Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Deep Learning Essentials: Your hands-on guide to the fundamentals of deep learning and neural network modeling
Deep Learning Essentials: Your hands-on guide to the fundamentals of deep learning and neural network modeling

Get to grips with the essentials of deep learning by leveraging the power of Python

Key Features

  • Your one-stop solution to get started with the essentials of deep learning and neural network modeling
  • Train different kinds of neural networks to tackle various problems in...
React Cookbook: Create dynamic web apps with React using Redux, Webpack, Node.js, and GraphQL
React Cookbook: Create dynamic web apps with React using Redux, Webpack, Node.js, and GraphQL

Over 66 hands-on recipes that cover UI development, animations, component architecture, routing, databases, testing, and debugging with React

Key Features

  • Use essential hacks and simple techniques to solve React application development challenges
  • Create native mobile...
Understanding Network Hacks: Attack and Defense with Python
Understanding Network Hacks: Attack and Defense with Python

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore...

Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software

Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate your own IAM stack.

The most common culprit of...

Applied Network Security
Applied Network Security

Master the art of detecting and averting advanced network security attacks and techniques

About This Book

  • Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
  • Become an expert in cracking WiFi...
Deep Learning Quick Reference: Useful hacks for training and optimizing deep neural networks with TensorFlow and Keras
Deep Learning Quick Reference: Useful hacks for training and optimizing deep neural networks with TensorFlow and Keras

Dive deeper into neural networks and get your models trained, optimized with this quick reference guide

Key Features

  • A quick reference to all important deep learning concepts and their implementations
  • Essential tips, tricks, and hacks to train a variety of deep learning...
The Definitive Guide to Django: Web Development Done Right
The Definitive Guide to Django: Web Development Done Right
Django, the Python-based equivalent to the Ruby on Rails web development framework, is presently one of the hottest topics in web development today. In The Definitive Guide to Django: Web Development Done Right, Adrian Holovaty, one of Django's creators, and Django lead developer Jacob Kaplan-Moss show you how they use this framework to...
Defensive Security Handbook: Best Practices for Securing Infrastructure
Defensive Security Handbook: Best Practices for Securing Infrastructure

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook...

Hacking BlackBerry: ExtremeTech
Hacking BlackBerry: ExtremeTech
Here's an even better way to get your BlackBerry fix

Admit it. You're addicted to your BlackBerry. That's okay. Most usersare, and this book is just going to make it worse. Now you'll discover how to use your BlackBerry to retrieve documents, weatherforecasts, and Web infor-mation; use it as a wordprocessor or...

Podcasting Hacks
Podcasting Hacks

Podcasting does for Internet audio listeners what TiVo does for television viewers--it puts you in charge of when you enjoy a program. Podcasting is a web-based broadcast medium that sends audio content (most commonly in the MP3 format) directly to an iPod or other digital audio player. You subscribe to audio feeds, receive new...

Group Policy: Fundamentals, Security, and the Managed Desktop
Group Policy: Fundamentals, Security, and the Managed Desktop

The Ultimate Book on Group Policy

Freshly updated to include Windows 7, Windows 8 and Windows Server 2012, Group Policy: Fundamentals, Security, and the Managed Desktop, Second Edition is the book for learning everything you need to know about Group Policy, no matter which version of Windows you use. Microsoft...

Java Deep Learning Projects: Implement 10 real-world deep learning applications using Deeplearning4j and open source APIs
Java Deep Learning Projects: Implement 10 real-world deep learning applications using Deeplearning4j and open source APIs

Build and deploy powerful neural network models using the latest Java deep learning libraries

Key Features

  • Understand DL with Java by implementing real-world projects
  • Master implementations of various ANN models and build your own DL systems
  • Develop...
Result Page: 21 20 19 18 17 16 15 14 13 12 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy