Home | Amazing | Today | Tags | Publishers | Years | Search 
Python Graphics: A Reference for Creating 2D and 3D Images
Python Graphics: A Reference for Creating 2D and 3D Images
Use Python's built-in features to create innovative graphics for data visualization and technical illustrations. This book goes beyond simple commands and libraries to explain how to not only display but also rotate, shade, and edit graphics for any purpose. 

Starting with the essential Python functions to set up a
...
Numerical Computing with Python: Harness the power of Python to analyze and find hidden patterns in the data
Numerical Computing with Python: Harness the power of Python to analyze and find hidden patterns in the data

Understand, explore, and effectively present data using the powerful data visualization techniques of Python

Key Features

  • Use the power of Pandas and Matplotlib to easily solve data mining issues
  • Understand the basics of statistics to build powerful predictive data...
Mastering Reverse Engineering: Re-engineer your ethical hacking skills
Mastering Reverse Engineering: Re-engineer your ethical hacking skills

Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses.

Key Features

  • Analyze and improvise software and hardware with real-world examples
  • Learn advanced debugging and patching...
Data Mining Algorithms in C++: Data Patterns and Algorithms for Modern Applications
Data Mining Algorithms in C++: Data Patterns and Algorithms for Modern Applications
Discover hidden relationships among the variables in your data, and learn how to exploit these relationships.  This book presents a collection of data-mining algorithms that are effective in a wide variety of prediction and classification applications.  All algorithms include an intuitive explanation of operation, essential...
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring...
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.

Key Features

  • Learn how to test for common bugs
  • Discover tools and methods for hacking ethically
  • Practice working through pentesting engagements...
Markov Chains: Models, Algorithms and Applications (International Series in Operations Research & Management Science)
Markov Chains: Models, Algorithms and Applications (International Series in Operations Research & Management Science)
Markov chains are a particularly powerful and widely used tool for analyzing a variety of stochastic (probabilistic) systems over time. This monograph will present a series of Markov models, starting from the basic models and then building up to higher-order models. Included in the higher-order discussions are multivariate models, higher-order...
My War Criminal: Personal Encounters with an Architect of Genocide
My War Criminal: Personal Encounters with an Architect of Genocide

An investigation into the nature of violence, terror, and trauma through conversations with a notorious war criminal by Jessica Stern, one of the world's foremost experts on terrorism.

Between October 2014 and November 2016, global terrorism expert Jessica Stern held a series of conversations in a...

Expert T-SQL Window Functions in SQL Server 2019: The Hidden Secret to Fast Analytic and Reporting Queries
Expert T-SQL Window Functions in SQL Server 2019: The Hidden Secret to Fast Analytic and Reporting Queries
Become an expert who can use window functions to solve T-SQL query problems. Replace slow cursors and self-joins with queries that are easy to write and perform better. This new edition provides expanded examples, including a chapter from the world of sports, and covers the latest performance enhancements through SQL Server 2019. ...
Biased: Uncovering the Hidden Prejudice That Shapes What We See, Think, and Do
Biased: Uncovering the Hidden Prejudice That Shapes What We See, Think, and Do
"A fascinating new book... [Dr. Jennifer Eberhardt is] a genius."—Trevor Noah, The Daily Show with Trevor Noah

"Poignant....important and illuminating."—The New York Times Book Review

"Groundbreaking."—Bryan Stevenson, New York Times
...
War and Childhood in the Era of the Two World Wars (Publications of the German Historical Institute)
War and Childhood in the Era of the Two World Wars (Publications of the German Historical Institute)
The histories of modern war and childhood were the result of competing urgencies. According to ideals of childhood widely accepted throughout the world by 1900, children should have been protected, even hidden, from conflict and danger. Yet at a time when modern ways of childhood became increasingly possible for economic, social, and political...
Tell Your Children: The Truth About Marijuana, Mental Illness, and Violence
Tell Your Children: The Truth About Marijuana, Mental Illness, and Violence
An eye-opening report from an award-winning author and former New York Times reporter reveals the link between teenage marijuana use and mental illness, and a hidden epidemic of violence caused by the drug—facts the media have ignored as the United States rushes to legalize cannabis.

Recreational
...
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy