Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning Ethical Hacking with Python
Beginning Ethical Hacking with Python

Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world...

The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)

Actionable guidance and expert perspective for real-world cybersecurity

The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world...

Communicating Science: A Practical Guide for Engineers and Physical Scientists
Communicating Science: A Practical Guide for Engineers and Physical Scientists

Read this book before you write your thesis or journal paper! Communicating Science is a textbook and reference on scientific writing oriented primarily at researchers in the physical sciences and engineering. It is written from the perspective of an experienced researcher. It draws on the authors' experience of teaching and working with...

CCNA Cyber Ops SECOPS 210-255 Official Cert Guide (Certification Guide)
CCNA Cyber Ops SECOPS 210-255 Official Cert Guide (Certification Guide)

Learn, prepare, and practice for CCNA Cyber Ops SECOPS #210-255 exam success with this Official Cert Guide from Pearson IT Certification, a leader in IT Certification learning.

  • Master CCNA Cyber Ops SECOPS #210-255 exam topics
Raspberry Pi for Python Programmers Cookbook - Second Edition
Raspberry Pi for Python Programmers Cookbook - Second Edition

About This Book

  • Install your first operating system, share files over the network, and run programs remotely
  • Construct robots and interface with your own circuits and purpose built add-ons, as well as adapt off-the-shelf household devices using this pragmatic guide
  • Packed with clear,...
Django: Web Development with Python
Django: Web Development with Python

About This Book

  • Explore the best practices to develop applications of a superior quality with Django framework
  • Unravel the common problems of web development in Django
  • This course teaches you major Django functions and will help you improve your skills by developing models, forms, views, and...
The Art of War in the Network Age: Back to the Future (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)
The Art of War in the Network Age: Back to the Future (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)

Previous studies have looked at the contribution of information technology and network theory to the art of warfare as understood in the broader sense. This book, however, focuses on an area particularly important in understanding the significance of the information revolution; its impact on strategic theory. The purpose of the book is to...

C Programming - An Advanced Course
C Programming - An Advanced Course

This book takes up where C Programming - A Beginner's Course leaves off. It assumes you have a working knowledge of basic programming concepts such as variables, constants, assignment, selection (if..else) and looping (while, for). It also assumes you are comfortable with writing functions and working with arrays. If you are not, it is...

Foundations of Computer Vision: Computational Geometry, Visual Image Structures and Object Shape Detection (Intelligent Systems Reference Library)
Foundations of Computer Vision: Computational Geometry, Visual Image Structures and Object Shape Detection (Intelligent Systems Reference Library)

This book introduces the fundamentals of computer vision (CV), with a focus on extracting useful information from digital images and videos. Including a wealth of methods used in detecting and classifying image objects and their shapes, it is the first book to apply a trio of tools (computational geometry, topology and algorithms) in solving...

Game Development Patterns and Best Practices: Better games, less hassle
Game Development Patterns and Best Practices: Better games, less hassle

Utilize proven solutions to solve common problems in game development

About This Book

  • Untangle your game development workflow, make cleaner code, and create structurally solid games
  • Implement key programming patterns that will enable you to make efficient AI and remove duplication
  • ...
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence

Investigate crimes involving cryptocurrencies and other blockchain technologies

Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their...

Street-Fighting Mathematics: The Art of Educated Guessing and Opportunistic Problem Solving (The MIT Press)
Street-Fighting Mathematics: The Art of Educated Guessing and Opportunistic Problem Solving (The MIT Press)
Too much mathematical rigor teaches rigor mortis: the fear of making an unjustified leap even when it lands on a correct result. Instead of paralysis, have courage—shoot first and ask questions later. Although unwise as public policy, it is a valuable problem-solving philosophy, and it is the theme of this book: how to...
Result Page: 760 759 758 757 756 755 754 753 752 751 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy