Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
Mastering Reverse Engineering: Re-engineer your ethical hacking skills
Mastering Reverse Engineering: Re-engineer your ethical hacking skills

Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses.

Key Features

  • Analyze and improvise software and hardware with real-world examples
  • Learn advanced debugging and patching...
Python Artificial Intelligence Projects for Beginners: Get up and running with Artificial Intelligence using 8 smart and exciting AI applications
Python Artificial Intelligence Projects for Beginners: Get up and running with Artificial Intelligence using 8 smart and exciting AI applications

Build smart applications by implementing real-world artificial intelligence projects

Key Features

  • Explore a variety of AI projects with Python
  • Get well-versed with different types of neural networks and popular deep learning algorithms
  • Leverage popular...
Hands-On Transfer Learning with Python: Implement advanced deep learning and neural network models using TensorFlow and Keras
Hands-On Transfer Learning with Python: Implement advanced deep learning and neural network models using TensorFlow and Keras

Deep learning simplified by taking supervised, unsupervised, and reinforcement learning to the next level using the Python ecosystem

Key Features

  • Build deep learning models with transfer learning principles in Python
  • implement transfer learning to solve real-world research...
Machine Learning Projects for Mobile Applications: Build Android and iOS applications using TensorFlow Lite and Core ML
Machine Learning Projects for Mobile Applications: Build Android and iOS applications using TensorFlow Lite and Core ML

Bring magic to your mobile apps using TensorFlow Lite and Core ML

Key Features

  • Explore machine learning using classification, analytics, and detection tasks.
  • Work with image, text and video datasets to delve into real-world tasks
  • Build apps for Android and...
Telecosmos: The Next Great Telecom Revolution
Telecosmos: The Next Great Telecom Revolution
An insider's guide to the exciting future of telecommunications

The last great telecommunications revolution brought us fiber optics, mobile phones, videoconferencing, and a host of other innovations that improved life and business and connected individuals in ways never imagined. Now emerging technologies such as Voice over Internet Protocol...

RFID Systems: Research Trends and Challenges
RFID Systems: Research Trends and Challenges

This book provides an insight into the 'hot' field of Radio Frequency Identification (RFID) Systems

In this book, the authors provide an insight into the field of RFID systems with an emphasis on networking aspects and research challenges related to passive Ultra High Frequency (UHF) RFID systems. The book reviews...

Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting
Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting
The book consists of a collection of works on utilising the automatic identification technology provided by Radio Frequency Identification (RFID) to address the problems of global counterfeiting of goods. The book presents current research, directed to securing supply chains against the efforts of counterfeit operators, carried out at the Auto-ID...
Bioinformatics: Problem Solving Paradigms
Bioinformatics: Problem Solving Paradigms
There are fundamental principles for problem analysis and algorithm design that are continuously used in bioinformatics. This book concentrates on a clear presentation of these principles, presenting them in a self-contained, mathematically clear and precise manner, and illustrating them with lots of case studies from main fields of bioinformatics...
RFID Handbook: Applications, Technology, Security, and Privacy
RFID Handbook: Applications, Technology, Security, and Privacy
Radio Frequency Identification (RFID) tagging is now used by the department of defense and many of the worlds largest retailers including Wal-Mart. As RFID continues to infiltrate industries worldwide, organizations must harness a clear understanding of this technology in order to maximize its potential and protect against the potential risks it...
An Introduction to Modeling and Simulation of Particulate Flows (Computational Science and Engineering)
An Introduction to Modeling and Simulation of Particulate Flows (Computational Science and Engineering)
The relatively recent increase in computational power available for mathematical modeling and simulation raises the possibility that modern numerical methods can play a significant role in the analysis of complex particulate flows. This introductory monograph focuses on basic models and physically based computational solution strategies for the...
A Transition to Abstract Mathematics, Second Edition: Learning Mathematical Thinking and Writing
A Transition to Abstract Mathematics, Second Edition: Learning Mathematical Thinking and Writing
This second edition assists engineering and physical science students on fundamental proof techniques and learning to think and write mathematics

Constructing concise and correct proofs is one of the most challenging aspects of learning to work with advanced mathematics. Meeting this challenge is a defining moment for those
...
Result Page: 34 33 32 31 30 29 28 27 26 25 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy