Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Networking Fundamentals
Networking Fundamentals

A clear and concise resource on Windows networking, perfect for IT beginners

Did you know that nearly 85% of IT support roles require a good understanding of networking concepts? If you are looking to advance your IT career, you will need a foundational understanding of Windows networking. Network...

Achieving DevOps: A Novel About Delivering the Best of Agile, DevOps, and Microservices
Achieving DevOps: A Novel About Delivering the Best of Agile, DevOps, and Microservices
Ben is stuck. A development lead with a strong vision for how the intersection of development and operations at his office can be improved, he can’t help but feel overwhelmed and discouraged by common problems such as slow turnaround time, rushed and ineffective handover documentation, mounting technical debt, and a...
Learning Linux Shell Scripting
Learning Linux Shell Scripting

Unleash the power of shell scripts to solve real-world problems by breaking through the practice of writing tedious code

About This Book

  • Learn how to efficiently and effectively build shell scripts and develop advanced applications with this handy book
  • Develop high...
Data Mining: Foundations and Practice (Studies in Computational Intelligence)
Data Mining: Foundations and Practice (Studies in Computational Intelligence)
The IEEE ICDM 2004 workshop on the Foundation of Data Mining and the IEEE ICDM 2005 workshop on the Foundation of Semantic Oriented Data and Web Mining focused on topics ranging from the foundations of data mining to new data mining paradigms. The workshops brought together both data mining researchers and practitioners to discuss these two...
Understand, Manage, and Prevent Algorithmic Bias: A Guide for Business Users and Data Scientists
Understand, Manage, and Prevent Algorithmic Bias: A Guide for Business Users and Data Scientists

Are algorithms friend or foe?

The human mind is evolutionarily designed to take shortcuts in order to survive. We jump to conclusions because our brains want to keep us safe. A majority of our biases work in our favor, such as when we feel a car speeding in our direction is dangerous and we instantly move, or when we...

Professional Red Teaming: Conducting Successful Cybersecurity Engagements
Professional Red Teaming: Conducting Successful Cybersecurity Engagements

Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools.

...

Qt5 Python GUI Programming Cookbook: Building responsive and powerful cross-platform applications with PyQt
Qt5 Python GUI Programming Cookbook: Building responsive and powerful cross-platform applications with PyQt

Over 60 recipes to help you design interactive, smart, and cross-platform GUI applications

Key Features

  • Get succinct QT solutions to pressing GUI programming problems in Python
  • Learn how to effectively implement reactive programming
  • Build customized...
Building Telegram Bots: Develop Bots in 12 Programming Languages using the Telegram Bot API
Building Telegram Bots: Develop Bots in 12 Programming Languages using the Telegram Bot API
Learn about bot programming, using all the latest and greatest programming languages, including Python, Go, and Clojure, so you can feel at ease writing your Telegram bot in a way that suits you.

This book shows how you can use bots for just about everything: they connect, they respond,
...
Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a
Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a

Do you want to learn ethical hacking/ penetration testing but not sure where to begin? Does the amount of information on the web make you feel overwhelmed and confused? Or maybe your looking to start a career as an ethical hacker and want to further your skills? How about step by step, methodical, literally foolproof approaches to be...

From Java to Ruby: Things Every Manager Should Know
From Java to Ruby: Things Every Manager Should Know
As I drove across the central Texas landscape, my excitement and anxiety were both building. I was driving to a new client that would change everything for me. This short trip would take me an hour south to a small college town, but symbolically I was beginning a much longer journey. I was going from Java to Ruby.

The past year, I had
...
Business Intelligence with SQL Server Reporting Services
Business Intelligence with SQL Server Reporting Services

Business Intelligence with SQL Server Reporting Services helps you deliver business intelligence with panache. Harness the power of the Reporting Services toolkit to combine charts, gauges, sparklines, indicators, and maps into compelling dashboards and scorecards. Create compelling visualizations that seize your audience’s...

Hands-On Reactive Programming with Python: Event-driven development unraveled with RxPY
Hands-On Reactive Programming with Python: Event-driven development unraveled with RxPY

A comprehensive guide to help you understand the principles of Reactive and asynchronous programming and its benefits

Key Features

  • Explore the advantages of Reactive programming
  • Use concurrency and parallelism in RxPY to build powerful reactive applications
  • ...
Result Page: 84 83 82 81 80 79 78 77 76 75 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy