Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network

This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical...

Mastering Parallel Programming with R
Mastering Parallel Programming with R

Master the robust features of R parallel programming to accelerate your data science computations

About This Book

  • Create R programs that exploit the computational capability of your cloud platforms and computers to the fullest
  • Become an expert in writing the most efficient and highest...
The Hacker Playbook: Practical Guide To Penetration Testing
The Hacker Playbook: Practical Guide To Penetration Testing

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the...

Network Security Assessment: From Vulnerability to Patch
Network Security Assessment: From Vulnerability to Patch
This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks.

This is unique in that it details both the management and technical skill and tools
...
The Best Damn IT Security Management Book Period
The Best Damn IT Security Management Book Period
This chapter will address vulnerabilities and why they are important. It also discusses a concept known as Windows of Vulnerability, and shows how to determine the risk a given vulnerability poses to your environment.

What Are Vulnerabilities?

So, what are
...
High Definition Postproduction: Editing and Delivering HD Video
High Definition Postproduction: Editing and Delivering HD Video
Avoid costly missteps in postproduction and get it right the first time with this book. Written by an in-the-trenches professional who works with HD every day, High Definition Postproduction is an overview of this exciting opportunity for film and video production and postproduction professionals. High Definition production and editing is here and...
Cryptanalysis of RSA and Its Variants
Cryptanalysis of RSA and Its Variants

Thirty years after RSA was first publicized, it remains an active research area. Although several good surveys exist, they are either slightly outdated or only focus on one type of attack. Offering an updated look at this field, Cryptanalysis of RSA and Its Variants presents the best known mathematical attacks on RSA and its...

Learn iOS 8 App Development
Learn iOS 8 App Development

Learn iOS 8 App Development is both a rapid tutorial and a useful reference. You'll quickly get up to speed with Swift (Apple's powerful new programming language), Cocoa Touch, and the iOS 8 SDK. It's an all-in-one getting started guide to building useful apps. You'll learn best practices that ensure your code will be...

Accelerated C# 2008
Accelerated C# 2008
C# 2008 offers powerful new features, and Accelerated C# 2008 is the fastest path to mastering them, and the rest of C#, for both experienced C# programmers moving to C# 2008 and programmers moving to C# from another object-oriented language. Many books introduce C#, but very few also explain how to use it optimally with the .NET common...
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy